Acronyms Flashcards

1
Q

3G

A

3rd-generation wireless data standard for cell phones and other mobile devices; max speed 168 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4G

A

popularly implemented as LTE (long term evolution) with theoretical download speeds of 300 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4to6

A

Internet connectivity technology that turn IPv4 into IPv6 to get to an IPv6 capable router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

6in4

A

IPv6 tunneling stanard that can go through IPv4 Network Address Translation (NAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

6to4

A

IPv6 tunneling protocol that doesn’t require a tunnel broker. Directly connect 2 routers that normally require public IPv4 address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

8P8C

A

8 position 8 contact; 4-pair connector used on the end of network cable— RJ45 connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

10 GbE

A

10 Gigabit Ethernet; very fast Ethernet designation, with a # of fiber-optic and copper standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

10Base2

A

last true bus-standard network where nodes connected to a common share length of coaxial cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

10BaseFL

A

Fiber-optic implementation of Ethernet that runs at 10Mbps using base-band signaling; max length is 2km

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

10BaseT

A

Ethernet LAN designed to run on UTP cabling; runs 10Mbps with base-band signaling; max length between NIC and hub is 100m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

10GBaseER/10GBaseEW

A

10GbE stanard using 1500nm single-mode fiber; max length 40km

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

10GBaseLR/10GBaseLW

A

10 GbE standard using 1310-nm single-mode fiber; max length 10km

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

10GBaseSR/10GBaseSW

A

10 GbE standard using 850-nm multimode fiber; max lenth 300m.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

10GBaseT

A

10 GbE stanard designed to un on Cat 6a UTP cabling; max length 100m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

66 block

A

Patch panel used in telephone networks displaced by 110 blocks in networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

100BaseFX

A

Ethernet LAN designed to run on fiber-optic cabling; runs at 100Mbps with baseband signaling; max length 400m for half-duplex and 2km for full-duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

100BaseT

A

Ethernet LAN designed to run on UTP cabling; runs at 100Mbps with baseband signaling; uses 2 pairs of wires on Cat 5 or better

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

100BaseT4

A

Ethernet LAN designed to run on UTP cabling; runs at 100 Mbps and uses 4-pair Cat 3 or better cabling; made obsolete by 100BaseT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

100BaseTX

A

technically accurate but little used name for 100BaseT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

110 block

A

aka 110-punchdown block; connection gridwork used to link UTP and STP cables behind RJ-45 patch panel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

802 committee

A

IEEE committee responsible for all Ethernet standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

802.1X

A

port-authentication network access control mechanism for networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

802.3

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

802.3ab

A

IEEE standard for 1000BaseT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

802.3z

A

umbrella IEEE standard for all versions of Gigabit Ethernet other than 1000BaseT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

802.11a

A

wireless standard that operates in the frequency range of 5GHz and throughput of up to 54 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

802.11ac

A

wireless standard that operates on frequency range of 5 GHz and throughput of up to 1 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

802.11a-ht

A

technical terms for mixed mode 802.11a and 802.11g operation; both tech are simultaneously supported

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

802.11b

A

1st popular wireless standard operating at frequency range of 2.4 GHz and throughput of up to 11 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

802.11g

A

older wireless standard that operates on 2.4 GHz band with max throughput of 54 Mbps; superseded by 802.11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

802.11g-ht

A

goes along with 802.11a-ht standard; mixed mode operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

802.11i

A

wireless standard that added security features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

802.11n

A

increases transfer speeds and adds support for MIMO by using multiple antennas; can operate on 2.4 or 5 GHz frequency band with max throughput of 400 Mbps; superseded by 802.11ac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

1000BaseCX

A

Gigabit Ethernet standard using copper cabling with max 25m distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

1000BaseLX

A

Gigabit Ethernet standard using single-mode fiber cabling with max 5km distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

1000BaseSX

A

Gigabit Ethernet standard using multimode fiber cabling and max 500m distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

1000BaseT

A

Gigabit Ethernet standard using Cat5e/6 UTP cabling with 100m max distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

1000BaseTX

A

short-lived gigabit-over-UTP standard form; simpler to implement than 1000BaseT but required Cat 6 cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

1000BaseX

A

umbrella Gigabit Ethernet standard; aka 802.3z

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A records

A

DNS records that map host names to their IPv4 addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

AAA

A

Authentication, Authorization, Accounting; security philosophy where computer trying to connect to a network must first present credentials in order to be authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

AAAA Records

A

DNS records that map host names to their IPv6 addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

absorption

A

quality of building materials to reduce or eliminate Wi-fi signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

acceptable use policy

A

document that defines what a person may and may not do on an organization’s computers and network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

access control

A

defines degree of permission granted to use a resource; from a switch pot to a particular file to a physical door in the building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

ACL

A

access control list; defined list of permissions that a user can perform on a shared resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

ACS

A

Access Control Server; cisco program/process/server that makes decision to admit or deny a node based on posture assessment; directs access device to allow connection or redirection or denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

access port

A

regular port in switch that has been configured as part of VLAN; port that hosts connect to; opposite of a trunk port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Active Directory

A

form of directory services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

activity light

A

LED on NIC, hub, or switch that blinks rapidly to show data transfers over network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

ad hoc mode

A

each node is in direct contact with every other node in a decentralized free-for-all; similar to mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

ANT+

A

Adaptive Network Technology; low-speed, high-power networking tech; used in place of Bluetooth (for smart phones and exercise machines)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

ARP

A

Address Resolution Protocol; in TCP/IP suite used with command-line utility of same name to determine MAC address that goes with IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

administrative accounts

A

specialized user accounts that have granted sufficient access rights and authority; some exist as default of system and have all authority throughout system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

ADSL

A

asymmetric digital subscriber line; fully digital dedicated connection to telephone system that provides download speeds of 9 Mbps and upload of 1 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

AES

A

Advanced Encryption Standard; block cipher created in late 1990s that uses a 128-bit block size and 128-, 192-. or 256-bit key size; practically uncrackable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

adware

A

program that monitors types of web sites you frequent and targets ads to you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

agent

A

software that runs within a client and reports client’s security characteristics to ACS to be approved or denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

agent-less

A

client that has its posture checked and presented by non-permanent software that executes as part of connection process; does not run directly within the client but on behalf of the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

aggregation

A

router hierarchy; every router under high router uses subnet of router’s existing routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

air gap

A

act of physically separating a network from every other network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Aircrack-ng

A

open source tool for penetration testing aspects of wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

alert

A

proactive message sent from an SNMP manager as a result of a trap issued by agent; alert may be e-mail, SMS message, voicemail, or other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

algorithm

A

set of rules for solving a problem given a # of steps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

allow

A

permission for data or communication to pass through or access a resource; specific allowances are exceptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

ARIN

A

American Registry for Internet Numbers; parcels out IP addresses to large ISPs and major corporations in North America

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

amplification

A

aspect of DoS attack that makes a server do a lot of processing and responding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

amplified DoS attack

A

sends a small amount of traffic to a service which produces a larger response that is sent to a spoofed IP address, overwhelming the victim machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

