Terms 101-150 Flashcards

1
Q

What is a Hex

A

Hexadecimal describes a base-16 number system. That is, it describes a numbering system containing 16 sequential numbers as base units (including 0) before adding a new position for the next number. (Note that we’re using “16” here as a decimal number to explain a number that would be “10” in hexadecimal.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is NAS

A

Network-attached storage is a file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients. NAS is specialized for serving files either by its hardware, software, or configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is RIP

A

The Routing Information Protocol (RIP) is one of a family of IP Routing protocols, and is an Interior Gateway Protocol (IGP) designed to distribute routing information within an Autonomous System (AS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MITM attack

A

in cryptography and computer security, a man-in-the-middle, monster-in-the-middle, machine-in-the-middle, monkey-in-the-middle, meddler-in-the-middle or person-in-the-middle attack is a cyberattack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does ARP do?

A

Address Resolution Protocol (ARP) is a protocol or procedure that connects an ever-changing Internet Protocol (IP) address to a fixed physical machine address, also known as a media access control (MAC) address, in a local-area network (LAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is 53 DNS

A

Amazon Route 53 is a highly available and scalable cloud Domain Name System (DNS) web service. It is designed to give developers and businesses an extremely reliable and cost effective way to route end users to Internet applications by translating names like www.example.com into the numeric IP addresses like 192.0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Packet analyzer

A

A packet sniffer — also known as a packet analyzer, protocol analyzer or network analyzer — is a piece of hardware or software used to monitor network traffic. Sniffers work by examining streams of data packets that flow between computers on a network as well as between networked computers and the larger Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is VLAN hopping

A

VLAN hopping is a computer security exploit, a method of attacking networked resources on a virtual LAN. The basic concept behind all VLAN hopping attacks is for an attacking host on a VLAN to gain access to traffic on other VLANs that would normally not be accessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is session hijacking

A

In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is MX

A

An MX (mail exchange) record is an entry in your DNS. zone file which specifies a mail server to handle a domain’s email. You must configure an MX recordMail Exchanger record is a record in DNS that specifies which server is handles email messages. to receive email to your domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a RADIUS server

A

Remote Authentication Dial-In User Service is a networking protocol that provides centralized authentication, authorization, and accounting management for users who connect and use a network service. RADIUS was developed by Livingston Enterprises in 1991 as an access server authentication and accounting protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Clustering

A

A cluster network is two or more computing devices working together for a common computing purpose. … Load-balancing clusters consist of two or more computing systems, also called nodes. The workload of the network is spread over these nodes to increase the computing performance of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is NIC teaming

A

NIC teaming is the process of combining multiple network cards together for performance, load balancing, and redundancy reasons. Use NIC teaming to group two or more physical NICs into a single logical network device called a bond.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is OSPF

A

Open Shortest Path First is a routing protocol for Internet Protocol networks. It uses a link state routing algorithm and falls into the group of interior gateway protocols, operating within a single autonomous system. It is defined as OSPF Version 2 in RFC 2328 for IPv4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is IS-IS

A

Intermediate System to Intermediate System is a routing protocol designed to move information efficiently within a computer network, a group of physically connected computers or similar devices. It accomplishes this by determining the best route for data through a packet switching network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is PAT

A

Port Address Translation (PAT) is an extension of Network Address Translation (NAT) that permits multiple devices on a LAN to be mapped to a single public IP address to conserve IP addresses.

17
Q

What is T1

A

Digital Signal 1 is a T-carrier signaling scheme devised by Bell Labs. DS1 is the primary digital telephone standard used in the United States, Canada and Japan and is able to transmit up to 24 multiplexed voice and data calls over telephone lines.

18
Q

What is Rack diagrams

A

A rack diagram, also known as a rack elevation, is a visual representation of the organization of IT equipment within a server rack used to track and manage data center assets. Data Center Infrastructure Management (DCIM) software is used to automatically create rack elevation diagrams.

19
Q

What is a standardized UNC

A

(Universal Naming Convention) A standard for identifying servers, printers and other resources in a network, which originated in the Unix community. A UNC path uses double slashes or backslashes to precede the name of the computer. … are not used in UNC names.

20
Q

What is UTM

A

Urchin Tracking Module parameters are five variants of URL parameters used by marketers to track the effectiveness of online marketing campaigns across traffic sources and publishing media. They were introduced by Google Analytics’ predecessor Urchin and, consequently, are supported out-of-the-box by Google Analytics.

21
Q

What is a Sticky Mac

A

Persistent MAC learning or sticky MAC is a port security feature where dynamically learned MAC addresses are retained when a switch or interface comes back online. … Prevent traffic loss from trusted workstations and servers since there is no need to relearn MAC address after a restart.

22
Q

What is Frame relay

A

Frame Relay is a standardized wide area network technology that specifies the physical and data link layers of digital telecommunications channels using a packet switching methodology.

23
Q

What is penetration testing

A

A penetration test, colloquially known as a pen test or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment.