Term 151-200 Flashcards
what is a PoE
Power over Ethernet (PoE) is technology that passes electric power over twisted-pair Ethernet cable to powered devices (PD), such as wireless access points, IP cameras, and VoIP phones in addition to the data that cable usually carries.
What is netsh winsock
netsh winsock reset is a command in windows to recover the computer from any socket errors which arise when you download some unknown file, or due to some malicious script on the computer. Winsock settings contain your computer’s configuration for Internet connectivity.
What is Multicast
In computer networking, multicast is group communication where data transmission is addressed to a group of destination computers simultaneously. Multicast can be one-to-many or many-to-many distribution. Multicast should not be confused with physical layer point-to-multipoint communication.
What is CNAME
A Canonical Name record is a type of resource record in the Domain Name System that maps one domain name to another. This can prove convenient when running multiple services from a single IP address.
what is RDP
Remote Desktop Protocol is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software
what is Fingerprinting
What is a fingerprint in cybersecurity? … Fingerprinting (also known as Footprinting) is the art of using that information to correlate data sets to identify network services, operating system number and version, software applications, databases, configurations and more.
What is Social engineering
In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. This differs from social engineering within the social sciences, which does not concern the divulging of confidential information.
what is Smurf attack
The Smurf attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol packets with the intended victim’s spoofed source IP are broadcast to a computer network using an IP broadcast address.
What is PKI
A public key infrastructure is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption.