Glossary of Terms Flashcards

1
Q

10Base2

A

The last true bus-standard network where nodes connected to a common, shared length of coaxial cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

10BaseFL

A

Fiber-optic implementation of Ethernet that runs at 10 Mbps using baseband signaling. Maximum segment length is 2 km

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

10BaseT

A

An Ethernet LAN designed to run on UTP cabling. Runs at 10 Mbps and uses baseband signaling. Maximum length for the cabling between the NIC and the hub (or the switch, the repeater, and so forth) is 100 m.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

10GBaseER/10GBaseEW

A

A 10 GbE standard using 1550-nm single-mode fiber. Maximum cable length up to 40 km

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

10GBaseLR/10GBaseLW

A

A 10 GbE standard using 1310-nm single-mode fiber. Maximum cable length up to 10 km.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

10GBaseSR/10GBaseSW

A

A 10 GbE standard using 850-nm multimode fiber. Maximum cable length up to 300 m.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

10GBaseT

A

A 10 GbE standard designed to run on CAT 6a UTP cabling. Maximum cable length of 100 m.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

10 Gigabit Ethernet (10 GbE)

A

Currently (2015) the fastest Ethernet designation available, with a number of fiber-optic and copper standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

100BaseFX

A

An Ethernet LAN designed to run on fiber-optic cabling. Runs at 100 Mbps and uses baseband signaling. Maximum cable length is 400 m for half-duplex and 2 km for full-duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

100BaseT

A

An Ethernet LAN designed to run on UTP cabling. Runs at 100 Mbps, uses baseband signaling, and uses two pairs of wires on CAT 5 or better cabling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

100BaseT4

A

An Ethernet LAN designed to run on UTP cabling. Runs at 100 Mbps and uses four-pair CAT 3 or better cabling. Made obsolete by 100BaseT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

100BaseTX

A

The technically accurate but little-used name for 100BaseT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

110 Block

A

Also known as a 110-punchdown block, a connection gridwork used to link UTP and STP cables behind an RJ-45 patch panel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

110-Punchdown Block

A

The most common connection used on the back of an RJ-45 jack and patch panels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

802 Committee

A

The IEEE committee responsible for all Ethernet standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.1X

A

A port-authentication network access control mechanism for networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

802.3 (Ethernet)

A

See Ethernet: Name coined by Xerox for the first standard of network cabling and protocols. Ethernet is based on a bus topology. The IEEE 802.3 subcommittee defines the current Ethernet specifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

802.3ab

A

The IEEE standard for 1000BaseT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

802.3z

A

The umbrella IEEE standard for all versions of Gigabit Ethernet other than 1000BaseT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

802.11

A

See IEEE 802.11.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

802.11a

A

A wireless standard that operates in the frequency range of 5 GHz and offers throughput of up to 54 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

802.11a-ht

A

802.11a-ht, and the corresponding 802.11g-ht standard, are technical terms for mixed mode 802.11a/802.11g operation. In mixed mode, both technologies are simultaneously supported

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

802.11b

A

The first popular wireless standard, operates in the frequency range of 2.4 GHz and offers throughput of up to 11 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

802.11g

A

Currently (2015) the wireless standard with the widest use, operates on the 2.4-GHz band with a maximum throughput of 54 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

802.11g-ht

A

802.11g-ht, and the corresponding 802.11a-ht standard, are technical terms for mixed mode 802.11a/802.11g operation. In mixed mode, both technologies are simultaneously supported

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

802.11i

A

A wireless standard that added security features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

802.11n

A

An updated 802.11 standard that increases transfer speeds and adds support for multiple in/multiple out (MIMO) by using multiple antennas. 802.11n can operate on either the 2.4- or 5-GHz frequency band and has a maximum throughput of 400 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

802.16

A

A wireless standard (also known as WiMAX) with a range of up to 30 miles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

1000BaseCX

A

A Gigabit Ethernet standard using unique copper cabling, with a 25-m maximum cable distance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

1000BaseLX

A

A Gigabit Ethernet standard using single-mode fiber cabling, with a 5-km maximum cable distance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

1000BaseSX

A

A Gigabit Ethernet standard using multimode fiber cabling, with a 220- to 500-m maximum cable distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

1000BaseT

A

A Gigabit Ethernet standard using CAT 5e/6 UTP cabling, with a 100-m maximum cable distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

1000BaseTX

A

Short-lived gigabit-over-UTP standard from TIA/EIA. Considered a competitor to 1000BaseT, it was simpler to implement but required the use of CAT 6 cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

1000BaseX

A

An umbrella Gigabit Ethernet standard. Also known as 802.3z. Comprises all Gigabit standards with the exception of 1000BaseT, which is under the 802.3ab standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A Records

A

A list of the IP addresses and names of all the systems on a DNS server domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

AAA

A

(Authentication, Authorization, and Accounting) A security philosophy wherein a computer trying to connect to a network must first present some form of credential in order to be authenticated and then must have limitable permissions within the network. The authenticating server should also record session information about the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Acceptable Use Policy

A

A document that defines what a person may and may not do on an organization’s computers and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Access Control

A

All-encompassing term that defines the degree of permission granted to use a particular resource. That resource may be anything from a switch port to a particular file to a physical door within a building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
A

A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Access Control Server (ACS)

A

Cisco program/process/server that makes the decision to admit or deny a node based on posture assessment. From there, the ACS directs the edge access device to allow a connection or to implement a denial or redirect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Access Port

A

Regular port in a switch that has been configured as part of a VLAN. Access ports are ports that hosts connect to. They are the opposite of a trunk port, which is only connected to a trunk port on another switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Active Directory

A

A form of directory service used in networks with Windows servers. Creates an organization of related computers that share one or more Windows domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Activity Light

A

An LED on a NIC, hub, or switch that blinks rapidly to show data transfers over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Ad Hoc Mode

A

A wireless networking mode where each node is in direct contact with every other node in a decentralized free-for-all. Ad hoc mode is similar to the mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Address Resolution Protocol (ARP)

A

A protocol in the TCP/IP suite used with the command-line utility of the same name to determine the MAC address that corresponds to a particular IP address.

Used to resolve ip addresses into MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Administrative Accounts

A

pecialized user accounts that have been granted sufficient access rights and authority to manage specified administrative tasks. Some administrative accounts exist as a default of the system and have all authority throughout the system. Others must be explicitly assigned the necessary powers to administer given resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

ADSL (Asymmetric Digital Subscriber Line)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Advanced Encryption Standard (AES)

A

A block cipher created in the late 1990s that uses a 128-bit block size and a 128-, 192-, or 256-bit key size. Practically uncrackable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Adware

A

A program that monitors the types of Web sites you frequent and uses that information to generate targeted advertisements, usually pop-up windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Agent

A

In terms of posture assessment, refers to software that runs within a client and reports the client’s security characteristics to an access control server to be approved or denied entry to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Aggregation

A

A router hierarchy in which every router underneath a higher router always uses a subnet of that router’s existing routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Air Gap

A

The act of physically separating a network from every other network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Amplification

A

The aspect of a DoS attack that makes a server do a lot of processing and responding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Angled Physical Contact (APC)

A

Fiber-optic connector that makes physical contact between two fiber-optic cables. It specifies an 8-degree angle to the curved end, lowering signal loss. APC connectors have less connection degradation from multiple insertions compared to other connectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Anti-Malware Program

A

Software that attempts to block several types of threats to a client including viruses, Trojan horses, worms, and other unapproved software installation and execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Antivirus

A

Software that attempts to prevent viruses from installing or executing on a client. Some antivirus software may also attempt to remove the virus or eradicate the effects of a virus after an infection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Anycast

A

A method of addressing groups of computers as though they were a single computer. Anycasting starts by giving a number of computers (or clusters of computers) the same IP address. Advanced routers then send incoming packets to the closest of the computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Application Layer

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Application/Context Aware

A

Advanced feature of some stateful firewalls where the content of the data is inspected to ensure it comes from, or is destined for, an appropriate application. Context-aware firewalls look both deeply and more broadly to ensure that the data content and other aspects of the packet are appropriate to the data transfer being conducted. Packets that fall outside these awareness criteria are denied by the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Application Programming Interface (API)

A

Shared functions, subroutines, and libraries that allow programs on a machine to communicate with the OS and other programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Approval Process

A

One or more decision makers consider a proposed change and the impact of the change, including funding. If the change, the impact, and the funding are acceptable, the change is permitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Archive

A

The creation and storage of retrievable copies of electronic data for legal and functional purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Area ID

A

Address assigned to routers in an OSPF network to prevent flooding beyond the routers in that particular network. See also Open Shortest Path First (OSPF).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q
A

Groups of logically associated OSPF routers designed to maximize routing efficiency while keeping the amount of broadcast traffic well managed. Areas are assigned a 32-bit value that manifests as an integer between 0 and 4294967295 or can take a form similar to an IP address, for example, “0.0.0.0.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

ARP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

ARP Cache Poisoning

A

A man-in-the-middle attack, where the attacker associates his MAC address with someone else’s IP address (almost always the router), so all traffic will be sent to him first. The attacker sends out unsolicited ARPs, which can either be requests or replies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

arping

A

A command used to discover hosts on a network, similar to ping, but that relies on ARP rather than ICMP. The arping command won’t cross any routers, so it will only work within a broadcast domain. See also Address Resolution Protocol (ARP) and ping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Asset Management

A

Managing each aspect of a network, from documentation to performance to hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Asymmetric Digital Subscriber Line (ADSL)

A

A fully digital, dedicated connection to the telephone system that provides download speeds of up to 9 Mbps and upload speeds of up to 1 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Asymmetric-Key Algorithm

A

An encryption method in which the key used to encrypt a message and the key used to decrypt it are different, or asymmetrical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Asynchronous Transfer Mode (ATM)

A

A network technology that runs at speeds between 25 and 622 Mbps using fiber-optic cabling or CAT 5 or better UTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Attenuation

A

The degradation of signal over distance for a networking cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Authentication

A

A process that proves good data traffic truly came from where it says it originated by verifying the sending and receiving users and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Authentication Server (AS)

A

In Kerberos, a system that hands out Ticket-Granting Tickets to clients after comparing the client hash to its own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Authoritative DNS Servers

A

DNS servers that hold the IP addresses and names of systems for a particular domain or domains in special storage areas called forward lookup zones. They also have reverse lookup zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Authoritative Name Servers

A

Another name for authoritative DNS servers. DNS servers that hold the IP addresses and names of systems for a particular domain or domains in special storage areas called forward lookup zones. They also have reverse lookup zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Authorization

A

A step in the AAA philosophy during which a client’s permissions are decided upon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Automatic Private IP Addressing (APIPA

A

A networking feature in operating systems that enables DHCP clients to self-configure an IP address and subnet mask automatically when a DHCP server isn’t available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Autonomous System (AS)

A

One or more networks that are governed by a single protocol, which provides routing for the Internet backbone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Backup Designated Router (BDR)

A

A second router set to take over if the designated router fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Bandwidth