APC

A

Angled Physical Contact; Fiber-optic connector that make physical contact between 2 f-o cables; 8-degree angle to curved end, lowering signal loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

anti-malware program

A

software that attempts to block several types of threats to a client’ i.e. viruses, worms, and other unapproved software installations and executions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

antivirus

A

software that attempts to prevent viruses from installing or executing on a client; some can try to remove or eradicate effects of a virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

anycast

A

method of addressing groups of computers as though they were one computer; gives computers the same IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Apache HTTP Server

A

open source HTTP server program that runs on a variety of operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

application log

A

tracks application events; i.e. opening and closing; different types record different events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

API

A

Application Programming Interface; shared functions, subroutines, and libraries that allow programs on a machine to communicate with OS and other programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

application/context aware

A

Advanced feature of some firewalls where content of data is inspected to make sure it’s from appropriate application; bad packets are denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

approval process

A

1 or more decision makers consider a impact of change and funding; if the change, funding, and impact are acceptable the change is approved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

archive

A

creation/storage of retrievable copies of electronic data for legal and functional purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

archive bit

A

attribute of a file that shows whether the file has been backed up since the last change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Area ID

A

address assigned to routers in an OSPF (open shortest path first) network to prevent flooding beyond routers network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

areas

A

groups of OSPF routers designed to maximize routing efficiency while keep broadcast traffic managed; assigned a 32-bit value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

ARP cache poisoning

A

attacker associates his MAC address with someone else’s IP address so all traffic is sent to him first; sends out unsolicited ARPs which can be requests or replies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

arping

A

command used to discover hosts on a network (like a ping) but replies on ARP rather than ICMP; only works in broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

asset disposal

A

reusing, repurposing, or recycling computing devices that follows system life cycle policies in organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

asset management

A

managing each aspect of a network from documentation to performance to hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

ADSL

A

asymmetric digital subscriber line; fully digital, dedicated connection to telephone system that provides download speeds of 9 Mbps and upload speeds of 1 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

asymmetric-key algorithm

A

encryption method in which key used to encrypt a message and decrypt are different

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

ATM

A

Asynchronous Transfer Mode; network tech that runs at speeds between 25 and 622 Mbps using fiber-optic cabling or Cat 5 or better UTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

attenuation

A

degradation of signal over distance for networking cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

authentication

A

process that proves good data traffic truly came from where it says it originated by verifying send/receive users and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

AS

A

Authentication Server; In Kerberos, a system that hands out Ticket-Granting Tickers to clients after comparing client hash to its own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

authoritative DNS servers

A

DNS servers that hold IP addresses and names of systems for a particular domain called forward lookup zones; they also have reverse lookup zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

authoritative name servers

A

another name for authoritative DNS servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

authorization

A

step in AAA philosophy during which client’s permissions are decided upon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

APIPA

A

networking feature in operating systems that enables DHCP clients to self-configure an IP address and subnet mask automatically when a DHCP server isn’t available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

AS

A

Autonomous System; one or more networks that are governed by single protocol which provides routing for Internet backbone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

back up

A

save important data in a secondary location as a safety precaution against loss of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

backup

A

archive of important data that disaster recovery team can retrieve in case of disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

BDR

A

backup designated router; 2nd router set to take over is designated router fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

backup generator

A

onsite generator that provides electricity if the power fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

badge

A

card-shaped device used for authentication; something you have; a possession factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

bandwidth

A

piece of the spectrum occupied by some form of signal; higher the bandwidth, the faster the signal; when one user is occupying it, others must wait

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

bandwidth saturation

A

frequency of a band is filled to capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

bandwidth speed tester

A

web sites for measuring an Internet connection throughput, download and upload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

banner grabbing

A

malicious user gains access to open port and uses it to probe a host to gain info and access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

baseband

A

digital signaling that has only 1 signal on the cable at a time; 1, 0, or idle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

baseline

A

static image of a system’s performance when all elements are known to be working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

basic NAT

A

translates a computer’s private or internal IP address to a global IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

BRI

A

Basic Rate Interface; consists of 2 B channels which can carry voice or data at 64 Kbps and a D channel which carries setup, config, and data at 16 Kbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

BSSID

A

Basic Service Set Identifier; naming scheme in wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

baud

A

one analog cycle on a telephone line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

baud rate

A

number of bauds per second; early days of telephone data the baud rate was often analogous to bits per second; not true anymore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

B channel

A

Bearer channel; type of ISDN channel that carries data and voice info using standard DS0 channels at 64 Kbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

BiDi transceiver

A

bidirectional transceiver; full-duplex fiber-optic connector that relies on wave division multiplexing to differentiate wave signals on a single fiber, creating single-strand fiber transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

biometric

A

human physical characteristic that can be measured and saved as authentication in granting the user access to a network; i.e. fingerprints, facial scans, retinal scans, voice pattern recognition, and other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

biometric devices

A

scan fingerprints, retinas, sound of voice to provide foolproof replacement for passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

BERT

A

Bit Error Rate Test; end-to-end test that verifies a T-carrier connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

block

A

access that is denied to or from a resource; can be on a firewall, ACS, or other secure gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

block cipher

A

encryption algorithm in which data is encrypted in chunks of a certain length; popular in wired networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

blocks

A

contiguous ranges of IP addresses that are assigned to organizations and end users by IANA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Bluejacking

A

process of sending unsolicited messages to another Bluetooth device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Bluesnarfing

A

use of weaknesses in Bluthtooth standard to steal info from other Bluetooth devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

BNC connector

A

used for 10Base2 coaxial cable; have to be locked into place by turning locking ring 90 degrees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

BNC coupler

A

passive connector used to join 2 segments of coaxial cables that are terminated with BNC connectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

bonding

A

2 or more NICs in a system working together to act as a single NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

BOOTP

A

Bootstrap Protocol; allows computers to discover and receive an IP address from a DHCP server prior to booting the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

BGP-4

A

Border Gateway Protocol; exterior gateway routing protocol that enables groups of routers to share ino so that efficient, loop-free routes can be established

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

botnet

A

group of computers under control of 1 operator for malicious purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

bottleneck

A

spot on a network where traffic slows precipitously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

bounce

A

signal sent by one device taking many different paths to get to receiving systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

bps

A

bits per second; measurement of how fast data is moved across a transmission medium; Gigabit Ethernet moves 1,000,000,000 bps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

bridge

A

device that connects 2 networks and passes traffic between them based on node address so that traffic between nodes on 1 network doesn’t appear on the other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

bridge loop

A

negative situation in which bridging devices (i.e. switches) are installed in a loop configuration, continuously; switches using STP (Spanning Tree Protocol) prevent them by turning off loop ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

bridged connection

A

early type of DSL connection that made line function as if you snapped an Ethernet cable into your NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

bridging loop

A

physical wiring of a cicuitous path between 2 or more switches causing them to loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

