Comp Net+ Definitions Flashcards

1
Q

What is a Network?

A

A Network is a group of devices that are connected together to communicate and share network resources such as files and peripheral devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Network Components?

A

Devices, Physical Media, Network adapters, Network Operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Devices?

A

Computers, tablets, cell phones, servers, printers, fax machines, switches, and routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Physical Media?

A

Media that connects devices to a network and transmits data between the devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Network Adapters?

A

Hardware that translates data between the network and a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Operating Systems

A

Software that controls network traffic and access to common network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Nodes?

A

A node is any device or computer that can connect to a network and generate, process, or transfer data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Endpoints?

A

Endpoints are nodes that function as a source or destination for data transfer..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Redistribution points?

A

Nodes that transfer data, such as a network switch or a router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Network Segment?

A

A segment is a subdivision of a network that links a number of devices or serves as a connection between two nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Network Backbone?

A

It is a very high speed transmission path that carries the majority of network data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Network Backbone types?

A

Serial, Distributed/hierarchical, Collapsed, Parallel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a server?

A

It is a network computer or process that shares resources with and responds to requests from computers, devices, and other servers on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Client?

A

It is a computer or process running on a device that initiates a connection to a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Host?

A

It is a device that is connected to a network. It can be a client or a server, or even a device such as a printer, router, or switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Peer Device?

A

It is a serf-sufficient computer that acts as both a server and a client to other computers on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a Mainframe?

A

It is a powerful, centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a Terminal?

A

It is a specialized device on a mainframe-based network that transmits user-entered data to a mainframe for processing and displays the results/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an Open Systems Interconnection Model (OSI)?

A

It is a standard means of describing network communication by defining it as a series of layers, each with specific input and output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is encapsulation?

A

The process of adding delivery info to the actual data transmitted on each layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is De-encapsulation?

A

It is removing the added info as data passed to the next highest level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are Data Packets?

A

It is a unit of data transfer between devices that communicate over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are Networking Standards?

A

A set of specifications, guidelines, or characteristics applied to network components to ensure interoperability and consistency between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a LAN?