A

A piece of the spectrum occupied by some form of signal, whether it is television, voice, fax data, and so forth. Signals require a certain size and location of bandwidth to be transmitted. The higher the bandwidth, the faster the signal transmission, thus allowing for a more complex signal such as audio or video. Because bandwidth is a limited space, when one user is occupying it, others must wait their turn. Bandwidth is also the capacity of a network to transmit a given amount of data during a given period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Bandwidth Saturation

A

When the frequency of a band is filled to capacity due to the large number of devices using the same bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Banner Grabbing

A

When a malicious user gains access to an open port and uses it to probe a host to gain information and access, as well as learn details about running services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Baseband

A

Digital signaling that has only one signal (a single signal) on the cable at a time. The signals must be in one of three states: one, zero, or idle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Baseline

A

Static image of a system’s (or network’s) performance when all elements are known to be working properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Basic NAT

A

A simple form of NAT that translates a computer’s private or internal IP address to a global IP address on a one-to-one basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Basic Rate Interface (BRI)

A

The basic ISDN configuration, which consists of two B channels (which can carry voice or data at a rate of 64 Kbps) and one D channel (which carries setup and configuration information, as well as data, at 16 Kbps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Basic Service Set (BSS

A

In wireless networking, a single access point servicing a given area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Basic Service Set Identifier (BSSID

A

Naming scheme in wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Baud

A

One analog cycle on a telephone line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Baud Rate

A

The number of bauds per second. In the early days of telephone data transmission, the baud rate was often analogous to bits per second. Due to advanced modulation of baud cycles as well as data compression, this is no longer true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Bearer Channel (B Channel)

A

A type of ISDN channel that carries data and voice information using standard DS0 channels at 64 Kbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Biometric

A

Human physical characteristic that can be measured and saved to be compared as authentication in granting the user access to a network or resource. Common biometrics include fingerprints, facial scans, retinal scans, voice pattern recognition, and others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Bit Error Rate Test (BERT)

A

An end-to-end test that verifies a T-carrier connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Block

A

Access that is denied through to or from a resource. A block may be implemented in a firewall, access control server, or other secure gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Blocks

A

Contiguous ranges of IP addresses that are assigned to organizations and end users by IANA. Also called network blocks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Block Cipher

A

An encryption algorithm in which data is encrypted in “chunks” of a certain length at a time. Popular in wired networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

BNC Connector

A

A connector used for 10Base2 coaxial cable. All BNC connectors have to be locked into place by turning the locking ring 90 degrees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

BNC Coupler

A

Passive connector used to join two segments of coaxial cables that are terminated with BNC connectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Bonding

A

Two or more NICs in a system working together to act as a single NIC to increase performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Bootstrap Protocol (BOOTP)

A

A component of TCP/IP that allows computers to discover and receive an IP address from a DHCP server prior to booting the OS. Other items that may be discovered during the BOOTP process are the IP address of the default gateway for the subnet and the IP addresses of any name servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Border Gateway Protocol (BGP-4)

A

An exterior gateway routing protocol that enables groups of routers to share routing information so that efficient, loop-free routes can be established

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Botnet

A

A group of computers under the control of one operator, used for malicious purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Bps (Bits Per Second)

A

A measurement of how fast data is moved across a transmission medium. A Gigabit Ethernet connection moves 1,000,000,000 bps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Bridge

A

A device that connects two networks and passes traffic between them based only on the node address, so that traffic between nodes on one network does not appear on the other network. For example, an Ethernet bridge only looks at the MAC address. Bridges filter and forward frames based on MAC addresses and operate at Layer 2 (Data Link layer) of the OSI seven-layer model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Bridge Loop

A

A negative situation in which bridging devices (usually switches) are installed in a loop configuration, causing frames to loop continuously. Switches using Spanning Tree Protocol (STP) prevent bridge loops by automatically turning off looping ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Bridged Connection

A

An early type of DSL connection that made the DSL line function the same as if you snapped an Ethernet cable into your NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Bridging Loop

A

A physical wiring of a circuitous path between two or more switches, causing frames to loop continuously. Implementing Spanning Tree Protocol (STP) in these devices will discover and block looped paths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

BYOD

A

Bring Your Own Device A trend wherein users bring their own network-enabled devices to the work environment. These cell phones, tablets, notebooks, and other mobile devices must be easily and securely integrated and released from corporate network environments using on-boarding and off-boarding technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Broadband

A

Analog signaling that sends multiple signals over the cable at the same time. The best example of broadband signaling is cable television. The zero, one, and idle states exist on multiple channels on the same cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Broadcast

A

A frame or packet addressed to all machines, almost always limited to a broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Broadcast Address

A

The address a NIC attaches to a frame when it wants every other NIC on the network to read it. In TCP/IP, the general broadcast address is 255.255.255.255. In Ethernet, the broadcast MAC address is FF-FF-FF-FF-FF-FF.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Broadcast Domain

A

A network of computers that will hear each other’s broadcasts. The older term collision domain is the same but rarely used today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Broadcast Storm

A

The result of one or more devices sending a nonstop flurry of broadcast frames on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Brute Force

A

A type of attack wherein every permutation of some form of data is tried in an attempt to discover protected information. Most commonly used on password cracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Bus Topology

A

A network topology that uses a single bus cable that connects all of the computers in a line. Bus topology networks must be terminated to prevent signal reflection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

BCP

A

Business Continuity Planning The process of defining the steps to be taken in the event of a physical corporate crisis to continue operations. Includes the creation of documents to specify facilities, equipment, resources, personnel, and their roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Butt Set

A

Device that can tap into a 66- or 110-punchdown block to see if a particular line is working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Byte

A

Eight contiguous bits, the fundamental data unit of personal computers. Storing the equivalent of one character, the byte is also the basic unit of measurement for computer storage. Bytes are counted in powers of two.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

CAB Files

A

Short for “cabinet files.” These files are compressed and most commonly used during Microsoft operating system installation to store many smaller files, such as device drivers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Cable Certifier

A

A very powerful cable testing device used by professional installers to test the electrical characteristics of a cable and then generate a certification report, proving that cable runs pass TIA/EIA standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Cable Drop

A

Location where the cable comes out of the wall at the workstation location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Cable Modem

A

A bridge device that interconnects the cable company’s DOCSIS service to the user’s Ethernet network. In most locations, the cable modem is the demarc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Cable Stripper

A

Device that enables the creation of UTP cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Cable Tester

A

A generic name for a device that tests cables. Some common tests are continuity, electrical shorts, crossed wires, or other electrical characteristics.

126
Q

Cable Tray

A

A device for organizing cable runs in a drop ceiling

127
Q

Cache

A

A special area of RAM that stores frequently accessed data. In a network there are a number of applications that take advantage of cache in some way

128
Q

Cache-Only DNS Servers (Caching-Only DNS Servers)

A

DNS servers that do not have any forward lookup zones. They resolve names of systems on the Internet for the network, but are not responsible for telling other DNS servers the names of any clients.

129
Q

Cached Lookup

A

The list kept by a DNS server of IP addresses it has already resolved, so it won’t have to re-resolve an FQDN it has already checked

130
Q

Caching Engine

A

A server dedicated to storing cache information on your network. These servers can reduce overall network traffic dramatically

131
Q

CAN

A

Campus Area Network A network installed in a medium-sized space spanning multiple buildings

132
Q

CNAME

A

Canonical Name Less common type of DNS record that acts as a computer’s alias.

133
Q

Capture File

A

A file in which the collected packets from a packet sniffer program are stored.

134
Q

CSMA/CA

A

Carrier Sense Multiple Access with Collision Avoidance

135
Q

CSMA/CD

A

Carrier Sense Multiple Access with Collision Detection

136
Q

CAT 3

A

Category 3 wire, a TIA/EIA standard for UTP wiring that can operate at up to 16 Mbps

137
Q

CAT 4

A

Category 4 wire, a TIA/EIA standard for UTP wiring that can operate at up to 20 Mbps. This wire is not widely used, except in older Token Ring networks

138
Q

CAT 5

A

Category 5 wire, a TIA/EIA standard for UTP wiring that can operate at up to 100 Mbps

139
Q

CAT 5e

A

Category 5e wire, a TIA/EIA standard for UTP wiring with improved support for 100 Mbps using two pairs and support for 1000 Mbps using four pairs

140
Q

CAT 6

A

Category 6 wire, a TIA/EIA standard for UTP wiring with improved support for 1000 Mbps

141
Q

Category (CAT) Rating

A

A grade assigned to cable to help network installers get the right cable for the right network technology. CAT ratings are officially rated in megahertz (MHz), indicating the highest-frequency bandwidth the cable can handle.

142
Q

CCITT

A

(Comité Consutatif Internationale Téléphonique et Télégraphique)
European standards body that established the V standards for modems.

143
Q

Central Office

A

Building that houses local exchanges and a location where individual voice circuits come together

144
Q

Certificate

A

A public encryption key signed with the digital signature from a trusted third party called a certificate authority (CA). This key serves to validate the identity of its holder when that person or company sends data to other parties

145
Q

Certifier

A

A device that tests a cable to ensure that it can handle its rated amount of capacity

146
Q

Chain of Custody

A

A document used to track the collection, handling, and transfer of evidence

147
Q

CHAP

A

Challenge Handshake Authentication Protocol A remote access authentication protocol. It has the serving system challenge the remote client, which must provide an encrypted password

148
Q

Change Management

A

The process of initiating, approving, funding, implementing, and documenting significant changes to the network

149
Q

Change Management Documentation

A

A set of documents that defines procedures for changes to the network

150
Q

Change Management Team

A

Personnel who collect change requests, evaluate the change, work with decision makers for approval, plan and implement approved changes, and document the changes

151
Q

Change Request

A

A formal or informal document suggesting a modification to some aspect of the network or computing environment

152
Q

Channel

A

A portion of the wireless spectrum on which a particular wireless network operates. Setting wireless networks to different channels enables separation of the networks.

153
Q

Channel Bonding

A

Wireless technology that enables wireless access points (WAPs) to use two channels for transmission

154
Q

CSU/DSU

A

CSU/DSU (Channel Service Unit/Data Service Unit)

155
Q

Checksum

A

A simple error-detection method that adds a numerical value to each data packet, based on the number of data bits in the packet. The receiving node applies the same formula to the data and verifies that the numerical value is the same; if not, the data has been corrupted and must be re-sent

156
Q

Cipher

A

A series of complex and hard-to-reverse mathematics run on a string of ones and zeroes in order to make a new set of seemingly meaningless ones and zeroes.