BYOD

A

Bring Your Own Device; users bring own network-enabled device to work; must use on-boarding and off-boarding technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

broadband

A

analog signaling that sends multiple signals over cable at the same time; i.e. cable television; 0, 1, and idle states exist on multiple channels on same cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

broadcast

A

frame or packet addressed to all machines on a broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

broadcast address

A

address a NIC attaches to a frame when it wants every other NIC on the network to read it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

broadcast domain

A

network of computers that will hear each other’s broadcasts; aka collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

broadcast storm

A

result of one or more devices sending a nonstop flurry of broadcast frames on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

browser

A

software program specifically designed to retrieve, interpret, and display web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

brute force

A

type of attack where every permutation of data is tried in an attempt to discover protected info; most commonly used on password cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

buffer

A

component of fiber-optic cable that adds strength to the cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

building entrance

A

location where all cables from outside world enter the building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

bus topology

A

network topology that uses a single bus cable that connects all of the computers in a line; must be terminated to prevent signal reflection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

BCP

A

business continuity planning; process of defining steps to be taken in event of physical corporate crisis to continue operations; includes creation of documents to specify facilities, equipment, resources, personnel, and their roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

butt set

A

device that can tap into a 66 or 110 punchdown block to see if a line is working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

byte

A

8 continuous bits; fundamental data unit of personal computers; storing equivalent of 1 character; basic unit of measurement for computer storage; counted in powers of 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

CAB files

A

cabinet files; compressed and used during Microsoft operating system installation to store smaller files such as device drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

cable certifier

A

powerful cable testing device used by professional installers to test electrical characteristics of cable then generate certification report if it passes TIA/EIA standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

cable drop

A

location where cable comes out of wall to workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

cable modem

A

bridge device that interconnects cable company’s DOCSIS service to user’s Ethernet network; cable modem is demarc in most locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

cable stripper

A

device that enables creation of UTP cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

cable tester

A

generic name for device that tests cables; continuity, electrical shorts, crossed wires, other electrical characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

cable tray

A

device for organizing cable runs in drop ceiling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

cache

A

special area of RAM that stores frequently accessed data; number of applications that take advantage of the cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

cached lookup

A

list kept by DNS server of IP addresses it already resolved so it won’t have to re-resolve a FQDN that is already checked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

cache-only DNS servers

A

do not have any forward lookup zones; resolve names of systems on Internet for network, but not responsible for telling other DNS servers names of clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

caching engine

A

server dedicated to storing cache info on your network; reduce overall network traffic dramatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Cacti

A

popular network graphing program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

CAN

A

campus area network; network installed in a medium-sized space spanning multiple buildings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

CNAME

A

canonical name; less common type of DNS record that acts a computer’s alias

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

captive portal

A

Wi-fi network implementation used in facilities that directs attempts to connect to network to an internal Web page for that facility; used to force terms of service on users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

capture file

A

file in which collected packets from a packet sniffer program are stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

card

A

generic term for anything that you can snap into an expansion slot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

CSMA/CA

A

carrier sense multiple access with collision avoidance; access method used on wireless networks; before hosts send out info they first listen for traffic, if it’s free they send out a signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

CSMA/CD

A

carrier sense multiple access with collision detection; older Ethernet systems used in wired LAN technologies enabling frames of data to flow through network and reach address locations; if collision occurred they would have to resend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

Cat 3

A

Category 3 wire; TIA/EIA standard for UTP wiring that can operate up to 16 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

Cat 5

A

Category 5 wire; TIA/EIA standard for UTP wiring that can operate up to 100 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

Cat 5e

A

Category 5e wire; TIA/EIA standard for UTP wiring with improved support for 100 Mbps using 2 pairs and 1000 Mbps using 4 pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

Cat 6

A

Category 6 wire; TIA/EIA standard for UTP wiring with improved support for 1000 Mbps; supports 10 Gbps up to 55 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

Cat 6a

A

Category 6a wire; TIA/EIA standard for UTP with support for 10 Gbps up to 100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

Cat 7

A

Category 7 wire; standard for UTP wiring with support for 10+ Gbps at 600 MHz max frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

Cat rating

A

Category rating; grade assigned to cable to help network installers get right cable for right network technology; officially rated in MHz; indicating highest frequency bandwidth cable can handle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

CCITT

A

Comite Consutatif Internationale Telephonique et Telegraphique; European standards body that established V standards for modems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

central office

A

building that houses local exchanges and location where individual voice circuits come together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

certificate

A

public encryption key signed with digital signature from a trusted 3rd party called certificate authority; key serves to validate identity of its holder when that person or company sends data to other parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

certifier

A

device that tests a cable to ensure that it can handle rated capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

chain of custody

A

document used to track collection, handling, and transfer of evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

CHAP

A

Challenge Handshake Authentication Protocol; remote access authentication protocol; serving system challenges remote client which must provide encrypted password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

CRAM-MD5

A

Challenge-Response Authentication Mechanism-Message Digest 5; a tool for server authentication in SMTP servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

change management

A

process of initiating, approving, funding, implementing, and documenting significant changes to network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

change management documentation

A

set of documents that defines procedures for changes to network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

change management team

A

personnel who collect change requests, evaluate change, work with decision makers for approval, plan and implement approved changes, and document changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

change request

A

formal or informal document suggesting modification to some aspect of network or computing environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

channel

A

portion of wireless spectrum on which a particular wireless network operates; setting wireless networks to different channels enables separation of networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

channel bonding

A

wireless technology that enables wireless access points to use 2 channels for transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

channel overlap

A

Drawback of 2.4 GHz wireless networks where channels shared some bandwidth with other channels; This is why only 3 2.4 GHz channels can be used in the US (1, 6, 11)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

CSU/DSU

A

Channel Service Unit/Digital Service Unit; piece of equipment that connects a T-carrier leased line from telephone company to a customer’s equipment; line encoding and conditioning functions and has loopback function for testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

chat

A

multiparty, real-time text conversation; internet’s most popular version is known as Internet Relay Chat (IRC) which you converse in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

checksum

A

simple error-detection method that adds a numerical value to each data packet; based on number of data bits in the packet; receiving node applies same formula to data and verifies numerical value is the same; if not data is corrupted and must be re-sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

CYOD

A

Choose your own device; deployment model where corporate employees select among catalog of approved mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

cipher

A

series of complex and hard-to-reverse mathematics run on a string of ones and zeros in order to make a new set of seemingly meaningless ones and zeros

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

cipher lock

A

door unlocking system that uses a door handle, a latch, and a sequence of mechanical push buttons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

ciphertext

A

output when cleartext is run through a cipher algorithm using a key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

circuit switching

A

process for connecting 2 phones together on one circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

Cisco IOS

A

Cisco’s proprietary operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

cladding

A

part of a fiber-optic cable that makes the light reflect down the fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

class license

A

contiguous chunk of IP addresses passed out by IANA (Internet Assigned Numbers Authority)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

CoS

A

Class of service; prioritization value used to apply to services, ports, or whatever a quality of service device might use

202
Q

classful

A

Obsolete IPv4 addressing scheme that relied on original class blocks, such as Class A, Class B, and Class C

