Network Deck Flashcards

(187 cards)

1
Q

10Base standards

A

A set of standards that describes the media type and the speeds at which each type of media operates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.11

A

An IEEE standard that specifies an over-the-air interface between a wireless client and a base station or between two wireless clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.2

A

An IEEE standard used to address the need for MAC sub-layer addressing in bridges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.3

A

An IEEE standard used to standardize Ethernet and expand it to include a wide range of cable media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.x

A

A family of networking standards developed by IEEE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A

A

A DNS record that maps the host name to its IP address using a 32-bit IPv4 address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AAAA

A

A DNS record that maps the host name to its IP address using a 128-bit IPv6 address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AC (Alternating Current)

A

An electrical current that switches its flow back and forth in a circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

access control

A

In security terms, the process of determining and assigning privileges to various resources, objects, and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

accountability

A

In security terms, the process of determining who to hold responsible for a particular activity or event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ACL (Access Control List)

A

A set of data (user names, passwords, time and date, IP address, MAC address, etc.) that is used to control access to a resource such as a computer, file, or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

active hub

A

A hub that regenerates the signal similar toa repeater.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

active IDS

A

An IDS that detects a security breach according to the parameters it has been configured with, logs the activity, and then takes the appropriate action to block the user from the suspicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ad-hoc mode

A

A peer-to-peer wireless configuration where each wireless workstation talks directly to other workstations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

address munging

A

A method used by end users to provide a fake name or address to post on consumer websites or newsgroups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

adware

A

Software that automatically displays or downloads advertisements when it is used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AH protocol (Authentication Header protocol)

A

A protocol that IPSec uses to provide data integrity through the use of MDS and SHA. AH takes an IP packet and uses either MDS or AH to hash the IP header and the data payload, and then adds its own header to the packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

algorithm

A

In encryption, the rule, system, or mechanism used to encrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

amplitude

A

The crest or trough of a wave from the midpoint of the waveform to its top or bottom.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

analog modulation

A

The process of superimposing a low frequency data signal over a high frequency carrier waveform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

analog signal

A

A signal that oscillates over time between minimum and maximum values and can take on any value between those limits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

ANS (Authoritative Name Server)

A

A name server that responds to name-related queries in one or more zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ANSI (American National Standards Institute)

A

The national standards institute of the United States, which facilitates the formation of a variety of national standards, as well as promoting those standards internationally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

