Mike Meyers Network + terms

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/813

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

814 Terms

1
New cards

3G

Third generation wireless data standard for cell phones and other mobile devices. 3G matured over time until Evolved High-Speed Packet Access (HSPA+) became the final wireless 3G data standard. It transferred at theoretical maximum speeds up to 168 megabits per second (Mbps), although real-world implementations rarely passed 10 Mbps.

2
New cards

4G

Most popularly implemented as Long Term Evolution (LTE), a wireless data standard with theoretical download speeds of 300 Mbps and upload speeds of 75 Mbps.

3
New cards

4to6

Internet connectivity technology that encapsulates IPv4 traffic into an IPv6 tunnel to get to an IPv6 address

4
New cards

6in4

An IPv6 tunneling standard that can go through IPv4 Network Address Translation (NAT)

5
New cards

6to4

An IPv6 tunneling protocol that doesn't require a tunnel broker. It is generally used to directly connect two routers because it normally requires a public IPv4 address

6
New cards

8 Position 8 Contact (8P8C)

Four-pair connector used on the end of network cable. Often erroneously referred to as an RJ-45 connector

7
New cards

10 Gigabit Ethernet (10GbE)

A very fast Ethernet designation, with a number of fiber-optic and copper standards

8
New cards

10base2

The last true bus-standard network where nodes connected to a common, shared length of coaxial cable.

9
New cards

10BaseFL

Fiber-optic implementation of Ethernet that runs at 10 Mbps using baseband signaling. Maximum segment length is 2 km.

10
New cards

10BaseT

An Ethernet LAN designed to run on UTP cabling. Runs at 10 Mbps and uses baseband signaling. Maximum length for the cabling between the NIC and the hub (or the switch, the repeater, and so forth) is 100 m.

11
New cards

10BaseER/10GBaseEW

A 10 GbE standard using 1550-nm single-mode fiber. Maximum cable length up to 40 km

12
New cards

10GBaseLR/10GBaseLW

A 10 GbE standard using 1310-nm single-mode fiber. Maximum cable length up to 10 km.

13
New cards

10GBaseSR/10GBaseSW

A 10 GbE standard using 850-nm multimode fiber. Maximum cable length up to 300 m.

14
New cards

10GBaseT

A 10 GbE standard designed to run on CAT 6a UTP cabling. Maximum cable length of 100 m.

15
New cards

66 block

Patch panel used in telephone networks; displaced by 110 blocks in networking

16
New cards

100BaseFX

An Ethernet LAN designed to run on fiber-optic cabling. Runs at 100 Mbps and uses baseband signaling. Maximum cable length is 400 m for half-duplex and 2 km for full-duplex.

17
New cards

100BaseT

An Ethernet LAN designed to run on UTP cabling. Runs at 100 Mbps, uses baseband signaling, and uses two pairs of wires on CAT 5 or better cabling.

18
New cards

100BaseT4

An Ethernet LAN designed to run on UTP cabling. Runs at 100 Mbps and uses four-pair CAT 3 or better cabling. Made obsolete by 100BaseT.

19
New cards

100BaseTX

The technically accurate but little-used name for 100BaseT.

20
New cards

110 block

Also known as a 110-punchdown block, a connection gridwork used to link UTP and STP cables behind an RJ-45 patch panel.

21
New cards

110-punchdown block

The most common connection used on the back of an RJ-45 jack and patch panels.

22
New cards

110-Punchdown Tool

See Punchdown Tool.

23
New cards

802 committee

The IEEE committee responsible for all Ethernet standards.

24
New cards

802.1X

A port-authentication network access control mechanism for networks.

25
New cards

802.3 (Ethernet)

See Ethernet.

26
New cards

802.3ab

The IEEE standard for 1000BaseT.

27
New cards

802.3z

The umbrella IEEE standard for all versions of Gigabit Ethernet other than 1000BaseT.

28
New cards

802.11

See IEEE 802.11.

29
New cards

802.11a

Wireless networking standard that operates in the 5-GHz band with a theoretical maximum throughput of 54 Mbps.

30
New cards

802.11ac

A wireless standard that operates at 5GHz and claims to provide wireless speeds of 1Gbps or higher.

31
New cards

802.11a-ht

Along with the corresponding 802.11g-ht standard, technical terms for mixed mode 802.11a/802.11g operation. In mixed-mode, both technologies are simultaneously supported.

32
New cards

802.11b

The first popular wireless standard, operates in the frequency range of 2.4 GHz and offers throughput of up to 11 Mbps

33
New cards

802.11g

Older wireless standard that operates on the 2.4-GHz band with a maximum throughput of 54 Mbps. Superseded by 802.11n

34
New cards

802.11g-ht

Along with the corresponding 802.11a-ht standard, technical terms for mixed mode 802.11a/802.11g operation. In mixed mode, both technologies are simultaneously supported

35
New cards

802.11i

A wireless standard that added security features.

36
New cards

802.11n

An 802.11 standard that increases the transfer speeds and adds support for multiple in/multiple out (MIMO) by using multiple antennas. 802.11n can operate on either the 2.4 or 5-GHz frequency band and has a maximum throughput of 400 Mbps. Superseded by 802.11ac

37
New cards

802.16

See IEEE 802.16

38
New cards

1000BaseCX

A Gigabit Ethernet standard using unique copper cabling, with a 25-m maximum cable distance.

39
New cards

1000BaseLX

A Gigabit Ethernet standard using single-mode fiber cabling, with a 5-km maximum cable distance.

40
New cards

1000BaseSX

A Gigabit Ethernet standard using multimode fiber cabling, with a 220- to 500-m maximum cable distance.

41
New cards

1000BaseT

A Gigabit Ethernet standard using CAT 5e/6 UTP cabling, with a 100-m maximum cable distance.

42
New cards

1000BaseTX

Short-lived gigabit-over-UTP standard from TIA/EIA. Considered a competitor to 1000BaseT, it was simpler to implement but required the use of CAT 6 cable.

43
New cards

1000BaseX

An umbrella Gigabit Ethernet standard. Also known as 802.3z. Comprises all Gigabit standards with the exception of 1000BaseT, which is under the 802.3ab standard.

44
New cards

A records

DNS records that map host names to their IPv4 addresses

45
New cards

AAA (authentication, authorization, and accounting)

See authentication, authorization, and accounting

46
New cards

AAAA records

DNS records that map host names to their IPv6 addresses

47
New cards

absorption

Quality of some building materials (such as brick, sheetrock and wood) to reduce or eliminate a Wi-Fi signal

48
New cards

acceptable use policy

A document that defines what a person may and may not do on an organization's computers and networks.

49
New cards

access control

All-encompassing term that defines the degree of permission granted to use a particular resource. That resource may be anything from a switch port to a particular file to a physical door within a building.

50
New cards

access control list (ACL)

A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource.

51
New cards

Access Control Server (ACS)

Cisco program/process/server that makes the decision to admit or deny a node based on posture assessment. From there, the ACS directs the edge access device to allow a connection or to implement a denial or redirect.

52
New cards

access port

Regular port in a switch that has been configured as part of a VLAN. Access ports are ports that hosts connect to. They are the opposite of a trunk port, which is only connected to a trunk port on another switch.

53
New cards

Active directrory

A form of directory service used in networks with Windows servers. Creates an organization of related computers that share one or more Windows domains

54
New cards

activity light

An LED on a NIC, hub, or switch that blinks rapidly to show data transfers over the network.

55
New cards

ad hoc mode

A wireless networking mode where each node is in direct contact with every other node in a decentralized free-for-all. Ad hoc mode is similar to the mesh topology.

56
New cards

Adaptive Network Technology (ANT+)

A low-speed, low-power networking technology; used in place of Bluetooth for connecting devices, such as smart phones and exercise machines

57
New cards

Address Resolution Protocol (ARP)

A protocol in the TCP/IP suite used with the command-line utility of the same name to determine the MAC address that corresponds to a particular IP address

58
New cards

administrative accounts

Specialized user accounts that have been granted sufficient access rights and authority to manage specified administrative tasks. Some administrative accounts exist as a default of the system and have all authority throughout the system. Others must be explicitly assigned the necessary powers to administer given resources.

59
New cards

ADSL (asymmetric digital subscriber line)

See Asymmetric Digital Subscriber Line (ADSL).

60
New cards

Advanced Encryption Standard (AES)

A block cipher created in the late 1990s that uses a 128-bit block size and a 128-, 192-, or 256-bit key size. Practically uncrackable.

61
New cards

adware

A program that monitors the types of Web sites you frequent and uses that information to generate targeted advertisements, usually pop-up windows.

62
New cards

agent

In terms of posture assessment, refers to a client that has its posture checked and presented by non-permanent software, such as a Web app program, that executes as part of the connection process. Agentless software does not run directly within the client but is run on behalf of the client

63
New cards

aggregation

A router hierarchy in which every router underneath a higher router always uses a subnet of that router's existing routes.

64
New cards

air gap

The act of physically separating a network from every other network.

65
New cards

Aircrack-ng

An open source tool for penetration testing many aspects of wireless networks.

66
New cards

alert

Proactive message sent from an SNMP manager as a result of a trap issued by an agent. Alerts may be sent as e-mail, SMS message, voicemail, or other avenue

67
New cards

algorithm

Set of rules for solving a problem in a given number of steps.

68
New cards

allow

Permission for data or communication to pass through or to access a resource. Specific allowances through a firewall are called exceptions.