203
Q

classless

A

IPv4 addressing scheme that does not rely on original class blocks

204
Q

CIDR

A

CLassless Inter-Domain Routing; The basis of allocating and routing classless addresses, not restricting subnet masks to /8, /16, or /24

205
Q

classless subnet

A

A subnet that does not fall into the common classes

206
Q

cleartext credentials

A

Any login process conducted over network where account names, passwords, or other authentication elements are sent from client or server in unencrypted fashion

207
Q

client

A

computer program that uses services of another computer program; software that extracts info form server

208
Q

client/server

A

relationship in which client software obtains services from a server on behalf of a user

209
Q

client/server application

A

performs some or all of its processing on an application server rather than on client; client receives results of processing

210
Q

client/server network

A

network that has dedicated server machines and client machines

211
Q

client-to-site

A

A type of VPN connection where single computer logs into remote network and becomes a member of that network

212
Q

CCTV

A

Closed-circuit television; self-contained, closed system in which video camera feeds signal to specific, dedicated monitors and storage devices

213
Q

cloud computing

A

using internet to store files and run applications; i.e. Google Docs is a cloud computing application that enables you to run productivity applications over the Internet

214
Q

cloud/server based

A

remote storage and access of software, especially anti-malware, where it can be singularly updated; central storage allows users to access and run current versions of software easily; client must initiate access to and launching of software

215
Q

cloud/server-based anti-malware

A

remote storage and access of software designed to protect against malicious software where it can be updated

216
Q

clustering

A

multiple pieces of equipment (servers) connected which appear to user and network as one logical device, providing data and services to organization for redundancy ad fault tolerance

217
Q

CWDM

A

coarse wavelength division multiplexing; optical multiplexing technology in which a few signals of different optical wavelength could be combined to travel a short distance

218
Q

coaxial cable

A

type of cable that contains central conductor wire surrounded by insulating material which is then surrounded by braided metal shield; center wire and braided metal shield share common axis or centerline

219
Q

CDMA

A

code-division multiple access; early cellular telephone tech that used spread-spectrum transmission; obsolete

220
Q

cold site

A

location that consists of building, facilities, desks, toilets, parking, and everything else needed minus computers

221
Q

collision

A

result of 2 nodes transmitting at same time on multiple access network such as Ethernet; both frames may be lost or partial frames may result

222
Q

collision light

A

light on some older NICs that flickers when a network collision is detected

223
Q

command

A

request, typed from a terminal or embedded in a file, to perform an operation or execute particular program

224
Q

CIFS

A

Common Internet File System; protocol that NetBIOS used to share folders and printers; still common even on UNIX/Linux systems

225
Q

community cloud

A

private cloud paid for and used by more than one organization

226
Q

compatibility issue

A

when different pieces of hardware or software don’t work together correctly

227
Q

compatibility requirements

A

with respect to network install and upgrades, requirements that deal with how well new tech integrates with older or existing tech

228
Q

complete algorithm

A

cipher and methods used to implement that cipher

229
Q

computer forensics

A

science of gathering, preserving, and presenting evidence stored on a computer or form of digital media that is presentable in court

230
Q

concentrator

A

device that brings together at a common center connections to a particular kind of network and implements that network internally

231
Q

configuration management

A

set of documents, policies, and procedures designed to help you maintain and update your network in a logical, orderly fashion

232
Q

configuration management documentation

A

define configuration of network; wiring diagrams, network diagrams, baselines, and policy/procedure/configuration documentation

233
Q

configurations

A

settings stored in devices that define how they are to operate

234
Q

connection

A

term used to refer to communication between 2 computers

235
Q

connectionless

A

type of communication characterized by sending packets that are acknowledged by destination host; UDP is quintessential connectionless protocol in TCP/IP suite

236
Q

connectionless communication

A

protocol that does not establish and verify a connection between hosts before sending data; sends data and hopes for the best; faster than connection-oriented protocols; UDP is an example

237
Q

connection-oriented

A

network communications between 2 hosts that includes negotiation between hosts to establish comm session; data segments are then transferred between hosts, with each being acknowledged before another can be sent; closure of comm is conducted at end of data transfer; TCP only one

238
Q

connection-oriented communication

A

protocol that establishes a connection between 2 hosts before transmitting data and verifies receipt before closing connection between hosts

239
Q

console port

A

connection jack in a switch used exclusively to connect a computer that will manage switch

240
Q

content filter

A

advanced networking device that implements content filtering, enabling admin to filter traffic based on signatures or keywords

241
Q

content switch

A

advanced networking device that works at least at layer 7 and hides servers behind a single IP

242
Q

contingency plan

A

documents that set out how to limit damage and recover from an incident

243
Q

contingency planning

A

process of creating documents that set out how to limit damage and recover quickly from an incident

244
Q

continuity

A

physical connection of wires in a network

245
Q

continuity tester

A

inexpensive network tester that can only test for continuity on a line

246
Q

convergence

A

point at which routing tables for all routers in a network are updated

247
Q

copy backup

A

type of backup similar to normal or full, in that all selected files on a system are backed up; type of backup does NOT change archive bit of files being backed up

248
Q

core

A

central glass of fiber-optic cable that carries the light signal

249
Q

COBO

A

corporate-owned business only; deployment model where corporation owns all mobile devices issued to employees; whitelist of approved applications they can install

250
Q

cost

A

arbitrary metric value assigned to a network route with OSFP-capable routers

251
Q

counter

A

predefined event that is recorded to a log file

252
Q

CRC

A

cyclic redundancy check; mathematical method used to check for errors in long streams of transmitted data with high accuracy

253
Q

crimper

A

aka crimping tool; tool used to secure a crimp or an RJ-45 connector onto end of table

254
Q

crossover cable

A

specially terminated UTP cable used to interconnect routers or switches or connect network cards without a switch; reverse sending and receiving wire pairs from one end to the other

255
Q

cross-platform support

A

standards created to enable terminals from different companies to interact with each other

256
Q

crosstalk

A

electrical signal interference between 2 cables that are in close proximity to each other

257
Q

crypto-malware

A

malicious software that uses some form of encryption to lock a user out of system

258
Q

CSMA/CA

A

carrier sense multiple access with collision avoidance; before host sends data they listen for traffic, if error is detected they wait and then try again; wireless

259
Q

CSMA/CD

A

carrier sense multiple access with collision detection; obsolete

260
Q

CSU/DSU

A

Channel Service Unit/Data Service Unit; connects a T-carrier leased line from telephone company to customer’s equipment; performs line encoding and conditioning functions

261
Q

CPE

A

customer-premises equipment; primary distribution box and customer owned/managed equipment that exists on customer side of demarc

262
Q

daily backup

A

aka daily copy backup; makes a copy of all files that have been changed that day without changing the archive bits of those files

263
Q

daisy-chain

A

method of connecting together several devices along a bus and managing the signals for each device

264
Q

data backup

A

process of creating extra copies of data to be used in case primary data source fails

265
Q

DES

A

Data Encryption Standard; symmetric-key algorithm developed by U.S. government in 1970s; used a 64-bit block and 56-bit key; 56-bit key made DES susceptible to brute-force attacks

266
Q

DOCSIS

A

Data Over Cable Service Interface Specification; unique protocol used by cable modem networks

267
Q

datagram

A

connectionless transfer unit created with User Datagram Protocol designed for quick transfer over a packet-switched network

268
Q

DTLS VPN

A

datagram TLS Virtual Private Network; optimizes connections for delay-sensitive applications (i.e. voice and video)

269
Q

DB-9

A

a 9-pin, D-shaped subminiature connector used in serial port connections

270
Q

DB-25

A

25-pin, D-shaped subminiature connector used in parallel and older serial port connections

271
Q

dead spot

A

place that should be covered by network signal but devices do not get signal

272
Q

deauth attack

A

deauthentication attack; form of DoS attack that targets 802.11 Wi-Fi networks by sending out a fram that kicks a wireless client off its current WAP connection; rogue WAP nearby presents stronger signal and then intercepts communications to and from

273
Q

dB

A

decibel; measurement of quality of signal

274
Q

dedicated circuit

A

circuit that runs from a breaker box to specific outlets

275
Q

dedicated line

A

telephone line that is always open, or connected, circuit; usually do not have telephone numbers

276
Q

dedicated server

A

machine that does not use any client functions, only server functions

277
Q

de-encapsulation

A

process of stripping all extra header info from packet as data moves up a protocol stack

278
Q

default

A

software function or operation that occurs automatically unless user specifies something else

279
Q

default gateway

A

IP address of router that interconnects the LAN to wider network like the Internet; routers IP address is part of configuration for communicating with multiple networks using IP

280
Q

D channel

A

Delta channel; type of ISDN line that transfers data to Kbps

281
Q

demarc

A

device that marks dividing line of responsibility for functioning of a network between internal users and upstream service providers

282
Q

demarc extension

A

any cabling that runs from network interface to whatever box is used by customer as demarc

283
Q

DMZ

A

demilitarized zone; lightly protected or unprotected subnet network positioned between an outer firewall and organization’s highly protected internal network; used mainly to host public address servers

284
Q

demultiplexer

A

device that can extract and distribute individual streams of data that have been combined together to travel along a single shared network cable

285
Q

DoS

A

denial of service; an effort to prevent users from gaining normal use of a resource

286
Q

DoS attack

A

denial of service attack; attack that floods networked server with so many requests that it becomes overwhelmed and ceases functioning

287
Q

DWDM

A

dense wavelength division multiplexing; optical multiplexing tech in which large number of optical signals of different optical wavelength could be combined to travel over relatively long fiber cables

288
Q

DR

A

designated router; main router in an OSPF network that relays info to all other routers in area

289
Q

destination port

A

fixed, predetermined number that defines function or session type in a TCP/IP network

290
Q

device driver

A

subprogram to control communications between computer and peripheral hardware

291
Q

device ID

A

last 6 digits of MAC address, identifying manufacturer’s unique serial number for NIC

292
Q

device types/requirements

A

with respect to installing and upgrading networks, these determine equipment needed to build network and how it should be organized

293
Q

DORA

A

DHCP 4-way handshake; process in which client gets a lease for IPv4 address— Discover, Offer, Request, and Ask

294
Q

DHCP lease

A

created by DHCP server to allow system requesting DHCP IP info to use info for certain amount of time

295
Q

DHCP relay

A

router process that passes DHCP requests and responses across router interfaces; comms can cross from one network to another within a router that has DHCP relay enabled and configured

296
Q

DHCP scope

A

pool of IP addresses that DHCP server may allocate to clients requesting IP addresses or other IP info like DNS server addresses

297
Q

DHCP snooping

A

switch process that monitors DHCP traffic, filtering out DHCP messages from untrusted sources; used to block attacks that use rogue DHCP server

298
Q

dial-up lines

A

telephone lines with telephone numbers; must dial to make connection as opposed to dedicated line

299
Q

differential backup

A

similar to incremental backup in that it backs up files that have been changed since last backup; does not change state of archive bit

300
Q

DiffServ

A

differentiated services; underlying architecture that makes quality of service (QoS) work

301
Q

DS1

A

digital signal 1; signaling method used by T1 lines which uses simple frame consisting of 25 pieces; a framing bit and 24 channels; holds single 8-bit DS0 data sample; make 193 bits per DS1 frame; frames transmitted 8000 times per second making total throughput of 1.544 Mbps

302
Q

digital signature

A

encrypted hash of a private encryption key that verifies sender’s identity to those who receive it

303
Q

DSL

A

digital subscriber line; high-speed internet connection tech that uses regular phone line for connectivity

304
Q

dipole antenna

A

standard straight-wire antenna that provides most omnidirectional function

305
Q

DC

A

direct current; type of electric circuit where flow of electrons is in complete circl

306
Q

directional antenna

A

focuses signal more toward specific direction

307
Q

DSSS

A

direct-sequence spread-spectrum; spread-spectrum broadcasting method defined in the 802.11 standard that sends data out on different frequencies at the same time

308
Q

disaster recovery

A

means and methods to recover primary infrastructure from a disaster; starts with a plan and includes data backups

309
Q

DAC

A

discretionary access control; authorization method based on idea that there is owner of a resource who may at their discretion assign access to that resource; much more flexible than MAC (mandatory access control)

310
Q

disk mirroring

A

process by which data is written to 2 or more disk drives; read and write speed is decreased but redundancy is increased; aka RAID level 1

311
Q

disk striping

A

process by which data is spread among multiple drives; increases speed for both reads and writes, but provides no fault tolerance; aka RAID level 0

312
Q

disk striping with parity

A

process by which data is spread among multiple drives, with parity info as well to provide fault tolerance; most common is RAID 5 where data and parity info is spread across 3 or more drives

313
Q

dispersion

A

diffusion over distance of light propagating down fiber cable

314
Q

distance vector

A

set of routing protocols that calculates total cost to get to a particular network ID and compares cost to total cost of all other routes

315
Q

DCS

A

distributed control system; small controller added directly to machine used to distribute computing load

316
Q

DCF

A

Distributed Coordination Function; 1 of 2 methods of collision avoidance defined by 802.11 standard and only 1 currently implemented; specifies strict rules for sending data on network media

317
Q

DDoS

A

distributed denial of service; multicomputer assault on network resource that attempts to prevent regular users from receiving services from resources; can be used to crash systems

318
Q

distributed switching

A

centralized installation, configuration, and handling of every switch in a virtualized network

319
Q

DLL

A

dynamic link library; file of executable functions or data that can be used by Windows application; DLL provides 1 or more particular functions and program accesses the functions by creating links to DLL

320
Q

DNS cache poisoning

A

attack that adds or changes info in DNS server to point host names to incorrect IP addresses under attackers control; when client visits attackers site, malware is installed

321
Q

DNS domain

A

specific branch of DNS name space; top-level DNS domains include .com, .gov, .edu

