Glossary- T Flashcards

1
Q

T-1

A

A common carrier standard protocol for transporting voice and data. T-1 can sup- port up to 24 separate voice channels of 64 kbit/sec each and is used primarily in North America.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T-3

A

A common carrier standard protocol for transporting voice and data. T-3 can sup- port up to 672 separate voice channels of 64 kbit/sec each and is used primarily in North America.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

table

A

A unit of storage in a relational database management system (rDBMS) that can be thought of as a list of records. See also relational database management system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

tablet

A

A mobile device with a touch screen interface. See also mobile device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

tailgating

A

A technique used by intruders who attempt to enter a building; they may follow an employee into a building without showing their own security credentials (for example, a keycard).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

tape management system (TMS)

A

An information system that is used to manage tape media, usually for the purpose of performing information backup. See also backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP/IP network model

A

The four-layer network model that incorporates encapsula- tion of messages. The TCP/IP suite of protocols is built on the TCP/IP network model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

technical control

A

A control that is implemented in IT systems and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

technical requirements

A

Formal statements that describe the required technical char-

acteristics that a system must support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

technology standard

A

A standard that specifies the software and hardware technolo- gies that are used by the IT organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TELNET

A

A TCP/IP application layer protocol that is used to establish a command- line session on a remote computer. TELNET does not encrypt user credentials as they are transmitted over the network, and has been largely replaced by SSH. See also secure shell (SSH).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

terminal emulation

A

A software program that runs on a workstation that emulates an older-style computer terminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

termination

A

The process of discontinuing employment of an employee or contractor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

terrorist

A

A person or group who perpetrates violence for political or religious reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

test plan

A

The list of tests that are to be carried out during a unit test or system test. See also unit testing, system testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

test server

A

Any type of server that is used to test features; a test server does not per- form production tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

thick client

A

A workstation that contains a fully functional operating system and ap- plication programs.

18
Q

thin client

A

A workstation that contains a minimal operating system and little or no data storage.

19
Q

threat

A

An event that, if realized, would bring harm to an asset.

20
Q

time bomb

A

See logic bomb.

21
Q

time division multiple access (TDMA)

A

An airlink standard for wireless communica- tions between mobile devices and base stations.

22
Q

time of check/time of use (TOC/TOU)

A

See race condition.

23
Q

time synchronization

A

A network-based service that is used to synchronize the time

clocks on computers connected to a network.

24
Q

timebox management

A

A project management technique where a large project is bro- ken down into smaller components and time periods.

25
Q

token

A

A small electronic device that is used in two-factor authentication. A token may display a number that the user types in to a login field, or it may be plugged into a workstation to complete authentication. See also two-factor authentication.

26
Q

Token Ring

A

A standard protocol for assembling a stream of data into frames for trans- port over a physical medium from one station to another on a local area network. On a Token Ring network, a three-byte token is passed from station to station over the network. A station may not transmit a packet to another station until it has first re- ceived the token.

27
Q

tolerable error rate

A

The highest number of errors that can exist without a result being materially misstated.

28
Q

toll fraud

A

An attack on a private branch exchange (PBX) that results in stolen long- distance telephone service.

29
Q

Towers of Hanoi

A

A complex backup media rotation scheme that provides for more lengthy retention of some backup media. Based on the Towers of Hanoi puzzle. See also backup media rotation.

30
Q

training

A

The process of educating personnel; to impart information or provide an environment where they can practice a new skill.

31
Q

transaction processing (TP) monitor

A

A system that manages transactions between application servers and database servers in a distributed processing environment.

32
Q

transfer

A

The process of changing an employee’s job title, department, and/or responsibilities.

33
Q

Transmission Control Protocol (TCP)

A

The connection-oriented protocol used in the TCP/IP suite of protocols to establish a connection and transport messages from one station to another over a network during a communication session.

34
Q

transport

A

Layer 4 of the OSI network model. See also OSI network model.

OR

Layer 3 of the TCP/IP network model. The purpose of the transport layer is the controlled and ordered delivery of messages (called packets) from one application on a station to another on the same network or on different networks. See also TCP/IP network model.

35
Q

Transport Layer Security (TLS)

A

An encryption protocol used to encrypt webpages requested with the HTTPS (Hypertext Transfer Protocol/Secure) URL. Replacement for Secure Sockets Layer (SSL). See also Secure Sockets Layer (SSL), Hypertext Transfer Protocol Secure (HTTPS).

36
Q

Trojan horse

A

A type of malware where programs are purported to perform one func- tion, but which actually perform other (or additional) undesired functions.

37
Q

trunk

A

A telecommunications network technique where several communications can share a set of lines or frequencies.

38
Q

tunneling

A

The practice of encapsulating messages within another protocol.

39
Q

twinax

A

A type of coaxial cable that uses two inner conductors.

40
Q

twisted-pair cable

A

A type of network cabling that consists of a thick cable containing four pairs of insulated copper conductors, all surrounded by a protective jacket.

41
Q

two-factor authentication

A

Any means used to authenticate a user that is stronger than the use of a user ID and password. Examples of two-factor authentication include digital certificate, token, smart card, or biometric.