157
Q

Cipher Lock

A

A door unlocking system that uses a door handle, a latch, and a sequence of mechanical push buttons

158
Q

Ciphertext

A

The output when cleartext is run through a cipher algorithm using a key

159
Q

Circuit Switching

A

The process for connecting two phones together on one circuit

160
Q

Cladding

A

The part of a fiber-optic cable that makes the light reflect down the fiber

161
Q

CoS

A

Class of Service A prioritization value used to apply to services, ports, or whatever a quality of service (QoS) device might use

162
Q

Class License

A

Contiguous chunk of IP addresses passed out by the Internet Assigned Numbers Authority (IANA)

163
Q

CIDR

A

Classless Inter-Domain Routing Method of categorizing IP addresses in order to distribute them. See also Subnetting

164
Q

Classless Subnet

A

A subnet that does not fall into the common categories such as Class A, Class B, and Class C

165
Q

Client

A

A computer program that uses the services of another computer program; software that extracts information from a server. Your autodial phone is a client, and the phone company is its server. Also, a machine that accesses shared resources on a server.

166
Q

Client-to-Site

A

A type of VPN connection where a single computer logs into a remote network and becomes, for all intents and purposes, a member of that network

167
Q

Client/Server

A

A relationship in which client software obtains services from a server on behalf of a user.

168
Q

Client/Server Application

A

An application that performs some or all of its processing on an application server rather than on the client. The client usually only receives the result of the processing

169
Q

Client/Server Network

A

A network that has dedicated server machines and client machines

170
Q

Closed-Circuit Television (CCTV)

A

A self-contained, closed system in which video cameras feed their signal to specific, dedicated monitors and storage devices

171
Q

Cloud Computing

A

Using the Internet to store files and run applications. For example, Google Docs is a cloud computing application that enables you to run productivity applications over the Internet from your Web browser.

172
Q

Cloud/Server Based

A

Remote storage and access of software, especially anti-malware software, where it can be singularly updated. This central storage allows users to access and run current versions of software easily, with the disadvantage of it not running automatically on the local client. The client must initiate access to and launching of the software

173
Q

Coaxial Cable

A

A type of cable that contains a central conductor wire surrounded by an insulating material, which in turn is surrounded by a braided metal shield. It is called coaxial because the center wire and the braided metal shield share a common axis or centerline

174
Q

Cold Site

A

A location that consists of a building, facilities, desks, toilets, parking, and everything that a business needs except computers

175
Q

Collision

A

The result of two nodes transmitting at the same time on a multiple access network such as Ethernet. Both frames may be lost or partial frames may result

176
Q

Collision Light

A

A light on some older NICs that flickers when a network collision is detected.

177
Q

CIFS

A

Common Internet File System The protocol that NetBIOS used to share folders and printers. Still very common, even on UNIX/Linux systems

178
Q

Community Cloud

A

A private cloud paid for and used by more than one organization

179
Q

Complete Algorithm

A

A cipher and the methods used to implement that cipher

180
Q

Computer Forensics

A

The science of gathering, preserving, and presenting evidence stored on a computer or any form of digital media that is presentable in a court of law

181
Q

Concentrator

A

A device that brings together at a common center connections to a particular kind of network (such as Ethernet) and implements that network internally

182
Q

Configuration Management

A

A set of documents, policies, and procedures designed to help you maintain and update your network in a logical, orderly fashion

183
Q

Configuration Management Documentation

A

Documents that define the configuration of a network. These would include wiring diagrams, network diagrams, baselines, and policy/procedure/configuration documentation

184
Q

Connection-Oriented

A

Network communication between two hosts that includes negotiation between the hosts to establish a communication session. Data segments are then transferred between hosts, with each segment being acknowledged before a subsequent segment can be sent. Orderly closure of the communication is conducted at the end of the data transfer or in the event of a communication failure. TCP is the only connection-oriented protocol in the TCP/IP suite

185
Q

Connection-Oriented Communication

A

A protocol that establishes a connection between two hosts before transmitting data and verifies receipt before closing the connection between the hosts. TCP is an example of a connection-oriented protocol.

186
Q

Connectionless

A

A type of communication characterized by sending packets that are not acknowledged by the destination host. UDP is the quintessential connectionless protocol in the TCP/IP suite.

187
Q

Connectionless Communication

A

A protocol that does not establish and verify a connection between the hosts before sending data; it just sends the data and hopes for the best. This is faster than connection-oriented protocols. UDP is an example of a connectionless protocol.

188
Q

Console Port

A

Connection jack in a switch used exclusively to connect a computer that will manage the switch.

189
Q

Content Switch

A

Advanced networking device that works at least at Layer 7 (Application layer) and hides servers behind a single IP

190
Q

Contingency Planning

A

The process of creating documents that set about how to limit damage and recover quickly from an incident

191
Q

Continuity

A

The physical connection of wires in a network

192
Q

Continuity Tester

A

Inexpensive network tester that can only test for continuity on a line

193
Q

Convergence

A

Point at which the routing tables for all routers in a network are updated

194
Q

Core

A

The central glass of the fiber-optic cable that carries the light signal

195
Q

Cost

A

An arbitrary metric value assigned to a network route with OSFP capable routers

196
Q

Counter

A

A predefined event that is recorded to a log file.

197
Q

CWDM

A

Coarse Wavelength Division Multiplexing An optical multiplexing technology in which a few signals of different optical wavelength could be combined to travel a fairly short distance

198
Q

CRC

A

Cyclic Redundancy Check A mathematical method used to check for errors in long streams of transmitted data with high accuracy

199
Q

Crimper

A

Also called a crimping tool, the tool used to secure a crimp (or an RJ-5 connector) onto the end of a cable.

200
Q

Cross-Platform Support

A

Standards created to enable terminals (and now operating systems) from different companies to interact with one another

201
Q

Crossover Cable

A

A specially terminated UTP cable used to interconnect routers or switches, or to connect network cards without a switch. Crossover cables reverse the sending and receiving wire pairs from one end to the other.