322
Q

DNS forwarding

A

DNS server configuration that sends DNS requests to another DNS server

323
Q

DNS resolver cache

A

used by Windows DNS clients to keep track of DNS info

324
Q

DNS root servers

A

highest in hierarchy of DNS servers running Internet

325
Q

DNS server

A

system that runs a special DNS server program

326
Q

DNS tree

A

hierarchy of DNS domains and individual computer names organized into tree-like structure, top of which is root

327
Q

document

A

mendium and data recorded on it for human use; report sheet or book; any record that has permanence and can be read by human or machine

328
Q

documentation

A

collection of organized documents or info recorded in documents; instructional material specifying inputs, operations, and outputs of computer program or system

329
Q

domain

A

describes a grouping of users, computers, and/or networks; group of computers and users that shares a common account database and common security policy; group of computers that shares common element in DNS hierarchical name

330
Q

domain controller

A

specifically configured to store user and server account info for its domain; store all account and security info in Active Directory domain service

331
Q

dig

A

domain information groper; command-line tool in non-Windows systems used to diagnose DNS problems

332
Q

DNS

A

Domain Name System; TCP/IP name resolution system that resolves host names to IP addresses, IP addresses to host names, and other bindings like DNS servers and mail servers for a domain

333
Q

domain users and groups

A

defined across entire network domain

334
Q

door access controls

A

methodology to grant permission or deny passage through doorway; computer-controlled, human-controlled, token-oriented, or other means

335
Q

dotted decimal notation

A

shorthand method for discussing and configuring binary IP addresses

336
Q

download

A

transfer of information from a remote computer system to user’s system

337
Q

drive mirroring

A

process of writing identical data to 2 hard drives on same controller at same time to provide data redundancy

338
Q

DS0

A

digital signal rate created by converting analog sound into 8-bit chunks 8000 times a second with data stream of 64 Kbps; simplest data stream of digital part of phone system

339
Q

DS1

A

signaling method used by T1 lines which uses relatively simple frame consisting of 25 pieces: a framing bit and 24 channels; holds single 8-bit DS0 data sample; combine to make 193 bits per DS1 frame; transmitted 8000 times/sex making total throughput of 1.544 Mbps

340
Q

DSLAM

A

DSL Access Multiplexer; device located in telephone company’s central office that connects multiple customers to Internet

341
Q

DSL modem

A

device that enables customers to connect to Internet using DSP connection; isn’t really a modem– more like ISDN terminal adapter

342
Q

DSP

A

digital signal processor; specialized microprocessor-like device that processes digital signals at expense of other capabilities; used in such specialized hardware as high-speed modems, multimedia sound cards, MIDI equipment, and real-time video capture and compression

343
Q

dual stack

A

networking device, such as router or PC that runs both IPv4 and IPv6

344
Q

duplexing

A

similar to mirroring in that in that data is written to and read from 2 physical drives for fault tolerance; separate controllers used for each drive for both fault tolerance and additional speed; considered RAID level 1

345
Q

dynamic addressing

A

way for a computer to receive IP info automatically from a server program

346
Q

DAI

A

Dynamic ARP Inspection; Cisco process that updates database of trusted systems; watches for false or suspicious ARPs and ignores them to prevent ARP cache poisoning and other malevolent efforts

347
Q

DDNS

A

Dynamic DNS; protocol that enables DNS servers to get automatic updates of IP addresses of computers in forward lookup zones, mainly by talking to local DHCP server

348
Q

DHCP

A

Dynamic Host Configuration Protocol; enables DHCP server to set TCP/IP settings automatically for a DHCP client

349
Q

DMVPN

A

dynamic multipoint VPN; virtual private network solution optimized for connections between multiple locations directly

350
Q

DNAT

A

dynamic NAT; type of Network Address Translation in which many computers can share a pool of routable IP addresses that number fewer than computers

351
Q

dynamic port numbers

A

port numbers 49152-65535 recommended by IANA to be used as ephemeral port numbers

352
Q

dynamic routing

A

process by which routers in internetwork automatically exchange info with other routers; requires dynamic routing protocol such as OSPF or RIP

353
Q

dynamic routing protocol

A

supports building of automatic routing tables such as OSPF or RIP

354
Q

E1

A

European counterpart of T1 connection that carries 32 channels at 64 Kbps for total of 2.048 Mbps– slightly faster than T1

355
Q

E3

A

European counterpart of T3 line that carries 16 E1 lines (512 channels) for total bandwidth of 34.368 Mbps– slower than American T3

356
Q

EAP-TLS

A

Extensible Authentication Protocol with Transport Layer Security; defines use of RADIUS server as well as mutual authentication, requiring certificates on server and client

357
Q

EAP-TTLS

A

Extensible Authentication Protocol with Tunneled Transport Layer Security; similar to EAP-TLS but only uses single server-side certificate

358
Q

edge device

A

hardware device that has been optimized to perform a task in coordination with other edge devices and controllers

359
Q

edge router

A

connects 1 Autonomous System to another

360
Q

effective permissions

A

permissions of all groups combined in any network operating system

361
Q

EMI

A

electromagnetic interference; interference from 1 device to another resulting in poor performance in device’s capabilities; similar to having static on your TV while running hair dryer or placing 2 monitors too close together and getting a “shaky” screen

362
Q

electronic discovery

A

process of requesting and providing electronic and stored data and evidence in legal way

363
Q

e-mail

A

electronic mail; messages (text) sent from 1 person to another via computer; can automatically send to large number of addresses (mailing list)

364
Q

E-mail alert

A

notification sent by e-mail as result of an event; typical use is a notification sent from SNMP manager as a result of out-of-tolerance condition in SNMP managed device

365
Q

e-mail client

A

program that runs on a computer and enables a user to send, receive, and organize e-mail

366
Q

e-mail server

A

aka mail server; accepts incoming e-mail, sorts e-mail for recipients into mailboxes, and sends e-mail to other servers using SMTP

367
Q

emulator

A

software or hardware that converts commands to and from host machine to entirely different platform; a program that enables you to run Nintendo games on your PC

368
Q

encapsulation

A

process of putting packets from one protocol inside another; example is Ethernet which places TCP/IP packes inside Ethernet frames

369
Q

encryption

A

method of securing messages by scrambling and encoding each packet as sent across unsecured medium like the Internet; each level provides multiple standards and options

370
Q

endpoint

A

in TCP/IP world, session info stored in RAM

371
Q

endpoints

A

correct term to use when discussing data each computer stores about connection between 2 computers’ TCP/IP applications

372
Q

end-to-end principle

A

early network concept that meant that applications and work should happen only at endpoints in a network, such as in a single client and single server

373
Q

EDGE

A

Enhanced Data rates for GSM Evolution; early cellular telephone tech that used a SIM card; obsolete

374
Q

EIGRP

A

Enhanced Interior Gateway Routing Protocol; Cisco’s proprietary hybrid protocol that has elements of both distance vector and link state routing

375
Q

SFP+

A

enhanced small form-factor pluggable; Fiber-optic connector used in 10 GbE networks

376
Q

environment limitations

A

with respect to building and upgrading networks; refers to degree of access to facilities and physical access to infrastructure; type of building must be considered; access to walls and ceilings will factor into construction of network

