• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/34

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

34 Cards in this Set

  • Front
  • Back

ADDS

TheActive Directory service that manages the process that allows a userto sign on to a network from any computer on the network and getaccess to the resources that Active Directory allows

Bits

Asingle pulse in the digital encoding system that can have one of onlytwo values: 0 or 1.

Catastrophicfailure

Afailure that destroys a component beyond use.

Convergence

Theuse of data networks to carry voice, video, and other communicationsservices in addition to data

Decapsulation

Removinga header or trailer from a lower OSI layer

Failopen

Systemallows access during the failure

Fragmentation

Alongthe way, if a Network layer protocol is aware that a packet is largerthan the maximum size for its network, it will divide the packet intosmaller packets

Globalaccount

Eachuser on the network has his own domain-level account called a globalaccount, also called a global username or network ID, which isassigned by the network administrator and is kept in ActiveDirectory.

HTTPS

WhenHTTP is layered on top of an encryption protocol, such as SSL(Secure Sockets Layer)or TLS(Transport Layer Security),the result is HTTPS(HTTP Secure),which gives a secure transmission.

Hub

Ahub is an inefficient and outdated networking device that has beenreplaced by switches. A hub accepted signals from a transmitting nodeand repeated those signals to all other connected nodes in abroadcast fashion. On Ethernet networks, hubs once served as thecentral connection point for a star topology. Also, hubs onlysupported half-duplex transmission.

IMAP4

anemail protocol which is sometimes used instead of the POP3 protocol.With IMAP4 email is stored on the mail server and can be accessedfrom any IMAP4 email client on the network. With POP3 email isdownloaded to the mail client where it is accessed.

Listsome application layer protocols that you know

Telnet,FTP, SMTP. DNS.SNMP, SMB

MSDS

MaterialSafety Data Sheet requires that the chemical manufacturer,distributor, or importer provide MSDS’s for each hazardous chemicalto downstream users to communicate information on these hazards.

MulticastDistribution

Incomputer networking, multicast (one-to-many or many-to-manydistribution) is group communication where information is addressedto a group of destination computers simultaneously.

Name the OSIModel Layers

Applications


Presentation


Session


Transport


Network


Data-Link


Physical

PAN

acomputer network used for data transmission among devices such ascomputers, telephones and personal digital assistants

Payload

Datathat is passed between applications or utility programs and theoperating system, and includes control information.

Peer-to-peernetworks

Anetwork in which every computer can communicate directly with everyother computer. By default, no computer on a peer-to-peer network hasmore authority than another. However, each computer can be configuredto share only some of its resources and keep other resourcesinaccessible to other nodes on the network.

Plenum

Thearea above the ceiling tile or below the subfloor in a building

PDU

(protocoldata unit) A unit of data at any layer of the OSI Model.

What is the reason for the OSI model

Amodel for understanding and developing computer-to-computercommunication developed in the 1980s by ISO. It divides networkingfunctions among seven layers: Physical, Data Link, Network,Transport, Session, Presentation, and Application.

RDP

(RemoteDesktop Protocol) An Application layer protocol that uses TCP/IP totransmit graphics and text quickly over a remote client-hostconnection. RDP also carries session, licensing, and encryptioninformation

Repeater

Adevice used to regenerate a digital signal in its original form.Repeaters operate at the Physical layer of the OSI model

Router
ALayer 3 device that uses logical addressing information to directdata between two or more networks and can help find the best path fortraffic to get from one network to another.
SSH
(SecureShell) A connection utility that provides authentication andencryption. With SSH, you can securely log on to a host, executecommands on that host, and copy files to or from that host. SSHencrypts data exchanged throughout the session
SSL
(SecureSockets Layer) A method of encrypting TCP/IP transmissions—includingWeb pages and data entered into Web forms—en route between theclient and server using public key encryption technology.
Switch
Aconnectivity device that logically subdivides a network into smaller,individual collision domains. A switch operates at the Data Linklayer of the OSI model and can interpret MAC address information todetermine whether to filter (discard) or forward packets it receives.
TCP/IPSuite Layers
HTTP(S),SMTP, FTP, POP, IMAP, FTP(S), TCP, UDP, IP, ICMP, ARP
TCPvs UDP
TCPis guaranteed delivery, UDP is best effort
Telnet
Aterminal emulation protocol used to log on to remote hosts using theTCP/IP protocol
Topologytypes
point-to-point,bus, star, ring, mesh, tree and hybrid.
TLS
(TransportLayer Security) A version of SSL standardized by the IETF (InternetEngineering Task Force). TLS uses slightly different encryptionalgorithms than SSL, but otherwise is very similar to the most recentversion of SSL
Upsetfailure
Damagethat can shorten the life of a component and/or cause intermittenterrors.
Whatis the role of the frame?
Theentire Data Link layer message, including the header, payload, andtrailer