Networking Terms Flashcards

1
Q

WEP

A

Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wired Equivalent Privacy

A

WEP is a type of security protocol that was commonly used to secure wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SSH

A

Secure Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Secure Shell

A

A secure network protocol used to log into and execute commands on a remote system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FTP

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

File Transfer Protocol

A

A network protocol used to transfer files from one system to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Simple Mail Transfer Protocol

A

A protocol used to send and receive emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SMTP

A

Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HTTP

A

Hyper Text Transfer Protcol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hyper Text Transfer Protocol

A

A client-server protocol used to send and receive data over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SMB

A

Server Message Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Server Message Block

A

A protocol used to share files, printers, and other resources in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NFS

A

Network File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network File System

A

A protocol used to access files over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SNMP

A

Simple Network Management Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Simple Network Management Protocol

A

A protocol used to manage network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WPA

A

Wifi Protected Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Wifi Protected Access

A

WPA is a wireless security protocol that uses a password to protect wireless networks from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TKIP

A

Temporal Key Integrity Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Temporal Key Integrity Protocol

A

TKIP is also a security protocol used in wireless networks but less secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Network Time Protocol

A

It is used to synchronize the timing of computers on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

NTP

A

Network Time Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

VLAN

A

Virtual Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Virtual Local Area Network

A

It is a way to segment a network into multiple logical networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

VTP

A

VLAN Trunking Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

VLAN Trunking Protocol

A

VTP is a Layer 2 protocol that is used to establish and maintain a virtual LAN (VLAN) spanning multiple switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

RIP

A

Routing Information Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Routing Information Protocol

A

RIP is a distance-vector routing protocol used in local area networks (LANs) and wide area networks (WANs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

OSPF

A

Open Shortest Path First

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Open Shortest Path First

A

It is an interior gateway protocol (IGP) for routing traffic within a single Autonomous System (AS) in an Internet Protocol (IP) network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

IGRP

A

Interior Gateway Routing Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Interior Gateway Routing Protocol

A

IGRP is a Cisco proprietary interior gateway protocol designed for routing within autonomous systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

EIGRP

A

Enhanced Interior Gateway Routing Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Enhanced Interior Gateway Routing Protocol

A

It is an advanced distance-vector routing protocol that is used to route IP traffic within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

PGP

A

Pretty Good Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Pretty Good Privacy

A

PGP is an encryption program that is used to secure emails, files, and other types of data.

35
Q

NNTP

A

Network News Transfer Protocol

36
Q

Network News Transfer Protocol

A

NNTP is a protocol used for distributing and retrieving messages in newsgroups across the internet.

37
Q

HSRP

A

Hot Standby Router Protocol

37
Q

CDP

A

Cisco Discovery Protocol

38
Q

Cisco Discovery Protocol

A

It is a proprietary protocol developed by Cisco Systems that allows network administrators to discover and manage Cisco devices connected to the network.

39
Q

Hot Standby Router Protocol

A

HSRP is a protocol used in Cisco routers to provide redundancy in the event of a router or other network device failure.

40
Q

VRRP

A

Virtual Router Redundancy Protocol

41
Q

STP

A

Spanning Tree Protocol

41
Q

Virtual Router Redundancy Protocol

A

It is a protocol used to provide automatic assignment of available Internet Protocol (IP) routers to participating hosts.

42
Q

Spanning Tree Protocol

A

STP is a network protocol used to ensure a loop-free topology in Layer 2 Ethernet networks.

43
Q

TACACS

A

Terminal Access Controller Access- Control System

44
Q

SIP

A

Session Initiation Protocol

44
Q

Session Initiation Protocol

A

It is a signaling protocol used for establishing and terminating real-time voice, video and multimedia sessions over an IP network.

45
Q

Terminal Access Controller Access-Control System

A

TACACS is a protocol that provides centralized authentication, authorization, and accounting for network access.

46
Q

VOIP

A

Voice Over IP

47
Q

Voice Over IP

A

VOIP is a technology that allows for telephone calls to be made over the internet.

47
Q

EAP

A

Extensible Authentication Protocol

48
Q

Extensible Authentication Protocol

A

EAP is a framework for authentication that supports multiple authentication methods, such as passwords, digital certificates, one-time passwords, and public-key authentication.

49
Q

LEAP

A

Lightweight Extensible Authentication Protocol

50
Q

Lightweight Extensible Authentication Protocol

A

LEAP is a proprietary wireless authentication protocol developed by Cisco Systems. It is based on the Extensible Authentication Protocol (EAP) used in the Point-to-Point Protocol (PPP).

51
Q

PEAP

A

Protected Extensible Authentication Protocol

52
Q

Protected Extensible Authentication Protocol

A

PEAP is a security protocol that provides an encrypted tunnel for wireless networks and other types of networks.

53
Q

SMS

A

Systems Management Server

54
Q

Systems Management Server

A

SMS is a systems management solution that helps organizations manage their networks, systems, and mobile devices.

55
Q

MBSA

A

Microsoft Baseline Security Analyzer

56
Q

Microsoft Baseline Security Analyzer

A

It is a free security tool from Microsoft that is used to detect potential security vulnerabilities in Windows computers, networks, and systems.

57
Q

SCADA

A

Supervisory Control and Data Acquistion

58
Q

Supervisory Control and Data Acquistion

A

It is a type of industrial control system that is used to monitor and control industrial processes, such as those in manufacturing, power generation, and water and waste treatment.

59
Q

VPN

A

Virtual Private Network

60
Q

Virtual Private Network

A

VPN is a technology that allows users to create a secure, encrypted connection to another network over the internet.

61
Q

IPsec

A

Internet Protocol Security

62
Q

Internet Protocol Security

A

IPsec is a protocol used to provide secure, encrypted communication over a network. It is commonly used in VPNs, or Virtual Private Networks, to create a secure tunnel between two devices.

63
Q

Point-to-point Tunneling Protocol

A

It is a protocol used to create a secure, encrypted tunnel for remote access.

63
Q

PPTP

A

Point-to-Point Tunneling Protocol

64
Q

NAT

A

Network Address Translation

65
Q

Network Address Translation

A

NAT is a technology that allows multiple devices on a private network to connect to the internet using a single public IP address. NAT works by translating the private IP addresses of devices on the network into a single public IP address, which is then used to connect to the internet.

66
Q

CRLF

A

Carriage Return Line Feed

67
Q

Carriage Return Line Feed

A

Combines two control characters to indicate the end of a line and a start of a new one for certain text file formats.

68
Q

AJAX

A

Asynchronous JavaScript and XML

69
Q

Asynchronous JavaScript and XML

A

Web development technique that allows creating dynamic web pages using JavaScript and XML/JSON.

70
Q

ISAPI

A

Internet Server Application Programming Interface

71
Q

Internet Server Application Programming Interface

A

Allows to create performance-oriented web extensions for web servers using a set of APIs.

72
Q

URI

A

Uniform Resource Identifier

73
Q

Uniform Resource Identifier

A

It is a syntax used to identify a resource on the Internet.

74
Q

URL

A

Uniform Resource Locator

75
Q

Uniform Resource Locator

A

Subset of URI that identifies a web page or another resource on the Internet, including the protocol and the domain name.

76
Q

IKE

A

Internet Key Exchange

77
Q

Internet Key Exchange

A

IKE is a protocol used to set up a secure connection between two computers. It is used in virtual private networks (VPNs) to provide authentication and encryption for data transmission, protecting the data from outside eavesdropping and tampering.

78
Q

GRE

A

Generic Routing Encapsulation

79
Q

Generic Routing Encapsulation

A

This protocol is used to encapsulate the data being transmitted within the VPN tunnel.

80
Q

RSH

A

Remote Shell

81
Q

Remote Shell

A

It is a program under Unix that allows executing commands and programs on a remote computer.