202
Q

Crosstalk

A

Electrical signal interference between two cables that are in close proximity to each other

203
Q

CSMA/CA

A

Carrier Sense Multiple Access with Collision Avoidance Access method used mainly on wireless networks. Before hosts send out data, they first listen for traffic. If the network is free, they send out a signal that reserves a certain amount of time to make sure the network is free of other signals. If data is detected on the wire, the hosts wait a random time period before trying again. If the wire is free, the data is sent out.

204
Q

CSMA/CD

A

Carrier Sense Multiple Access with Collision Detection Access method that Ethernet systems use in wired LAN technologies, enabling frames of data to flow through the network and ultimately reach address locations. Hosts on CSMA/CD networks first listen to hear of there is any data on the wire. If there is none, they send out data. If a collision occurs, then both hosts wait a random time period before retransmitting the data

205
Q

CSU/DSU

A

Channel Service Unit/Data Service Unit A piece of equipment that connects a T-carrier leased line from the telephone company to a customer’s equipment (such as a router). It performs line encoding and conditioning functions, and it often has a loopback function for testing

206
Q

CPE

A

Customer-Premises Equipment The primary distribution box and customer-owned/managed equipment that exists on the customer side of the demarc

207
Q

Daily Backup

A

Also called a daily copy backup, makes a copy of all files that have been changed on that day without changing the archive bits of those files

208
Q

Daisy-chain

A

A method of connecting together several devices along a bus and managing the signals for each device

209
Q

Data Backup

A

The process of creating extra copies of data to be used in case the primary data source fails

210
Q

DES

A

Data Encryption Standard
A symmetric-key algorithm developed by the U.S. government in the 1970s and formerly in use in a variety of TCP/IP applications. DES used a 64-bit block and a 56-bit key. Over time, the 56-bit key made DES susceptible to brute-force attacks

211
Q

Data Link Layer

A
212
Q

DOCSIS

A

Data Over Cable Service Interface Specification The unique protocol used by cable modem networks

213
Q

Datagram

A

A connectionless transfer unit created with User Datagram Protocol designed for quick transfers over a packet-switched network

214
Q

DB-25

A

A 25-pin, D-shaped subminiature connector, typically use in parallel and older serial port connections

215
Q

DB-9

A

A 9-pin, D-shaped subminiature connector, often used in serial port connections

216
Q

De-encapsulation

A

The process of stripping all the extra header information from a packet as the data moves up a protocol stack

217
Q

Dead Spot

A

A place that should be covered by the network signal but where devices get no signal

218
Q

dB

A

Decibel A measurement of the quality of a signal

219
Q

Dedicated Circuit

A

A circuit that runs from a breaker box to specific outlets

220
Q

Dedicated Line

A

A telephone line that is an always open, or connected, circuit. Dedicated telephone lines usually do not have telephone numbers

221
Q

Dedicated Server

A

A machine that does not use any client functions, only server function

222
Q

Default

A

A software function or operation that occurs automatically unless the user specifies something else

223
Q

Default Gateway

A

In a TCP/IP network, the IP address of the router that interconnects the LAN to a wider network, usually the Internet. This router’s IP address is part of the necessary TCP/IP configuration for communicating with multiple networks using IP.

224
Q

D Channel

A

Delta Channel A type of ISDN line that transfers data at 16 Kbps

225
Q

Demarc

A

A device that marks the dividing line of responsibility for the functioning of a network between internal users and upstream service providers

226
Q

Demarc Extension

A

Any cabling that runs from the network interface to whatever box is used by the customer as a demarc

227
Q

DMZ

A

Demilitarized Zone A lightly protected or unprotected subnet network positioned between an outer firewall and an organization’s highly protected internal network. DMZs are used mainly to host public address servers (such as Web servers)

228
Q

Demultiplexer

A

Device that can extract and distribute individual streams of data that have been combined together to travel along a single shared network cable

229
Q

DoS

A

Denial of Service An effort to prevent users from gaining normal use of a resource

230
Q

DR

A

Designated Router The main router in an OSPF network that relays information to all other routers in the area

231
Q

Destination Port

A

A fixed, predetermined number that defines the function or session type in a TCP/IP network

232
Q

Device Driver

A

A subprogram to control communications between the computer and some peripheral hardware

233
Q

Device ID

A

The last six digits of a MAC address, identifying the manufacturer’s unique serial number for that NIC

234
Q

Device Types/Requirements

A

With respect to installing and upgrading networks, these determine what equipment is needed to build the network and how the network should be organized

235
Q

DHCP Lease

A

Created by the DHCP server to allow a system requesting DHCP IP information to use that information for a certain amount of time

236
Q

DHCP Relay

A

A router process that, when enabled, passes DHCP requests and responses across router interfaces. In common terms, DHCP communications can cross from one network to another within a router that has DHCP relay enabled and configured

237
Q

DHCP Scope

A

The pool of IP addresses that a DHCP server may allocate to clients requesting IP addresses or other IP information like DNS server addresses

238
Q

DHCP Snooping

A

Switch process that monitors DHCP traffic, filtering out DHCP messages from untrusted sources. Typically used to block attacks that use a rogue DHCP server

239
Q

Dial-up Lines

A

Telephone lines with telephone numbers; they must dial to make a connection, as opposed to a dedicated line

240
Q

Differential Backup

A

Similar to an incremental backup in that it backs up the files that have been changed since the last backup. This type of backup does not change the state of the archive bit.

