Glossary Flashcards

1
Q

802.11a

A

Provides protocols that allow transmission and reception of data at rates of 1.5 to 54 Mbps and
operates at a frequency of 5 GHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.11ac

A

Improves upon 802.11n by implementing wider channels (80 or 160 MHz versus 40 MHz) in the 5
GHz band, more spatial streams (up to eight versus four), higher-order modulation (up to 256-QAM
vs. 64-QAM), the addition of MU-MIMO, and yields a data rate of up to 433.3 Mbps per spatial
stream, 1300 Mbps total, in 80 MHz channels in the 5 GHz band.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.11b

A

Has a maximum raw data rate of 11 Mbps, uses the same media access method defined in the
original standard, and operates at a frequency of 2.4 GHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.11g

A

Operates at a maximum physical layer bit rate of 54 Mbps exclusive of forward error correction codes,
or about 22 Mbps average throughput, and operates at a frequency of 2.4 GHz. It is also fully
backwards compatible with 802.11b hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.11n

A

Improves upon the previous 802.11 standards by adding MIMO. 802.11n operates on both the 2.4
GHz and the 5 GHz bands. Support for 5 GHz bands is optional. Its net data rate ranges from 54
Mbps to 600 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A record

A

Returns a 32-bit IPv4 address, most commonly used to map hostnames to an IP address of the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AAAA record

A

Returns a 128-bit IPv6 address, most commonly used to map hostnames to an IP address of the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ADSL

A

Asymmetric Digital Subscriber Line (ADSL) is a type of DSL technology, a data communications
technology that enables faster data transmission over copper telephone lines than a conventional
voiceband modem can provide. ADSL differs from the less common SDSL in that the bandwidth and
bit rate are said to be asymmetric, meaning greater toward the customer premises (downstream) than
the reverse (upstream).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AES

A

Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to
protect classified information and is implemented in software and hardware throughout the world to
encrypt sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bus Topology

A

A network topology in which nodes are directly connected to a common linear (or branched) halfduplex
link called a bus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cable Broadband

A

A form of broadband Internet access. Like DSL and fiber to the premises services, cable Internet
access provides network edge connectivity (last mile access) from the Internet service provider to an
end user. It is integrated into the cable television infrastructure analogously to DSL which uses the
existing telephone network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CAT3

A

Category 3 (CAT3) cable is a UTP cable used in telephone wiring which is designed to reliably carry
data up to 10 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CAT5

A

Category 5 (CAT5) cable is a twisted-pair cable for computer networks. The cable standard provides
performance of up to 100 MHz and 100 Mbps. It is suitable for most varieties of Ethernet over
twisted-pair. CAT5 is also used to carry other signals such as telephony and video. The recommended
max distance this cable can carry is 100 meters or 328 feet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CAT5e

A

Category 5 Enhanced (CAT5e) cable is a twisted-pair cable for computer networks. This category
improved upon CAT5 by reliably carrying speeds up to 1 Gbps. The recommended max distance this
cable can carry is 100 meters or 328 feet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CAT6

A

Category 6 (CAT6) cable is a standardized twisted-pair cable for Ethernet and other network physical
layers that is backward compatible with the CAT5/5e and CAT3 cable standards. CAT6 features more
stringent specifications for crosstalk and system noise and specifies performance of up to 250 MHz
and 10 Gbps speeds. When used for 10/100/1000BASE-T, the maximum allowed length of a CAT6
cable is up to 100 meters or 328ft. For 10GBASE-T, an unshielded CAT6 cable should not exceed 55
meters or 180 feet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CAT6a

A

Category 6 Augmented (CAT6a) cable is characterized to 500 MHz and has improved alien crosstalk
characteristics, allowing 10GBASE-T to be run for the same 100-meter maximum distance as previous
Ethernet variants.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CNAME Record

A

Canonical name record (CNAME Record) is a type of resource record in the DNS used to specify that
a domain name is an alias for another domain (the canonical domain).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Default Routing

A

Defines the packet forwarding rule to use when no specific route can be determined for a given IP
destination address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DHCP

A

Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on TCP/IP
networks whereby a DHCP server dynamically assigns an IP address and other network configuration
parameters to each device on a network so they can communicate with other IP networks. DHCP runs
on ports 67 and 68.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DNS

A

Domain Name System (DNS) is a naming system for computers, services, or other resources
connected to the Internet or private network. DNS runs on port 53.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DSL

A

Digital subscriber line (DSL) is a family of technologies that are used to transmit digital data over
telephone lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Dual IP Stack

A

The implementation of both IPv4 and IPv6 within an operating system. A device with dual-stack
implementation has an IPv4 and IPv6 address, and can communicate with other nodes in the LAN or
the Internet using either IPv4 or IPv6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Dynamic Routing

A

Also called adaptive routing, a process where a router can forward data via a different route or given
destination based on the current conditions of the communication circuits within a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

E1

A

The European version of the T1 line. It uses 32 64 Kbps channels, so it runs at 2.048 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
E3
The European version of the T3 line. It uses the equivalent of 16 E1 lines, so the speed is 34.368 Mbps.
26
Extranet
A controlled private network that allows access to partners, vendors, and suppliers or an authorized set of customers. Some examples of this type of network usage include exchanging large volumes of data with partners, collaborating with other organizations on joint development efforts, and providing or accessing services provided by one company to a group of other companies, such as an online banking application managed by one company on behalf of affiliated banks.
27
Fiber
Also known as fiber optic cable, is an assembly similar to an electrical cable, but containing one or more optical fibers that are used to carry light. The optical fiber elements are typically individually coated with plastic layers and contained in a protective tube suitable for the environment where the cable will be deployed.
28
Firewall
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and an untrusted external network, such as the Internet.
29
Gateway
A network node equipped for interfacing with another network that uses different protocols. A gateway can operate at any network layer. The activities of a gateway are more complex than that of the router or switch as it communicates using more than one protocol.
30
HOSTS File
A text file that maps hostnames to IP addresses.
31
Hub
A network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment. It has multiple I/O ports, in which a signal introduced at the input of any port appears at the output of every port except the original incoming. A hub works at the physical layer (layer 1) of the OSI model.
32
Internet
The global system of interconnected computer networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies.
33
Intranet
A private network accessible only to an organization's users. This type of network is used to deliver tools such as collaborations, corporate directories, sales and customer relationship management tools, product management, etc.
34
Ipconfig
A console application that displays all current TCP/IP network configuration values and can modify DHCP and DNS settings.
35
IPv4
Internet Protocol version 4 (IPv4) is the fourth version of IP. It is one of the core protocols of standards-based internetworking methods in the internet and was the first version deployed for production in the ARPANET in 1983. IPv4 uses 32-bit addresses which limits the address space to 4,294,967,296 addresses.
36
IPv6
Internet Protocol version 6 (IPv6) is the most recent version of IP, the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 uses a 128-bit address, theoretically allowing approximately 3.4×10^38 addresses.
37
LMHOSTS File
A text file that maps IP addresses to NetBIOS names of remote servers under Windows when other methods, such as WINS, fail.
38
MAC Address Table
Programmed within a switch to store the hardware addresses of devices that connect to each switch port.
39
Managed Switch
Has one or more ways to modify the configuration of the switch. These ways include: a CLI accessed via serial console, telnet, or Secure Shell, an embedded SNMP agent allowing management from a remote console or management station, or a web interface for management from a web browser.
40
Mesh Topology
A local network topology in which the infrastructure nodes (such as bridges, switches and other infrastructure devices) connect directly, dynamically, and nonhierarchically to as many other nodes as possible and cooperate with one another to route data from/to clients efficiently.
41
MX Record
Mail exchanger record (MX Record) is a type of certified and verified resource record in the DNS that specifies a mail server responsible for accepting email messages on behalf of a recipient's domain, and a preference value used to prioritize mail delivery if multiple mail servers are available.
42
NAT
Network Address Translation (NAT) is a method of remapping one IP address space into another by modifying network address information in the IP header of the packets while they are in transit across a traffic routing device.
43
NetBIOS
Network Basic Input/Output System (NetBIOS) is a program that allows applications on different computers to communicate within a LAN. It provides name service for name registration and resolution, datagram distribution service for connectionless communication, and session service for connection-oriented communication.
44
Netstat
A command-line network utility tool that displays network connections for the TCP (both incoming and outgoing), routing tables, and a number of network interface (network interface controller or software-defined network interface) and network protocol statistics.
45
OSI Model
Open Systems Interconnection model (OSI Model) is a conceptual framework that characterizes the communication functions of a computing system. The model uses seven layers to help give a visual description of what is going on with a particular networking system. It consists of the following layers: Layer 1: Physical Layer 2: Data-link Layer 3: Network Layer 4: Transport Layer 5: Session Layer 6: Presentation Layer 7: Application
46
OSPF
Open Shortest Path First (OSPF) is a routing protocol for IP networks. It uses a LSR algorithm and falls into the group of IGPs, operating within a single AS.
47
P2P Wireless
Point-to-Point (P2P) wireless allows two devices to establish a direct Wi-Fi connection without requiring a wireless router and can be used from a short-range link connecting two neighboring buildings or two locations miles apart. Distance is affected by the height of each radio device, the frequency used, power level, and environmental interference.
48
Pathping
A network utility supplied in Windows NT and beyond that combines the functionality of ping with that of tracert and provides details of the path between two hosts and ping-like statistics for each node in the path based on samples taken over a time period, depending on how many nodes are between the start and end host.
49
Ping
A computer network administration software utility used to test the reachability of a host on an IP network. It measures the round-trip time for messages sent from the originating host to a destination computer that are echoed back to the source.
50
PPTP
Point-to-Point Tunneling Protocol (PPTP) is a protocol that allows organizations to extend their own network through private tunnels over the public Internet.
51
PTR
Pointer Record (PTR) is a pointer to a canonical name. Unlike a CNAME, DNS processing stops and just the name is returned. The most common use is for implementing reverse DNS lookups.
52
QoS
Quality of Service (QoS) is the description or measurement of the overall performance of a service in a computer network or a cloud computing service, particularly the performance seen by the users of the network.
53
Ring Topology
A network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node, a ring. Data travels from node to node, with each node along the way handling every packet.
54
RIP
Routing Information Protocol (RIP) is one of the oldest distance-vector routing protocols which employ the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from source to destination. The largest number of hops allowed for RIP is 15, which limits the size of networks that RIP can support.
55
RJ-11
A modular connector commonly used to terminate twisted-pair telephone wire. They are used to establish a bridged connection for one telephone line.
56
RJ-45
A modular connector commonly used to terminate twisted-pair and multiconductor flat cable. These connectors are commonly used for Ethernet over twisted-pair, registered jacks, and other telephone applications, RS-232 serial, and other applications involving unshielded twisted-pair, shielded twisted pair, and multiconductor flat cable.
57
SDSL
Symmetric Digital Subscriber Line (SDSL) is a DSL that transmits digital data over the copper wires of the telephone network, where the bandwidth in the downstream direction, from the network to the subscriber, is identical to the bandwidth in the upstream direction, from the subscriber to the network. This symmetric bandwidth can be considered to be the opposite of the asymmetric bandwidth offered by ADSL technologies, where the upstream bandwidth is lower than the downstream bandwidth.
58
Star Topology
One of the most common computer network topologies. In its simplest form, a star network consists of one central hub which acts as a conduit to transmit messages. Every host is connected to a central hub.
59
Static Routing
A form of routing that occurs when a router uses a manually configured routing entry, rather than information from a dynamic routing traffic.
60
STP
Shielded twisted-pair (STP) cables are the same as UTP cables but with shielding within the cable housing to protect against EMI and electro-magnetic interference.
61
Subnet Mask
The bitmask that when applied by a bitwise and operation to any IP address in the network, yields the routing prefix.
62
Subnetting
Dividing a network into two or more networks.
63
Switch
A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device. A network switch is a multiport network bridge that uses hardware addresses to process and forward data at the data-link layer (layer 2) of the OSI model. Some switches can also process data at the network layer (layer 3) by additionally incorporating routing functionality. Such switches are commonly known as layer-3 switches or multilayer switches.
64
T1
A data line that usually consists of two pairs of wired copper cable that can transmit data or voice. The connection uses DS1, Digital Signal 1 signals while the channels themselves use DS0, Digital Signal 0 signals. A full T1 line uses 24 channels, which, multiplied by 64 Kbps each = 1.536 Mbps. Add 8 bits of data extra resulting in 1.544 Mbps speed for a T1 line.
65
T3
A much faster T1 connection in that it uses the equivalent of 28 T1 lines for a speed of 44.736 Mbps. T3 lines use a signal called DS3, Digital Signal 3, and the line is usually delivered over fiber optic cable.
66
TCP/IP Model
The conceptual model that consists of 4 layers and provides end-to-end data communication specifying how data should be packetized, addressed, transmitted, routed, and received. Unlike the OSI model, the layers in this model are considered less rigid which means that many protocols implemented can be considered in gray areas between one area and another. The layers in this model are; Layer 1: Link, Layer 2: Internet, Layer 3: Transport, Layer 4: Application.
67
Telnet
A protocol used on the Internet or local area network to provide bidirectional, interactive, textoriented communication facility using a virtual terminal connection. Telnet runs on port 23.
68
TKIP
Temporal Key Integrity Protocol (TKIP) is a wireless network security protocol that features boosted encryption strength, 48-bit sequencing number assignments to each data packet, 128-bit encryption keys, and 64-bit authentication keys.
69
Traceroute
A computer network diagnostic tool for displaying the route path and measuring transit delays of packets across an IP network. The history of the route is recorded as the round-trip times of the packets received from each successive host (remote node) in the route path; the sum of the mean times in each hop is a measure of the total time spent to establish the connection.
70
UDP
User Datagram Protocol (UDP) is a protocol used by computer applications to send messages, in this case referred to as datagrams, to other hosts on an IP network.
71
Unmanaged Switch
A switch with no configuration interface. Unmanaged switches are plug and play and are typically the least expensive switches.
72
UTP
Unshielded twisted-pair (UTP) cables are found in many Ethernet networks and telephone systems. UTP is often grouped into sets of 25 pairs according to a standard 25-pair color code and are not copper shielded.
73
Virtual Switch
Responsible for providing connectivity both VM-to-VM (between VMs) and between VMs and the outside network.
74
VLAN
Virtual local area network (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data-link layer (OSI layer 2).
75
VPN
Virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
76
WEP
Wired Equivalent Privacy (WEP) is a standard network protocol that adds security to wireless networks. It was designed to give wireless networks the equivalent level of privacy and security protection as a wired network. WEP supports encryption keys of 40 bits plus 24 additional bits of system-generated data, equaling 64 bits of total length.
77
WINS
Windows Internet Name Service (WINS) is a name server and service for Microsoft Windows and is implemented in two parts: a server service and a TCP/IP client component. The server service manages the embedded Jet Database, server to server replication, service requests, and conflicts. The TCP/IP client component manages client registration, renewal of names, and queries.
78
Wireless Bridging
A technique to link together different networks in multiple buildings in one company or organization through an extension of a wireless mesh, utilizing both hardware and network protocol support. Typically, this is accomplished using outdoor wireless links such as communication antennas or dishes.
79
WPA
Wi-Fi Protected Access (WPA) is a security technology for wireless networks. It provides stronger encryption than WEP through use of either of two standard technologies: TKIP and AES.
80
WPA2
Wi-Fi Protected Access 2 (WPA2) is a security method added to WPA for wireless networks that provides stronger data protection and network access control. It provides government grade security by implementing the AES encryption algorithm.
81
Tool - Shortcut Selection - V Direct Selection - A Magic Wand - Y Lasso - Q Pen - P Blob Brush - Shift+B Add Anchor Point - + (Plus) Delete Anchor Point - - (Minus) Convert Anchor Point - Shift+C Artboard - Shift+O Type - T Line Segment - \ (Backslash) Rectangle - M Ellipse - L Paintbrush - B Pencil - N Rotate - R Reflect - O Scale - S Warp - Shift+R Width - Shift+W Free Transform - E Shape Builder - Shift+M Perspective Grid - Shift+P Perspective Selection - Shift+V Symbol Sprayer - Shift+S Column Graph J - Mesh U Gradient - G Eyedropper - I Blend - W Live Paint Bucket - K Live Paint Selection - Shift+L Slice - Shift+K Eraser - Shift+E Scissors - C Hand - H Zoom - Z Zoom In - Ctrl+Spacebar Zoom Out - Ctrl+Alt+Spacebar Zoom to exact size - Ctrl+Spacebar+Drag Hide/show all tools and panels - Tab Hide/show all panels except toolbox - Shift+Tab
82
Action - Shortcut Draw from center - Alt Draw from center with dialog - Alt+Click Constrain proportion - Shift Move object while drawing - Spacebar Add/subtract sides, points, spiral segments - Up or Down Arrow Decrease inner radius - Ctrl Decrease/increase type size - Ctrl+Shift+< or Ctrl+Shift+> Decrease/increase leading - Alt+Up Arrow or Alt+Down Arrow Decrease/increase kerning/tracking - Alt+Left Arrow or Alt+Right Arrow Reset kerning or tracking to 0 - Ctrl+Alt+Q Move selection - Arrow Keys Move selection 10 points - Shift+Arrow Keys Lock selected artwork - Ctrl+2 Lock all deselected artwork - Ctrl+Alt+Shift+2 Unlock all artwork - Ctrl+Alt+2 Hide selected artwork - Ctrl+3 Hide all deselected artwork - Ctrl+Alt+Shift+3 Show all artwork - Ctrl+Alt+3 Show layer while turning off all others - Alt+Click on eyeball icon Select all items on layer - Alt+Click layer name Copy selected item to different layer - Alt+Drag selection square in Layers panel Create new layer at top of list - Ctrl+Click Create new layer below selected layer - Ctrl+Alt+Click Show/Hide brushes - F5 Show/Hide color - F6 Show/Hide layers - F7 Show/Hide info - Ctrl+F8 Show/Hide gradient - Ctrl+F9 Show/Hide stroke - Ctrl+F10 Show/Hide attributes - Ctrl+F11 Revert file - F12 Show/Hide graphic styles - Shift+F5 Show/Hide appearance - Shift+F6 Show/Hide align - Shift+F7 Show/Hide transform - Shift+F8 Show/Hide pathfinder - Shift+Ctrl+F9 Show/Hide transparency - Shift+Ctrl+F10 Show/Hide symbols - Shift+Ctrl+F11