Acronyms 2 C182 Flashcards

1
Q

PAN

A

Personal Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

LAN

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WAN

A

Wide Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network consisting of a central cable to which all network devices are attached

A

Bus Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network in which all network devices connect to one another through a single central device

A

Star Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network that connects devices in a loop

A

Ring network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Connects every device to every other device

A

Mesh network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AP

A

Access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Technical rules governing data communication

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network architecture in which a system is divided between server tasks performed on the instructions received from clients, requesting information

A

Client-Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network model where all computers on the network are equal and data may be shared from computer to computer

A

Peer-To-Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Uses many independent computers to provide computation or services

A

Cluster Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A collection of computers, often geographically dispersed, that are coordinated to solve a common problem.

A

Grid Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Large pools of shared computers that can be allocated to clients as needed

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Two types of twisted Cables

A

UTC - Unshielded Twisted Cable

STC - Shielded Twisted Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network bandwidth is measured in

A

Mbps - Megabits Per Second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CAT 1 bandwidth speed

A

1 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CAT 2 bandwidth speed

A

4 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CAT 3 bandwidth

A

10 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CAT 4 bandwidth speed

A

16 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CAT 5 bandwidth speed

A

100 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CAT 5e bandwidth speed

A

1 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CAT 6 bandwidth speed

A

10 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CAT 6a bandwidth speed

A

10 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

CAT 7 bandwidth speed

A

10 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Uses a single data channel in which the whole bandwidth of the transmission medium is dedicated to one data channel at a time

A

Baseband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Used in computer networks and to deliver cable TV sevice

A

Coaxial Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A multiple data channel system in which the bandwidth of a transmission medium carries several data streams at the same time

A

Broadband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Monitors network traffic and blocks traffic that triggers its safety rules.

A

Firewall

30
Q

(lowercase i) internet

A

A network of networks

31
Q

(Uppercase I) Internet

A

The World Wide Web

32
Q

Extends the range of cabling types so connections can be made by increasing the strength of the network sgnal

A

Repeaters

33
Q

Connects to different types of network and provide management of the message

A

Bridge

34
Q

Used on LANs to reduce network traffic

A

Switches

35
Q

Acts as a gateway to the internet

A

Router (Gateway)

36
Q

DARPA

A

Defense Advances Research Projects Agency

37
Q

Who founded the internet as a project in the early 1960s?

A

DARPA

38
Q

The internet uses IP addresses as

A

Unique Identifiers

39
Q

IPv4 uses a _______ address pattern

A

32-bit

40
Q

IPv6 uses a ______ address pattern

A

128-bit

41
Q

ICANN

A

Internet Corporation for Assigned Names and Numbers

42
Q

Awards blocks of consecutively numbered IP addresses to ISPs

A

ICANN

43
Q

A section of the internet operated by a single authority

A

Domain

44
Q

TLD

A

Top-Level Domain

45
Q

COM, EDU, GOV, NET are examples of

A

Top-Level Domains

46
Q

HTTP

A

Hypertext Transfer Protocol

47
Q

SMTP

A

Simple Mail Transfer Protocol

48
Q

POP3

A

Post Office Protocol version 3

49
Q

IMAP

A

Instant Messaging Access Protocol

50
Q

VoIP

A

Voice over Internet Protocol

51
Q

CDNs

A

Content Delivery Networks

52
Q

XML

A

Extensible Markup Language

53
Q

Each hypertext document available through the World Wide Web is given a unique address called ______

A

Uniform Resource Locator (URL)

54
Q

HTML

A

Hypertext Markup Language

55
Q

A language used to create webpages

A

HTML

56
Q

Software intentionally designed to cause damage to a computer, server, client, or computer network

A

Malware (viruses, worms, spyware, phishing)

57
Q

Software that causes unintentional harm

A

Software bug

58
Q

Infects a computer by inserting itself into programs that already reside in the machine

A

Virus

59
Q

Forwards copies of itself to other machines in a network resulting in the detriment of individual machines or the operations of the network.

A

Worms

60
Q

Collects information about the computer’s activities and reports back to the instigator

A

Spyware

61
Q

Obtains private information by simply asking for it

A

Phishing

62
Q

The process of overloading a computer with messages resulting in suffocation in the network

A

Denial of Service

63
Q

DoS

A

Denial of Service

64
Q

When a hacker intercepts the data as it is traveling to or from the victim’s device

A

Packet Sniffing (Man-in-the-Middle)

65
Q

An application that uses a large dictionary to guess the victim’s password

A

Dictionary Attack

66
Q

Tries to identify the hash value of a password, then converts it back to plain text

A

Rainbow Tables

67
Q

A hacking method that uses trial and error to crack passwords, login credentials, and encryption keys

A

Brute Force

68
Q

Three Triads

A

Confidentiality, Integrity, Availability

69
Q

A software that acts as an intermediary between a client and a server to shield the client from adverse actions of the server

A

Proxy Server

70
Q

Monitors network behavior such as the origin and volume traffic, looking for anomalies to proactively or reactively mitigate unwanted occurances

A

Network Auditing Software

71
Q

Software that detects and removes known viruses from the network

A

Antivirus