antivirus software

A

A software program that scans a computer or network for known viruses, Trojans, worms, and other malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
AP (Access Point)
A device or software that facilitates communication and provides enhanced security to wireless devices.
26
APIPA (Automatic Private IP Addressing)
A service that enables a DHCP client computer to configure itself automatically with an IP address on the 169.254.0.0 network in case no DHCP servers respond to the client's DHCP discover broadcast.
27
Application layer
The OSI layer provides services and utilities that enable applications to access the network and its resources.
28
application-based IDS
An IDS software component that monitors a specific application on a host.
29
ARP (Address Resolution Protocol)
A communications protocol that resolves IP addresses to MAC addresses.
30
ARP cache
A table used to maintain a correlation between each MAC address and its corresponding IP address.
31
arp utility
A command that enables an administrator to view and manipulate the ARP cache, including deleting it or adding an entry to it.
32
AS (Autonomous System)
A self-contained network on the Internet that deploys a single protocol and has a single administration.
33
asynchronous communications
A communication method in which special start and stop bit patterns are inserted between each byte of data allowing the receiver to distinguish between the bytes in the data stream.
34
ATM (Asynchronous Transfer Mode)
A cell-switching network technology designed for the high-speed transfer of voice, video, and data in LANs, WANs, and telephone networks.
35
attack
Any technique that is used to exploit a vulnerability in any application on a computer system without authorization.
36
attacker
A term for a user who gains unauthorized access to computers and networks for malicious purposes.
37
attenuation
The fading or degradation of a signal as it travels across a network medium.
38
auditing
In security terms, the process of tracking and recording system activities and resource access. Also known as accounting.
39
AUI connector (Attachment Unit Interface connector)
A 15-pin D-shaped connector. Also known as a DIX connector, named for the three companies that invented it Digital Equipment Corporation (DEC), Intel, and Xerox.
40
authentication
A network security measure in which a computer user or some other network component proves its identity in order to gain access to network resources.
41
authentication by assertion
Authentication based entirely on a user name/password combination.
42
authorization
In security terms, the process of determining what rights and privileges a particular entity has.
43
availability
The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.
44
backoff
The random amount of time a node in a CSMA/CD network waits after a collision has occurred; a typical backoff period is a few milliseconds long.
45
bandwidth
The average number of bits of data that can be transmitted from a source to a destination over the network in one second.
46
baseband transmission
A transmission technique in which digital signaling is used to send data over a single transmission medium using the entire bandwidth of that medium.
47
baseline
A record of a system's performance statistics under normal operating conditions.
48
BGP (Border Gateway Protocol)
A path-vector protocol used by ISPs to establish routing between one another.
49
biometrics
Authentication schemes based on an individual's physical characteristics.
50
black hat
A hacker who exposes vulnerabilities for financial gain or for some malicious purpose.
51
bluejacking
A method used by attackers to send out unwanted Bluetooth signals from PDAs, mobile phones, and laptops to other Bluetooth-enabled devices.
52
bluesnarfing
A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
53
Bluetooth
A wireless technology that facilitates short-range wireless communication between devices such as personal computers, laptop, cellular phones, and gaming consoles, thus creating a WPAN.
54
BOOTP (Bootstrap Protocol)
A UDP network protocol that helps diskless workstation computers get an IP address before loading an advanced operating system.
55
border router
A router situated on the edge of an AS that connects the AS to one or more remote networks.
56
botnet
A collection of software robots run by a command and control program that is controlled by a person.
57
bottleneck
A component of a system that performs poorly when compared to other components and reduces the overall system performance.
58
bounded media
A networking medium that uses a physical conductor, typically made of metal or glass.
59
BPL (Broadband over Powerlines)
A technology that allows domestic power lines for broadband transmission.
60
branching factor
In a physical tree topology, the number of point-to-point connections that are consistently found between a node and the nodes beneath it in the tree structure.
61
bridge
A network device that divides a logical bus network into subnets.
62
broadband transmission
A transmission technique in which analog signaling is used to send data over a transmission medium using a portion of the medium's bandwidth.
63
broadcast domain
A logical area in a computer network where any node connected to the computer network can directly transmit to any other node in the domain without a central routing device.
64
broadcast radio
A form of RF networking that is non-directional, uses a single frequency for transmission, and comes in low- and high-power versions.
