Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
32 Cards in this Set
- Front
- Back
Host/Client |
Client/Host architecture allows for multiple clients to connect and share resources on host servers. |
|
Application Server |
A server that is designed for or dedicated to running specific applications |
|
Hub |
Central connection point for network (OSI Layer 1 Physical) |
|
Switch |
central connection point for a network (OSI Layer 2 Data Link) |
|
Router |
A networking device that forwards packets between networks by determining the best path to the destination. (OSI layer 3 Networking) |
|
WAP |
Wireless application protocol |
|
Proxy server |
a server that acts as an intermediary for request from clients seeking resources from other services. |
|
Firewall |
The first line of defense for a network. |
|
Back up |
Making copies of data so that these additional copies may be used to restore the original after a data loss event. |
|
Repeater |
an electronic device that receives a signal, cleans it or unnecessary noise, and regenerates it, and retransmits it at a higher power level. (OSI layer 1 physical) |
|
Topology |
Refers to the physical arrangement of a LANs components. |
|
Bus |
uses a common backbone or single cable to connect all devices |
|
Star |
features a central connection point (hub, switch, router) |
|
Ring |
Every device has exactly two neighbors for communication purposes. |
|
Mesh |
a network where all the nodes are connected to each other |
|
LAN |
Local area network |
|
WAN |
Wide Area Network |
|
MAN |
Metropolitan Area Network |
|
GAN |
Global Area Network |
|
OSI Model |
1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application
(Acronym: Please Do Not Throw Sausage Pizza Away or P. Diddy Needs To Stop Producing Albums) |
|
NIPRNET |
Non-Classified Internet Protocol Router Network |
|
SIPRNET |
Secret Internet Protocol Router Network |
|
JWICS |
Joint Worldwide Intelligence Communication Systems |
|
Virus |
Malicious code written with an intention to damage the user's computer |
|
Worm |
self replicating malware |
|
Trojan |
a harmful piece of malware that looks legitimate |
|
Backdoor |
program that a hacker installs on a target system to allow access to the system at a later time. |
|
Phishing |
criminally fraudulent process of attempting to acquire sensitive info such as usernames, passwords, etc. by masquerading as a trustworthy entity in an electronic communication. |
|
Brute Force Attack |
a strategy used to break the encryption of data |
|
Social Engineering |
the act of manipulating people into performing actions or divulging confidential information. |
|
PKI |
Public Key Infrastructure |
|
DNS |
Domain Name System: translates alphabetic domain names into numeric IP addresses. |