WGU D322 Section 4

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

PAN

Normally used for short-range communications, within a few feet, such as wireless headphones to a smartphone or a wireless mouse to a PC

2
New cards

LAN

Consist of a collection of computers in a single building or building complex. For example, the computers in a manufacturing building may be connected via a _________

3
New cards

WAN

Link systems over a greater distance, including machines on the opposite sides of the world

4
New cards

client/server model

A popular convention used for interprocess communication. The basic roles played by the processes are categorized as either a client making requests or a server satisfying client requests

5
New cards

Peer-to-peer (P2P)

Another model for interprocess communication. In this model, processers both request and provide service to each other. Instant messaging and interactive games played by users on multiple machines are both examples of _________

6
New cards

Distributed systems

Execute software as processes on more than one computer

7
New cards

Cluster computing

Uses many independent computers to provide computation or services comparable to those of a larger machine. Provides high availability as it is likely that at least one computer will be able to answer a request even when others are unavailable or broken down. In addition, can balance loads by automatically shifting requests among the members.

8
New cards

Grid computing

A type of distributed system that is more loosely coupled than clusters but still works together as a system to complete large tasks. Typically includes specialized software to make it easier to distribute the workload and data among the machines

9
New cards

Cloud computing

Provides large pools of shared computers that can be allocated to clients as needed. Allows users to collaborate or build web services without needing to know how many computers are working on the problem or where the relevant data is stored. Provides reasonable guarantees for reliability and scalability while raising concerns about security and privacy.

10
New cards

Transmission medium

Simply a component that carries data from one network device to another. There are two types: wired and wireless.

11
New cards

Network bandwidth

Typically measured in megabits per second (Mbps) and gigabits (Gbps) per second. (Note the distinction between Mbps and MB. One megabit is equivalent to 1,000 kilobits, whereas one megabyte is equivalent to 1,024 kilobytes.)

12
New cards

Coaxial cables

Have an outer plastic that is used in computer networks and to deliver cable TV services. First used commercially used in the 1940s, it is used for both baseband and broadband data communication services. Cable modems and televisions typically use _______

13
New cards

Baseband

A signal at a very narrow frequency range on which data or information is superimposed and then transmitted. Examples include Ethernet LANs and serial cables.

14
New cards

Broadband

Considered high-capacity transmission technologies that are used to transmit data, voice, and video across long distances and at high speeds. Examples include coaxial cable, fiber optic cable, and radio waves.

15
New cards

Fiber-optic cable

Uses the concept of reflection of light through a core made up of glass or plastic. The core is surrounded by a less dense glass or plastic covering called the cladding. _______ are able to transmit large volumes of data. Their bandwidth can provide up to 26,000 times the bandwidth of the twisted pair wires.

16
New cards

Repeaters

Extend the range of cabling types so connections can be made by increasing the strength of the network signal.

17
New cards

Bridges

Used to connect to different types of network and provide management of the message. For example, _______ can connect a twisted pair and coaxial network. _______ analyzes the network message and will only bridge the network if a message is addressed to a device on the other side.

18
New cards

Switches

Used on LANs to reduce network traffic by management of network messages. For example, on a 100-device network, a _______ would only send one message to the destination device. This management example would create 99% less traffic.

19
New cards

Routers

The device that makes the internet possible. Connected to your LAN acts as gateway to the internet. Manage network traffic by having a routing table of known devices. If a destination address is unknown, it will forward the message to another until the message reaches the correct address.

20
New cards

ICANN

Internet Corporation for Assigned Names and Numbers. A nonprofit organization that coordinates the internet's operations, awards blocks of consecutively numbered IP addresses to ISPs.

21
New cards

TLD

Top-Level Domain

22
New cards

hypertext transfer protocol (HTTP)

As web servers and browsers became more sophisticated, traditional networks became handled by web pages using the powerful _______

23
New cards

SMTP

Simple Mail Transfer Protocol

24
New cards

DNS

Domain Name System

25
New cards

POP3

Post Office Protocol version 3

26
New cards

IMAP

Internet Message Access Protocol

27
New cards

VoIP

Voice over Internet Protocol - used for voice communication over the Internet

28
New cards

CDNs

Content Delivery Networks

29
New cards

URL

Uniform Resource Locator - includes the protocol, domain, and all subdomains, as well as the resource path ID and name of the document. This information collectively indicates the location of the document on the server.

30
New cards

HTML

A standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on World Wide Web pages - focuses on appearance.

31
New cards

XML

Extensible Markup Language - emphasizes semantics.

32
New cards

Malware (malicious software)

Any software intentionally designed to cause damage to a computer, server, client, or computer network.

33
New cards

Virus

Software program that infects a computer by inserting itself into programs that already reside in the machine.

34
New cards

Worm

An autonomous program that forwards copies of itself to other machines in a network and could result in detriment of individual machines or the operations of the network.

35
New cards

Spyware

Resides on a computer, collecting information about the computer's activities and reporting back to the spyware's instigator. Passwords or credit card numbers can be exposed.

36
New cards

Phishing

Technique used to obtain private information by simply asking for it. The perpetrator sends emails posing as a legitimate business asking for information.

37
New cards

Denial of Service (DoS)

The process of overloading a computer with messages and results in suffocating the network resources.

38
New cards

Packet sniffing or Man-in-the-middle (MITM)

The attacker intercepts the data as it is traveling to or from the victim's device, including authentication credentials.

39
New cards

Brute force attack

This is where the attacker uses all possible combinations of characters to learn a user's password. There are multiple variations of this attack.

40
New cards

Dictionary attacks

Performed by the attacker by using an application and a large dictionary text file with just words. When the attacker runs the application, it tries identifying the password by trying hundreds or thousands of words per minute from that file.

41
New cards

Rainbow tables

Try to identify the hash value of the password, then convert it back to plain text.

42
New cards

Proxy server

Software that acts as an intermediary between a client and a server to shield the client from adverse actions of the server.

43
New cards

Network auditing software

Monitors network behaviors such as the origin and volume of traffic, looking for anomalies to proactively or reactively mitigate unwanted occurrences.

44
New cards

Antivirus software

Detects and removes known viruses from the network.

45
New cards

Encryption

Encodes information to keep it confidential even if the data is stolen.