A

A local area network is a self-contained network that spans a small area, such as a single building, floor, or room.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a WAN?
Wide Area Network is a network that spans a large area, often across multiple geographical locations.
26
What is the Internet?
The single largest global WAN, linking virtually every country in the world.
27
What is an Intranet?
Private network that uses internet protocols and services to share a company's info with it employees.
28
What is an Extranet?
Private network that grants controlled access to users outside of the network.
29
What is an Enterprise Network?
A network that includes both LAN's and WAN's.
30
What is Network Configurations?
design specification for how the nodes on a network are constructed to interact and communicate.
31
What is a Centralized Network?
A network in which a central mainframe computer controls all network communication and performs data processing and storage on behalf of clients.
32
What is Client/ server Network?
Network in which servers provide resources to clients.
33
What is a Peer-to- Peer Network?
One in which resource sharing, processing, and communications control are completely decentralized.
34
What is a Mixed Node Network?
One that incorporates elements from more than one of the three standard network configurations.
35
What does Topology mean?
Determines the network's overall layout, signaling, and data-flow patterns.
36
What is Data Transmission?
Exchange of data among different computers or other electronic devices through a network.
37
What is an Analog Signal?
Data transmitted as electromagnetic pulses across a network medium. It is also a continuous wave.
38
What is a Digital Signal?
many wave possible values, can have combinations of only two values, ones and zeros.
39
What is a Broadcast Transmission?
Method in which data is sent from a source node to all other nodes on a network.
40
What is a Multicast Transmission?
Method in which data is sent from a server to specific nodes that are predefined as members of a multicast group.
41
What is an Anycast Transmission?
Transmission method in which data is sent from a server to the nearest node within a group.
42
Serial Data Transmission?
The transmission of bits occurs as one per clock cycle across a single transmission medium.
43
Parallel Data Transmission?
Transmission of multiple bits takes place by using multiple transmission lines.
44
Baseband Transmission?
digital signals are sent via DC pulses over a single, unmultiplexed signal channel.
45
Broadband Transmission?
single medium to carry multiple channels of data, usually through modulation.
46
What is Multplexing?
Controlled media access method in which a central device combines signals from multiple nodes and transmits the combined signal across a medium.
47
What is Network Media?
the conduit through which signals flow, can be either bounded or unbounded.
48
What are Copper Media?
Type of bounded media that use one or more copper conductors surrounded by an insulated coating.
49
What are Twisted Pair Cables?
Type of cable in which one or more pairs of copper wires are twisted around each other and clad in a color-coded, protective insulating plastic sheath or jacket to form a pair.
50
What are coaxial cables?
is a type of copper cable that features a central conducting copper core surrounded by an insulator and braided or foil shielding.
51
What are Connectors?
Metal devices that are located at the end of a wire.
52
What is Fiber Optic Cable?
Network cable that has a core surrounded by one or more glass or plastic strands.
53
What are Media Converters?
It enables networks running on different media to interconnect and exchange signals.
54
What is Premise Wiring?
Collection of cables, connectors, and other devices that connect LAN and phone equipment within a commercial building.
55
What are Punch Down Blocks?
Can be used to connect one group of telephone and network wires with another group in utility or telecommunication closets.
56
What is a Plenum Cable?
Network cable that is jacketed tightly around conductors so that fire cannot travel within the cable.
57
What is Polyvinyl Chloride?
Jacketed cabling is inexpensive and flexible.
58
What is a Rack System?
Standardized frame or enclosure for mounting electronic equipment and devices.
59
What is Electrical Noise?
Also known as interference in wireless networks, refers to unwanted signals that are present in the network media.
60
What is Grounding?
The connection of a shield or conductor to an electrical ground point, such as a pipe or wire that is in contact with the ground.
61
What is Shielding?
The method of placing the grounded conductive material around the media.
62
What is contention Based
Nodes themselves negotiate for media access time
63
Controlled media access
central device or system controls when and for how long each node can transmit
64
What is Polling
a controlled media access method in which a central device contacts each node to check whether it has data to transmit
65
What is Demand Priority
a polling technique in which nodes signal their state- wither ready to transmit or idle- to an intelligent hub
66
What is CSMA/CA
a contention based media access method that is primarily used in IEEE 802.11 based wireless LANs
67
CSMA/CD
a contention based media access method used in Ethernet LANs, where nodes contend for use of the physical medium
68
What is Refraction
occurs when a light ray, passing from one transparent medium to another, bends due to a change in velocity
69
What is a Demarcation point
Contains the telecommunication service entrance to the building, campus-wide backbone connections, and the interconnection to the local exchange carrier's telecommunication facilities
70
What is Backbone wiring
Provides connections between equipment rooms and telecommunication closets
71
What is an Equipment room
Main cross-connection point for an entire facility
72
What is a telecommunications closet
Houses the connection equipment for cross-connection to an equipment room along with workstations in area
73
What is Horizontal wiring
runs from each workstation outlet to the telecommunication closet
74
What is a Drop Cable
wire that runs to a PC, printer, or other device connected to a network
75
Patch Panel
connection point for drop and patch cables
76
Patch cable
cable that is plugged into the patch panel to connect two drop cables
77
Cross-connects
Individual wires that connect two drop cables to a patch panel
78
Distribution frames
devices that terminate cables and enable connections with other devices
79
Wiring Closet
small room where patch panels are installed
80
Wireless Communication?
a type of communication in which signals are transmitted over a distance without the use of a physical medium
81
Point-to-Point
direct connection between two nodes
82
Multipoint
involves connections between many nodes
83
broadcast
communication method in which data goes from a source node to all other nodes on a network
84
Latency
time taken by data sent through wireless connection from a requesting device to the receiving device and back
85
Multiple input multiple output
multiplexing to increase wireless network range and bandwidth
86
Radio Networking
form of wireless communications in which signals are sent via RF waves 10KHz to 1GHz
87
Broadcast Radio
form of TF networking that is non-directional, uses single frequency for transmission low and high power versions
88
Spread Spectrum
radio transmission in which the signal is sent over more than one frequency
89
Orthogonal Frequency Division Multiplex
Multiple frequencies simultaneously to send data
90
Direct Sequence Spread Spectrum
Multiple frequencies simultaneously to send data
91
Infrared Transmission
form of wireless transmission in which signals are sent as pulses of infrared light
92
Bluetooth
wireless tech that facilitates short range wireless communication between devices
93
Microwave Transmission
form of point-to-point wireless transmission in which signals are sent via pulses of electromagnetic energy in microwave region of electromagnetic spectrum
94
Backhaul
connection between provider core network and its smaller distribution level subnetworks
95
Access point
device that provides connection between wireless devices and can connect to wired networks
96
Service Set Identifier
32 bit alphanumeric string that identifies a WAP and all devices attached to it
97
Wireless Controllers
Provide LAN management to multiple access point
98
Lightweight Access Point Protocol
Controls multiple Wi-Fi wireless access points
99
Wireless Bridge
used to connect two wired networks by a wireless connection
100
Wireless Antenna
device that converts high frequency signals on a cable into electromagnetic waves and vice versa
101
Wireless LAN
self-contained net of two or more devices connected by using a wireless connection
102
Distributed Coordination Function
collision avoidance method that controls access to the physical medium
103
Infrastructure mode
one or more WAPs to connect workstations to the cable backbone
104
Ad-Hoc-Mode
peer-to-peer configuration which each wireless workstation talks directly to other workstations
105
Service Set Identifier broadcasts
continuous announcement by w wireless access point that transmits its name, or SSID, so that it is discoverable by wireless devices searching for a network
106
Physical Topologies
networks physical wiring layout or shape
107
Logical Topologies
path which data moves
108
Physical Bus Topology
network topology in which nodes are arranged in a linear format and a T-connector connects each node directly to cable network
109
Termination
application of a resistor or other device to the end of a cable
110
Physical Ring Topology
network topology which each node is connected to the two nearest nodes, up and downstream
111
physical start topology
network topology uses a central connectivity device, such as a switch with individual physical connections to each node
112
Physical Mesh Topology
each node is directly connected to every other node.
113
Hybrid Topology
exhibits characteristics of more than one standard topology
114
Logical Bus Topology
nodes receive the data transmitted all at the same time, regardless of physical wiring
115
Logical Ring Topology
each node receives data only from its upstream neighbor and retransmits data only to it downstream neighbor
116
Logical Star Topology
follows a physical star
117
Transceivers
device that has both a transmitter and a receiver integrated in it send and receive data
118
Gigabit Interface Converter
transceiver used to convert electrical signals into optical signals and vice versa
119
ThinNet
name given to Ethernet networking that uses RG58/U or RG58A/U cabling
120
ThickNet
name given to Ethernet networking that uses RG8 Cabling
121
Ethernet Frames
data packet that has been encoded at the Data Link layer (layer 2) for transmission from one node to another
122
Preamble
7byte pattern of ones and zeros used to signal start of frame and provide synchronization & timing info
123
Start-of-Frame
1byte identifies beginning of data field
124
Destination Address
6bytes MAC address of computer to which the frame is being transmitted
125
Source Address
MAC address of the computer transmitting data
126
Frame Type
Length of entire Ethernet frame in bytes, or frame type ID of the frame
127
Data
Payload of the frame. Minimum of 46 bytes maximum of 1500
128
Frame Check Sequence
Checks the frame by using a 32-bit cycle redundancy check
129
MAC Address