65
broadcast transmission
A transmission method in which data goes from a source node to all other nodes on a network.
66
brute force attack
A type of password attack where an attacker uses an application to exhaustively try every possible alphanumeric combination to try to crack encrypted passwords.
67
BSS (Basic Service Set)
A service set that defines the way a WLAN is configured.
68
buffer overflow
An attack that targets system vulnerability to cause the device operating system to crash or reboot and may result in loss of data or execute rogue code on devices.
69
buffering
A flow control technique in which received data is stored on a temporary high-speed memory location.
70
butt set
A special type of telephone used by telecom technicians when installing and testing local lines. Also known as a lineman's test set.
71
CA (Certificate Authority)
A server that can issue digital certificates and the associated public/private key pairs.
72
cable certifiers
A type of certifier that can perform tests, such as cable testing and validity testing.
73
cable Internet access
A WAN connectivity technology that uses a cable television connection and a cable modem to provide high-speed Internet access to homes and small businesses.
74
cable modem
Hardware that connects subscribers to a service provider's cable systems.
75
cable tester
An electrical instrument that verifies if a signal is transmitted by a cable. Also called a media tester.
76
cache
A buffer that is used when reading information from a disk or RAM.
77
caching engine
An application or service that stores requested data in order to provide faster responses to future requests for the data.
78
CAN (Campus Area Network)
A network that covers an area equivalent to an academic campus or business park.
79
CARP (Common Address Redundancy Protocol)
A redundancy protocol that allows a number of computers to be grouped together to use a single virtual network interface between them.
80
carrier signal
A high frequency signal that is superimposed on an analog signal to carry information.
81
CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)
An AES cipher-based encryption protocol used in WPA2.
82
cell
The area covered by a wireless access point Alternatively, a cell is a type of network, similar to a packet switching network, in which data is transmitted as fixed-length packets called cells.
83
cell switching network
A type of network, similar to a packet switching network, in which data is transmitted as fixed-length packets called cells.
84
centralized network
A network in which a central host computer controls all network communication and performs data processing and storage on behalf of clients.
85
certificate management system
A system that provides the software tools to perform the day-to-day functions of a PKI.
86
certificate repository
A database containing digital certificates.
87
change management
A systematic way of approving and executing change in order to assure maximum security, stability, and availability of information technology services.
88
CHAP (Challenge Handshake Authentication Protocol)
An encrypted remote-access authentication method that enables connections from any authentication method requested by the server, except for PAP and SPAP unencrypted authentication.
89
Checksum
A value to let the receiver test the integrity of received data.
90
chips
Multiple data signals generated in the DSSS technique.
91
CIA triad (Confidentiality, Integrity, Availability)
The three principles of security control and management: confidentiality, integrity, and availability. Also known as the information security triad or information security triple.
92
CIDR (Classless Inter Domain Routing)
A subnetting method that selects a subnet mask that meets an individual network's networking and node requirements and then treats the mask like a 32-bit binary word.
93
cipher
A method for concealing the meaning of text.
94
ciphertext
Data that has been encoded with a cipher and is unreadable.
95
circuit switching
A switching technique in which one endpoint creates a single path connection to another, depending on the requirement.
96
circuit tester
An electrical instrument that displays whether an electrical outlet is wired correctly.
97
Class A addresses
A block of iP addresses from 1.0.0.0 to 127.255.255.255 that provides the largest number of nodes (16,777,214) for the smallest number of networks (126), thus increasing the number of nodes per network.
98
Class B addresses
A block ofiP addresses from 128.0.0.0 to 191.255.255.255 that provides a good balance between the number of networks and the number of nodes per network-16,382 networks of 65,534 nodes each.
99
Class C addresses
A block of IP addresses from 192.0.0.0 to 223.255.255.255 that provides the largest number of networks (2,097,150) and the smallest number of nodes per network (254).
100
Class D addresses
A block of IP addresses from 224.0.0.0 to 239.255.255.255 used to support multicast sessions.
101
Class E addresses
A block of IP addresses from 240.0.0.0 to 255.255.255.255 used for research and experimentation purposes.
102
cleartext
The unencrypted form of data. Also known as plaintext.
103
client
A network computer that utilizes the resources of other network computers.
104
client/server network
A network in which servers provide resources to clients.
105
CNAME (Canonical name record)
A DNS record that maps multiple canonical names (aliases) to one A record.
106
coax
