Comp Net+ Definitions Flashcards
What is a Network?
A Network is a group of devices that are connected together to communicate and share network resources such as files and peripheral devices.
What are Network Components?
Devices, Physical Media, Network adapters, Network Operating systems
What are Devices?
Computers, tablets, cell phones, servers, printers, fax machines, switches, and routers
What is Physical Media?
Media that connects devices to a network and transmits data between the devices.
What are Network Adapters?
Hardware that translates data between the network and a device.
Network Operating Systems
Software that controls network traffic and access to common network resources.
What are Nodes?
A node is any device or computer that can connect to a network and generate, process, or transfer data.
What are Endpoints?
Endpoints are nodes that function as a source or destination for data transfer..
What are Redistribution points?
Nodes that transfer data, such as a network switch or a router.
What is a Network Segment?
A segment is a subdivision of a network that links a number of devices or serves as a connection between two nodes.
What is a Network Backbone?
It is a very high speed transmission path that carries the majority of network data.
What are Network Backbone types?
Serial, Distributed/hierarchical, Collapsed, Parallel
What is a server?
It is a network computer or process that shares resources with and responds to requests from computers, devices, and other servers on the network.
What is a Client?
It is a computer or process running on a device that initiates a connection to a server.
What is a Host?
It is a device that is connected to a network. It can be a client or a server, or even a device such as a printer, router, or switch.
What is a Peer Device?
It is a serf-sufficient computer that acts as both a server and a client to other computers on a network.
What is a Mainframe?
It is a powerful, centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.
What is a Terminal?
It is a specialized device on a mainframe-based network that transmits user-entered data to a mainframe for processing and displays the results/
What is an Open Systems Interconnection Model (OSI)?
It is a standard means of describing network communication by defining it as a series of layers, each with specific input and output.
What is encapsulation?
The process of adding delivery info to the actual data transmitted on each layer.
What is De-encapsulation?
It is removing the added info as data passed to the next highest level.
What are Data Packets?
It is a unit of data transfer between devices that communicate over a network.
What are Networking Standards?
A set of specifications, guidelines, or characteristics applied to network components to ensure interoperability and consistency between them.
What is a LAN?
A local area network is a self-contained network that spans a small area, such as a single building, floor, or room.
What is a WAN?
Wide Area Network is a network that spans a large area, often across multiple geographical locations.
What is the Internet?
The single largest global WAN, linking virtually every country in the world.
What is an Intranet?
Private network that uses internet protocols and services to share a company’s info with it employees.
What is an Extranet?
Private network that grants controlled access to users outside of the network.
What is an Enterprise Network?
A network that includes both LAN’s and WAN’s.
What is Network Configurations?
design specification for how the nodes on a network are constructed to interact and communicate.
What is a Centralized Network?
A network in which a central mainframe computer controls all network communication and performs data processing and storage on behalf of clients.
What is Client/ server Network?
Network in which servers provide resources to clients.
What is a Peer-to- Peer Network?
One in which resource sharing, processing, and communications control are completely decentralized.
What is a Mixed Node Network?
One that incorporates elements from more than one of the three standard network configurations.
What does Topology mean?
Determines the network’s overall layout, signaling, and data-flow patterns.
What is Data Transmission?
Exchange of data among different computers or other electronic devices through a network.
What is an Analog Signal?
Data transmitted as electromagnetic pulses across a network medium. It is also a continuous wave.
What is a Digital Signal?
many wave possible values, can have combinations of only two values, ones and zeros.
What is a Broadcast Transmission?
Method in which data is sent from a source node to all other nodes on a network.
What is a Multicast Transmission?
Method in which data is sent from a server to specific nodes that are predefined as members of a multicast group.
What is an Anycast Transmission?
Transmission method in which data is sent from a server to the nearest node within a group.
Serial Data Transmission?
The transmission of bits occurs as one per clock cycle across a single transmission medium.
Parallel Data Transmission?
Transmission of multiple bits takes place by using multiple transmission lines.
Baseband Transmission?
digital signals are sent via DC pulses over a single, unmultiplexed signal channel.