also called physical address, is unique, hardware-level address assigned to every networking device by Manufacture
130
Fast Ethernet
tech that can transmit data at speeds of 100Mbps
131
Gigabit Ethernet
Tech that can transmit data at speeds of 1000mbps and primarily uses fibers for transmission
132
switches
network device that acts as a common connecting point for various nodes or segments
133
Unmanaged switches
devices that perform switching without user intervention
134
Managed switch
Provides complete control over how the device functions
135
Routers
Networking device that connects multiple networks
136
Gateways
generic term for any device or software that translates one network protocol to another
137
Firewalls
software or hardware device or combination that protects a device or network from unauthorized data blocking unsolicited traffic
138
analog modems
device that modulates signals to encode digital info and demodulates signals to decode the transmitted info
139
Network Controllers
support large-scale networks and communication between set-tops and application servers
140
Repeater
device that regenerates a signal to improve signal strength over transmission distances
141
Hub
networking device used to connect nodes in physical star topology network into logical bus topology
142
passive hub
ports wired together physically
143
Active hub
true multiport repeater
144
Bridge
older version of switch
145
Collision Domain
network segment in which a collision can happen
146
broadcast Domain
network segment on which broadcasts occur
147
multilayer switch
performs both routing and switching
148
Spanning Tree Protocol
layer 2 protocol used to prevent switching loops
149
Virtual LAN
logical grouping of ports on the switch
150
Port Mirroring
practice of duplicating all traffic on one port is a switch to a second port, effectively sending a copy of all the data to the node connected to the second port
151
Trunking
Process that can be combined to increase bandwidth and reliability
152
VLAN Pooling
mechanism whereby WAP's can choose among several different available VLAN' to assign to incoming client connections
153
VLAN Trunking Protocol
messaging protocol that switches use to update each other's VLAN databases
154
What is the TCP/IP model
four-layer model developed by the United States Department of Defense
155
Connection-Oriented Protocol
Data Transmission method in which a connection is established before any data can be sent and where a stream of data is delivered in the same order as it was sent.
156
Connectionless Protocol
Data Transmission method that does not establish a connection between devices and where data may be delivered out of order and may be delivered over different paths
157
Transmission Control Protocol
guaranteed delivery protocol used to send data packets between devices over a network such as the internet
158
User Datagram Protocol
is a connectionless Transport-layer protocol in the IP suite and is a best effort delivery protocol
159
Internet Protocol
Protocol responsible for routing individual datagrams and addressing.
160
Internet Control Message Protocol
used with IP that attempts to report on the condition of a connection between two nodes
161
Internet Group Management Protocol
supports multicasting in a routed environment
162
Address Resolution Protocol
Maps an IP address to a physical or media access control address recognized within a local network
163
Protocol Analyzers
Diagnostic software that can examine and display data packets that are being transmitted over a network
164
Promiscuous Mode
enables device running an analyzer to recognize all packets being sent over the network
165
IP Address
Unique binary address assigned to a device so that it can communicate with other devices on a TCP/IP network
166
Subnet Masks
number assigned to each host for dividing the IP address into network and node portions
167
Subnetting
process of logically dividing a network into smaller subnetworks or subnets, with each subnet having a unique address
168
Private IP Address
addresses that organizations use for nodes within enterprise networks requiring IP connectivity and not external connections to the Internet
169
Default Gateway
is the IP address of a router that routes remote traffic from the device's local subnet to remote subnets
170
Custom Subnet
collection of leased IP addresses that are divided into smaller groups to serve a network's needs
171
Custom Subnet Mask
divide single IP address block into multiple subnetsq
172
Classless Inter-Domain Routing
addressing method that considers a custom subnet mask as a 32 bit binary word
173
Protocol binding
assigning a protocol to a NIC
174
Connection
virtual link between two nodes established for the duration of a communication session
175
Flow Control
technique for optimizing data exchange between systems
176
Buffering
flow control technique in which data received is stored on a temporary high-speed memory location, called a buffer, until the main system components are ready to work with the data
177
Flooding
Info arriving to quickly
178
Data Windows
flow control technique in which multiple packets are sent as a unit called a block or a window
179
Fixed window
every block contains the same number of packets
180
Sliding window
variable block sizes
181
Error Detection
process of determining if transmitted data has been received correctly and completely
182
Parity Check
process used to detect errors in memory of data communication
183
Cyclic redundancy check
an error detection method in which a predefined mathematical operation is used to calculate a CRC code
184
Routing
process of selecting the best route for transferring a packet from a source to its destination on a network
185
Hop
action of forwarding a packet from router to the next
186
Route