241
Q

DiffServ

A

Differentiated Services The underlying architecture that makes quality of service (QoS) work

242
Q

DIG

A

Domain Information Groper Command-line tool in non-Windows systems used to diagnose DNS problems

243
Q

DS1

A

Digital Signal 1 The signaling method used by T1 lines, which uses a relatively simple frame consisting of 25 pieces: a framing bit and 24 channels. Each DS1 channel holds a single 8-bit DS0 data sample. The framing bit and data channels combine to make 193 bits per DS1 frame. These frames are transmitted 8000 times/sec, making a total throughput of 1.544 Mbp

244
Q

DSP

A

Digital Signal Processor A specialized microprocessor-like device that processes digital signals at the expense of other capabilities, much as the floating-point unit (FPU) is optimized for math functions. DSPs are used in such specialized hardware as high-speed modems, multimedia sound cards, MIDI equipment, and real-time video capture and compression

245
Q

Digital Signature

A

An encrypted hash of a private encryption key that verifies a sender’s identity to those who receive encrypted data or messages

246
Q

DSL

A

Digital Subscriber Line A high-speed Internet connection technology that uses a regular telephone line for connectivity. DSL comes in several varieties, including Asymmetric (ADSL) and Symmetric (SDSL), and many speeds. Typical home-user DSL connections are ADSL with a download speed of up to 9 Mbps and an upload speed of up to 1 Kbps

247
Q

Dipole Antenna

A

The standard straight-wire antenna that provides most omnidirectional function.

248
Q

DC

A

Direct Current A type of electric circuit where the flow of electrons is in a complete circle

249
Q

DSSS

A

Direct-Sequence Spread-Spectrum
A spread-spectrum broadcasting method defined in the 802.11 standard that sends data out on different frequencies at the same time

250
Q

Directional Antenna

A

An antenna that focuses its signal more towards a specific direction; as compared to an omnidirectional antenna that radiates its signal in all directions equally

251
Q

Disaster Recovery

A

The means and methods to recover primary infrastructure from a disaster. Disaster recovery starts with a plan and includes data backups

252
Q

DAC

A

Discretionary Access Control Authorization method based on the idea that there is an owner of a resource who may at his or her discretion assign access to that resource. DAC is considered much more flexible than mandatory access control (MAC)

253
Q

Disk Mirroring

A

Process by which data is written simultaneously to two or more disk drives. Read and write speed is decreased but redundancy, in case of catastrophe, is increased. Also known as RAID level 1. See also Duplexing

254
Q

Disk Striping

A

Process by which data is spread among multiple (at least two) drives. It increases speed for both reads and writes of data, but provides no fault tolerance. Also known as RAID level 0

255
Q

Disk Striping with Parity

A

Process by which data is spread among multiple (at least three) drives, with parity information as well to provide fault tolerance. The most commonly implemented type is RAID 5, where the data and parity information is spread across three or more drives

256
Q

Dispersion

A

Diffusion over distance of light propagating down fiber cable

257
Q

Distance Vector

A

Set of routing protocols that calculates the total cost to get to a particular network ID and compares that cost to the total cost of all the other routes to get to that same network ID

258
Q

DCS

A

Distributed Control System A small controller added directly to a machine used to distribute the computing load

259
Q

DCF

A

Distributed Coordination Function One of two methods of collision avoidance defined by the 802.11 standard and the only one currently implemented. DCF specifies strict rules for sending data onto the network media. See also Point Coordination Function (PCF)

260
Q

DDoS

A

Distributed Denial of Service Multicomputer assault on a network resource that attempts, with sheer overwhelming quantity of requests, to prevent regular users from receiving services from the resource

261
Q

DDoS Attack

A

Distributed Denial of Service Attack A DoS attack that uses multiple (as in hundreds or up to hundreds of thousands) of computers under the control of a single operator to conduct a devastating attack

262
Q

DLL

A

Dynamic Link Library A file of executable functions or data that can be used by a Windows application. Typically, a DLL provides one or more particular functions, and a program accesses the functions by creating links to the DLL

263
Q

DNS Domain

A

A specific branch of the DNS name space. Top-level DNS domains include .com, .gov, and .edu.

264
Q

DNS Resolver Cache

A

A cache used by Windows DNS clients to keep track of DNS information

265
Q

DNS Root Servers

A

The highest in the hierarchy of DNS servers running the Internet

266
Q

DNS Server

A

Domain Naming System: A system that runs a special DNS server program

267
Q

DNS Tree

A

A hierarchy of DNS domains and individual computer names organized into a tree-like structure, the top of which is the root

268
Q

Document

A

A medium and the data recorded on it for human use; for example, a report sheet or book. By extension, any record that has permanence and that can be read by a human or a machine

269
Q

Documentation

A

A collection of organized documents or the information recorded in documents. Also, instructional material specifying the inputs, operations, and outputs of a computer program or system

270
Q

Domain

A

A term used to describe a grouping of users, computers, and/or networks. In Microsoft networking, a domain is a group of computers and users that shares a common account database and a common security policy. For the Internet, a domain is a group of computers that shares a common element in their DNS hierarchical name

271
Q

Domain Controller

A

A Microsoft Windows Server system specifically configured to store user and server account information for its domain. Often abbreviated as “DC.” Windows domain controllers store all account and security information in the Active Directory directory service

272
Q

DNS

A

Domain Name System A TCP/IP name resolution system that resolves host names to IP addresses

273
Q

Domain Users and Groups

A

Users and groups that are defined across an entire network domain

274
Q

Door Access Controls

A

Methodology to grant permission or to deny passage through a doorway. The method may be computer-controlled, human-controlled, token-oriented, or many other means

275
Q

Dotted Decimal Notation

A

Shorthand method for discussing and configuring binary IP addresses

276
Q

Download

A

The transfer of information from a remote computer system to the user’s system. Opposite of upload

277
Q

Drive Duplexing

A

Also called disk duplexing or drive duplexing, similar to mirroring in that data is written to and read from two physical drives for fault tolerance. In addition, separate controllers are used for each drive, for both additional fault tolerance and additional speed. Considered RAID level 1. See also Disk Mirroring.

