Chapt. 2 Key Terms(Networking) Flashcards

1
Q

help us know when to speak, when to listen, and how to start and finish conversations.

A

protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a number or range of numbers assigned to a particular connection session or connection type

A

port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a reliable communication protocol that ensures reliable delivery of data to the destination computer

A

transmission control protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a communication protocol that is considered unreliable and does not guarantee delivery of network packets of information to the destination computer

A

user datagram protocol(UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a protocol used by both web browsers and specialized ___ programs to access dedicated file transfer servers for file downloads and uploads. uses port 21

A

file transfer protocol(FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a protocol that allows data to be exchanged between computers on a secured channel. it is a more secure replacement for FTP and Telnet. uses port 22

A

Secure shell(SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a protocol that enables a user to make a text-based connection to a remote computer or networking device and use it as if he were a regular user sitting in fromt of it rather than simply downloading pages and files as he would with an http:// or ftp:// connection. uses port 23

A

telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a protocol that is used to send email from a client system to an email server, which also uses ____ to relay the message to the receiving email server. uses port 25

A

simple mail transfer protocol(SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a service that translates domain names into IP addresses. uses port 53

A

domain name system(DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a unique alphanumeric identifier for a website.

A

domain name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a protocol used by web browsers, such as internet explorer, microsoft edge, firefox and chrome to access websits and content. uses port 80

A

hypertext transfer protocol(HTTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a protocol that is often used for payment transactions on the World Wide Web and for sensitive transactions in corporate information systems. uses port 443

A

hypertext transfer protocol secure(HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

an email protocol used by client computers to download or receive email. uses port 110

A

post office protocol version 3(POP3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

an email protocol that enables messages to remain on the email server so they can be retrieved from any location. uses port 143

A

internet message access protocol(IMAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a protocol that allows some legacy applications that were developed in the 1980’s, before the TCP/IP environment had become the standard, to work on larger networks and the internet. uses ports 137-139

A

NetBIOS(RFC1001)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a protocol that provides access to shared items such as files and printers. uses ports 137-139 for traffic using NetBIOS over TCP(NetBT) and port 445 for ___ hosted on TCP

A

server message block(SMB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

an early standard method for sharing files across corporate intranets and the internet. Has largely been replaced by updated versions of server message block.

A

common internet file system(CIFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a protocol designed to allow networked hosts to find services of other devices, such as printers on the local network. uses port 427

A

service location protocol(SLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a protocol that uses TCP/IP for transport and is used by macOS to connect to devices running older macOS and OS X versions and for Apples time machine backup app. uses port 548

A

Apple filing protocol(AFP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

a protocol used by remote desktop services, which is the windows server based companion of remote desktop connection. uses port 3389

A

remote desktop protocol(RDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

a protocol used to automatically assign IP addresses to hosts. uses ports 67 and 68

A

dynamic host configuration protocol(DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

a protocol that is used as the standard for managing and monitoring devices on a network. uses ports 161 and 162

A

simple network management protocol(SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

a protocol used to access and maintain distributed directories of information such as the kind involved with microsoft domains. uses port 389

A

lightweight directory access protocol(LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

a device that routes data from one network to another. often integrated with wireless access points and switches.

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

a middle ground between hardware and software that is a software program that has been written for read only memory

A

firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

a network device that sets a direct path for data to run from one system to another, can be combined with a router or a wireless access point, faster than a hub because it supports the full bandwidth of the network at each port rather than subdividing the bandwidth among active ports, as a hub does.

A

switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

a small network that typically supports a telecommuting worker or a few employees. often funtions as both an office network and a home network.

A

small office home office(SOHO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

a device that enables wireless devices to connect to a network

A

wireless access point(WAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

a virtual device that administrators can use to manage wireless LAN networks and brach offices that are located anywhere on the internet from a central location.

A

cloud based controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

a hardware appliance or software application that protects a computer from unwanted intrusion.

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

an interface on a computer(or other device) that connects to a LAN

A

network interface card(NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

a device that amplifies a network signal to enable it to run over longer cable or wireless distance than normal

A

repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

a simple device used on an ethernet network for connecting devices to each other

A

hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

a device that encodes/decodes cable internet network signals. can be connected to a single computer or to a wired or wireless router

A

cable modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

a device that encodes/decodes cable internet network signals over broadband

A

DSL modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

a device( or setting on many access points) that is used to connect two wireless LANs together in order to expand a wirelsess network or to connect wireless clients to an ethernet network.

A

wireless bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

a box designed as a junction point for twisted pair cable and fiber cable used in networks

A

patch panel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

a switch with added capability to send power out a port using CAT5 or better grades of twisted pair cable

A

PoE power over ethernet

39
Q

the process of modifying IP addresses as information crosses a router

A

network address translation(NAT)

40
Q

a method of allowing inbound traffic on a particular TCP or UDP port or range to go to a particular IP address rather than to all devices on a network. used to forward external visitors through the router to a specific computer. instead of opening up the entire LAN, this method directs particular traffic where you want it to go

A

port forwarding

41
Q

a feature available on some routers that opens an outgoing port or range of ports on demand by a particular service, such as internet relay chat (IRC). can be used without being tied to a specific IP address.

A

port triggering

42
Q

another name for port triggering

A

destination network address translation(DNAT)

43
Q

in network computing, a subnetwork that provides external services. It is often between the LAN and the internet but is controlled by the organization that also controls the LAN.

A

demilitarized zone(DMZ)

44
Q

an important feature to enable on any network that provides streaming media, gaming or VoIP services because it prioritizes real time streaming traffic

A

quality of service(QoS)

45
Q

a router feature that enables devices on a network to add themselves to the network without the need to reconfigure the router

A

universal plug and play (UPnP)

46
Q

the oldest and weakest WiFi encryption standard. under this standard all network devices must use the same key and encryption strength

A

wired equivalent privacy (WEP)

47
Q

a security protocol developed by the Wi-Fi Alliance to secure wireless networking. Takes the place of WEP and uses TKIP as the encryption protocol

A

WiFi protected access(WPA)

48
Q

an encryption protocol for wireless LANs. replaced WEP, which had security vulnerabilities.

A

TKIP(Temporal Key Integrity Protocol)

49
Q

a security protocol developed by the Wi-Fi alliance to secure wireless networking using the AES encryption protocol. takes the place of WPA

A

WiFi protected access version 2(WPA2)

50
Q

a protocol that is similar to TKIP but more secure and that is used with the WPA2 wireless encryption standard.

A

advanced encryption standard(AES)

51
Q

a push button on some modems that allows devices to easily connect to the local wireless network.

A

WiFi protected setup(WPS)

52
Q

a wireless ethernet standard that uses 2.4GHz radio signaling for performance from 2Mbps to 11Mbps. it is compatible with 802.11__ based wireless networks but not with 802.11__ based networks unless dual band access points are used.

A

802.11b /g,a

53
Q

a wireless ethernet standard that uses 5GHz radio signals and provides performance at rates from 6Mbps up to 54Mbps. it is not compatible with other 802.11 based wireless networks unless dual band access points are used.

A

802.11a

54
Q

a wireless ethernet standard that uses 2.4GHz radio signaling for performance up to 54Mbps. it is compatible with 802.11__ based wireless networks but not with 802.11__ based networks unless dual band access points are used.

A

802.11g /a,b

55
Q

a wireless ethernet standard that uses 2.4GHz and 5GHz radio signaling for performance up to 600Mbps. uses MIMO antenna technology.

A

802.11n

56
Q

a wireless ethernet standard that uses 5GHz radio signaling for performance up to 1300Mbps. uses MU-MIMO antenna technology.

A

802.11ac

57
Q

a short range wireless network used primarily by mobile devices.

A

bluetooth

58
Q

the process of connecting two wireless devices together, such as a bluetooth or wireless mouse or keyboard and its receiver

A

pairing

59
Q

a feature included in many mobile devices such as tablets for data transfer and shopping. when enabled and a suitable payment system such as apple pay or android pay is installed on a mobile device, it can be used for secure payments at any retailer that supports this technology

A

near field communication(NFC)

60
Q

a technology that consists of an ____ tag that can broadcast information about an item, as well as an ____ reader to accept the broadcast information and deliver it to a computer system for use.

A

radio frequency identification(RFID)

61
Q

typically a computer with a single large drive or a RAID array for shared storage on a network.

A

file server

62
Q

a special kind of file server designed to store large amounts of data in a central location for users on a network

A

network attached storage(NAS)

63
Q

a device that manages the printing tasks for multiple users sharing one or more printers in an office

A

print server

64
Q

a server on a network that provides IP addresses on demand. usually incorporated into a SOHO wireless router.

