Acronyms 2 C182 Flashcards
PAN
Personal Area Network
LAN
Local Area Network
WAN
Wide Area Network
A network consisting of a central cable to which all network devices are attached
Bus Network
A network in which all network devices connect to one another through a single central device
Star Network
A network that connects devices in a loop
Ring network
Connects every device to every other device
Mesh network
AP
Access point
Technical rules governing data communication
Protocols
A network architecture in which a system is divided between server tasks performed on the instructions received from clients, requesting information
Client-Server
A network model where all computers on the network are equal and data may be shared from computer to computer
Peer-To-Peer
Uses many independent computers to provide computation or services
Cluster Computing
A collection of computers, often geographically dispersed, that are coordinated to solve a common problem.
Grid Computing
Large pools of shared computers that can be allocated to clients as needed
Cloud Computing
Two types of twisted Cables
UTC - Unshielded Twisted Cable
STC - Shielded Twisted Cable
Network bandwidth is measured in
Mbps - Megabits Per Second
CAT 1 bandwidth speed
1 Mbps
CAT 2 bandwidth speed
4 Mbps
CAT 3 bandwidth
10 Mbps
CAT 4 bandwidth speed
16 Mbps
CAT 5 bandwidth speed
100 Mbps
CAT 5e bandwidth speed
1 Gbps
CAT 6 bandwidth speed
10 Gbps
CAT 6a bandwidth speed
10 Gbps
CAT 7 bandwidth speed
10 Gbps
Uses a single data channel in which the whole bandwidth of the transmission medium is dedicated to one data channel at a time
Baseband
Used in computer networks and to deliver cable TV sevice
Coaxial Cable
A multiple data channel system in which the bandwidth of a transmission medium carries several data streams at the same time
Broadband
Monitors network traffic and blocks traffic that triggers its safety rules.
Firewall
(lowercase i) internet
A network of networks
(Uppercase I) Internet
The World Wide Web
Extends the range of cabling types so connections can be made by increasing the strength of the network sgnal
Repeaters
Connects to different types of network and provide management of the message
Bridge
Used on LANs to reduce network traffic
Switches
Acts as a gateway to the internet
Router (Gateway)
DARPA
Defense Advances Research Projects Agency
Who founded the internet as a project in the early 1960s?
DARPA
The internet uses IP addresses as
Unique Identifiers
IPv4 uses a _______ address pattern
32-bit
IPv6 uses a ______ address pattern
128-bit
ICANN
Internet Corporation for Assigned Names and Numbers
Awards blocks of consecutively numbered IP addresses to ISPs
ICANN
A section of the internet operated by a single authority
Domain
TLD
Top-Level Domain
COM, EDU, GOV, NET are examples of
Top-Level Domains
HTTP
Hypertext Transfer Protocol
SMTP
Simple Mail Transfer Protocol
POP3
Post Office Protocol version 3
IMAP
Instant Messaging Access Protocol
VoIP
Voice over Internet Protocol
CDNs
Content Delivery Networks
XML
Extensible Markup Language
Each hypertext document available through the World Wide Web is given a unique address called ______
Uniform Resource Locator (URL)
HTML
Hypertext Markup Language
A language used to create webpages
HTML
Software intentionally designed to cause damage to a computer, server, client, or computer network
Malware (viruses, worms, spyware, phishing)
Software that causes unintentional harm
Software bug
Infects a computer by inserting itself into programs that already reside in the machine
Virus
Forwards copies of itself to other machines in a network resulting in the detriment of individual machines or the operations of the network.
Worms
Collects information about the computer’s activities and reports back to the instigator
Spyware
Obtains private information by simply asking for it
Phishing
The process of overloading a computer with messages resulting in suffocation in the network
Denial of Service
DoS
Denial of Service
When a hacker intercepts the data as it is traveling to or from the victim’s device
Packet Sniffing (Man-in-the-Middle)
An application that uses a large dictionary to guess the victim’s password
Dictionary Attack
Tries to identify the hash value of a password, then converts it back to plain text
Rainbow Tables
A hacking method that uses trial and error to crack passwords, login credentials, and encryption keys
Brute Force
Three Triads
Confidentiality, Integrity, Availability
A software that acts as an intermediary between a client and a server to shield the client from adverse actions of the server
Proxy Server
Monitors network behavior such as the origin and volume traffic, looking for anomalies to proactively or reactively mitigate unwanted occurances
Network Auditing Software
Software that detects and removes known viruses from the network
Antivirus