path used by data packets to reach the specified destination, using the gateway as the next hop
187
Static routing
table mappings that the network administrator establishes manually in the router prior to routing
188
Routing Tables
database created manually or by a route-discovery protocol that contains network addresses as perceived by a specific router
189
Autonomous System
self-contained network or group of networks governed by a single administration
190
Interior Gateway protocol
protocol responsible for exchanging routing info between gateways in AS
191
Distance Vector Routing
used on packet-switched networks to automatically calculate route costs and routing table entries
192
Link State Routing
flood routing info to all router within a network
193
Hybrid routing
one the uses the best of both distance-vector and link-state routing methods
194
Path-Vector Routing
used in inter-domain routing, and a route keeps track of the route from itself to the destination
195
Route Convergence
is the period of time between a network change and the router updates to reach a steady state once again
196
Routing Loop
process in which two routers discover different routes to the same location that include each other, but have incorrect info and thereby never reach the endpoint
197
Count-to-infinity
occur when a router or network goes down and one of the other routers does not realize that it can no longer reach the route
198
What is a Reservation
lease assignments in DHCP that enable you to configure a permanent IP address for a particular client on the subnet
199
What is BOOTP
Predecessor of DHCP
200
What is a Relay Agent
service that captures a DHCP broadcast and forwards it through router as a unicast to DHCP on another subnet
201
What is Automatic Private IP Addressing
service that enables DHCP client device to configure itself automatically if no DHCP is available
202
What is a Ping command
used to verify network connectivity of a device and active
203
What are Ports
number that represents a process running on a network
204
What is a Socket
an identifier for an application process on TCP/IP
205
What are Host Names
unique name given to a node
206
What are Domains
grouping of devices on the internet or network based on nature of operations
207
What is a Domain Name
unique name that identifies entity on internet
208
What is a Fully Qualified Domain Name
A host name combined with host's domain name
209
What is a Domain Name System
name resolution service that translates Fully Qualified Domain Name into IP addresses
210
What is an Authoritative Name Server
DNS server possesses an actual copy of records for a zone as opposed to caching lookup
211
What is Start of Authority
fist DNS server to create the zone
212
What are DNS Components
database divided logically into hierarchical grouping of domains. divided physically into files called zones
213
What is a Recursive Query
when client requests preferred DNS server find data on other DNS servers
214
What is Iterative Query
occurs when client requests info a server already has in its cache
215
What are HOSTS file
plaintext file configured on client device containing list of IP addresses and associated host names
216
What is a Tracert Command
determines the route data takes to get to particular destination
217
What is Pathping command
provides info about latency and packet loss on network
218
What is a TCP/IP stack
collection of protocols that work together to provide communications on IP-based networks
219
What is Daemon
Background process that performs specific operation
220
What is File Transfer Protocol
enables transfer of files between user's workstation and remote host
221
What is Network Time Protocol
synchronized clock times of devices in a network by exchanging time signals
222
What is Simple Network Management Protocol
enables admins to monitor/manage network devices/traffic
223
What is Simple Mail Transfer Protocol
communications protocol for formatting sending email messages client to server
224
What is POP3
used to retrieve email messages from mailbox on a mail server
225
What is Internet Message Access Protocol version 4
retrieving messages from mail server
226
What is Hypertext Protocol
works on application layer of OSI model and Application layer of TCP/IP model to provide web services
227
What is Hypertext Protocol Secure
provides secure connection between web browser and server Encrypted data
228
What is Telecommunication Network
emulation protocol enables users at one site to simulate session on a remote host as if terminal were directly attached
229
What is Secure Shell
program enables user or app to log on to another device over network, execute commands, manage files
230
What is Server Message Black
protocol works on Application layer of OSI helps share resources files, printers, serial ports among devices
231
What is Remote Desktop Protocol
connecting managing devices that are not necessarily located at same place as admin
232
What is a Modem
enables digital data to be sent over analog medium
233
What is a DSL Modem
Hardware that connects subscribers to phone line
234
What is a Cable Modem
Hardware that connects subscriber to ISP cable system
235
What is Dial-up Modem
Communication device that convert's computer digital signal to analog
236
What is a Channel Service/ Data service unit
combo of two WAN devices working together to connect digital WAN line to customer's LAN
237
What is Integrated Services for Digital Network
Adapter similar to modem joining Basic Rate Interface connections to different physical interfaces on router
238
What is Circuit switching
one endpoint creates single path connection to another
239
What is a Packet Switching Network
Data transmitted is broken into small units/packets move in sequence through network
240