A common abbreviation for coaxial cable.
107
coaxial cable
A type of copper cable that features a central conductor surrounded by an insulator and braided or foil shielding.
108
codec
Software or hardware that codes and decodes digital data to and from the analog format.
109
cold site
A predetermined alternate location where a network can be rebuilt after a disaster.
110
cold spare
A duplicate piece of backup equipment that can be configured to use as an alternate if needed.
111
collision domain
Another name for a contention domain.
112
compulsory tunnels
VPN tunnels that are established by the WAN carrier without involvement from client endpoints.
113
computer network
A group of computers that are connected together to communicate and share network resources.
114
confidentiality
The fundamental security goal of keeping information and communications private and protecting them from unauthorized access.
115
connection
A virtual link between two nodes established for the duration of a communication session.
116
connector
A metal device at the end of a wire to connect video equipment and network nodes in a LAN.
117
contention domain
A contention-based network on which a group of nodes compete with each other for access to the media.
118
contention-based media access
A media access method in which nodes compete or cooperate among themselves for media access time. Also called competitive media access.
119
controlled media access
A media access method in which a central device or system controls when and for how long each node can transmit Also called deterministic media access.
120
copper media
A type of bounded media that uses one or more copper conductors surrounded by a non-conductive insulated coating.
121
cost
The number of hops along a route between two networks.
122
counter
An individual statistic about the operation of system objects such as software processes or hardware components, monitored by a performance monitor.
123
cracker
A user who breaks encryption codes, defeats software copy protections, or specializes in breaking into systems.
124
CRC (Cyclic Redundancy Check)
An error detection method that can be applied to blocks of data, rather than individual words. Both the sender and receiver calculate EDC; if they match, the data is assumed to be valid.
125
crossover cable
A special network cable used in Ethernet UTP installations, in which the transmit and receive lines are crossed in a way that enables you to connect two hubs or two stations without using a switch.
126
cryptography
The science of hiding information to protect sensitive information and communication from unauthorized access.
127
CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance)
A contention-based media access method in which nodes can transmit whenever they have data to send.
128
CSMA/CD (Carrier Sense Multiple Access/Collision Detection)
A contention-based media access method in which nodes can transmit whenever they have data to send.
129
CSU/DSU (Channel Service Unit/Data Service Unit)
A combination of two WAN connectivity devices on a Frame Relay network that work together to connect a digital WAN line with a customer's LAN.
130
custom TCP/IP subnet
A class of leased addresses that are divided into smaller groups to serve a network's needs.
131
cycle
One complete oscillation of an analog signal.
132
daemon
A background process that performs a specific operation.
133
Data Link layer
An OSI layer responsible for error-free transfer of data packets between nodes on the network.
134
data packet
A unit of data transfer between computers that communicate on a network.
135
data theft
A type of attack in which unauthorized access is used to obtain protected network information.
136
data transmission
The transfer of data between computers or other electronic devices through a network.
137
data window
A flow control technique in which multiple packets are sent as a unit. The recipient acknowledges each window rather than each packet, resulting in higher throughput.
138
DC (Direct Current)
A type of electric current that flows unidirectionally.
139
DCE (Data Communications Equipment)
Interface devices such as modems on a Frame Relay network.
140
DDoS attack (Distributed Denial of Service attack)
A software attack in which an attacker hijacks or manipulates multiple computers (through the use of zombies or drones) on disparate networks to carry out a DoS attack.
141
de-encapsulation
It is the reverse process of removing the added information, as data passes to the next higher layer at the receiver end.
142
deciphering
The process of reversing a cipher.
143
dedicated lines
A telecommunication path that is available 24 hours a day for use by a designated user.
144
default gateway
An IP address of the router that routes remote traffic from the computer's local subnet to remote subnets.
145
demand priority
A polling technique in which nodes signal their state--either ready to transmit or idle--to an intelligent hub. The hub polls the state of each node and grants permission to transmit in turn.
146
demarc
A demarcation point where a building's wiring ends and the telephone company's wiring begins.
147
demarc extension
A demarcation point where a network connectivity line terminates within or just outside of a building and may need to be extended further to accommodate the extended connectivity segment.
148
demodulation
The process of decoding or removing a low frequency data signal from a high frequency carrier waveform.
149
demultiplexer
