1/60
Study Alot and Hard!
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Transmission Control Protocol (TCP)
Connection-oriented protocol that establishes a connection before sending data and ensures reliable, ordered delivery
User Datagram Protocol (UDP)
Connectionless protocol that sends data without establishing a connection and does not guarantee delivery
Connection-oriented
A type of communication where a session is established before data transfer
Connectionless
A type of communication where data is sent without establishing a session
HyperText Transfer Protocol (HTTP)
Protocol used to load web pages over the internet (port 80)
HyperText Transfer Protocol Secure (HTTPS)
Secure version of HTTP that encrypts data (port 443)
File Transfer Protocol (FTP)
Protocol used to transfer files between computers (port 21)
Secure File Transfer Protocol (SFTP)
Secure version of FTP that uses encryption (port 22)
Secure Shell (SSH)
Protocol used for secure remote login and command execution (port 22)
Telnet
Protocol used for remote login that is not secure (port 23)
Remote Desktop Protocol (RDP)
Protocol used to remotely control another computer (port 3389)
Remote Desktop Services (RDS)
Microsoft service that allows multiple users to access desktops remotely
Lightweight Directory Access Protocol (LDAP)
Protocol used to access and manage directory services
Simple Mail Transfer Protocol (SMTP)
Protocol used to send emails (port 25)
Post Office Protocol Version 3 (POP3)
Protocol used to download emails from a server (port 110)
Internet Message Access Protocol (IMAP)
Protocol used to sync emails across devices (port 143)
Active Directory
Microsoft implementation of directory services based on LDAP
Domain Name System (DNS)
System that translates domain names into IP addresses
Dynamic Host Configuration Protocol (DHCP)
Protocol that automatically assigns IP addresses to devices
Voice over Internet Protocol (VoIP)
Technology used to make voice calls over the internet
Simple Network Management Protocol (SNMP)
Protocol used to monitor and manage network devices
Packet Internet Groper (ping)
Command used to test connectivity between devices
Trace Route (tracert)
Command used to display the path packets take across a network
Internet Protocol Configuration (ipconfig)
Command used to display IP settings on a device
PuTTY
Software used as an SSH or Telnet client for remote access
Windows Secure Copy Protocol (WinSCP)
File transfer client that supports secure protocols
Encapsulation
Process of wrapping data with headers as it moves through network layers
Tunneling
Process of sending one protocol inside another protocol
Logical Port
Virtual communication endpoint identified by a number (e.g., port 80)
Authentication
Process of verifying a user’s identity
Kerberos
Secure authentication protocol that uses tickets to verify identity
Strong Password
A password that is complex and difficult to guess
Firewall
Network Security system that is a barrier between trusted internal networks and untrusted external networks like the internet
Bandwidth
Maximum rate of data transfer across a network
Baseband
Transmission method using a single signal channel
Broadband
Transmission method using multiple signal channels
Daemon
A background service running on a server (e.g., httpd or ftpd)
Client Software
Software that requests services from a server (e.g., web browser)
Server Software
Software that provides services to clients (e.g., web server)
Apache HTTP Server
Web server software used to host websites
nginx
Web server software known for high performance
Microsoft Internet Information Services (IIS)
Web server software developed by Microsoft
Internet Corporation for Assigned Names and Numbers (ICANN)
Organization that oversees domain names and internet governance
Internet Assigned Numbers Authority (IANA)
Organization that manages IP addresses and protocol parameters
Internet Protocol Version 4 (IPv4)
32-bit addressing system used to identify devices on a network
IPv4 Address
A 32-bit number written as four decimal values between 0 and 255
Private IP Address
IP address used within a local network and not routable on the internet
Automatic Private Internet Protocol Addressing (APIPA)
Feature that assigns a 169.254.x.x address when DHCP fails
Subnet Mask
A value that separates the network portion and host portion of an IP address
Network ID
Portion of an IP address that identifies the network
Host ID
Portion of an IP address that identifies a device on the network
Classless Inter-Domain Routing (CIDR)
Method of allocating IP addresses using a suffix like /24
Default Gateway
Router address used to access other networks, including the internet
Subnet
Logical subdivision of a network based on IP addressing
Virtual Local Area Network (VLAN)
Logical grouping of devices within a network regardless of physical location
Workgroup
A group of computers that share resources in a peer-to-peer network
Internet Protocol Version 6 (IPv6)
128-bit addressing system designed to replace IPv4
IPv6 Address
A 128-bit address written in hexadecimal format
Hexadecimal
Base-16 numbering system using digits 0-9 and letters A-F
Zero Compression
Method used in IPv6 to shorten addresses by removing consecutive zeros
Encapsulation (IPv6 Tunneling)
Process of wrapping IPv6 packets inside IPv4 packets for compatibility