What is Virtual Circuit Switching
Technique to transfer packets on logical circuits , do not have physical resources
241
What is a permanent Virtual Circuit
usually associated with lease lines
242
What is a switched Virtual circuit
associated with dial-up connections
243
What are Cell Switching Network
Similar to packet switching except data transmitted as fixed-length cells
244
What is a Point-to-point Connection
simple WAN topology provides a direct connection between two nodes.
245
What is Point-to-multipoint
physical star, central site is hub, multiple branch are spokes
246
What is Digital Subscriber Lin (DSL)
public network access broadband internet connection digital signal over existing phone lines
247
What is Cable Internet Access
cable television connection cable modem provide high speed internet access
248
What are Dial up Connections
modem existing phone line, long distance service low cost access
249
What is a Dedicated Line
telecommunication path 24 hours a day for designated user.
250
What is Satellite Media
Provide long-range global WAN Transmissions
251
Asynchronous Transfer Mode (ATM)
cell-switching network tech supports high speed transfer
252
What is Frame Relay
WAN rule, packet switching tech allows transmission of data over shared network
253
What is Multiprotocol Label Switching (MLS)
used in high performance packet data networks
254
What are T-Carrier Systems
digital packet switched system designed to carry multiplexed telephone connections
255
What is a Plesiochronous digital hierarchy (PDH)
carry data over fiber optic or microware radio systems
256
What is a Synchronous Optical Network (SDH)
standard data transport over fiber optic cable
257
What is Dense Wavelength division multiplexing (DWDM)
uses light wavelengths to transmit data
258
What is Coarse Wavelength Division Multiplexing (CWDM)
combining multiple signals on laser beams at various wavelengths for transmission on fiber optic cables
259
What is an Optical Carrier System (OCx)
specifies bandwidth for fiber optic transmission
260
What is Passive Optical Network
Point-to multipoint used for broadcast transmissions using optical systems
261
What is Long-Term Evolution (LTE)
radio tech for wireless broadband access
262
What is a Passive Optical Network (PON)
brings optical fiber and signals all or most of way to user
263
What is Wireless Interoperabiltiy for Microwave Access (WiMAX)
packet based wireless telecommunication tech provides wireless broadband over long distances
264
What are Unified Communication Tech (UC)
Group of integrated real time communication services and Non real consistent user experience multiple devices
265
What is Virtualization
tech through which one or more simulated computing devices run within a physical computer
266
What are Virtual Servers
VMs running network operating system or server software
267
What is Virtual Network Interface Card (VNIC)
virtualizes physical NIC used by VM
268
What is a Virtual Switch
Software application enable communication between VM's
269
What are Virtual Routers
Software routing framework enabling host to act as hardware router over LAN
270
What are Virtual firewalls
firewall service or appliance running entirely within virtualized environment
271
What is a Storage Area Network
high speed data transfer network that provides access to consolidated black level storage
272
What is Network Attached Storage
Computing device appliance providing file based data storage
273
What is Confidentiality
principle of keeping info and communications private and protected
274
What is Integrity
keeping info accurate, free of errors, without unauthorized modifications
275
What is Availability
principle of ensuring system operates continuously and accessable
276
What is Non-Repudiation
data remains associated with party that creates it
277
What is Least Privilege
users and software can access only what is necessary to perform job
278
What is Risk
concept that indicates exposure to the chance of damage or loss
279
What is a Data Breach
Security incident sensitive, protected or confidential data is copied, stolen without authorization
280
What is Unauthorized Access
type of Network or data access not explicitly approved
281
What is a Hacker
individual who have skills to gain access to computing devices through unauthorized means
282
What is a White Hat
Hacker who discovers exposes security flaws for manufacturers to fix
283
What is a Black Hat
Hacker who exposes for gain
284
What are Security Controls
safeguards/ countermeasures avoid, counteract or minimized risk
285
What are Security Policies
formalized statement that defines how security will be implemented
286
What is Windows Security Policies
configuration within Windows OS that control overall security behavior
287
What is a Group Policy
Centralized account management feature available for active directory
288
What are Permissions
security setting that determines level of access
289
What is Segmentation
Placing devices in their own segment of the network
290
What is Wireless Security
any method of securing your WLAN to prevent unauthorized access
291
What is a Site Survey
analysis technique that determines coverage area of wireless network and Identifies interference
292
What is a Disaster
Catastrophic loss of due to that cannot reasonably be prevented
293
What is Disaster Recovery
admin function protecting people/ resources while restoring network
294
What is a Natural Disaster
Fire, storm, flood
295
What is Data Destruction
Data loss due to causes other than natural
296
What is Hardware Failure
failure of network hardware
297
What is Business Continuity
set of planning / preparatory activities used during serious incident/ disaster to ensure organization critical business functions will continue
298
What is Single Point of Failure