Broadband Transmission?
single medium to carry multiple channels of data, usually through modulation.
What is Multplexing?
Controlled media access method in which a central device combines signals from multiple nodes and transmits the combined signal across a medium.
What is Network Media?
the conduit through which signals flow, can be either bounded or unbounded.
What are Copper Media?
Type of bounded media that use one or more copper conductors surrounded by an insulated coating.
What are Twisted Pair Cables?
Type of cable in which one or more pairs of copper wires are twisted around each other and clad in a color-coded, protective insulating plastic sheath or jacket to form a pair.
What are coaxial cables?
is a type of copper cable that features a central conducting copper core surrounded by an insulator and braided or foil shielding.
What are Connectors?
Metal devices that are located at the end of a wire.
What is Fiber Optic Cable?
Network cable that has a core surrounded by one or more glass or plastic strands.
What are Media Converters?
It enables networks running on different media to interconnect and exchange signals.
What is Premise Wiring?
Collection of cables, connectors, and other devices that connect LAN and phone equipment within a commercial building.
What are Punch Down Blocks?
Can be used to connect one group of telephone and network wires with another group in utility or telecommunication closets.
What is a Plenum Cable?
Network cable that is jacketed tightly around conductors so that fire cannot travel within the cable.
What is Polyvinyl Chloride?
Jacketed cabling is inexpensive and flexible.
What is a Rack System?
Standardized frame or enclosure for mounting electronic equipment and devices.
What is Electrical Noise?
Also known as interference in wireless networks, refers to unwanted signals that are present in the network media.
What is Grounding?
The connection of a shield or conductor to an electrical ground point, such as a pipe or wire that is in contact with the ground.
What is Shielding?
The method of placing the grounded conductive material around the media.
What is contention Based
Nodes themselves negotiate for media access time
Controlled media access
central device or system controls when and for how long each node can transmit
What is Polling
a controlled media access method in which a central device contacts each node to check whether it has data to transmit
What is Demand Priority
a polling technique in which nodes signal their state- wither ready to transmit or idle- to an intelligent hub
What is CSMA/CA
a contention based media access method that is primarily used in IEEE 802.11 based wireless LANs
CSMA/CD
a contention based media access method used in Ethernet LANs, where nodes contend for use of the physical medium
What is Refraction
occurs when a light ray, passing from one transparent medium to another, bends due to a change in velocity
What is a Demarcation point
Contains the telecommunication service entrance to the building, campus-wide backbone connections, and the interconnection to the local exchange carrier’s telecommunication facilities
What is Backbone wiring
Provides connections between equipment rooms and telecommunication closets
What is an Equipment room
Main cross-connection point for an entire facility
What is a telecommunications closet
Houses the connection equipment for cross-connection to an equipment room along with workstations in area
What is Horizontal wiring
runs from each workstation outlet to the telecommunication closet
What is a Drop Cable
wire that runs to a PC, printer, or other device connected to a network
Patch Panel
connection point for drop and patch cables
Patch cable
cable that is plugged into the patch panel to connect two drop cables
Cross-connects
Individual wires that connect two drop cables to a patch panel
Distribution frames
devices that terminate cables and enable connections with other devices
Wiring Closet
small room where patch panels are installed
Wireless Communication?
