CCST Networking Exam Objectives Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/74

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards based on the CCST Networking exam objectives.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

75 Terms

1
New cards

TCP/IP Model

A suite of communication protocols used to interconnect network devices on the internet.

2
New cards

OSI Model

A conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers.

3
New cards

LAN (Local Area Network)

A distinct logical grouping of networked computers and other devices within a network.

4
New cards

WAN (Wide Area Network)

A network that covers a broad area (e.g., any network whose links cross metropolitan, regional, or national boundaries).

5
New cards

MAN (Metropolitan Area Network)

A network spanning a metropolitan area.

6
New cards

CAN (Campus Area Network)

A network that interconnects devices within a limited geographical area.

7
New cards

PAN (Personal Area Network)

A network covering a very small area, usually a personal workspace.

8
New cards

WLAN (Wireless Local Area Network)

A wireless local area network.

9
New cards

Cloud Applications

Applications and services hosted on remote servers and accessed over the internet.

10
New cards

On-Premises Applications

Applications and services hosted on servers located within the organization's physical premises.

11
New cards

SaaS (Software as a Service)

A cloud computing model where a third-party provider makes applications available to customers over the Internet.

12
New cards

PaaS (Platform as a Service)

A cloud computing model that delivers hardware and software tools to users over the internet.

13
New cards

IaaS (Infrastructure as a Service)

A cloud computing model that provides virtualized computing resources over the internet.

14
New cards

TCP (Transmission Control Protocol)

A connection-oriented protocol that provides reliable, ordered, and error-checked delivery of a stream of bytes between applications running on hosts communicating via an IP network.

15
New cards

UDP (User Datagram Protocol)

A connectionless protocol that is useful for time-sensitive communications.

16
New cards

FTP (File Transfer Protocol)

A standard network protocol used for the transfer of computer files between a client and server on a computer network

17
New cards

SFTP (Secure File Transfer Protocol)

A network protocol that provides secure file transfer over a Secure Shell (SSH) connection.

18
New cards

TFTP (Trivial File Transfer Protocol)

A simple protocol for transferring files, employing UDP and lacking advanced features.

19
New cards

HTTP (Hypertext Transfer Protocol)

An application protocol for distributed, collaborative, hypermedia information systems.

20
New cards

HTTPS (Hypertext Transfer Protocol Secure)

The secure version of HTTP which uses SSL/TLS for encryption.

21
New cards

DHCP (Dynamic Host Configuration Protocol)

A network management protocol used on IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network.

22
New cards

DNS (Domain Name System)

A hierarchical and decentralized naming system for computers, services, or any resource connected to the Internet or a private network.

23
New cards

ICMP (Internet Control Message Protocol)

A protocol used to send error messages and operational information indicating success or failure when communicating with another IP address.

24
New cards

NTP (Network Time Protocol)

A networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks.

25
New cards

Private Addresses

IP addresses used for communication within a private network.

26
New cards

Public Addresses

IP addresses used for communication on the public internet.

27
New cards

NAT (Network Address Translation)

A networking method that remaps one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.

28
New cards

IPv4 Address

A numerical identifier that is assigned to a network interface for communications in an Internet Protocol network.

29
New cards

Subnet

A logical subdivision of an IP network.

30
New cards

Subnet Calculator

A calculator used to determine the subnet mask, network address, and broadcast address of a subnet.

31
New cards

CIDR (Classless Inter-Domain Routing)

A notation represented by a slash followed by a number, indicating the number of bits in the network prefix.

32
New cards

Subnet Mask

A bitmask that indicates the network and host portions of an IP address.

33
New cards

Broadcast Domain

A logical division of a network where all devices can reach each other via broadcast.

34
New cards

IPv6 Address

The next generation Internet Protocol address standard intended to replace IPv4.

35
New cards

Fiber, Copper, Twisted Pair

Physical cables used to connect devices in a network.

36
New cards

Coax, RJ-45, RJ-11, Fiber Connectors

Physical interfaces used to connect cables to network devices

37
New cards

Wi-Fi

Wireless networking technology based on the IEEE 802.11 standards.

38
New cards

Cellular

Wireless communication technology that uses radio waves to transmit data over long distances through a network of base stations.

39
New cards

Wired Network Technology

A network technology that uses physical cables to transmit data between devices.

40
New cards

Endpoint Devices

Devices that connect to a network, such as computers, mobile devices, and IoT devices.

41
New cards

Internet of Things (IoT)

A category of physical items embedded with sensors, processing ability, software, and other technologies, and that connect and exchange data with other devices and systems over the Internet or other communications networks.

42
New cards

Default Gateway

The default IP address that a device uses to forward traffic to a remote network or the Internet.

43
New cards

Layer 2 Switch

Operates at the data link layer (Layer 2) of the OSI model and forwards traffic based on MAC addresses.

44
New cards

Layer 3 Switch

Operates at the network layer (Layer 3) of the OSI model and forwards traffic based on IP addresses.

45
New cards

Troubleshooting Methodologies

A methodology used to systematically diagnose and resolve network issues.

46
New cards

Ticketing

The process of recording and tracking incidents, requests, and problems through their lifecycle.

47
New cards

Packet Analyzer

A computer program that can intercept and log traffic that passes over a network.

48
New cards

Ping

A command-line utility used check network connectivity between two nodes.

49
New cards

ipconfig

A command-line command used to display the configuration of network interfaces on Windows.

50
New cards

ifconfig

A command-line command used to display the configuration of network interfaces on Linux.

51
New cards

ip

A command-line command used to display the configuration of network interfaces.

52
New cards

tracert / traceroute

A command-line utility used to trace the route that packets take to a destination.

53
New cards

nslookup

A command-line tool used to query the Domain Name System (DNS) to obtain domain name or IP address mapping information.

54
New cards

Firewall

A network security system that controls the incoming and outgoing network traffic based on predetermined security rules.

55
New cards

Telnet

A networking protocol that allows a user to log into another computer over a network, to execute commands in a remote machine.

56
New cards

SSH (Secure Shell)

A cryptographic network protocol for operating network services securely over an unsecured network.

57
New cards

VPN (Virtual Private Network)

A technology that creates a secure, encrypted connection over a less secure network.

58
New cards

show commands

Basic operational commands on a Cisco network devices.

59
New cards

Confidentiality

The protection of information from unauthorized access.

60
New cards

Integrity

The assurance that information is accurate and complete.

61
New cards

Availability

Ensuring that authorized users have reliable and timely access to information and resources.

62
New cards

Authentication

The process of verifying the identity of a user, device, or other entity.

63
New cards

Authorization

The process of granting or denying access to specific resources or privileges.

64
New cards

Accounting

Tracking and recording user activity and resource usage.

65
New cards

Multifactor Authentication (MFA)

A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.

66
New cards

Encryption

The process of encoding information to protect it from unauthorized access.

67
New cards

Certificates

A digital document that verifies the identity of a website or server.

68
New cards

Password

A secret word or phrase that is used to authenticate a user.

69
New cards

Active Directory

A directory service that provides a central repository for user accounts and other network resources.

70
New cards

Vulnerability

A weakness which can be exploited to perform unauthorized actions within a computer system.

71
New cards

Spam

Unsolicited or unwanted electronic messages.

72
New cards

Phishing

A type of social engineering attack used to steal user data, including login credentials and credit card numbers.

73
New cards

Malware

Software that is intended to damage or disable computers and computer systems.

74
New cards

Denial of Service

An attack intended to make a machine or network resource unavailable to its intended users.

75
New cards

WPA/WPA2/WPA3

Wireless security protocols used to secure Wi-Fi networks.