• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
A fully digital, dedicated connection to the telphone system that provides download speeds of up to 90Mbps and upload speeds of up to 1Mbps
Asymmetric DSL
ISDN service that consists of two 64 Kbps B channesl and one 16 Kbps D channel for a total of 144 Kpbs.
Basic Rate ISDN (BRI)
A type of virus that combines the characteristics of boot sector and executable viruses.
Bimodal/bipartite virus
A virus that alters the code in the MBR of a hard drive. Once a machine is booted, the virus will reside in memory and attempt to infect other systems.
Boot sector virus
A network topology that connects all computers to a single, shared cable. In a bus topology, if one computer fails, the network fails.
Bus Topology
A variety of grades called categories for UTP cables. The ratings are officially rated in megahertz indicating the highest frequency bandwidth the cable can handle.
CAT rating
A piece of equipment that connects a leased line from the telephone company to a customer's equipment. It performs line encoding and conditioning functions, and it often has a loopback function for testing.
Channel Service Unit/Digital Service Unit
Popular medium for computer data storage developed in the mid 1980's originally for music.
DAT
Also known as flooding attacks, this floods the network wiht so many requests that it becomes overwhelmed and ceases functioning.
Denial of Service Attack
Backs up files that were changed or added since the last full backup.
Differential Backup
A public encryption key signed wiht the digital signature from a trusted third party called a certificate authority (CA). This key serves to validate the identity of its holder when that person or company sends data to other parties.
Digital Certificate
Large capacity data tapes used in backups.
Digital Linear Tape
A high-speed Internet connection technology that uses a regular telephone line for connectivity. Typical home users of this technology use an asynchronous form with download speeds of up to 1.4Mbps and upload speeds of about 384 Kpbs.
Digital Subscriber Line
Provides fault tolerance by writing data across multible drives and then including an additional drive, called a parity drive, that stores information to rebuild the data contained on the other drives. Requires at least three physical disks to function.
Disk Striping w/Parity
Software that prevents unauthorized traffic between two networks by examining the IP packets that travel on both networks. Firewalls look at the IP address and type of access the packet requires (such as FTP or HTTP) and then determines if that type of traffic is allowed.
Firewall
A software firewall built into Windows XP that protects a system from unauthorized access from the internet.
Internet Connection Firewall
A group of protocols used to encrypt IP packets. It is most commonly seen on Virtual Private Networks.
IPSec
Device that can determine shorts, crimps or attenuation in a cable.
Oscilloscope
Serial protocol used for sending information over a dial up connection. This protocol enables the sending of IP packets, supports compression, enables IP address negotiation, and is the successor of the older SLIP protocol.
PPP(Point to Point Protocol)
The technical name for the medium you use everyday to make phone calls and send faxes. The remote access service enables connections across several media. The most common of there is PSTN
PSTN (Public Switch Telephone Network)
An application that enables UNIX systems to communicate using SMBs Sever Message Blocks. This in turn, enables them to act as Microsoft clients and servers on the network.
Samba
More a concept than an actual virus, these are usually boot sector viruses that use a variety of methods to hide from antivirus software.
Stealth virus
Sends a signal down a wire which is reflected back to the device. Will then calculate the distance down the cable before being reflected back.
Time Domain Reflectometer
Used to perform tests of phone and network lines. Generates a tone to aassist in the identification of the wire being checked.
Tone Generator
A protocol that enables a computer to connect tot he internet throught a dial in connection and to enjoy most of the benefits of a direct domain.
PPP over Ethernet (PPPoE)