part of a system that if fails will stop entire network from working
299
What are Vulnerabilities
condition that leaves device open to attack
300
What is Unnecessary Running services
services running on device that are not necessary for intended purpose
301
What is an Open Port
A port number configures to accept packets
302
What is an Unpatched System
current OS supported by manufacturer but does not have latest security updates
303
What are Unencrypted Channels
Connections in which data being sent is not encrypted
304
What are Cleartext Credentials
user passwords that are transmitted or stored unencrypted
305
What are Unsecure Protocols
ones that expose data and/or credentials in cleartext
306
What is Radio Frequency Emanation
electronic equipment emit unintentional radio signals and someone can eavesdrop
307
What are Threats
any event or action that could potentially result in violation of security requirement
308
What is Data Theft
attack which attacker uses unauthorized access to obtain protected network info
309
What are Social Engineering Attacks
attack that uses deception trickery to convince users to provide data
310
What are Insider Threats
malicious employee who compromises network or uses access to gain info
311
What is Malware
Code designed to gain access
312
What is a Malware Attack
Software in which attacker inserts type of undesired software on target
313
What is a software Attack
attack against software resources
314
What is Grayware
Spyware that might possibly not be malicious in nature
315
What is a Compromised System
device that has been infected by malware
316
What are Buffer Overflows
attack that targets vulnerability to cause a crash or reboot
317
What are Password Attacks
any type of attack which attacker attempts to obtain and use passwords illegitimately
318
What is a Network Sniffer
device placed on network to capture data as it passes
319
What is IP Spoofing
type of software attack, attacker creates IP packets with forged IP address
320
What is a Denial of Service Attack (DoS)
Type of network attack , attacker attempts to disrupt or disable service
321
What is Authentication
method of uniquely validating particular entity or individual credentials
322
What is a Single Sign-On
single user authentication provides access to all devices
323
What is Extensible Authentication Protocol (EAP)
enable hardware-based identifiers
324
What is Kerberos
authentication service based on time-sensitive tickets
325
What is hashing encryption
one-way encryption cleartext into ciphertext
326
What are Digital Certificates
electronic docs associates creds to public key
327
What is Encrypting File System
file-encryption tool
328
What is a Public Key Infrastructure
encryption system compose of Certificate Authority (CA) certificates, software.
329
What is a Secure Socket Layer
security protocol combines digital certs for authentication
330
What does Transport Layer Security (TLS) do
Prevents eavesdropping
331
What is Wired Equivalent Privacy
provides 64, 128,256 bit encryption
332
What does Network Access Control (NAC) do
collect protocol, policies, hardware that govern network comms
333
What is a Persistent Agent
software installed on device to respond continuous queries from NAC about device health
334
What is a Non-Persistent Agent
Dissolvable agent installed on demand and then removed
335
What is a Quarantine Network
restricted network provides users with routed access to certain hosts
336
What is a Proxy Server
isolates clients from servers by downloading files on behalf of them
337
What is a Reverse Proxy
Server that retrieves resources on behalf of client
338
What is a Network Address Translation (NAT)
Conceals internal addressing from external networks
339
What does Port Address translation (PAT) do
maps one or more unregistered addresses to single registered address using multiple ports
340
What is Port Forwarding
enables permanent translation entry that maps a port on gateway to IP address
341
What is Port Filtering
Technique enabling or disabling TCP/ UDP Computers
342
What is Traffic Filtering
allows only legit traffic through to network
343
What is Stateful Inspection
examines data/ packet and connection between internal and external devices
344
What is Stateless Firewall
compares each individual packet to a rule to see if they match
345
What is a Stateful Firewall
monitors entire conversation start to finish
346
What does a Unified Threat Management (UTM) do
manages multiple security apps through single console
347
What is a Penetration Test
attack authorized by owner to find security weakness
348
What is Remote Networking
enable users not at physical location to access network
349
What does Remote Authentication Dial-In User Service (RADIUS) do
provides standardized, centralized authentication for remote users
350
What is Network Management
manages functions like operation, admin, maintenance
351
What is Simple Network Management Protocol (SNMP)
used to collect info from network devices for diagnostics
352
What is a Throughput Tester
software tools to measure network throughput
353
What are Connectivity tools
Trouble shooting tools
354
What is a Performance Monitor
software that monitors state of services
355
What is a Network Analyzer
software or hardware that analyzes data packets
356
What Is Fault Tolerance
redundancy
357
What is Configuration Management
process setting up and changing configuration of network
358
What is IT Asset Management
policy to include info about financial/ contractual specs of hardware/ software
359
What is Common Address Redundancy Protocol (CARP)
number of devices to group together to use single virtual network interface
360
What doe System and Network Integrated Polling Software (SNIPS) do
monitors software tool that funs on UNIX