69
New cards

American Registry for Internet Numbers (ARIN)

A Regional Internet Registry (RIR) that parcels out IP addresses to large ISPs and major corporations in North America

70
New cards

amplification

The aspect of a DoS attack that makes a server do a lof of processing and responding

71
New cards

amplified DOS attack

The type of DoS attack that sends a small amount of traffic to a server, which produces a much larger response from the server that is sent to a spoofed IP address, overwhelming a victim machine

72
New cards

Angled Physical Contact (APC)

Fiber-optic connector that makes physical contact between two fiber-optic cables. It specifies an 8-degree angle to the curved end, lowering signal loss. APC connectors have less connection degradation from multiple insertions compared to other connectors.

73
New cards

anti-malware program

Software that attempts to block several types of threats to a client including viruses, Trojan horses, worms, and other unapproved software installation and execution.

74
New cards

antivirus

Software that attempts to prevent viruses from installing or executing on a client. Some antivirus software may also attempt to remove the virus or eradicate the effects of a virus after an infection.

75
New cards

anycast

A method of addressing groups of computers as though they were a single computer. Anycasting starts by giving a number of computers (or clusters of computers) the same IP address. Advanced routers then send incoming packets to the closest of the computers.

76
New cards

Apache HTTP Server

An open source HTTP server program that runs on a wide variety of operating systems.

77
New cards

Application layer

See Open System Interconnection (OSI) Seven-Layer Model.

78
New cards

application log

Tracks application events, such as when an application opens or closes. Different types of application logs record different events.

79
New cards

Application Programming Interface (API)

Shared functions, subroutines, and libraries that allow programs on a machine to communicate with the OS and other programs.

80
New cards

application/context aware

Advanced feature of some stateful firewalls where the content of the data is inspected to ensure it comes from, or is destined for, an appropriate application. Context-aware firewalls look both deeply and more broadly to ensure that the data content and other aspects of the packet are appropriate to the data transfer being conducted. Packets that fall outside these awareness criteria are denied by the firewall.

81
New cards

approval process

One or more decision makers consider a proposed change and the impact of the change, including funding. If the change, the impact, and the funding are acceptable, the change is permitted.

82
New cards

archive

The creation and storage of retrievable copies of electronic data for legal and functional purposes

83
New cards

archive bit

An attribute of a file that shows whether the file has been backed up since the last change. Each time a file is opened, changed, or saved, the archive bit is turned on. Some types of backups turn off the archive bit to indicate that a good backup of the file exists on tape.

84
New cards

Area ID

Address assigned to routers in an OSPF network to prevent flooding beyond the routers in that particular network. See also Open Shortest Path First (OSPF)

85
New cards

areas

Groups of logically associated OSPF routers designed to maximize routing efficiency while keeping the amount of broadcast traffic well managed. Areas are assigned a 32-bit value that manifests as an integer between 0 and 4294967295 or can take a form similar to an IP address, for example, "0.0.0.0."

86
New cards

ARP

See Address Resolution Protocol (ARP).

87
New cards

ARP cache poisoning

A man-in-the-middle attack, where the attacker associates his MAC address with someone else's IP address (almost always the router), so all traffic will be sent to him first. The attacker sends out unsolicited ARPs, which can either be requests or replies.

88
New cards

arping

A command used to discover hosts on a network, similar to ping, but that relies on ARP rather than ICMP. The arping command won't cross any routers, so it will only work within a broadcast domain. See also Address Resolution Protocol (ARP) and ping.

89
New cards

asset disposal

Reusing, repurposing or recycling computing devices that follows system life cycle policies in many organizations

90
New cards

asset management

Managing each aspect of a network, from documentation to performance to hardware.

91
New cards

Asymmetric Digital Subscriber Line (ADSL)

A fully digital, dedicated connection to the telephone system that provides download speeds of up to 9 Mbps and upload speeds of up to 1 Mbps.

92
New cards

Asymmetric-Key Algorithm

An encryption method in which the key used to encrypt a message and the key used to decrypt it are different, or asymmetrical.

93
New cards

Asynchronous Transfer Mode (ATM)

A network technology that runs at speeds between 25 and 622 Mbps using fiber-optic cabling or CAT 5 or better UTP.

94
New cards

attenuation

A process that proves good data traffic truly came from where it says it originated by verifying the sending and receiving users and computers

95
New cards

Authentication, Authorization, and Accounting (AAA)

A security philosophy wherein a computer trying to connect to a network must first present some form of credential in order to be authenticated and then must have limitable permissions within the network. The authenticating server should also record session information about the client

96
New cards

authentication server (AS)

In Kerberos, a system that hands out Ticket-Granting Tickets to clients after comparing the client hash to its own. see also Ticket-Granting Ticket (TGT)

97
New cards

authoritative DNS servers

DNS servers that hold the IP addresses and names of systems for a particular domain or domains in special storage areas called forward lookup zones. they also have reverse lockup zones

98
New cards

Authoritative Name Server

Another name for Authoritative DNS servers.

99
New cards

authorization

A step in the AAA philosophy during which a client's permissions are decided upon

100
New cards

Autonomous System (AS)

One or more networks that are governed by a single protocol, which provides routing for the Internet backbone.