a type of communication in which signals are transmitted over a distance without the use of a physical medium
Point-to-Point
direct connection between two nodes
Multipoint
involves connections between many nodes
broadcast
communication method in which data goes from a source node to all other nodes on a network
Latency
time taken by data sent through wireless connection from a requesting device to the receiving device and back
Multiple input multiple output
multiplexing to increase wireless network range and bandwidth
Radio Networking
form of wireless communications in which signals are sent via RF waves 10KHz to 1GHz
Broadcast Radio
form of TF networking that is non-directional, uses single frequency for transmission low and high power versions
Spread Spectrum
radio transmission in which the signal is sent over more than one frequency
Orthogonal Frequency Division Multiplex
Multiple frequencies simultaneously to send data
Direct Sequence Spread Spectrum
Multiple frequencies simultaneously to send data
Infrared Transmission
form of wireless transmission in which signals are sent as pulses of infrared light
Bluetooth
wireless tech that facilitates short range wireless communication between devices
Microwave Transmission
form of point-to-point wireless transmission in which signals are sent via pulses of electromagnetic energy in microwave region of electromagnetic spectrum
Backhaul
connection between provider core network and its smaller distribution level subnetworks
Access point
device that provides connection between wireless devices and can connect to wired networks
Service Set Identifier
32 bit alphanumeric string that identifies a WAP and all devices attached to it
Wireless Controllers
Provide LAN management to multiple access point
Lightweight Access Point Protocol
Controls multiple Wi-Fi wireless access points
Wireless Bridge
used to connect two wired networks by a wireless connection
Wireless Antenna
device that converts high frequency signals on a cable into electromagnetic waves and vice versa
Wireless LAN
self-contained net of two or more devices connected by using a wireless connection
Distributed Coordination Function
collision avoidance method that controls access to the physical medium
Infrastructure mode
one or more WAPs to connect workstations to the cable backbone
Ad-Hoc-Mode
peer-to-peer configuration which each wireless workstation talks directly to other workstations
Service Set Identifier broadcasts
continuous announcement by w wireless access point that transmits its name, or SSID, so that it is discoverable by wireless devices searching for a network
Physical Topologies
networks physical wiring layout or shape
Logical Topologies
path which data moves
Physical Bus Topology
network topology in which nodes are arranged in a linear format and a T-connector connects each node directly to cable network
Termination
application of a resistor or other device to the end of a cable
Physical Ring Topology
network topology which each node is connected to the two nearest nodes, up and downstream
physical start topology
network topology uses a central connectivity device, such as a switch with individual physical connections to each node
Physical Mesh Topology
each node is directly connected to every other node.
Hybrid Topology
exhibits characteristics of more than one standard topology
Logical Bus Topology
nodes receive the data transmitted all at the same time, regardless of physical wiring
Logical Ring Topology
each node receives data only from its upstream neighbor and retransmits data only to it downstream neighbor
Logical Star Topology
follows a physical star
Transceivers
device that has both a transmitter and a receiver integrated in it send and receive data
Gigabit Interface Converter
transceiver used to convert electrical signals into optical signals and vice versa
ThinNet
name given to Ethernet networking that uses RG58/U or RG58A/U cabling
ThickNet
name given to Ethernet networking that uses RG8 Cabling
Ethernet Frames
data packet that has been encoded at the Data Link layer (layer 2) for transmission from one node to another
Preamble
7byte pattern of ones and zeros used to signal start of frame and provide synchronization & timing info
Start-of-Frame
1byte identifies beginning of data field
Destination Address
6bytes MAC address of computer to which the frame is being transmitted
Source Address
MAC address of the computer transmitting data
Frame Type
Length of entire Ethernet frame in bytes, or frame type ID of the frame
Data
Payload of the frame. Minimum of 46 bytes maximum of 1500
Frame Check Sequence
Checks the frame by using a 32-bit cycle redundancy check
MAC Address
also called physical address, is unique, hardware-level address assigned to every networking device by Manufacture
Fast Ethernet
tech that can transmit data at speeds of 100Mbps
Gigabit Ethernet
Tech that can transmit data at speeds of 1000mbps and primarily uses fibers for transmission
switches
network device that acts as a common connecting point for various nodes or segments
Unmanaged switches
devices that perform switching without user intervention
Managed switch
Provides complete control over how the device functions
Routers
Networking device that connects multiple networks
Gateways
generic term for any device or software that translates one network protocol to another
Firewalls
software or hardware device or combination that protects a device or network from unauthorized data blocking unsolicited traffic
analog modems
device that modulates signals to encode digital info and demodulates signals to decode the transmitted info
Network Controllers
support large-scale networks and communication between set-tops and application servers
Repeater
device that regenerates a signal to improve signal strength over transmission distances
Hub
networking device used to connect nodes in physical star topology network into logical bus topology
passive hub
ports wired together physically
Active hub
true multiport repeater
Bridge
older version of switch
Collision Domain
network segment in which a collision can happen
broadcast Domain
network segment on which broadcasts occur
multilayer switch
performs both routing and switching
Spanning Tree Protocol
layer 2 protocol used to prevent switching loops
Virtual LAN
logical grouping of ports on the switch
Port Mirroring
practice of duplicating all traffic on one port is a switch to a second port, effectively sending a copy of all the data to the node connected to the second port
Trunking
Process that can be combined to increase bandwidth and reliability
VLAN Pooling
mechanism whereby WAP’s can choose among several different available VLAN’ to assign to incoming client connections
VLAN Trunking Protocol
messaging protocol that switches use to update each other’s VLAN databases
What is the TCP/IP model
four-layer model developed by the United States Department of Defense
Connection-Oriented Protocol
Data Transmission method in which a connection is established before any data can be sent and where a stream of data is delivered in the same order as it was sent.
