• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/45

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

45 Cards in this Set

  • Front
  • Back

Collaboration Tools

Allow individuals to communicate with each other, often across real-time interactive video.

Blogs

"WebLogs" are web pages that are easy to edit and update. Are a mean of communicating thoughts.

Wikis

Web pages that groups of people can edit and view together.

Podcasting

Deliver audio records to a wide audience.

Peer-To-Peer File Sharing

Share files without having to store and download them from a central server.

Network Interface Card [NIC]

Local Area Network [LAN] Adapter that provides physical connection to the network.

Physical Port

Connector or outlet on a network device where the network media is connected to an end device or another network device.

Interface

Specialised ports on a networking device that connect to individual network.

Local Area Network [LAN]

Provides access to the network in a small geographical area.

Wide Area Network [WAN]

Provides access to the network in a wide geographical area.

Metropolitan Area Network [MAN]

Provides access to the network in a range wider than a Local Area Network [LAN] but smaller than a Wide Area Network [WAN].

Wireless Local Area Network [WLAN]

Wirelessly provides access to the network in a small geographical area.

Storage Area Network [SAN]

A network infrastructure designed to support file servers and manage data.

Intranet

Private connection of Local Area Networks [LANs] and Wide Area Networks [WANs] that belongs to an organization.

Extranet

Provides secure and safe access to individuals that work for other organization, but still need the access.

Cable Connection

Provides connection as well as television signal through the same method.

Digital Subscriber Line [DSL] Connection

Provides connection while it runs through the telephone cable.

Fault Tolerance

A network that limits the impact of failure, so that the fewest number of devices are affected. Also, it is built in a way that allows quick recovery when a failure occurs.

Scalability

A network that can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users.

Quality of Service [QoS]

A network that prevents congestion of bandwidth.

Data Confidentiality

Only the intended and authorized recipients can access and read data.

Data Integrity

Having the assurance that the information has not been altered in transmission, from origin to destination.

Data Availability

Having the assurance of timely and reliable access to data services for authorized users.

Wireless Internet Service Provider [WISP]

Connect subscribers to a designated access point or hot spot. Commonly used in rural areas.

Wireless Broadband Service

Uses the same cellular technology used to access the Internet with a smart phone or tablet. Using an antenna that provides wireless connection in a home.

Viruses, worms, and trojan horses

Malicious software and arbitrary code running on a user device.

Spyware and adware

Software installed on a user device that secretly collects information about the user

Denial of service attacks

Attacks designed to slow or crash applications and processes on a network device.

Data interception and theft

Capture private information from an organization’s network.

Identity theft

Steal the login credentials of a user in order to access private data.

Anti-virus and anti-spyware

These are used to protect end devices from becoming infected with malicious software.

Firewall filtering

This is used to block unauthorized access to the network.

Access control lists [ACL]

These are used to further filter access and traffic forwarding.

Intrusion prevention systems [IPS]

These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.

Virtual private networks [VPN]

These are used to provide secure access to remote workers.

Command-Line Interface [CLI]

Access to a computer operating system or an application through visual prompt of commands.

Console

Physical management port that provides out-of-band access to a Cisco device.

Secure Shell [SSH]

Method for remotely establishing a secure Command Line Interface [CLI] connection through a virtual interface, over a network.

Telnet

Insecure method of remotely establishing a Command Line Interface [CLI] session through a virtual interface, over a network. User authentication, passwords, and commands are sent over the network in plaintext.

Legacy Auxiliary Port [AUX]

Establish a Command Line Interface [CLI] session remotely using a modem. Is out-of-band and does not require networking services to be configured or available.

startup-config [Command]

The file stored in Non-Volatile Random Access Memory [NVRAM] that contains all of the commands that will be used by the device upon startup or reboot.

running-config [Command]

The file stored in Random Access Memory [RAM] that reflects the current configuration.

Access Method

Determines when someone is able to send a message. Hosts on a network need it to know when to begin sending messages and how to respond when errors occur.

Flow Control

In network communication, source and destination hosts use it to negotiate correct timing for successful communication.

Response Timeout

Rules that hosts have in the networks to specify how long to wait for responses and what action to take if a response timeout occurs.