Shit to remember version 2 Flashcards

1
Q

Ad hoc mode

A

Ad hoc mode configures a device to communicate directly to another device using the wireless network adapter. With ad hoc mode, a central access point is not required to communicate to another device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IaaS

A

IaaS (Infrastructure as a Service) is a model that provides the computing platform, but no additional software. The user will usually configure the platform with the appropriate CPU, memory, and storage options, and the service provider is only responsible for the uptime and availability of the hardware platform. The user is generally responsible for all software
administration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DaaS

A

DaaS (Desktop as a Service) provides cloud-based desktop access and centralized workstation management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PaaS

A

PaaS (Platform as a Service) is a cloud model that provides a hosted application framework in the cloud. The customer is responsible for development their own application based on the cloud-based framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SaaS

A

SaaS (Software as a Service) provides a fully developed application for end-user access. The cloud service provider handles the hosting, application development, support, and all other aspects of application services. The users only need to login and use the available service from a
browser or app.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hybrid

A

A hybrid cloud deployment model combines both public cloud and private cloud resources. Public cloud resources would be publicly available, usually across the Internet. Private cloud resources would be restricted to a single organization or small group of organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Community

A

A community cloud model is often used by multiple organizations to build a pool of resources with their combined financial contributions. This multi-tenant model provides a shared cloud-based deployment to organizations with similar goals and objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LDAP

A

LDAP 389 tcp udp(Lightweight Directory Access Protocol) is a protocol used to access network directories, such as Microsoft’s Active Directory database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Transfer belt

A

The transfer belt is commonly used on color laser printers to collect
different toner colors and transfer them to the paper.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SCSI

A

SCSI (Small Computer System Interface) connectors are most commonly used with storage devices and storage subsystems. Legacy , ID #, chained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DVD-RW DL

A

A DVD-RW DL (Digital Versatile Disc, Read/Write, Dual-Layer)

provides 8.5 GB (gigabytes) of available storage space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CD-ROM

A

A CD-ROM (Compact Disc ROM) supports 700 MB (megabytes) of

storage space,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Blue-ray DL

A

Blue-ray DL (Dual-Layer) can store 50 GB of data, .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DB-9

A

A DB-9 connector, or less commonly, DE-9 (D-subminiature size E, 9 pin) is a connector used to send serial signals to another device. A DB-9 connector on a computer is commonly used to connect to the management interface of a switch, router, firewall, or another infrastructure device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Riser cards

A

Riser cards extend motherboard expansion slots 90-degrees and allow PCIe (Peripheral Component Interconnect Express) slots to be installed horizontally in a computer or server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

F-connector

A

F-connector
An F-connector is the screw-on connector commonly associated with the coax used for cable television or cable modems. F-connectors and coax are
not commonly used to connect external storage devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TRS

A

TRS (Tip/Ring/Sleeve) is a common connection type for analog headphones and other audio interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BNC

A

BNC (Bayonet Neill–Concelman) connectors are connectors that are commonly used for coaxial cables. BNC interfaces are commonly found on network and video connections. Connectors are often used for enterprise network wide area network links or video connections. The bayonet on a BNC connector twists and locks onto a BNC interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

RS-232

A

RS-232 (Recommended Standard 232) is a serial communication standard that commonly uses DB-25 (D-subminiature size B, 25 pin) or DE-9 (D-subminiature size E, 9 pin) as a connector type. This standard
technically refers to the signal sent between devices and not the connector type, although DB-25 and DE-9 are commonly related to RS-232

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

WMN

A

A WMN (Wireless Mesh Network) is commonly used by Internet of Things (IoT) devices to work together for long distance communications. WMN is not used by itself for Internet access.

21
Q

ISDN

A

ISDN (Integrated Services Digital Network) is a circuit-switched network type that communicates over twisted pair telephone lines. ISDN can be used to communicate with other ISDN devices over the telephone network Proxy .

22
Q

Proxies

A

Proxies are used to sit between a network conversation to provide additional management or security features.