Connectionless Protocol
Data Transmission method that does not establish a connection between devices and where data may be delivered out of order and may be delivered over different paths
Transmission Control Protocol
guaranteed delivery protocol used to send data packets between devices over a network such as the internet
User Datagram Protocol
is a connectionless Transport-layer protocol in the IP suite and is a best effort delivery protocol
Internet Protocol
Protocol responsible for routing individual datagrams and addressing.
Internet Control Message Protocol
used with IP that attempts to report on the condition of a connection between two nodes
Internet Group Management Protocol
supports multicasting in a routed environment
Address Resolution Protocol
Maps an IP address to a physical or media access control address recognized within a local network
Protocol Analyzers
Diagnostic software that can examine and display data packets that are being transmitted over a network
Promiscuous Mode
enables device running an analyzer to recognize all packets being sent over the network
IP Address
Unique binary address assigned to a device so that it can communicate with other devices on a TCP/IP network
Subnet Masks
number assigned to each host for dividing the IP address into network and node portions
Subnetting
process of logically dividing a network into smaller subnetworks or subnets, with each subnet having a unique address
Private IP Address
addresses that organizations use for nodes within enterprise networks requiring IP connectivity and not external connections to the Internet
Default Gateway
is the IP address of a router that routes remote traffic from the device’s local subnet to remote subnets
Custom Subnet
collection of leased IP addresses that are divided into smaller groups to serve a network’s needs
Custom Subnet Mask
divide single IP address block into multiple subnetsq
Classless Inter-Domain Routing
addressing method that considers a custom subnet mask as a 32 bit binary word
Protocol binding
assigning a protocol to a NIC
Connection
virtual link between two nodes established for the duration of a communication session
Flow Control
technique for optimizing data exchange between systems
Buffering
flow control technique in which data received is stored on a temporary high-speed memory location, called a buffer, until the main system components are ready to work with the data
Flooding
Info arriving to quickly
Data Windows
flow control technique in which multiple packets are sent as a unit called a block or a window
Fixed window
every block contains the same number of packets
Sliding window
variable block sizes
Error Detection
process of determining if transmitted data has been received correctly and completely
Parity Check
process used to detect errors in memory of data communication
Cyclic redundancy check
an error detection method in which a predefined mathematical operation is used to calculate a CRC code
Routing
process of selecting the best route for transferring a packet from a source to its destination on a network
Hop
action of forwarding a packet from router to the next
Route
path used by data packets to reach the specified destination, using the gateway as the next hop
Static routing
table mappings that the network administrator establishes manually in the router prior to routing
Routing Tables
database created manually or by a route-discovery protocol that contains network addresses as perceived by a specific router
Autonomous System
self-contained network or group of networks governed by a single administration
Interior Gateway protocol
protocol responsible for exchanging routing info between gateways in AS
Distance Vector Routing
used on packet-switched networks to automatically calculate route costs and routing table entries
Link State Routing
flood routing info to all router within a network
Hybrid routing
one the uses the best of both distance-vector and link-state routing methods
Path-Vector Routing
used in inter-domain routing, and a route keeps track of the route from itself to the destination
Route Convergence
is the period of time between a network change and the router updates to reach a steady state once again
Routing Loop
process in which two routers discover different routes to the same location that include each other, but have incorrect info and thereby never reach the endpoint
Count-to-infinity
occur when a router or network goes down and one of the other routers does not realize that it can no longer reach the route
What is a Reservation
lease assignments in DHCP that enable you to configure a permanent IP address for a particular client on the subnet
What is BOOTP
Predecessor of DHCP
What is a Relay Agent
service that captures a DHCP broadcast and forwards it through router as a unicast to DHCP on another subnet
