• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/41

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

41 Cards in this Set

  • Front
  • Back
WAN
Wide area network.
LAN
Local Area network
Router
hardware device that "routes" or connects the user to a network
WEP
"wired equivilent privacy" it helps with security by encryption
802.11
wifi standards used to transmit data over a network
WPA
WiFi protected access. better than WEP because it is custom to user
Firewall
limits data that can be shared for security
Phising
a Con where users send emails in order to collect information.
Worm
these duplicate in your system which slows it down
VPN
"Virtual Private Network" sets up a tunnel on a network for protection of sending data to different places
PGP
"pretty good privacy" used on emails
Audit Log
Track of all the events that happen on a network. Helps backtrack to the problem
Wireless G
standard for wireless networks
Switch
used to network multiple computers together. more advanced than hub
Internet 2
network used for education
Hub
Hardware used to network multiple computers
FTP
"File Transfer Protocol" method of transferring files over the internet
Packet Jam
files are broken into packets and sent. When recieved if a packet is late then there is a packet jam causing error
Buffer Overflow
processes store data in a buffer which will delete data
Logic Bomb
malacious code intentionally left into a software that will happen if certain things are met
Social Engineering
tricking somebody into giving you their information
confidentiality
making sure information is only accesible to authorized people
authentication
used to make sure unauthorized people can't use the the information on certain networks
NLR
National Lamda Rail System. First transcontinental internet system
TCP/IP
set of communication protocol for the internet
IP adress
"internet protocol" adress. used to identify the host or computer
Spam
undesirable electronic messsges like emails
PKI
"Public Key Infracture" used to ban users and stuff
Encryption
transforming information using a algorith to make it unreadable
DNS
"Domain Name system" used to give an ip adress to a name.
NLR
National Lamda Rail System. First transcontinental internet system
TCP/IP
set of communication protocol for the internet
IP adress
"internet protocol" adress. used to identify the host or computer
Spam
undesirable electronic messsges like emails
PKI
"Public Key Infracture" used to ban users and stuff
Encryption
transforming information using a algorith to make it unreadable
DNS
"Domain Name system" used to give an ip adress to a name.
backbone
provides a path of information for users on a LAN
bit torrent
manages downloads and uploads
cookie
small text saved by the internet through the user navigation
P2P
Peer to peer network