278
Q

Drive Mirroring

A

The process of writing identical data to two hard drives on the same controller at the same time to provide data redundancy

279
Q

DS0

A

The digital signal rate created by converting analog sound into 8-bit chunks 8000 times a second, with a data stream of 64 Kbps. This is the simplest data stream (and the slowest rate) of the digital part of the phone system

280
Q

DS1

A

The signaling method used by T1 lines, which uses a relatively simple frame consisting of 25 pieces: a framing bit and 24 channels. Each DS1 channel holds a single 8-bit DS0 data sample. The framing bit and data channels combine to make 193 bits per DS1 frame. These frames are transmitted 8000 times/sec, making a total throughput of 1.544 Mbp

281
Q

(DSLAM

A

DSL (Digital Service Lines) Access Multiplexer A device located in a telephone company’s central office that connects multiple customers to the Internet

282
Q

DSL Modem

A

A device that enables customers to connect to the Internet using a DSL connection. A DSL modem isn’t really a modem—it’s more like an ISDN terminal adapter—but the term stuck, and even the manufacturers of the devices now call them DSL modems

283
Q

DSP

A

Digital Signal Processor A specialized microprocessor-like device that processes digital signals at the expense of other capabilities, much as the floating-point unit (FPU) is optimized for math functions. DSPs are used in such specialized hardware as high-speed modems, multimedia sound cards, MIDI equipment, and real-time video capture and compression

284
Q

Duplexing

A

Also called disk duplexing or drive duplexing, similar to mirroring in that data is written to and read from two physical drives for fault tolerance. In addition, separate controllers are used for each drive, for both additional fault tolerance and additional speed. Considered RAID level 1. See also Disk Mirroring.

285
Q

Dynamic Addressing

A

A way for a computer to receive IP information automatically from a server program. See also Dynamic Host Configuration Protocol (DHCP)

286
Q

DAI

A

Dynamic ARP Inspection Cisco process that updates a database of trusted systems. DAI then watches for false or suspicious ARPs and ignores them to prevent ARP cache poisoning and other malevolent efforts

287
Q

DDNS

A

Dynamic DNS A protocol that enables DNS servers to get automatic updates of IP addresses of computers in their forward lookup zones, mainly by talking to the local DHCP server

288
Q

DHCP

A

Dynamic Host Configuration Protocol A protocol that enables a DHCP server to set TCP/IP settings automatically for a DHCP client

289
Q

Dynamic NAT

A

Type of NAT in which many computers can share a pool of routable IP addresses that number fewer than the computers

290
Q

Dynamic Port Numbers

A

Port numbers 49152–65535, recommended by the IANA to be used as ephemeral port numbers

291
Q

Dynamic Routing

A

Process by which routers in an internetwork automatically exchange information with other routers. Requires a dynamic routing protocol, such as OSPF or RIP

292
Q

Dynamic Routing Protocol

A

A protocol that supports the building of automatic routing tables, such as OSPF or RIP

293
Q

E-mail

A

Electronic Mail Messages, usually text, sent from one person to another via computer. E-mail can also be sent automatically to a large number of addresses, known as a mailing list.

294
Q

E-mail Alert

A

Notification sent by e-mail as a result of an event. A typical use is a notification sent from an SNMP manager as a result of an out of tolerance condition in an SNMP managed device

295
Q

E-mail Client

A

Program that runs on a computer and enables a user to send, receive, and organize e-mail

296
Q

E-mail Server

A

Also known as mail server, a server that accepts incoming e-mail, sorts the e-mail for recipients into mailboxes, and sends e-mail to other servers using SMTP

297
Q

E1

A

The European counterpart of a T1 connection that carries 32 channels at 64 Kbps for a total of 2.048 Mbps—making it slightly faster than a T1

298
Q

E3

A

The European counterpart of a T3 line that carries 16 E1 lines (512 channels), for a total bandwidth of 34.368 Mbps—making it a little bit slower than an American T3

299
Q

EAP-TLS

A

Extensible Authentication Protocol with Transport Layer Security A protocol that defines the use of a RADIUS server as well as mutual authentication, requiring certificates on both the server and every client

300
Q

EAP-TTLS

A

A protocol similar to EAP-TLS but only uses a single server-side certificate

301
Q

Edge

A

A hardware device that has been optimized to perform a task in coordination with other edge devices and controllers

302
Q

Edge Router

A

Router that connects one Autonomous System (AS) to another

303
Q

Effective Permissions

A

The permissions of all groups combined in any network operating system

304
Q

EMI

A

Electromagnetic Interference Interference from one device to another, resulting in poor performance in the device’s capabilities. This is similar to having static on your TV while running a hair dryer, or placing two monitors too close together and getting a “shaky” screen

305
Q

Electronic Discovery

A

The process of requesting and providing electronic and stored data and evidence in a legal way

306
Q

ESD

A

Electrostatic Discharge The movement of electrons from one body to another. ESD is a real menace to PCs because it can cause permanent damage to semiconductors

307
Q

Emulator

A

Software or hardware that converts the commands to and from the host machine to an entirely different platform. For example, a program that enables you to run Nintendo games on your PC

308
Q
A
309
Q
A
310
Q
A