What is Automatic Private IP Addressing
service that enables DHCP client device to configure itself automatically if no DHCP is available
What is a Ping command
used to verify network connectivity of a device and active
What are Ports
number that represents a process running on a network
What is a Socket
an identifier for an application process on TCP/IP
What are Host Names
unique name given to a node
What are Domains
grouping of devices on the internet or network based on nature of operations
What is a Domain Name
unique name that identifies entity on internet
What is a Fully Qualified Domain Name
A host name combined with host’s domain name
What is a Domain Name System
name resolution service that translates Fully Qualified Domain Name into IP addresses
What is an Authoritative Name Server
DNS server possesses an actual copy of records for a zone as opposed to caching lookup
What is Start of Authority
fist DNS server to create the zone
What are DNS Components
database divided logically into hierarchical grouping of domains. divided physically into files called zones
What is a Recursive Query
when client requests preferred DNS server find data on other DNS servers
What is Iterative Query
occurs when client requests info a server already has in its cache
What are HOSTS file
plaintext file configured on client device containing list of IP addresses and associated host names
What is a Tracert Command
determines the route data takes to get to particular destination
What is Pathping command
provides info about latency and packet loss on network
What is a TCP/IP stack
collection of protocols that work together to provide communications on IP-based networks
What is Daemon
Background process that performs specific operation
What is File Transfer Protocol
enables transfer of files between user’s workstation and remote host
What is Network Time Protocol
synchronized clock times of devices in a network by exchanging time signals
What is Simple Network Management Protocol
enables admins to monitor/manage network devices/traffic
What is Simple Mail Transfer Protocol
communications protocol for formatting sending email messages client to server
What is POP3
used to retrieve email messages from mailbox on a mail server
What is Internet Message Access Protocol version 4
retrieving messages from mail server
What is Hypertext Protocol
works on application layer of OSI model and Application layer of TCP/IP model to provide web services
What is Hypertext Protocol Secure
provides secure connection between web browser and server Encrypted data
What is Telecommunication Network
emulation protocol enables users at one site to simulate session on a remote host as if terminal were directly attached
What is Secure Shell
program enables user or app to log on to another device over network, execute commands, manage files
What is Server Message Black
protocol works on Application layer of OSI helps share resources files, printers, serial ports among devices
What is Remote Desktop Protocol
connecting managing devices that are not necessarily located at same place as admin
What is a Modem
enables digital data to be sent over analog medium
What is a DSL Modem
Hardware that connects subscribers to phone line
What is a Cable Modem
Hardware that connects subscriber to ISP cable system
What is Dial-up Modem
Communication device that convert’s computer digital signal to analog
What is a Channel Service/ Data service unit
combo of two WAN devices working together to connect digital WAN line to customer’s LAN
What is Integrated Services for Digital Network
Adapter similar to modem joining Basic Rate Interface connections to different physical interfaces on router
What is Circuit switching
one endpoint creates single path connection to another
What is a Packet Switching Network
Data transmitted is broken into small units/packets move in sequence through network
What is Virtual Circuit Switching
Technique to transfer packets on logical circuits , do not have physical resources
What is a permanent Virtual Circuit
usually associated with lease lines
What is a switched Virtual circuit
associated with dial-up connections
What are Cell Switching Network
Similar to packet switching except data transmitted as fixed-length cells
What is a Point-to-point Connection
simple WAN topology provides a direct connection between two nodes.
What is Point-to-multipoint
physical star, central site is hub, multiple branch are spokes
What is Digital Subscriber Lin (DSL)
public network access broadband internet connection digital signal over existing phone lines
What is Cable Internet Access
cable television connection cable modem provide high speed internet access
What are Dial up Connections
modem existing phone line, long distance service low cost access
What is a Dedicated Line
telecommunication path 24 hours a day for designated user.