A

DHCP server(dynamic host configuration protocol) server

65
Q

a server that tracks events, such as user logins and crashes that happen on devices on a network

A

syslog server

66
Q

a device that provides firewall, remote access, and virtual private network(VPN) support, web traffic filtering with anti-malware, and network intrusion prevention.

A

unified threat management(UTM)

67
Q

a device or program that detects network intrusions that might not be detected by a firewall

A

intrusion detection system(IDS)

68
Q

a device or software that uses methods similar to those used by an IDS, but unlike an IDS, can also block attacks.

A

intrusion prevention system(IPS)

69
Q

a server that tracks devices using the network and ensures that they comply with the security parameters of the network.

A

end-point management server

70
Q

an outdated operating system, programming language, application, or hardware.

A

legacy system

71
Q

dedicated computing devices used for specific tasks such as machine control, point of sale systems, or ATMs. are often legacy systems.

A

embedded systems

72
Q

an IPv4 network addressing feature used to specify how much of an IP address is the host address and what part is the extended network address.

A

subnet mask

73
Q

a private and secure network connection that is carried by an insecure public network, such as the internet.

A

virtual private network (VPN)

74
Q

a grouping of some computers on a local area network that are configured to behave as if they have their own separate LAN. allows users to create an encrypted connection to their home or business network via the internet when accessing the network remotely.

A

virtual local are network(VLAN)

75
Q

a type of broadband internet service that uses telephone lines to carry internet traffic at speeds up to 1.5Mbps or more while allowing you to use your phone for normal functions at the same time.

A

digital subscriber line(DSL)

two major types are ADSL and SDSL

76
Q

a network that uses an analog (phone line) modem to make a direct connection to a remote computer via phone line.

A

dial-up network

77
Q

network cable that uses glass fibers to transmit photons to carry data.

A

fiber

short for fiber optic

78
Q

an internet provider option that uses dish antennas similar to _______ TV antennas to receive and transmit signals between geosynchronous _______ and computers.

A

satellite

79
Q

a set of standards originally developed to provide an all digital method for connecting multiple telephone and telephony type devices such as fax machines, to a single telephone line and to provide a faster connection for teleconferencing for remote computer users. using PTSN lines, ____ used a terminal adapter (TA) on multiple 64Kbps channels.

A

integrated services digital network(ISDN)

80
Q

a type of wireless networking in which fixed microwave towers are used to send and receive signals. a popular type of internet and TV access in rural areas.

A

line-of-sight wireless

81
Q

a group of computers and other devices usually located in a small area such as a house, a small office, or a single building.

A

local area network(LAN)

82
Q

a group of one or more LANs over a large geographic area.

A

wide area network(WAN)

83
Q

a network that is larger than a LAN and smaller than WAN

A

personal area network(PAN)

84
Q

a smaller version of a WAN. typically used when a company has two offices in the same city and wants to make a high speed connection between them

A

metropolitan are network(MAN)

85
Q

a communications network made up of a cloud of radio nodes organized in a ____ topology. a ____ involves many interconnections among devices or nodes.

A

wireless mesh network(WMN)

86
Q

a tool used to strip a portion of the plastic jacket off of a cable to expose the individual wires.

A

cable stripper

87
Q

a tool used to attach a connector to the end of a raw twisted pair or coaxial cable

A

crimper

88
Q

a tool that punches down the individual wires into the 110 IDC clips of an RJ-45 jack and a patch panel

A

punchdown tool

89
Q

a tool that can be used to test both coaxial and TP cabling and AC and DC voltage

A

multimeter

90
Q

a kit that consists of two parts: a device, which connects to one end of a network cable that, when turned on, sends a sound along the length of the cable; and a device to pick up that sound anywhere along the cable length and at the termination point.

A

tone generator and probe

also called fox and hound

91
Q

a tool that test each wire in a cable and makes sure each on is wired properly

A

cable tester

92
Q

a plug that routes output to input wires to enable a port to be tested for proper send/receive functions. widely available for testing ethernet ports as well as legacy COM and LPT ports. simulates a network and tests whether the network adapter and the TCP/IP are functioning properly.

A

loopback plug

93
Q

a device or app that detects WiFi signals and determines signal strength

A

WiFi analyzer