1/65
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
EAP
Authentication protocol supporting smart cards
RJ45
Network cable end often confused with a telephone plug
Cross-site scripting
Computer security vulnerability in web applications
Unicast
Single packet sent from a source to a destination on a network
Impact of outsourcing on network design
Meeting with the outsourcing company to determine impact
SMB
Client/server file-sharing protocol establishing long-term connections
Spanning tree protocol
Eliminates switching loops
SOAP
Protocol for exchanging structured information in Web Services
Reliability
Network measurement area monitoring health of links using end-to-end probes
Domain
Network model recommended for more than ten workstations
Cladding
Reflective material around the core of a fiber optic cable
Subnet
Subnet where an IP address resides based on given IP and subnet mask
OSPF DR election
Router with the highest OSPF priority setting wins as DR
VLAN
Partitioned layer-2 network creating distinct broadcast domains
SMTP
TCP/IP protocol for message exchange between email systems
Debugging
Process to monitor connection establishment on a serial link using PPP
HTTP port
TCP port for HTTP communication traffic
EULA
Typical software agreement
Hub in OSI model
Specified in the Physical layer
Debugging
Process to monitor connection establishment on a serial link using PPP
Physical layer
Layer of OSI model where an unplugged network cable issue occurs
Firmware
Essential for keeping hardware running effectively
Traceroute
Linux or UNIX specific command-line tool
Firewall design
Recommended approach for opening and closing ports
Cat 5 cable length
Maximum recommended length for a single run
Router installation
Inexpensive way to reduce network traffic for the short term
MPLS
Technology reducing latency and useful for voice and video services
Ether Channel
Feature to increase bandwidth by combining multiple physical links
Promiscuous mode
Feature to configure for packet sniffing on a hub
BwPing
Tool to measure bandwidth and response times between hosts using ICMP
Five-9s availability
Goal for a network to be available 99.999% of the time
IIS
Web server application by Microsoft for Microsoft Windows
CIRT tasks
Tasks performed by a Computer Incident Response Team
Subnet mask for two equal subnets
255.255.255.128
SMTP
TCP/IP protocol governing e-mail message delivery
cPanel
Unix-based web hosting control panel simplifying website hosting
WEP
Older wireless encryption strategy susceptible to brute force attacks
Dry-run
Initial test of a plan by conducting a structured walk-through
VA
Rating used to specify the size of a UPS
RAID 5
Stripe sets with parity RAID level
Cron
Time-based job scheduler in Unix-like operating systems
Business continuity planning scope
Primary focus on business processes
PPTP incorrect statement
PPTP is derived from L2TP
Wireless network configuration
WPA2, SSID visible, and 802.11n for temporary setup
Access control
System enabling control of access to areas and resources
Linus Torvalds
Individual after whom Linux is named
MAC
Unspecified term in the context provided
Application gateway
A type of firewall that applies security mechanisms to specific applications like FTP and Telnet servers, effective but can degrade performance.
Loopback address
Used in OSPF routing protocol to ensure a consistent router ID for the OSPF process.
DHCP scope
Client information and settings configured once a DHCP server is activated.
Peer-to-peer network
Characterized by decentralized administration, shared resources, and easy setup, lacking centralized authentication.
TCP/IP
Set of rules governing data transmission over the Internet.
RAID
Stands for Redundant Array of Independent Disks, used for data storage.
SSL
Protocol for secure data communication, especially over insecure networks like the Internet.
Crossover cable
Used to connect similar devices in a network, such as a computer to a switch.
NAT
Stands for Network Address Translation, a technique used in networking.
VPN
Technology for establishing secure connections between remote users and internal networks.
POP3
Protocol used to retrieve email from a remote server to a local client.
DMZ
Demilitarized Zone used in network security to isolate external-facing servers and services.
VPN
Protocol used for securely connecting to a remote network using a tunneling protocol.
Network layer
OSI layer responsible for logical addressing in networking.
WPA
Wireless encryption protocol providing strong security for wireless networks.
Switch
Device that connects multiple network segments and makes forwarding decisions based on MAC addresses.
IPv6
Internet Protocol version 6 with features like larger address space, improved security, and automatic configuration.
Private IP address ranges
Include 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, and 192.168.0.0 - 192.168.255.255.
Ping
Command used to test connectivity between two devices in a network.