What is Satellite Media
Provide long-range global WAN Transmissions
Asynchronous Transfer Mode (ATM)
cell-switching network tech supports high speed transfer
What is Frame Relay
WAN rule, packet switching tech allows transmission of data over shared network
What is Multiprotocol Label Switching (MLS)
used in high performance packet data networks
What are T-Carrier Systems
digital packet switched system designed to carry multiplexed telephone connections
What is a Plesiochronous digital hierarchy (PDH)
carry data over fiber optic or microware radio systems
What is a Synchronous Optical Network (SDH)
standard data transport over fiber optic cable
What is Dense Wavelength division multiplexing (DWDM)
uses light wavelengths to transmit data
What is Coarse Wavelength Division Multiplexing (CWDM)
combining multiple signals on laser beams at various wavelengths for transmission on fiber optic cables
What is an Optical Carrier System (OCx)
specifies bandwidth for fiber optic transmission
What is Passive Optical Network
Point-to multipoint used for broadcast transmissions using optical systems
What is Long-Term Evolution (LTE)
radio tech for wireless broadband access
What is a Passive Optical Network (PON)
brings optical fiber and signals all or most of way to user
What is Wireless Interoperabiltiy for Microwave Access (WiMAX)
packet based wireless telecommunication tech provides wireless broadband over long distances
What are Unified Communication Tech (UC)
Group of integrated real time communication services and Non real consistent user experience multiple devices
What is Virtualization
tech through which one or more simulated computing devices run within a physical computer
What are Virtual Servers
VMs running network operating system or server software
What is Virtual Network Interface Card (VNIC)
virtualizes physical NIC used by VM
What is a Virtual Switch
Software application enable communication between VM’s
What are Virtual Routers
Software routing framework enabling host to act as hardware router over LAN
What are Virtual firewalls
firewall service or appliance running entirely within virtualized environment
What is a Storage Area Network
high speed data transfer network that provides access to consolidated black level storage
What is Network Attached Storage
Computing device appliance providing file based data storage
What is Confidentiality
principle of keeping info and communications private and protected
What is Integrity
keeping info accurate, free of errors, without unauthorized modifications
What is Availability
principle of ensuring system operates continuously and accessable
What is Non-Repudiation
data remains associated with party that creates it
What is Least Privilege
users and software can access only what is necessary to perform job
What is Risk
concept that indicates exposure to the chance of damage or loss
What is a Data Breach
Security incident sensitive, protected or confidential data is copied, stolen without authorization
What is Unauthorized Access
type of Network or data access not explicitly approved
What is a Hacker
individual who have skills to gain access to computing devices through unauthorized means
What is a White Hat
Hacker who discovers exposes security flaws for manufacturers to fix
What is a Black Hat
Hacker who exposes for gain
What are Security Controls
safeguards/ countermeasures avoid, counteract or minimized risk
What are Security Policies
formalized statement that defines how security will be implemented
What is Windows Security Policies
configuration within Windows OS that control overall security behavior
What is a Group Policy
Centralized account management feature available for active directory
What are Permissions
security setting that determines level of access
What is Segmentation
Placing devices in their own segment of the network
What is Wireless Security
any method of securing your WLAN to prevent unauthorized access
What is a Site Survey
analysis technique that determines coverage area of wireless network and Identifies interference
What is a Disaster
Catastrophic loss of due to that cannot reasonably be prevented
What is Disaster Recovery
admin function protecting people/ resources while restoring network
What is a Natural Disaster
Fire, storm, flood
What is Data Destruction
Data loss due to causes other than natural
What is Hardware Failure
failure of network hardware
What is Business Continuity
set of planning / preparatory activities used during serious incident/ disaster to ensure organization critical business functions will continue
What is Single Point of Failure
part of a system that if fails will stop entire network from working
What are Vulnerabilities
condition that leaves device open to attack
What is Unnecessary Running services
services running on device that are not necessary for intended purpose
What is an Open Port
A port number configures to accept packets
What is an Unpatched System
current OS supported by manufacturer but does not have latest security updates
What are Unencrypted Channels