23
Q

Hub

A

Hub
A hub does not make any forwarding decisions based on the contents of a
network frame. When the frame is received by the hub, it sends a copy of
that frame to every other interface on the hub.

24
Q

Unmanaged switch

A

Switches use the destination MAC (Media Access Control) address to
make forwarding decisions. These forwarding decisions are identical in
both managed and unmanaged switches

25
Q

Router

A

A router makes forwarding decisions based on the destination IP (Internet
Protocol) address in the network traffic.

26
Q

Cable tester

A

A cable tester can quickly perform a wire map to determine if all of the
wires were properly crimped or punched down on both ends of the cable

27
Q

Tone generator

A

A tone generator places an analog audio tone onto the wires of a cable, and an inductive probe is then used on the other side to precisely identify the
cable that contains the tone signal. By moving the tone generator to each of the ten cables, the other cable end can easily be identified and labeled.

28
Q

Multimeter

A

A multimeter can be used to identify voltage levels and continuity, but it’s
not a useful tool for identifying the ends of two distantly located cables.

29
Q

Loopback plug

A

Loopback plugs are commonly used to troubleshooting physical network interfaces.

30
Q

SSO

A

SSO (Single Sign-on)

31
Q

Punch-down tool

A

Punch-down tools are used to reconnect wires, but only to punch-down
blocks such as 66 blocks or 110 blocks. For device connections, a crimper
is the only way to attach a new RJ45 connector.

32
Q

MAN (Metropolitan Area Network)

A

(Metropolitan Area Network) connects locations that are in the same city or metropolitan area. Once the distance is outside the scope of
the immediate metro area, the connection is categorized as a WAN (Wide
Area Network).

33
Q

Repeater

A

Repeaters will regenerate signals to extend the overall distance of a
network link.

34
Q

F-connectors

A

F-connectors are the threaded connectors commonly used on cable television
and cable modem coax cables.

35
Q

WAP

A

A WAP (Wireless Access Point) is a device that bridges the 802.11 wireless network together with a wired Ethernet network

36
Q

PRL

A

Some cellular provides will maintain a PRL (Preferred Roaming List) that
the phone uses to connect to the desired cellular tower

37
Q

Emulation

A

The best environment for running an application is the system architecture in which it was originally designed. However, there may be instances
where the original architecture may be unavailable. In those instances, it may be possible to emulate the original system architecture on a completely different computing system.

38
Q

Twisted pair copper

A

DSL (Digital Subscriber Line) networks use the same twisted pair copper
as traditional phone lines.

39
Q

Coax

A

Coaxial cables are commonly associated with cable television and cable
modem networks

40
Q

FireWire

A

Although the name FireWire is an Apple trademark, the IEEE 1394
standard was used by other manufacturers with the names i.LINK, Lynx,
and others. FireWire connectors cannot be plugged in face up or face
down.

41
Q

Infrastructure mode

A

Infrastructure mode uses an access point to communicate with other
devices on the network. Ad hoc mode communicates directly to another
device without using an access point

42
Q

Long Term Evolution

A

Long Term Evolution, or LTE, is a converged standard used by mobile providers to provide high-speed communication over cellular frequencies.

43
Q

Integrated Services Digital Network

A

Integrated Services Digital Network (ISDN) is a wired networking standard that provides digital communication over twisted pair copper

44
Q

On-demand

A

The characteristic of on-demand self-service is an important aspect of
cloud computing. With an on-demand process, system administrators can
instantly create, modify, or delete services. This provides the flexibility to
build an application infrastructure for any service at any time.

45
Q

Resource pooling

A

It’s common to place all of the computing power in one place to use for all
cloud services. As more resources are needed, they are allocated from this
central pool of resources.

46
Q

WEP

A

IV - Initialization Vectors

47
Q

EPA

A

PSK - Pre Shared Keys

48
Q

WPA2

A

AES - Advanced Encryption system

49
Q

WPA/WPA2

A

TKIP - Temporal Key Integrity Protocol