1/74
Vocabulary flashcards based on the CCST Networking exam objectives.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
TCP/IP Model
A suite of communication protocols used to interconnect network devices on the internet.
OSI Model
A conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers.
LAN (Local Area Network)
A distinct logical grouping of networked computers and other devices within a network.
WAN (Wide Area Network)
A network that covers a broad area (e.g., any network whose links cross metropolitan, regional, or national boundaries).
MAN (Metropolitan Area Network)
A network spanning a metropolitan area.
CAN (Campus Area Network)
A network that interconnects devices within a limited geographical area.
PAN (Personal Area Network)
A network covering a very small area, usually a personal workspace.
WLAN (Wireless Local Area Network)
A wireless local area network.
Cloud Applications
Applications and services hosted on remote servers and accessed over the internet.
On-Premises Applications
Applications and services hosted on servers located within the organization's physical premises.
SaaS (Software as a Service)
A cloud computing model where a third-party provider makes applications available to customers over the Internet.
PaaS (Platform as a Service)
A cloud computing model that delivers hardware and software tools to users over the internet.
IaaS (Infrastructure as a Service)
A cloud computing model that provides virtualized computing resources over the internet.
TCP (Transmission Control Protocol)
A connection-oriented protocol that provides reliable, ordered, and error-checked delivery of a stream of bytes between applications running on hosts communicating via an IP network.
UDP (User Datagram Protocol)
A connectionless protocol that is useful for time-sensitive communications.
FTP (File Transfer Protocol)
A standard network protocol used for the transfer of computer files between a client and server on a computer network
SFTP (Secure File Transfer Protocol)
A network protocol that provides secure file transfer over a Secure Shell (SSH) connection.
TFTP (Trivial File Transfer Protocol)
A simple protocol for transferring files, employing UDP and lacking advanced features.
HTTP (Hypertext Transfer Protocol)
An application protocol for distributed, collaborative, hypermedia information systems.
HTTPS (Hypertext Transfer Protocol Secure)
The secure version of HTTP which uses SSL/TLS for encryption.
DHCP (Dynamic Host Configuration Protocol)
A network management protocol used on IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network.
DNS (Domain Name System)
A hierarchical and decentralized naming system for computers, services, or any resource connected to the Internet or a private network.
ICMP (Internet Control Message Protocol)
A protocol used to send error messages and operational information indicating success or failure when communicating with another IP address.
NTP (Network Time Protocol)
A networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks.
Private Addresses
IP addresses used for communication within a private network.
Public Addresses
IP addresses used for communication on the public internet.
NAT (Network Address Translation)
A networking method that remaps one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.
IPv4 Address
A numerical identifier that is assigned to a network interface for communications in an Internet Protocol network.
Subnet
A logical subdivision of an IP network.
Subnet Calculator
A calculator used to determine the subnet mask, network address, and broadcast address of a subnet.
CIDR (Classless Inter-Domain Routing)
A notation represented by a slash followed by a number, indicating the number of bits in the network prefix.
Subnet Mask
A bitmask that indicates the network and host portions of an IP address.
Broadcast Domain
A logical division of a network where all devices can reach each other via broadcast.
IPv6 Address
The next generation Internet Protocol address standard intended to replace IPv4.
Fiber, Copper, Twisted Pair
Physical cables used to connect devices in a network.
Coax, RJ-45, RJ-11, Fiber Connectors
Physical interfaces used to connect cables to network devices
Wi-Fi
Wireless networking technology based on the IEEE 802.11 standards.
Cellular
Wireless communication technology that uses radio waves to transmit data over long distances through a network of base stations.
Wired Network Technology
A network technology that uses physical cables to transmit data between devices.
Endpoint Devices
Devices that connect to a network, such as computers, mobile devices, and IoT devices.
Internet of Things (IoT)
A category of physical items embedded with sensors, processing ability, software, and other technologies, and that connect and exchange data with other devices and systems over the Internet or other communications networks.
Default Gateway
The default IP address that a device uses to forward traffic to a remote network or the Internet.
Layer 2 Switch
Operates at the data link layer (Layer 2) of the OSI model and forwards traffic based on MAC addresses.
Layer 3 Switch
Operates at the network layer (Layer 3) of the OSI model and forwards traffic based on IP addresses.
Troubleshooting Methodologies
A methodology used to systematically diagnose and resolve network issues.
Ticketing
The process of recording and tracking incidents, requests, and problems through their lifecycle.
Packet Analyzer
A computer program that can intercept and log traffic that passes over a network.
Ping
A command-line utility used check network connectivity between two nodes.
ipconfig
A command-line command used to display the configuration of network interfaces on Windows.
ifconfig
A command-line command used to display the configuration of network interfaces on Linux.
ip
A command-line command used to display the configuration of network interfaces.
tracert / traceroute
A command-line utility used to trace the route that packets take to a destination.
nslookup
A command-line tool used to query the Domain Name System (DNS) to obtain domain name or IP address mapping information.
Firewall
A network security system that controls the incoming and outgoing network traffic based on predetermined security rules.
Telnet
A networking protocol that allows a user to log into another computer over a network, to execute commands in a remote machine.
SSH (Secure Shell)
A cryptographic network protocol for operating network services securely over an unsecured network.
VPN (Virtual Private Network)
A technology that creates a secure, encrypted connection over a less secure network.
show commands
Basic operational commands on a Cisco network devices.
Confidentiality
The protection of information from unauthorized access.
Integrity
The assurance that information is accurate and complete.
Availability
Ensuring that authorized users have reliable and timely access to information and resources.
Authentication
The process of verifying the identity of a user, device, or other entity.
Authorization
The process of granting or denying access to specific resources or privileges.
Accounting
Tracking and recording user activity and resource usage.
Multifactor Authentication (MFA)
A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
Encryption
The process of encoding information to protect it from unauthorized access.
Certificates
A digital document that verifies the identity of a website or server.
Password
A secret word or phrase that is used to authenticate a user.
Active Directory
A directory service that provides a central repository for user accounts and other network resources.
Vulnerability
A weakness which can be exploited to perform unauthorized actions within a computer system.
Spam
Unsolicited or unwanted electronic messages.
Phishing
A type of social engineering attack used to steal user data, including login credentials and credit card numbers.
Malware
Software that is intended to damage or disable computers and computer systems.
Denial of Service
An attack intended to make a machine or network resource unavailable to its intended users.
WPA/WPA2/WPA3
Wireless security protocols used to secure Wi-Fi networks.