Networking Concepts Terminology Flashcards

Acquire a high level of familiarization and proficiency in working with networks.

1
Q

MAN

A

A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SAN

A

A storage area network (SAN) is a dedicated, high-speed network that provides access to block-level storage. SANs were adopted to improve application availability and performance by segregating storage traffic from the rest of the LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WAN

A

A wide area network (WAN) is a geographically distributed private telecommunications network that interconnects multiple local area networks (LANs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LAN

A

A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link to a server. Typically, a LAN encompasses computers and peripherals connected to a server within a distinct geographic area such as an office or a commercial establishment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What connects a LAN and a WAN

A

A router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the most common method for encrypting TCP/IP communications?

A

Secure Sockets Layer (SSL) is a networking protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PGP (pretty-good-privacy)

A

Pretty Good Privacy or PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Kerberos

A

Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet. Kerberos is built in to all major operating systems, including Microsoft Windows, Apple OS X, FreeBSD and Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HKEY

A

Handle to Registry Key (HKEY) is a typedef supplied in the Windows headers files. A typedef can be thought of as an alias or pseudonym.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of firewall inspects each packet passing through the network and accepts or rejects it based on user-defined rules?

A

packet filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a computer network?

A

A computer network is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections between nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a node?

A

A node is either a redistribution point or a communication endpoint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a networking handshake?

A

Handshaking begins when one device sends a message to another device indicating that it wants to establish a communications channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

packet filter

A

The packet filter examines the header of each packet based on a specific set of rules, and on that basis, decides to prevent it from passing (called DROP) or allow it to pass (called ACCEPT). Users define the rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

proxy server

A

A proxy server is a dedicated computer or a software system running on a computer that acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service. The proxy server may exist in the same machine as a firewall server or it may be on a separate server, which forwards requests through the firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

proxy server

A

A proxy server is a dedicated computer or a software system running on a computer that acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service. The proxy server may exist in the same machine as a firewall server or it may be on a separate server, which forwards requests through the firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

circuit-level gateway

A

A circuit-level gateway monitors TCP handshaking between packets from trusted clients or servers to untrusted hosts and vice versa to determine whether a requested session is legitimate. To filter packets in this way, a circuit-level gateway relies on data contained in the packet headers for the Internet’s TCP session-layer protocol. Because a circuit-level gateway filters packets at the session layer of the OSI model, this gateway operates two layers higher than a packet-filtering firewall does.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

application gateway

A

An application gateway or application level gateway (ALG) is a firewall proxy which provides network security. It filters incoming node traffic to certain specifications which mean that only transmitted network application data is filtered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is TCP?

A

TCP (Transmission Control Protocol) is a standard that defines how to establish and maintain a network conversation via which application programs can exchange data. TCP works with the Internet Protocol (IP), which defines how computers send packets of data to each other. The global standard routable protocol is TCP/IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What’s data transmission?

A

Data transmission, digital transmission or digital communications is the physical transfer of data over a point-to-point or point-to-multipoint communication channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following terms refers to a permanent IP address assignment from a DHCP server?

1) Reservation
2) Relay
3) Scope
4) Lease

A

reservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

relay (networking concept)

A

A relay network is a broad class of network topology commonly used in wireless networks, where the source and destination are interconnected by means of some nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

reservation (networking concept)

A

The Resource Reservation Protocol (RSVP) is a transport layer protocol designed to reserve resources across a network for quality of service (QoS) using the integrated services model. It is a permanent IP address assignment from a DHCP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Integrated Service Model

A

Integrated Services. The Integrated Services (IntServ) model is also known as hard QoS (quality of service) model. It’s a model based on flows, i.e., source and destination IP addresses and ports. With the IntServ model, applications ask to the network for an explicit resource reservation per flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

scope (networking concept)

A

Scope of Networks. The scope of a network refers to its geographical size. A network can range in size from just a few computers in one office to thousands of computers linked together over great distances. Network scope is determined by the size of the organization or the distance between users on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

DHCP

A

DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP. DHCP automates and centrally manages these configurations rather than requiring network administrators to manually assign IP addresses to all network devices. DHCP can be implemented on small local networks as well as large enterprise networks. DHCP is not a routable protocol, nor is it a secure one. DHCP is limited to a specific local area network (LAN), which means a single DHCP server per LAN is adequate, or two servers for use in case of a failover.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

lease (networking)

A

A leased line is a private bidirectional or symmetric telecommunications circuit between two or more locations provided in exchange for a monthly rent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Jeff just moved to a new apartment and is looking for a company to contact for internet service. He is willing to pay a monthly fee, but in return he needs a modem and also an e-mail address. Who would Jeff contact for this service?