Connections in which data being sent is not encrypted
What are Cleartext Credentials
user passwords that are transmitted or stored unencrypted
What are Unsecure Protocols
ones that expose data and/or credentials in cleartext
What is Radio Frequency Emanation
electronic equipment emit unintentional radio signals and someone can eavesdrop
What are Threats
any event or action that could potentially result in violation of security requirement
What is Data Theft
attack which attacker uses unauthorized access to obtain protected network info
What are Social Engineering Attacks
attack that uses deception trickery to convince users to provide data
What are Insider Threats
malicious employee who compromises network or uses access to gain info
What is Malware
Code designed to gain access
What is a Malware Attack
Software in which attacker inserts type of undesired software on target
What is a software Attack
attack against software resources
What is Grayware
Spyware that might possibly not be malicious in nature
What is a Compromised System
device that has been infected by malware
What are Buffer Overflows
attack that targets vulnerability to cause a crash or reboot
What are Password Attacks
any type of attack which attacker attempts to obtain and use passwords illegitimately
What is a Network Sniffer
device placed on network to capture data as it passes
What is IP Spoofing
type of software attack, attacker creates IP packets with forged IP address
What is a Denial of Service Attack (DoS)
Type of network attack , attacker attempts to disrupt or disable service
What is Authentication
method of uniquely validating particular entity or individual credentials
What is a Single Sign-On
single user authentication provides access to all devices
What is Extensible Authentication Protocol (EAP)
enable hardware-based identifiers
What is Kerberos
authentication service based on time-sensitive tickets
What is hashing encryption
one-way encryption cleartext into ciphertext
What are Digital Certificates
electronic docs associates creds to public key
What is Encrypting File System
file-encryption tool
What is a Public Key Infrastructure
encryption system compose of Certificate Authority (CA) certificates, software.
What is a Secure Socket Layer
security protocol combines digital certs for authentication
What does Transport Layer Security (TLS) do
Prevents eavesdropping
What is Wired Equivalent Privacy
provides 64, 128,256 bit encryption
What does Network Access Control (NAC) do
collect protocol, policies, hardware that govern network comms
What is a Persistent Agent
software installed on device to respond continuous queries from NAC about device health
What is a Non-Persistent Agent
Dissolvable agent installed on demand and then removed
What is a Quarantine Network
restricted network provides users with routed access to certain hosts
What is a Proxy Server
isolates clients from servers by downloading files on behalf of them
What is a Reverse Proxy
Server that retrieves resources on behalf of client
What is a Network Address Translation (NAT)
Conceals internal addressing from external networks
What does Port Address translation (PAT) do
maps one or more unregistered addresses to single registered address using multiple ports
What is Port Forwarding
enables permanent translation entry that maps a port on gateway to IP address
What is Port Filtering
Technique enabling or disabling TCP/ UDP Computers
What is Traffic Filtering
allows only legit traffic through to network
What is Stateful Inspection
examines data/ packet and connection between internal and external devices
What is Stateless Firewall
compares each individual packet to a rule to see if they match
What is a Stateful Firewall
monitors entire conversation start to finish
What does a Unified Threat Management (UTM) do
manages multiple security apps through single console
What is a Penetration Test
attack authorized by owner to find security weakness
What is Remote Networking
enable users not at physical location to access network
What does Remote Authentication Dial-In User Service (RADIUS) do
provides standardized, centralized authentication for remote users
What is Network Management
manages functions like operation, admin, maintenance
What is Simple Network Management Protocol (SNMP)
used to collect info from network devices for diagnostics
What is a Throughput Tester
software tools to measure network throughput
What are Connectivity tools
Trouble shooting tools
What is a Performance Monitor
software that monitors state of services
What is a Network Analyzer
software or hardware that analyzes data packets
What Is Fault Tolerance
redundancy
What is Configuration Management
process setting up and changing configuration of network
What is IT Asset Management
policy to include info about financial/ contractual specs of hardware/ software
What is Common Address Redundancy Protocol (CARP)
number of devices to group together to use single virtual network interface
What doe System and Network Integrated Polling Software (SNIPS) do
monitors software tool that funs on UNIX