Glossary Flashcards

1
Q

802.11a

A

Provides protocols that allow transmission and reception of data at rates of 1.5 to 54 Mbps and
operates at a frequency of 5 GHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.11ac

A

Improves upon 802.11n by implementing wider channels (80 or 160 MHz versus 40 MHz) in the 5
GHz band, more spatial streams (up to eight versus four), higher-order modulation (up to 256-QAM
vs. 64-QAM), the addition of MU-MIMO, and yields a data rate of up to 433.3 Mbps per spatial
stream, 1300 Mbps total, in 80 MHz channels in the 5 GHz band.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.11b

A

Has a maximum raw data rate of 11 Mbps, uses the same media access method defined in the
original standard, and operates at a frequency of 2.4 GHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.11g

A

Operates at a maximum physical layer bit rate of 54 Mbps exclusive of forward error correction codes,
or about 22 Mbps average throughput, and operates at a frequency of 2.4 GHz. It is also fully
backwards compatible with 802.11b hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.11n

A

Improves upon the previous 802.11 standards by adding MIMO. 802.11n operates on both the 2.4
GHz and the 5 GHz bands. Support for 5 GHz bands is optional. Its net data rate ranges from 54
Mbps to 600 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A record

A

Returns a 32-bit IPv4 address, most commonly used to map hostnames to an IP address of the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AAAA record

A

Returns a 128-bit IPv6 address, most commonly used to map hostnames to an IP address of the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ADSL

A

Asymmetric Digital Subscriber Line (ADSL) is a type of DSL technology, a data communications
technology that enables faster data transmission over copper telephone lines than a conventional
voiceband modem can provide. ADSL differs from the less common SDSL in that the bandwidth and
bit rate are said to be asymmetric, meaning greater toward the customer premises (downstream) than
the reverse (upstream).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AES

A

Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to
protect classified information and is implemented in software and hardware throughout the world to
encrypt sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bus Topology

A

A network topology in which nodes are directly connected to a common linear (or branched) halfduplex
link called a bus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cable Broadband

A

A form of broadband Internet access. Like DSL and fiber to the premises services, cable Internet
access provides network edge connectivity (last mile access) from the Internet service provider to an
end user. It is integrated into the cable television infrastructure analogously to DSL which uses the
existing telephone network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CAT3

A

Category 3 (CAT3) cable is a UTP cable used in telephone wiring which is designed to reliably carry
data up to 10 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CAT5

A

Category 5 (CAT5) cable is a twisted-pair cable for computer networks. The cable standard provides
performance of up to 100 MHz and 100 Mbps. It is suitable for most varieties of Ethernet over
twisted-pair. CAT5 is also used to carry other signals such as telephony and video. The recommended
max distance this cable can carry is 100 meters or 328 feet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CAT5e

A

Category 5 Enhanced (CAT5e) cable is a twisted-pair cable for computer networks. This category
improved upon CAT5 by reliably carrying speeds up to 1 Gbps. The recommended max distance this
cable can carry is 100 meters or 328 feet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CAT6

A

Category 6 (CAT6) cable is a standardized twisted-pair cable for Ethernet and other network physical
layers that is backward compatible with the CAT5/5e and CAT3 cable standards. CAT6 features more
stringent specifications for crosstalk and system noise and specifies performance of up to 250 MHz
and 10 Gbps speeds. When used for 10/100/1000BASE-T, the maximum allowed length of a CAT6
cable is up to 100 meters or 328ft. For 10GBASE-T, an unshielded CAT6 cable should not exceed 55
meters or 180 feet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CAT6a

A

Category 6 Augmented (CAT6a) cable is characterized to 500 MHz and has improved alien crosstalk
characteristics, allowing 10GBASE-T to be run for the same 100-meter maximum distance as previous
Ethernet variants.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CNAME Record

A

Canonical name record (CNAME Record) is a type of resource record in the DNS used to specify that
a domain name is an alias for another domain (the canonical domain).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Default Routing

A

Defines the packet forwarding rule to use when no specific route can be determined for a given IP
destination address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DHCP

A

Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on TCP/IP
networks whereby a DHCP server dynamically assigns an IP address and other network configuration
parameters to each device on a network so they can communicate with other IP networks. DHCP runs
on ports 67 and 68.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DNS

A

Domain Name System (DNS) is a naming system for computers, services, or other resources
connected to the Internet or private network. DNS runs on port 53.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DSL

A

Digital subscriber line (DSL) is a family of technologies that are used to transmit digital data over
telephone lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Dual IP Stack

A

The implementation of both IPv4 and IPv6 within an operating system. A device with dual-stack
implementation has an IPv4 and IPv6 address, and can communicate with other nodes in the LAN or
the Internet using either IPv4 or IPv6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Dynamic Routing

A

Also called adaptive routing, a process where a router can forward data via a different route or given
destination based on the current conditions of the communication circuits within a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

E1

A

The European version of the T1 line. It uses 32 64 Kbps channels, so it runs at 2.048 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

E3

A

The European version of the T3 line. It uses the equivalent of 16 E1 lines, so the speed is 34.368 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Extranet

A

A controlled private network that allows access to partners, vendors, and suppliers or an authorized
set of customers. Some examples of this type of network usage include exchanging large volumes of
data with partners, collaborating with other organizations on joint development efforts, and
providing or accessing services provided by one company to a group of other companies, such as an
online banking application managed by one company on behalf of affiliated banks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Fiber

A

Also known as fiber optic cable, is an assembly similar to an electrical cable, but containing one or
more optical fibers that are used to carry light. The optical fiber elements are typically individually
coated with plastic layers and contained in a protective tube suitable for the environment where the
cable will be deployed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Firewall

A

A network security system that monitors and controls incoming and outgoing network traffic based
on predetermined security rules. A firewall typically establishes a barrier between a trusted internal
network and an untrusted external network, such as the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Gateway

A

A network node equipped for interfacing with another network that uses different protocols. A
gateway can operate at any network layer. The activities of a gateway are more complex than that of
the router or switch as it communicates using more than one protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

HOSTS File

A

A text file that maps hostnames to IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Hub

A

A network hardware device for connecting multiple Ethernet devices together and making them act
as a single network segment. It has multiple I/O ports, in which a signal introduced at the input of any
port appears at the output of every port except the original incoming. A hub works at the physical
layer (layer 1) of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Internet

A

The global system of interconnected computer networks that consists of private, public, academic,
business, and government networks of local to global scope, linked by a broad array of electronic,
wireless, and optical networking technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Intranet

A

A private network accessible only to an organization’s users. This type of network is used to deliver
tools such as collaborations, corporate directories, sales and customer relationship management
tools, product management, etc.

34
Q

Ipconfig

A

A console application that displays all current TCP/IP network configuration values and can modify
DHCP and DNS settings.

35
Q

IPv4

A

Internet Protocol version 4 (IPv4) is the fourth version of IP. It is one of the core protocols of
standards-based internetworking methods in the internet and was the first version deployed for
production in the ARPANET in 1983. IPv4 uses 32-bit addresses which limits the address space to
4,294,967,296 addresses.

36
Q

IPv6

A

Internet Protocol version 6 (IPv6) is the most recent version of IP, the communications protocol that
provides an identification and location system for computers on networks and routes traffic across
the Internet. IPv6 uses a 128-bit address, theoretically allowing approximately 3.4×10^38 addresses.

37
Q

LMHOSTS File

A

A text file that maps IP addresses to NetBIOS names of remote servers under Windows when other
methods, such as WINS, fail.

38
Q

MAC Address
Table

A

Programmed within a switch to store the hardware addresses of devices that connect to each switch
port.

39
Q

Managed Switch

A

Has one or more ways to modify the configuration of the switch. These ways include: a CLI accessed
via serial console, telnet, or Secure Shell, an embedded SNMP agent allowing management from a
remote console or management station, or a web interface for management from a web browser.

40
Q

Mesh Topology

A

A local network topology in which the infrastructure nodes (such as bridges, switches and other
infrastructure devices) connect directly, dynamically, and nonhierarchically to as many other nodes as
possible and cooperate with one another to route data from/to clients efficiently.

