Networking Terminology and Concepts

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/32

flashcard set

Earn XP

Description and Tags

These flashcards cover key terms and definitions related to networking concepts, protocols, and security risks.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards

Network

A collection of interconnected devices that can communicate with each other to share resources and information.

2
New cards

Internet

A global network of networks connecting millions of private, public, academic, business, and government networks using standardized communication protocols.

3
New cards

Bandwidth

The maximum rate of data transfer across a network path, typically measured in bits per second (bps). It indicates the capacity of the network to transmit data.

4
New cards

Latency

The time it takes for data to travel from the source to the destination across a network, usually measured in milliseconds (ms).

5
New cards

Jitter

The variation in latency over time in a network, which can cause packets to arrive out of order.

6
New cards

Datastream

A continuous flow of data transmitted over a network, consisting of various types of data including audio, video, or text.

7
New cards

Vint Cerf and Bob Kahn

The two engineers credited with designing the Internet's protocols, specifically the Transmission Control Protocol (TCP) and the Internet Protocol (IP).

8
New cards

Redundancy

In networking, the inclusion of extra components or connections that are not strictly necessary for functionality, providing backup in case of failure.

9
New cards

Protocol

A set of rules and conventions for communication between network devices, defining how data is transmitted, received, and interpreted.

10
New cards

Internet Protocol (IP)

A protocol crucial for routing data packets across networks, providing addressing to ensure data is sent to the correct destination.

11
New cards

IPv4 Address

A standard IPv4 address is 32 bits long and can provide approximately 4.3 billion unique IP addresses.

12
New cards

IPv6

The new version of IP that will eventually replace IPv4, using 128 bits for addressing and capable of providing approximately 340 undecillion unique IP addresses.

13
New cards

Domain

A human-readable address used to identify a location on the Internet, typically associated with a specific IP address.

14
New cards

Domain Name System (DNS)

A system that translates human-readable domain names into IP addresses, enabling users to access websites using easy-to-remember names.

15
New cards

Hypertext Transfer Protocol (HTTP)

A protocol used for transmitting hypertext (web pages) over the Internet, defining how messages are formatted and transmitted.

16
New cards

GET request

An HTTP method used to request data from a specified resource, typically a web page or file from a server.

17
New cards

Packet

A formatted unit of data carried by a packet-switched network, containing both the data being transmitted and control information for routing.

18
New cards

Transmission Control Protocol (TCP)

A connection-oriented protocol that ensures reliable data transmission by establishing a connection, sequencing packets, and providing error-checking.

19
New cards

User Datagram Protocol (UDP)

A connectionless protocol that allows for faster data transmission without the overhead of establishing a connection or ensuring reliability.

20
New cards

Cookie

A small piece of data stored on a user's device by a web browser while browsing a website, used to remember user preferences and session information.

21
New cards

SSL (Secure Sockets Layer)

An older protocol providing secure communication over a computer network, ensuring data integrity and confidentiality.

22
New cards

TLS (Transport Layer Security)

The modern version of SSL providing improved security features.

23
New cards

Certificate Authorities (CAs)

Entities that issue digital certificates to verify the identity of websites and encrypt data transmitted between users and servers.

24
New cards

DDoS attack

A Distributed Denial of Service attack that overwhelms a target server or network with traffic from multiple sources.

25
New cards

Man-in-the-Middle (MitM) attack

An attack where an attacker intercepts and potentially alters communication between two parties without their knowledge.

26
New cards

DNS Tunneling

A technique used to encode data within DNS queries and responses, allowing attackers to bypass network security.

27
New cards

SQL Injection

A code injection technique exploiting vulnerabilities in an application's software by inserting malicious SQL queries.

28
New cards

Phishing attack

A cyber attack that tricks individuals into providing sensitive information by masquerading as a trustworthy entity.

29
New cards

Ransomware

Malicious software that encrypts a victim's files, rendering them inaccessible until a ransom is paid to the attacker.

30
New cards

Rootkit

Malicious software designed to gain unauthorized access to a computer or network while hiding its presence.

31
New cards

Keylogger

Surveillance software that records keystrokes made by a user, capturing sensitive information.

32
New cards

Virus

A malicious program that attaches to legitimate files and spreads when those files are shared.

33
New cards

Worm

Standalone malware that replicates itself to spread across networks without user intervention.