A device that performs demultiplexing. Also called a demux.
150
demultiplexing
A process that converts the multiplexed signals to independent signals.
151
DES (Data Encryption Standard)
A shared-key encryption algorithm that uses a 56-bit encryption key to encode data in 64-bit blocks.
152
DET (Directory Entry Table)
A logical link between a directory and the files it contains that is implemented by the NTFS.
153
DFS (Distributed File System)
A software-based distributed hierarchical storage implementation that is built into Windows Server 2003, Windows Server 2008 R2, and other Windows server software.
154
DHCP (Dynamic Host Configuration Protocol)
A network service that provides automatic assignment of IP addresses and other TCP /IP configuration information.
155
DHCP relay agent
A service that captures a BOOTP broadcast and forwards it through the router as a unicast transmission to a DHCP server on a remote subnet.
156
dial-up lines
PS1N connections that use modems, existing phone lines, and long-distance carrier services to provide low-cost, low-bandwidth WAN connectivity and remote network access.
157
dial-up modem
A communication device that converts a computer's digital signals into analog signals before transmission over telephone lines.
158
dialectric
An insulator-a material that does not conduct electricity by separating the conductor and shield. The entire package is wrapped in an insulating layer called a sheath or jacket.
159
Diameter
An authentication protocol that is an updated version of RADIUS and improves on some of its features.
160
dictionary attack
A type of password attack that automates password guessing by comparing encrypted passwords against a predetermined list of possible password values.
161
differential signaling
A noise reduction technique in which the signals from two inputs are compared; signals that are identical on the two inputs are ignored, while those that are different on the inputs are accepted.
162
digital certificate
An electronic document that associates credentials with a public key.
163
digital signal
An electrical signal that can have combinations of only two values: one and zero.
164
digital signal modulation
A process of representing digital data with an analog signal so that digital data can be transmitted between different digital devices.
165
digital signature
An encrypted hash value that is appended to a message to identify the sender and the message.
166
directional antenna
A type of antenna that concentrates the signal beam in a single direction.
167
disaster
A catastrophic loss of system functioning due to a cause that cannot reasonably be foreseen or avoided.
168
disaster recovery
The administrative function of protecting people and resources while restoring a failed network or systems as quickly as possible.
169
disaster recovery plan
A policy and set of procedures that documents how people and resources will be protected in case of disaster, and how the organization will recover from the disaster and restore normal functioning.
170
distance-vector routing
Each router passes a copy of its routing table to its adjacent neighbors. The neighbor adds the route to its own table, incrementing the metric to reflect the extra distance to the end network. The distance is given as a hop count; the vector component specifies the address of the next hop.
171
DMZ (demilitarized zone)
A small section of a private network that is located between two firewalls and made available for public access.
172
DNS (Domain Name System)
The naming service used on the Internet and many TCP/IP-based networks.
173
DNSBLs (DNS blacklists)
Published lists that contain email addresses that ace confirmed as spam sources.
174
domain
175
adjacent neighbors
The neighbor adds the route to its own table, incrementing the metric to reflect the extra distance to the end network. The distance is given as a hop count; the vector component specifies the address of the next hop.
176
domain
A grouping of computers on the Internet based on the nature of their operations.
177
domain name
A unique name that identifies a website on the Internet A period is used to separate the labels of domain names.
178
DoS attack (Denial of Service attack)
A network attack in which an attacker disables systems that provide network services by consuming a network link's available bandwidth, consuming a single system's available resources, or exploiting programming flaws in an application or operating system.
179
drain
The connection point between a shield and the ground.
180
drone
Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. Also called a zombie.
181
DS (Distribution System)
A wired connection between a BSS and a premise-wide network that enables mobility on devices.
182
DSH (Digital Signal Hierarchy)
A channelized data transmission standard used to multiplex several single data or voice channels for a greater total bandwidth.
183
DSL (Digital Subscriber Line)
A broadband Internet connection method that transmits digital signals over existing phone lines.
184
DSSS (Direct Sequence Spread Spectrum)
A type of radio transmission in which a single data signal is converted into multiple digital data signals called chips.
185
DTE (Data Termination Equipment)
Interface devices such as NICs and routers on a Frame Relay network.
186
DVM (Digital Volt Meter)
Uses an analog-to-digital converter to display numeric voltage readings.
187
DWDM (Dense Wavelength Division Multiplexing)
A multiplexing technology that uses light wavelengths to transmit data.