41
Q

MX Record

A

Mail exchanger record (MX Record) is a type of certified and verified resource record in the DNS that
specifies a mail server responsible for accepting email messages on behalf of a recipient’s domain,
and a preference value used to prioritize mail delivery if multiple mail servers are available.

42
Q

NAT

A

Network Address Translation (NAT) is a method of remapping one IP address space into another by
modifying network address information in the IP header of the packets while they are in transit across
a traffic routing device.

43
Q

NetBIOS

A

Network Basic Input/Output System (NetBIOS) is a program that allows applications on different
computers to communicate within a LAN. It provides name service for name registration and
resolution, datagram distribution service for connectionless communication, and session service for
connection-oriented communication.

44
Q

Netstat

A

A command-line network utility tool that displays network connections for the TCP (both incoming
and outgoing), routing tables, and a number of network interface (network interface controller or
software-defined network interface) and network protocol statistics.

45
Q

OSI Model

A

Open Systems Interconnection model (OSI Model) is a conceptual framework that characterizes the
communication functions of a computing system. The model uses seven layers to help give a visual
description of what is going on with a particular networking system. It consists of the following layers:

Layer 1: Physical
Layer 2: Data-link
Layer 3: Network
Layer 4: Transport
Layer 5: Session
Layer 6: Presentation
Layer 7: Application

46
Q

OSPF

A

Open Shortest Path First (OSPF) is a routing protocol for IP networks. It uses a LSR algorithm and falls
into the group of IGPs, operating within a single AS.

47
Q

P2P Wireless

A

Point-to-Point (P2P) wireless allows two devices to establish a direct Wi-Fi connection without
requiring a wireless router and can be used from a short-range link connecting two neighboring
buildings or two locations miles apart. Distance is affected by the height of each radio device, the
frequency used, power level, and environmental interference.

48
Q

Pathping

A

A network utility supplied in Windows NT and beyond that combines the functionality of ping with
that of tracert and provides details of the path between two hosts and ping-like statistics for each
node in the path based on samples taken over a time period, depending on how many nodes are
between the start and end host.

49
Q

Ping

A

A computer network administration software utility used to test the reachability of a host on an IP
network. It measures the round-trip time for messages sent from the originating host to a destination
computer that are echoed back to the source.

50
Q

PPTP

A

Point-to-Point Tunneling Protocol (PPTP) is a protocol that allows organizations to extend their own
network through private tunnels over the public Internet.

51
Q

PTR

A

Pointer Record (PTR) is a pointer to a canonical name. Unlike a CNAME, DNS processing stops and
just the name is returned. The most common use is for implementing reverse DNS lookups.

52
Q

QoS

A

Quality of Service (QoS) is the description or measurement of the overall performance of a service in
a computer network or a cloud computing service, particularly the performance seen by the users of
the network.

53
Q

Ring Topology

A

A network topology in which each node connects to exactly two other nodes, forming a single
continuous pathway for signals through each node, a ring. Data travels from node to node, with each
node along the way handling every packet.

54
Q

RIP

A

Routing Information Protocol (RIP) is one of the oldest distance-vector routing protocols which
employ the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the
number of hops allowed in a path from source to destination. The largest number of hops allowed for
RIP is 15, which limits the size of networks that RIP can support.

55
Q

RJ-11

A

A modular connector commonly used to terminate twisted-pair telephone wire. They are used to
establish a bridged connection for one telephone line.

56
Q

RJ-45

A

A modular connector commonly used to terminate twisted-pair and multiconductor flat cable. These
connectors are commonly used for Ethernet over twisted-pair, registered jacks, and other telephone
applications, RS-232 serial, and other applications involving unshielded twisted-pair, shielded twisted pair,
and multiconductor flat cable.

57
Q

SDSL

A

Symmetric Digital Subscriber Line (SDSL) is a DSL that transmits digital data over the copper wires of
the telephone network, where the bandwidth in the downstream direction, from the network to the
subscriber, is identical to the bandwidth in the upstream direction, from the subscriber to the
network. This symmetric bandwidth can be considered to be the opposite of the asymmetric
bandwidth offered by ADSL technologies, where the upstream bandwidth is lower than the
downstream bandwidth.

58
Q

Star Topology

A

One of the most common computer network topologies. In its simplest form, a star network consists
of one central hub which acts as a conduit to transmit messages. Every host is connected to a central
hub.

59
Q

Static Routing

A

A form of routing that occurs when a router uses a manually configured routing entry, rather than
information from a dynamic routing traffic.

60
Q

STP

A

Shielded twisted-pair (STP) cables are the same as UTP cables but with shielding within the cable
housing to protect against EMI and electro-magnetic interference.

61
Q

Subnet Mask

A

The bitmask that when applied by a bitwise and operation to any IP address in the network, yields the
routing prefix.

62
Q

Subnetting

A

Dividing a network into two or more networks.

63
Q

Switch

A

A computer networking device that connects devices together on a computer network by using
packet switching to receive, process, and forward data to the destination device. A network switch is a
multiport network bridge that uses hardware addresses to process and forward data at the data-link
layer (layer 2) of the OSI model. Some switches can also process data at the network layer (layer 3) by
additionally incorporating routing functionality. Such switches are commonly known as layer-3
switches or multilayer switches.

64
Q

T1

A

A data line that usually consists of two pairs of wired copper cable that can transmit data or voice.
The connection uses DS1, Digital Signal 1 signals while the channels themselves use DS0, Digital Signal 0 signals. A full T1 line uses 24 channels, which, multiplied by 64 Kbps each = 1.536 Mbps. Add
8 bits of data extra resulting in 1.544 Mbps speed for a T1 line.

65
Q

T3

A

A much faster T1 connection in that it uses the equivalent of 28 T1 lines for a speed of 44.736 Mbps.
T3 lines use a signal called DS3, Digital Signal 3, and the line is usually delivered over fiber optic cable.

66
Q

TCP/IP Model

A

The conceptual model that consists of 4 layers and provides end-to-end data communication
specifying how data should be packetized, addressed, transmitted, routed, and received. Unlike the
OSI model, the layers in this model are considered less rigid which means that many protocols
implemented can be considered in gray areas between one area and another. The layers in this model
are; Layer 1: Link, Layer 2: Internet, Layer 3: Transport, Layer 4: Application.

67
Q

Telnet

A

A protocol used on the Internet or local area network to provide bidirectional, interactive, textoriented
communication facility using a virtual terminal connection. Telnet runs on port 23.

68
Q

TKIP

A

Temporal Key Integrity Protocol (TKIP) is a wireless network security protocol that features boosted
encryption strength, 48-bit sequencing number assignments to each data packet, 128-bit encryption
keys, and 64-bit authentication keys.

69
Q

Traceroute

A

A computer network diagnostic tool for displaying the route path and measuring transit delays of
packets across an IP network. The history of the route is recorded as the round-trip times of the
packets received from each successive host (remote node) in the route path; the sum of the mean
times in each hop is a measure of the total time spent to establish the connection.

70
Q

UDP

A

User Datagram Protocol (UDP) is a protocol used by computer applications to send messages, in this
case referred to as datagrams, to other hosts on an IP network.

71
Q

Unmanaged
Switch

A

A switch with no configuration interface. Unmanaged switches are plug and play and are typically the
least expensive switches.

72
Q

UTP

A

Unshielded twisted-pair (UTP) cables are found in many Ethernet networks and telephone systems.
UTP is often grouped into sets of 25 pairs according to a standard 25-pair color code and are not
copper shielded.

73
Q

Virtual Switch

A

Responsible for providing connectivity both VM-to-VM (between VMs) and between VMs and the
outside network.

74
Q

VLAN

A

Virtual local area network (VLAN) is any broadcast domain that is partitioned and isolated in a
computer network at the data-link layer (OSI layer 2).

75
Q

VPN

A

Virtual private network (VPN) extends a private network across a public network, and enables users to
send and receive data across shared or public networks as if their computing devices were directly
connected to the private network.

76
Q

WEP

A

Wired Equivalent Privacy (WEP) is a standard network protocol that adds security to wireless
networks. It was designed to give wireless networks the equivalent level of privacy and security
protection as a wired network. WEP supports encryption keys of 40 bits plus 24 additional bits of
system-generated data, equaling 64 bits of total length.

77
Q

WINS

A

Windows Internet Name Service (WINS) is a name server and service for Microsoft Windows and is
implemented in two parts: a server service and a TCP/IP client component. The server service
manages the embedded Jet Database, server to server replication, service requests, and conflicts. The
TCP/IP client component manages client registration, renewal of names, and queries.

78
Q

Wireless Bridging

A

A technique to link together different networks in multiple buildings in one company or organization
through an extension of a wireless mesh, utilizing both hardware and network protocol support.
Typically, this is accomplished using outdoor wireless links such as communication antennas or
dishes.

79
Q

WPA

A

Wi-Fi Protected Access (WPA) is a security technology for wireless networks. It provides stronger
encryption than WEP through use of either of two standard technologies: TKIP and AES.

80
Q

WPA2

A

Wi-Fi Protected Access 2 (WPA2) is a security method added to WPA for wireless networks that
provides stronger data protection and network access control. It provides government grade security
by implementing the AES encryption algorithm.

81
Q

Tool - Shortcut
Selection - V
Direct Selection - A
Magic Wand - Y
Lasso - Q
Pen - P
Blob Brush - Shift+B
Add Anchor Point -
+ (Plus)
Delete Anchor Point - - (Minus)
Convert Anchor Point - Shift+C
Artboard - Shift+O
Type - T
Line Segment - \ (Backslash)
Rectangle - M
Ellipse - L
Paintbrush - B
Pencil - N
Rotate - R
Reflect - O
Scale - S
Warp - Shift+R
Width - Shift+W
Free Transform - E
Shape Builder - Shift+M
Perspective Grid - Shift+P
Perspective Selection - Shift+V
Symbol Sprayer - Shift+S
Column Graph J
- Mesh U
Gradient - G
Eyedropper - I
Blend - W
Live Paint Bucket - K
Live Paint Selection - Shift+L
Slice - Shift+K
Eraser - Shift+E
Scissors - C
Hand - H
Zoom - Z
Zoom In - Ctrl+Spacebar
Zoom Out - Ctrl+Alt+Spacebar
Zoom to exact size - Ctrl+Spacebar+Drag
Hide/show all tools and
panels - Tab
Hide/show all panels except toolbox
- Shift+Tab

A
82
Q

Action - Shortcut
Draw from center - Alt
Draw from center with dialog - Alt+Click
Constrain proportion - Shift
Move object while drawing - Spacebar
Add/subtract sides, points, spiral segments
- Up or Down Arrow
Decrease inner radius - Ctrl
Decrease/increase type size - Ctrl+Shift+< or
Ctrl+Shift+>
Decrease/increase leading - Alt+Up Arrow or Alt+Down Arrow
Decrease/increase
kerning/tracking
- Alt+Left Arrow or
Alt+Right Arrow
Reset kerning or tracking to 0 - Ctrl+Alt+Q
Move selection - Arrow Keys
Move selection 10 points - Shift+Arrow Keys
Lock selected artwork - Ctrl+2
Lock all deselected artwork - Ctrl+Alt+Shift+2
Unlock all artwork - Ctrl+Alt+2
Hide selected artwork - Ctrl+3
Hide all deselected artwork - Ctrl+Alt+Shift+3
Show all artwork - Ctrl+Alt+3
Show layer while turning off
all others
- Alt+Click on eyeball icon
Select all items on layer - Alt+Click layer name
Copy selected item to
different layer
- Alt+Drag selection square in
Layers panel

Create new layer at top of list - Ctrl+Click

Create new layer below
selected layer -
Ctrl+Alt+Click
Show/Hide brushes - F5
Show/Hide color - F6
Show/Hide layers - F7
Show/Hide info - Ctrl+F8
Show/Hide gradient - Ctrl+F9
Show/Hide stroke - Ctrl+F10
Show/Hide attributes - Ctrl+F11
Revert file - F12
Show/Hide graphic styles - Shift+F5
Show/Hide appearance - Shift+F6
Show/Hide align - Shift+F7
Show/Hide transform - Shift+F8
Show/Hide pathfinder - Shift+Ctrl+F9
Show/Hide transparency - Shift+Ctrl+F10
Show/Hide symbols - Shift+Ctrl+F11

A