Chapter 12 - Business Networking and Security Flashcards

1
Q

Access card reader

A

A device that reads information from a magnetic strip on the back of a credit card-like access card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access method

A

A method to control which computer is allowed to use transmission media at a certain time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active topology

A

In a network, a type of topology where the nodes participate in moving data through the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Application server

A

A server that acts as a repository for application software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication

A

The process of identifying a computer user, based on a login or username and password. The computer system determines whether the computer user is authorized and what level of access is to be granted on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication server

A

A server that keeps track of who is logging on to the network and which services on the network are available to each user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bastion host

A

A heavily secured server located on a special perimeter network between the company’s secure internal network and its firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Biometric authentication device

A

A device that uses some unique characteristic of human biology to identify authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bridge

A

A device that is used to send data between different collision domains in a network, depending on where the recipient device is located

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Brute force attack

A

An attempt to access an account by repeatedly trying different passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bus topology

A

A system of networking connections in which all devices are connected in sequence on a single cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Centralized

A

A characteristic of client/server networks where the server, not the individual user, coordinates data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Client/server network

A

A type of network that uses servers to deliver services to computers that are requesting them (clients)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cloud server

A

A server that is maintained by a hosting company and that is connected to networks via the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Coaxial cable

A

A single copper wire surrounded by layers of plastic insulation, metal sheathing, and a plastic jacket, used mainly in cable television and cable Internet service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Communications server

A

A server that handles all communications between the network and other networks, including managing Internet connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CSMA/CD

A

The method used on Ethernet networks to avoid data collisions, short for carrier sense multiple access with collision detection
- node connected to the network uses carrier sense to verify that no other nodes are currently transmitting data signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data collision

A

When two computers send data at the same time and the sets of data collide somewhere in the connection media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Database server

A

A server that provides client computers with access to information stored in databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Decentralized

A

A characteristic of peer-to-peer networks where the individual user coordinates data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Dedicated server

A

A server used to fulfill one specific function, such as handling email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Device driver

A

Software that facilitates the communication between a device and its operating system or between a network adapter and a server’s operating system and the operating system of the computer in which the adapter is installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Electronic data interchange (EDI)

A

The exchange of large amounts of data in a standardized electronic format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

E-mail server

A

A server whose sole function is to process and deliver incoming and outgoing email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Extranet
An area of an intranet that only certain corporations or individuals can access; the owner of the extranet decides who will be permitted to access it
26
Fibre-Optic cable
A cable that transmits data at close to the speed of light along glass or plastic fibres
27
File server
A server that stores and manages files for network users or that acts as a storehouse for files that users can download
28
Frame
Groups of data packets that are sent together in a package
29
Honey pot
A computer system that is set up to attract unauthorized users by appearing to be a key part of a network or system that contains something of great value
30
Hybrid topology
Combining multiple topologies into one network
31
Information assurance
Ensuring that information systems contain accurate information and are adequately secured against tampering
32
Intranet
A private network set up by a business or an organization that is used exclusively by a select group of employees, customers, suppliers, volunteers or supporters
33
Jam signal
A special signal sent to network nodes alerting them that a data collision has occurred
34
Local area network (LAN)
A network in which the nodes are located within a small geographic area
35
Media access control (MAC) address
The physical address, similar to a serial number, of each network adapter
36
Network adapter
A device that enables the computer to communicate with the network using a common data communication language or protocol
37
Network administrator
Person who maintains networks for businesses
38
Network operating system
Software that handles requests for information, Internet access and the use of peripherals for the rest of the network node, providing the services necessary for the computers on the network to communicate
39
Network topology
The physical or logical arrangement of computers, transmission media, and other network components
40
Open Systems Interconnection (OSI)
A networking protocol established by the Institute of Electrical and Electronics Engineers (IEEE) that provides guidelines for modern networks
41
Packet screening
Having an external screening router examine incoming data packets to ensure they originated from or are authorized by valid users on the internal network
42
Passive topology
In a network, a type of topology where the nodes do nothing to move data along the network
43
Possessed object
Any object that users carry to identify themselves and that grants them access to a computer system or facility
44
Print queue
A software holding area for print jobs (aka print spooler)
45
Print server
A server that manages all client-requested printing jobs for all printers on a network
46
Protocol
A set of rules for exchanging communications
47
Proxy server
A server that acts as a go-between, connecting computers on the internal network with those on the external network
48
Ring topology
A type of network topology where computers and peripherals are laid out in a configuration resembling a circle
49
Router
A device that routes packets of data between two or more networks
50
Scalability
A characteristic of client/server networks where more users can be easily added without affecting the performance of other network nodes
51
Shielded twisted-pair cable
Twisted-pair cable that contains a layer of foil shielded to reduced interference
52
Star topology
The most widely deployed client/server network topology where the nodes connect to a central communications device called a switch in a pattern resembling a star
53
Switch
A device for transmitting data on a network | - makes decisions, based on the MAC address of the data, as to where data is to be sent
54
Terminator
A device that absorbs a signal so that it is not reflected back onto parts of the network that have already received it
55
Token
A special data packet used to pass data in a ring topology network
56
Token method
The access method used by ring networks to avoid data collisions
57
Transmission media
The radio waves or the physical system that transports data on a network
58
Tunneling
The main technology for achieving a virtual private network | - placement of data packets inside other data packets
59
Twisted-pair cable
Cables made of copper wires that are twisted around each other and are surrounded by a plastic jack - such as traditional home phone wire
60
Virtual private network (VPN)
A network that uses the public Internet communications infrastructure to build a secure, private network among various locations
61
Virtualization
Using specialized software to make individual physical servers behave as though they are more than one physical device
62
Web server
A computer running a specialized operating system that enables it to host web pages and to provide requested web pages to clients
63
Wide area network (WAN)
A network made up of local area networks connected over long distances
64
Wireless access point (WAP)
Gives wireless devices a sending and receiving connection point to the network
65
Wireless network interface card (NIC)
A special network adapter card that allows a computing device to connect to a network using wireless access