377
Q

environmental monitor

A

device used in telecomm rooms that keeps track of humidity, temperature, and more

378
Q

ephemeral port

A

arbitrary number generated by sending computer that receiving computer uses as destination address when sending a return packet

379
Q

equipment limitations

A

with respect to installing and upgrading networks, the degree of usage of any existing equipment, applications or cabling

380
Q

equipment rack

A

metal structure used in equipment rooms to secure network hardware devices and patch panels; most are 19” wide; devices designed to fit in rack use a height measurement call units or U

381
Q

ESD

A

electrostatic discharge; the movement of electrons from 1 boy to another; real menace to PCs because it can cause damage to semiconductors

382
Q

Ethernet

A

name coined by Xerox for 1st standard of network cabling and protocols; based on bus topology; IEEE 802.3 subcommittee defines current specifications

383
Q

EoP

A

Ethernet over Power; IEEE 1901 standard (aka HomePlug HD-PLC) provides high-speed home networking through building’s existing power infrastructure

384
Q

evil twin

A

attack that lures people into logging into a rouge access point that looks similar to a legit access point

385
Q

HSPA+

A

Evolved High- Speed Packet Access; final wireless 3G data standard; transferring max speed up to 168 Mbps; though it rarely passed 10 Mbps

386
Q

executable viruses

A

literally extensions of executables and unable to exist by themselves; once infected executable is run the virus loads into memory and adds copies of itself to other EXEs that are run

387
Q

Exim

A

E-mail server for every major platform; fast and efficient

388
Q

exit plan

A

documents and diagrams that identify best way out of a building in the even of an emergency and procedures to follow

389
Q

ESS

A

Extended Service Set; single wireless access point servicing a given area that has been extended by adding more access points

390
Q

ESSID

A

Extended Service Set Identifier; SSID applied to Extended Service Set as a networking name convention

391
Q

EUI-48

A

Extended Unique Identifier, 48-bit; IEEE term for 48-bit MAC address assigned to network interface; 1st 24 bits are assigned by IEEE as organizationally unique identifier

392
Q

EUI=64

A

Extended Unique Identifier, 64-bit; last 64 bits of IPv6 address, which are determined based on calculation based on device’s 48-bit MAC address

393
Q

EAP

A

Extensible Authentication Protocol; wrapper that EAP-compliant apps can use to accept one of many types of authentication; substantial use is in wireless network

394
Q

external connections

A

network’s connections to wider Internet; major concern when setting up a SOHO network

395
Q

EDB

A

external data bus; primary data highway of all computers; everything in computer is tied directly or indirectly to EDB

396
Q

external firewall

A

sits between perimeter network and Internet; responsible for bearing the brunt of attacks from Internet

397
Q

external network address

A

added to MAC address of every computer on IPX/SPX network that defines every computer on the network; often referred to as network number

398
Q

external threats

A

threats to network through external means; virus attacks and exploitation of users, security holes in OS or weakness of network hardware

399
Q

fail close

A

defines condition of doors and locks in event of emergency; doors should close and lock

400
Q

fail open

A

defines condition of doors and locks in the event of emergency; door should be open and unlocked

401
Q

FAQ

A

frequently asked questions

402
Q

FEXT

A

far-end crosstalk; crosstalk on opposite end of cable from signal’s source

403
Q

Fast Ethernet

A

nickname for 100-Mbps Ethernet standards; originally applied to 100BaseT

404
Q

fault tolerance

A

capability of system to continue functioning after some part of system failure: RAID is an example

405
Q

F-connector

A

screw-on connector used to terminate small-diameter coaxial cable such as RG-6 and RG-59 cables

406
Q

FDDI

A

Fiber Distributed Data Interface; older tech fiber-optic network used in campus-sized installations; transfers data 100 Mbps and uses bus topology

407
Q

FCC

A

Federal Communications Commission; In US, regulates public airwaves and rates PCs and other equipment according to amount of radiation emitted

408
Q

fiber-optic cable

A

high-speed physical medium for transmitting data that uses light rather than electricity; made of high-purity glass fibers sealed within opaque tube; faster than copper wire

409
Q

FC

A

Fibre Channel; self-contained high-speed storage environment with own storage arrays, cables, protocols, and switches; critical part of storage area networks

410
Q

file hashing

A

when download provider hashes the contents of a file and publishes resulting message digest

411
Q

file server

A

computer designated to store software, courseware, administrative tools, and other data on LAN or WAN; gives info to other computers via network when users enter personal access code

412
Q

FTP

A

File Transfer Protocol; set of rules that allows 2 computers to talk to one another as a file transfer is carried out; used when you transfer a file from 1 computer to another across Internet

413
Q

fire ratings

A

developed by Underwriters Laboratories (UL) and National Electrical Code (NEC) to define risk of network cables burning and creating noxious fumes

414
Q

firewall

A

device that restricts traffic between LAN and Internet

415
Q

FireWire

A

IEEE 1394 standard to send wide-band signals over thin connector system that plugs into TVs, VCRS, PCs, etc… serial bus developed by Apple and Texas Instruments enables connection of 60 devices at speeds of 100-800 Mbps

416
Q

first responder

A

person or robot whose job is to react to notification of possible computer crime by determining severity, collecting info, document findings/actions, and provide info to proper authorities

417
Q

flat name space

A

naming convention that gives each device only one name that be unique; used by NetBIOS; TCP/IP uses hierarchical name space

418
Q

flat-surface connector

A

early fiber-optic connector that resulted in gap between fiber-optic junctions due to flat grind faces of fibers; was replaced by Angled Physical Contact (APC) connectors

419
Q

flood guard

A

tech in modern switches that can detect and block excessive traffic

420
Q

flow

A

stream of packets from 1 place to another

421
Q

flow cache

A

stores sets of flows for interpretation and analysis

422
Q

forensics report

A

document that describes details of gathering, securing, transporting, and investigating evidence

423
Q

forward lookup zone

A

storage area in DNS server to store IP addresses and names of systems for particular domain(s)

424
Q

forward proxy server

A

acts as middleman between clients and servers, making requests to network servers on behalf of clients; results sent to proxy server and then passed on to original client

425
Q

fractional T1 access

A

service provided by many telephone companies where customers can purchase a number of individual channels in a T1 line in order to save money

426
Q

frame

A

defined series of binary data that is basic container for discrete amount of data moving across a network; created in Layer 2 of OSI model

427
Q

FCS

A

frame check sequence; sequence of bits palced in a frame that is used to check primary data for errors

428
Q

Frame Relay

A

extremely efficient data transmission technique used to send digital info such as voice, data, LAN, WAN traffic quickly and cost-efficiently to many destinations from 1 port

429
Q

FreeRADIUS

A

server software for UNIX/Linux Systems

430
Q

freeware

A

software that is distributed for free with no license fee

431
Q

FDM

A

frequency division multiplexing; process of keeping individual phone calls separate by adding different frequency multiplier to each phone call; separate phone calls by unique frequency range