  1. )DNS
  2. )ISDN
  3. )ISP
  4. )IEEE
A

ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

DNS

A

The domain name system (DNS) is the way that internet domain names are located and translated into internet protocol (IP) addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

ISDN

A

ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for circuit-switched transmission of data over various media, including ordinary telephone-grade copper wire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

CCITT (ITU-T)

A

The CCITT, now known as the ITU-T (for Telecommunication Standardization Sector of the International Telecommunications Union), is the primary international body for fostering cooperative standards for telecommunications equipment and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

ISP

A

An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting. (provides modem and e-mails adress)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

IEEE

A

The IEEE (Institute of Electrical and Electronics Engineers) describes itself as “the world’s largest technical professional society – promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.”

34
Q

Which of the following is a non-rout-able protocol?

  1. ) NetBEUI
  2. )TCP/IP
  3. ) DHCP
  4. ) AppleTalk
A

NetBEUI

35
Q

routable (networking terms)

A

The routable protocol allows packets to be forwarded from one network to another, which at home is between the user’s local network and the Internet. The global standard routable protocol is TCP/IP.

36
Q

routable protocols

A

TCP/IP

AppleTalk

37
Q

Non routable protocols

A

DHCP

NetBEUI

38
Q

protocol (networking)

A

Network protocols define communication between two or more devices over a network. Network protocols govern network communication.

39
Q

router

A

A router is a networking device that forwards data packets between computer networks.

40
Q

NetBEUI

A

NetBEUI is a program that lets computers communicate within a local area network. NetBEUI does not support the routing of messages to other networks

41
Q

SSL

A

Secure Sockets Layer (SSL) is a networking protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet. It encrypts TCP/IP communications.

42
Q

TCP

A

TCP (Transmission Control Protocol) is a standard that defines how to establish and maintain a network conversation via which application programs can exchange data. TCP works with the Internet Protocol (IP), which defines how computers send packets of data to each other.

43
Q

AppleTalk

A

AppleTalk is a set of local area network communication protocols originally created for Apple computers. AppleTalk is considered a routable and self-configuring protocol. Calling it a routable protocol means that AppleTalk can be used to transmit data across multiple networks with the use of a router.

44
Q

network

A

A network is defined as a group of two or more computer systems linked together.

45
Q

client/server

A

A client-server network is a communications model in which multiple client programs share the services of a common server program.

46
Q

server

A

A network server is a computer system, which is used as the central repository of data and various programs that are shared by users in a network.

47
Q

peer to peer

A

Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session. Unlike the client/server model, in which the client makes a service request and the server fulfills the request, the P2P network model allows each node to function as both a client and server.

48
Q

null

A

A null modem cable allows you to connect your PC to another nearby PC or serial device using its modem protocol. A popular use of null modem cables is for setting up “head-to-head” gaming between two players at different computers in the same room. (A null modem cable is limited to 30 feet in length.)

49
Q

modem

A

A modem modulates outgoing digital signals from a computer or other digital device to analog signals for a conventional copper twisted pair telephone line and demodulates the incoming analog signal and converts it to a digital signal for the digital device.

50
Q

standalone

A

A desktop or laptop computer that is used on its own without requiring a connection to a local area network (LAN) or wide area network (WAN). Although it may be connected to a network, it is still a stand-alone PC as long as the network connection is not mandatory for its general use.

51
Q

The term for a computer with no network is:

1) client/server
2) peer to peer
3) null
4) standalone

A

standalone

52
Q

A digital subscriber line is best described as:

1) an always on services made up of copper phone lines that are not used by voice.
2) using existing cable lines that converts a digital signal to analog when sending data.
3) a solution for those who live in remote areas because it connects to satellites.
4) a dedicated line that connects directs from the ISP of you home/business without sharing.

A

A digital subscriber line is best described as an always on service made of copper phone lines not used by voice. Digital subscriber line, a technology for the high-speed transmission of digital information over standard telephone lines.

53
Q

Which networking tool would be used to attach an RJ-45 connector to a CAT5e networking cable?

1) punch down tool
2) crimper
3) DHCP tool
4) reflectometer

A

crimper

54
Q

punch down tool

A

Most punch down tools are of the impact type, consisting of a handle, an internal spring mechanism, and a removable slotted blade. To use the punch down tool, a wire is pre-positioned into a slotted post on a punch block, and then the punch down tool is pressed down on top of the wire, over the post. Once the required pressure is reached, an internal spring is triggered, and the blade pushes the wire into the slot, simultaneously cutting the insulation and securing the wire.

55
Q

networking tool

A

A computer networking tool is any type of software that assists in the creation, maintenance, or distribution of a wireless network. They are responsible for the maintenance of local area networks, especially in situations that involve dozens or hundreds of computers within the same network.

56
Q

Which of the following is not a network operating system?

