• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

10Base2

An Ethernet topology using thin Ethernet coaxial cable, also known as ThinEthernet or thinnet. The maximum distance per segment is 185 meters.

Coaxial cable - Thinnet

10Base5

An Ethernet topology using thick Ethernet coaxial cable, also known as ThickEthernet or thicknet. 10Base5 was once commonly used for backbones in Ethernetnetworks. This is an older network architecture that has been replaced by 10BaseT,100BaseT, and now 1000BaseT. The maximum distance per segment is 500 meters.

Thicknet

10BaseT

An Ethernet topology using unshielded twisted-pair cable, also known astwisted-pair. 10BaseT has become the most popular Ethernet cable, because manybuildings are already wired for 10BaseT, it is inexpensive and easy to work with, and ifthe cable specifications are CAT5, it can transmit data at 100 Mbps. The maximumdistance per segment is 100 meters.

Twisted-pair

100BaseT

An Ethernet topology using CAT5 twisted-pair cable to transmit at 100 Mbps,also known as Fast Ethernet. The maximum distance per segment is 100 meters.

Fast Ethernet

1000BaseT

An Ethernet topology using CAT5e twisted-pair cable to transmit at 1000Mbps, also known as Gigabit Ethernet. The maximum distance per segment is 100 meters.

Gigabit Ethernet

Acceptable use policy (AUP)

The acceptable use policy is part of the company securitypolicy that specifies what the company considers acceptable use of company assets suchas cell phones, laptops, Internet, and e-mail.

Access control entry (ACE)

An entry within the access control list that specifies anauditing entry or an access permission for a security principle, such as specific user, or fora group of users, on an object.

access control list (ACL)

A list of security permissions or audit settings to an object.

access methods

The rules governing the use of the physical network by various devices.An access method determines how data is submitted on the wire. Two examples of accessmethods are token passing and CSMA/CD.

access permissions

Access permissions are types of access to an object within anoperation system. Windows includes a number of access permissions, including read,execute, and modify.

access point

An access point, also known as a wireless access point, is a device thatallows wireless clients to connect to a wired network through the access point.

account

An account, or user account, provides access to the network. It contains theinformation enabling a person to use the network, including user name and logonspecifications, password, and rights to directories and resources.

account lockout

A feature that locks out an account after a certain number of unsuccessfullogon attempts (three bad attempts are a common choice). Typically, a locked account canno longer be used until the administrator unlocks it. This helps prevent hackers frombreaking into accounts.

account policies

A set of rules for password usage and account lockout.

account restrictions

Determines when and how a user gains access to the network.

acknowledgment (ACK)

A packet of information sent from the recipient computer to thesending computer for the purpose of verifying that a transmission has been received. Anunsuccessful transmission will generate a negative acknowledgment (NACK).

Active Directory

A Microsoft Windows directory service holding network accounts,groups, and group policy objects.

Active Hub

A hub device used in a star topology to regenerate the signal and distribute datato each node connected to the hub. Unlike a passive hub, the active hub requireselectricity. See also hub and passive hub.

Active Partition

Indicates which bootable partition is booted when the system is poweredon.

Adapter

The term used for a card that is inserted into the system to provide functionality,such as a network adapter, which provides connectivity to the network.

Address Resolution

The process of finding the address of a host using another addressform. For example, when the IP address is used, it must be resolved to the MAC address.

Address Resolution Protocol (ARP)

Used to determine a host’s MAC address from its IPaddress. To accomplish this feat, ARP sends out a broadcast message (an ARP requestpacket that contains the IP address of the system it is trying to find). All systems on thelocal network detect the broadcast message, and the system that owns the IP address forwhich ARP is looking replies by sending its physical address to the originating system inan ARP reply packet. The physical/IP address combo is then stored in the ARP cache ofthe originating system for future use.

Administrator Account

The account used to administer the settings on a Windows serverand network. This account is created during install and has unlimited access to the server.Care must be taken when logged on to a server as an administrator, because administratoraccess rights include the capability to shut down the server and erase critical data.

Automatic Private IP Address (APIPA)

An APIPA address is an IP address that has thefirst two octets of 169.254.x.y and is automatically assigned by the system when a DHCPserver cannot be found on the network.

Application Layer

The OSI layer that provides a consistent way for an application to makea network request. Examples of application-layer protocols are HTTP, SMTP, and FTP.