432
Q

frequency mismatch

A

problem older wireless networks with manual settings where the WAP transmitted on 1 channel and wireless client was set to access on a different channel

433
Q

FHSS

A

frequency-hopping spread-spectrum; broadcasting method defined in 802.11 standard that sends data one 1 frequency at a time, constantly shifting frequencies

434
Q

FAQ

A

frequently asked questions

435
Q

FUBAR

A

Fouled Up Beyond All Recognition

436
Q

full backup

A

archive created where every file selected is backed up, and archive bit is turned off for every file backed up

437
Q

full-duplex

A

any device that can send and receive data simultaneously

438
Q

fully meshed topology

A

mesh network where every node is directly connected to every other node

439
Q

FQDN

A

fully qualified domain name; complete DNS name of a system from host name to top-level domain name; textual nomenclature to domain-organized resource; written left to right with host on left followed by hierarchical subdomains within top-level domain on right; each level is separated from any preceding or following layer by a dot

440
Q

gain

A

strengthening and focusing of radio frequency output from a WAP

441
Q

gateway router

A

router that acts as a default gateway in TCP/IP network

442
Q

general logs

A

record updates to applications

443
Q

geofencing

A

process of using mobile device’s built-in GPS capabilities and mobile networking capabilities to set geographical constraints on where mobile device can be used

444
Q

Get (SNMP)

A

query from SNMP manager sent to agent of managed device for status of management info base object

445
Q

giga

A

prefix generally refers to quantity 1,073,741,824; 1 gigabyte is that many bytes; with frequencies giga refers to 1 billion; 1 gigahertz is 1,000,000,000 hertz

446
Q

GBIC

A

gigabit interface converter; modular port that supports a standardized, wide variety of gigabit interface modules

447
Q

gigabyte

A

1024 megabytes

448
Q

global routing prefix

A

first 48 bits of an IPv6 unicast address, used to get a packet to its destination

449
Q

GSM

A

Global System for Mobile; Early cellular telephone networking standard– obsolete

450
Q

global unicast address

A

second IPv6 address that every system needs in order to get on Internet

451
Q

GFS

A

grandfather, father, son; tape rotation strategy used in data backups

452
Q

graphing

A

type of software that creates visual representations and graphs of data collected by SNMP managers

453
Q

greenfield mode

A

1 of 3 modes used with 802.11n wireless networks wherein everything is running at higher speed

454
Q

ground loop

A

voltage differential that exists between 2 different grounding points

455
Q

Group Policy

A

feature of Windows Active Directory that allows an administrator to apply policy settings to network users en masse

456
Q

GPO

A

Group Policy Object; Enables network administrators to define multiple rights and permissions to entire sets of users at one time

457
Q

groups

A

collections of network users who share similar tasks and need similar permissions

458
Q

guest

A

operating system running as virtual machine inside a hypervisor

459
Q

guest network

A

can contain or allow access to any resource that management deems acceptable

460
Q

H.320

A

standard that uses multiple ISDN channels to transport video teleconferencing over a network

461
Q

H.323

A

VoIP standard that handles initiation, setup, and delivery of VoIP sessions

462
Q

hackers

A

people who break into computer systems; malicious=black hat; positive=white hat; middle-ground=gray hat

463
Q

half-duplex

A

any device that can only send or receive data at any given moment

464
Q

hardening

A

applying security hardware, software, and processes to your network to prevent bad things from happening

465
Q

hardware appliance

A

physical network device, typically a “box” that implements and runs software or firmware to perform tasks; firewall, switch, router, print server, or other device

466
Q

hardware tools

A

cable testers, TDRs, OTDRs, certifiers, voltage event recorders, protocol analyzers, cable strippers, multimeters, tone probes/generators, butt sets, punchdown tools used to configure/troubleshoot network

467
Q

hash

A

mathematical function used in cryptography that is run on a string of binary digits of any length that results in value of some fixed length

468
Q

HEC

A

HDMI Ethernet Channel; Ethernet-enabled HDMI ports that combine video, audio, and data on single cable

469
Q

header

A

first section of a frame, packet, segment or datagram

470
Q

HVAC

A

heating, ventilation, and air conditioning; all of equipment involved in heating and cooling environments within a facility

471
Q

hex

A

hexadecimal; hex symbols based on numbering system of 16 (computer short-hand for binary); use 10 digits and 6 letters to condense 0 and 1 to binary

472
Q

hierarchical name space

A

naming scheme where full name of each object includes its position within hierarchy

473
Q

HA

A

high availability; collection of technologies and procedures that work together to keep an application available at all times

474
Q

high-speed WAN Internet cards

A

type of router expansion card that enables connection to 2 different ISPs

475
Q

history logs

A

logs that track history of how a user access network resources

476
Q

home automation

A

process of remotely controlling household devices, such as lights, thermostats, cameras, and washer/dryer

477
Q

home page

A

either web page that browser is set to use when starts up or main web page for business, organization, or person

478
Q

honeynet

A

network created by honeypot in order to lure in hackers

479
Q

honeypot

A

area of a network that an admin sets up for express purpose of attracting a computer hacker

480
Q

hop

A

passage of packet through router

481
Q

hop count

A

older metric used in RIP routers; # of routers a packet must cross to get from router to network

482
Q

horizontal cabling

A

cabling that connects equipment room to work areas

483
Q

host

A

single device on TCP/IP network that has IP address

484
Q

host ID

A

portion of IP address that defines a specific machine in a subnet

485
Q

host name

A

individual computer name in DNS naming convention

486
Q

host-based anti-malware

A

anti-malware software that is installed on individual systems as opposed to network at large

487
Q

host-based firewall

A

software firewall installed on “host” that provides firewall services for just that machine

488
Q

hostname

A

command-line tool that returns the host name of computer it is run on

489
Q

host file

A

predecessor to DNS, static text file that resides on computer and used to resolve DNS host names to IP addresses

490
Q

host-to-host

A

type of VPN connection in which single host establishes link with remote, single host

491
Q

host-to-site

A

type of VPN connection where host logs into remote network as if it were any other local resource of that network

492
Q

hot site

A

complete backup facility to continue business operations; has all resources in place, computers, network infrastructure and current backups

493
Q

hotspot

A

wireless access point that is connected to cellular data network (4G); can be permanent or portable

494
Q

HTML

A

Hypertext Markup Language; ASCII-based script-like language for creating hypertext doc like those on WWW

495
Q

HTTPS

A

HTTP over SSL; secure form of HTTP in which hypertext is encrypted by TLS (Transport Layer Security) before being sent onto network

496
Q

hub

A

electronic device that sits at center of star topology network, providing common point for connection of network devices

497
Q

HMI

A

human machine interface; DCS (distributed control system) computer or set of controls that exists between controller and human operator

498
Q

hybrid cloud

A

public and private cloud resources, connected to achieve some target result

499
Q

hybrid topology

A

mix or blend of 2 different topologies

500
Q

hypertext

A

document that has been marked up to enable user to select words or pictures within document, click them, and connect to further info

501
Q

HTML

A

Hypertext Markup Language