NETWORK+ Terms C's Flashcards

(46 cards)

1
Q

A device that provides
Internet access over cable television
lines.

A

cable modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A tool used to strip the sheathing from copper cabling.

A

cable stripper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A device used to check for electrical continuity along a length of cable.___ ___ is a generic term that can be applied to devices such as volt/ohm meters and
TDRs.

A

cable tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A type of DNS server that operates the same

way as secondary servers except that a zone transfer does not take place when the this is started.

A

caching-only server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A protocol that enables multiple hosts on the
same network to share a set of IP addresses and thus provides failover redundancy. It is commonly used with routers and firewalls and can provide load balancing.

A

CARP (Common Address

Redundancy Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A signal that carries data.
The _____ signal is modulated to
create peaks and troughs, which
represent binary bits.

A

carrier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A process in which a detailed record of every change made to the network is documented.

A

change control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A communications path used for data transmission.

A

channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A protocol that challenges a system to verify identity. ____ ___ ___ ___ is an improvement over Password Authentication
Protocol (PAP) in which one-way hashing is incorporated into a threeway handshake. RFC 1334 applies to both PAP and CHAP.

A

CHAP (Challenge Handshake

Authentication Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A basic method of error checking that involves calculating the sum of bytes in a section of data and then embedding the
result in the packet. When the packet
reaches the destination, the calculation
is performed again to make sure that the value is still the same.

A

checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
An IP addressing scheme that
enables a single IP address to designate
many unique IP addresses.
\_\_\_ \_\_\_ \_\_\_ \_\_\_ addressing uses an IP address followed by a / and the IP network
prefix. An example of a this
address is 192.168.100.0/16. It
is sometimes called supernetting.
A

CIDR (classless interdomain routing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A type of network security system whereby network traffic is filtered based on
specified session rules and may be
restricted to recognized computers
only.

A

circuit-level firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A method of sending data between two parties in which a dedicated circuit is created at the beginning of the conversation
and is broken at the end. All data transported during the session travels over the same path, or circuit.

A

circuit switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A TCP/IP network that uses addresses from 1 to 126 and supports up to 126 subnets
with 16,777,214 unique hosts each.

A

Class A network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A TCP/IP network that uses addresses from 128 to 191 and supports up to 16,384 subnets with 65,534 unique hosts each.

A

Class B network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A TCP/IP network
that uses addresses from 192
to 223 and supports up to 2,097,152
subnets with 254 unique hosts each.

A

Class C network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A node that uses the services

from another node on a network.

A

client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A networking architecture in which frontend,
or client, nodes request and
process data stored by the back-end,
or server, node.

A

client/server networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
The hosting, storage, and delivery of computing as a service rather than a product. The end user accesses remotely
stored programs and other resources
through the Internet without the
need for expensive local networking
devices, services, and support.
A

cloud computing

20
Q

A technology that enables two or more computers to act as a single system to provide improved fault tolerance, load balancing, and failover capability.

21
Q
Specifies an alias or nickname for a
canonical hostname record in a
domain name system (DNS) database.
\_\_\_\_\_\_\_  records are used to
give a single computer multiple
names (aliases).
A

CNAME (canonical name)

22
Q
A data cable, that is
made of a solid copper core insulated
and surrounded by braided metal
and covered with a thick plastic or
rubber covering. It is the standard
cable used in cable television
and in older bus topology networks.
A

coaxial cable

23
Q
A disaster recovery site
that provides office space, but the
customer provides and installs all
the equipment needed to continue
operations.
24
Q

A redundant piece of hardware stored in case a component should fail. Typically used for server systems.

25
The result of two frames simultaneously transmitting on an Ethernet network and colliding, thereby destroying both frames.
collision
26
``` A segment of an Ethernet network between managing nodes, where only one packet can be transmitted at a time. Switches, bridges, and routers can be used to segment a network into separate___ ____. ```
collision domain
27
``` An LED on networking equipment that flashes to indicate a collision on the network. A ____ ____can be used to determine whether the network is experiencing many collisions. ```
collision light
28
The transfer of information between nodes on a network.
communication
29
A device that combines several communications channels into one. It is often used to combine multiple terminals into one line.
concentrator
30
Packet transfer in which delivery is | not guaranteed.
connectionless communication
31
Packet transfer in which | delivery is guaranteed.
connection-oriented communication
32
The linking of nodes on a network for communication to take place.
connectivity
33
When a change in the network routing is made, it takes some time for the routers to detect and accommodate this change; this is known as _______.
convergence
34
Normally, a backup of the entire hard drive. A ____ ____ is similar to a full backup, except that the copy backup does not alter the state of the archive bits on files.
copy backup
35
``` A value used to encourage or discourage the use of a certain route through a network. Routes that are to be discouraged are assigned a higher one, and those that are to be encouraged are assigned a lower one. ```
cost
36
A person who attempts to break software code or gain access to a system to which he or she is not authorized.
cracker
37
``` The process of attempting to break software code, normally to defeat copyright protection or alter the software’s functioning. Also the process of attempting to gain unauthorized access to a computer system. ```
cracking
38
A challenge-response | authentication mechanism.
CRAM-MD5
39
``` A method used to check for errors in packets that have been transferred across a network. A computation bit is added to the packet and recalculated at the destination to determine whether the entire content of the packet has been correctly transferred. ```
CRC (cyclical redundancy check)
40
A tool used to join connectors to the ends of network cables.
crimper
41
A cable that can be used to directly connect two devices—such as two computer systems— or as a means to expand networks that use devices such as hubs or switches. A traditional ____ ____ is a UTP cable in which the wires are crossed for the purposes of placing the transmit line of one device on the receive line of the other. A T1 crossover is used to connect two T1 CSU/DSU devices in a back-to-back configuration.
crossover cable
42
Electronic interference caused when two wires are too close to each other, and the adjacent cable creates interference.
crosstalk
43
A contention media access method that | uses collision-avoidance techniques.
CSMA/CA (carrier sense multiple | access with collision avoidance)
44
A contention media access method that uses collision-detection and retransmission techniques.
CSMA/CD (carrier sense multiple | access with collision detection)
45
``` Acts as a translator between the LAN data format and the WAN data format. Such a conversion is necessary because the technologies used on WAN links are different from those used on LANs. ```
CSU/DSU (Channel Service | Unit/Data Service Unit)
46
``` A switching method that does not copy the entire packet into the switch buffers. Instead, the destination address is captured into the switch, the route to the destination node is determined, and the packet is quickly sent out the corresponding corresponding port. ___ ___ ___ switching maintains a low latency. ```
cut-through packet switching