1) Windows NT
2) Windows for Workgroups
3) Windows 2000
4) Linux

A

Windows for Workgroups

57
Q

Windows NT

A

Windows NT is a Microsoft Windows personal computer operating system designed for users and businesses needing advanced capability. NT’s technology is the base for the Microsoft successor operating system, Windows 2000.

58
Q

Windows 2000

A

Windows 2000 (W2K) is a est commercial version of Microsoft’s evolving Windows operating system. Previously called Windows NT 5.0, Microsoft emphasizes that Windows 2000 is evolutionary and “Built on NT Technology.”

59
Q

operating system

A

An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.

60
Q

Linux

A

Skinny Linux is an umbrella term that encompasses any compact version of the Linux operating system, such as Austrumi, Puppy Linux Damn Small Linux and Feather Linux.

61
Q

Which of the following is not a way an operating system allocates disk space for files?

1) sporadic allocation
2) contiguous allocation
3) linked allocation
4) indexed allocation

A

sporadic allocation

62
Q

What is the purpose of the event viewer tool?

1) Schedule programs or other tasks to run automatically.
2) Used to check the main log files in Windows Server.
3) View advanced system information about the CPU, memory, hard disk, and network performance.
4) View and edit group policy security settings.

A

Used to check the main log files in the Windows Server.

63
Q

A roaming mandatory profile must be named with what extension:

1) .DAT
2) .TMP
3) .MAN
4) .TXT

A

.MAN

64
Q

.DAT

A

A DAT file is a generic data file created by a specific application. It may contain data in binary or text format (text-based DAT files can be viewed in a text editor). DAT files are typically accessed only by the application that created them. Many programs create, open, or reference DAT files.

65
Q

.TMP

A

The TMP Misc file format. Temporary files with the TMP extension are generated by software and programs automatically. Usually, they serve as backup files and store information while a new file is created.

66
Q

.MAN

A

A roaming mandatory profile must be named with .MAN extension

67
Q

.TXT

A

TXT is a file extension for a text file, used by a variety of text editors. Text is a human-readable sequence of characters and the words they form that can be encoded into computer-readable formats.

68
Q

Worm attack

A

A computer worm is self-replicating malware that duplicates itself to spread to uninfected computers. Worms often use parts of an operating system that are automatic and invisible to the user. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks.

69
Q

Which of the following are the recommended steps that should be taken for worm attack mitigation?

1) containment, quarantine, inoculation, treatment
2) containment inoculation, quarantine, treatment
3) quarantine, containment, inoculation, treatment
4) inoculation, containment, quarantine, treatment

A

containment, inoculation, quarantine, treatment

70
Q

HTTPS communication is on what TCP port?

1) 443
2) 21
3) 23
4) 80

A

443

71
Q

HTTPS

A

HTTPS encrypts and decrypts user page requests as well as the pages that are returned by the Web server. The use of HTTPS protects against eavesdropping and man-in-the-middle attacks. HTTPS uses port 443 instead of HTTP port 80 in its interactions with the lower layer, TCP/IP.

72
Q

access attack

A

In computers and computer networks an attack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access. SIEM can help prevent these attacks.

73
Q

Which of the following would be classified as an access attack?

1) trojan horse
2) zero-day attack
3) DoS
4) password attack

A

password attack

74
Q

tojan horse

A

In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, are strong indications that a Trojan is residing on a computer.

75
Q

zero-day attack

A

Zero-day is a flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching or otherwise fixing the flaw. The term zero day may refer to the vulnerability itself, or an attack that has zero days between the time the vulnerability is discovered and the first attack. Once a zero-day vulnerability has been made public, it is known as an n-day or one-day vulnerability.

76
Q

DoS (disk operating system)

A

DOS (Disk Operating System) can refer to a computer operating system that is loaded from a disk drive or to an operating system based on Microsoft Disk Operating System (MS-DOS).

77
Q

Which of the following reconnaissance attack tools are used to search the publicly available IP address to identify the address that are active?

1) ping sweeps
2) packet sniffers
3) port scans
4) internet queries

A

ping sweeps

78
Q

ping sweepps

A

A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers). Whereas a single ping will tell you whether one specified host computer exists on the network, a ping sweep consists of ICMP (Internet Control Message Protocol) ECHO requests sent to multiple hosts. If a given address is live, it will return an ICMP ECHO reply. Ping sweeps are among the older and slower methods used to scan a network.

79
Q

VLANs

A

A VLAN (virtual LAN) abstracts the idea of the local area network (LAN) by providing data link connectivity for a subnet. One or more network switches may support multiple, independent VLANs, creating Layer 2 (data link) implementations of subnets. A VLAN is associated with a broadcast domain. It is usually composed of one or more Ethernet switches.

80
Q

switch

A

A network switch (also called switching hub, bridging hub, officially MAC bridge) is a computer networking device that connects devices on a computer network by using packet switching to receive, process, and forward data to the destination device.