Ch. 13-20 Flashcards

(145 cards)

1
Q

Multiplexer

A

Takes a circuit and combines it with a few hundred other circuits into a single complex circuit on one wire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FDM

A

Frequency Division Multiplexing - process of keeping every separate call in its own unique frequency range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Circuit Switching

A

Physically connecting two phones together on one circuit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A repeater

A

Takes the entire digital signal and re-creates it out the other end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Last Mile

A

The connection from a central office to individual users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DS0

A

Digital Signal Rate - Converts analog sound into 8-bit chunks 8000 times a second creating a data stream.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Modem

A

A modulator takes a digital signal and converts it into an analog signal. A demodulator takes an analog signal and converts it into a digital signal. A modem does both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

T1 connection

A

A high-speed digital networking technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T1 Line

A

The specific, shielded, two-pair cabling that connects the two ends of a T1 connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CSU/DSU

A

Channel Service Unit/Digital Service Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DS1

A

Digital Signal 1 - A special signaling method. Uses a relatively primitive frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TDM

A

Time Division Multiplexing - The process of having frames that carry a portion of every channel in every frame on a regular interval.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

T3 Line

A

Supports a data rate of about 4 Mbps on a dedicated telephone connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

T1

A

24 channels, 1.544 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T3

A

672 channels, 44.736 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

E1

A

32 channels, 2.048 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

E3

A

512 channels, 34.368 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SONET

A

Synchronous Optical Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SDH

A

Synchronous Digital Hierarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

OC

A

Optical Carrier - standards denote the optical data-carrying capacity (in bps) of fiber-optic cables in networks conforming to the SONET standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

WDM

A

Wavelength Division Multiplexing - enables an individual single-mode fiber to carry multiple signals by giving each signal a different wavelength.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DWDM

A

Dense Wavelength Division Multiplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

STS

A

Synchronous Transport Signal - Consists of two parts: STS Payload and STS Overhead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

STS Payload

A

Carries data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
STS Overhead
Carries the signaling and protocol information.
26
Packet Switches
Machines that forward and store packets using any type of packet switching protocol.
27
Frame Relay
An extremely efficient packet-switching standard, designed for and used primarily with T-carriers. Switches packets quickly, but without any guarantee of data integrity at all.
28
ATM
Asynchronous Transfer Mode - A network technology originally used for high-speed LAN's. Integrated voice, video, and data on one connection, using short and fixed-length packets called cells to transfer information.
29
MPLS
Multiprotocol Label Switching - Adds an MPLS label that sits between the Layer 2 and Layer 3 information. Layer 3 is always IP, so MPLS labels sit between Layer 2 and the IP headers. Consists of four parts: Label, Cost of Service (CoS), S, Time to Live (TTL).
30
QoS
Quality of Service
31
FEC
Forwarding Equivalence Class - A group of devices that tend to send packets to the same place, such as a single broadcast domain of computers connected to a router.
32
LSR
Label Switching Router - Looks for and forwards packets based on their MPLS label.
33
LER
Label Edge Router - An MPLS router that has the job of adding MPLS labels to incoming packets that do not yet have a label.
34
LDP
Label Distribution Protocol - LSR's and LER's use the LDP to communicate dynamic information about their state.
35
BERT
Bit Error Rate Test - Verifies the T-connection from end to end.
36
Dedicated Lines
Are always off the hook, they never hang up on each other.
37
Dial-up Lines
Have phone numbers, must dial up to make connection.
38
PSTN
Public Switched Telephone Network - POTS (plain old telephone service). Regular phone line.
39
LEC
Local Exchange Carrier - The telephone company (telco) that provides local connections and usually the one that owns your local central office.
40
IXC
Interexchange Carrier - provides long distance
41
Baud
One analog cycle on a telephone line.
42
Baud Rate
The number of bauds per second.
43
NIU
Network Interface Unit - The small box on the side of a home that accepts the incoming lines from the telephone company and then splits connections used in businesses.
44
UART
Universal Asynchronous Receiver/Transmitter - Takes the 8-bit-wide digital data and converts it into 1-bit-wide digital data and hands it to the modem for conversion to analog. This process is reversed for incoming data.
45
CCITT
International Telegraph and Telephone Consultative Committee now known as ITU (International Telecommunication Union)
46
V Standards
Define the speeds at which modems can modulate. V.92 Standard is the current standard.
47
V.42
Error Checking
48
V.42bis
Data compression
49
V.44
Data compression
50
MNP5
Both error checking and data compression
51
ISDN
Integrated Services Digital Network - process of sending telephone transmission across fully digital lines end-to-end.
52
B Channels
Bearer Channels - carry data and voice information using standard DS0 channels.
53
D Channels
Delta Channels - Carry setup and configuration information at 16 Kbps.
54
BRI
Basic Rate Interface - Most common setup is two B/one D. Setup uses only one physical line, but each B channel sends 64 Kbps, doubling the throughput total to 128 Kbps.
55
PRI
Primary Rate Interface - Type of ISDN, A full T1 line, carrying 23 B channels.
56
TA
Terminal Adapter
57
SPID
Service Profile ID
58
DSL
Digital Subscriber Line - A fully digital, dedicated connection.
59
SDSL
Symmetric DSL - Expensive, equal upload and download speed
60
ADSL
Asymmetric DSL - less expensive
61
VDSL
Very High Bitrate DSL - most expensive
62
SOHO
Small Office and Home Office
63
DSLAM
DSL Access Multiplexer - connects multiple customers to the internet.
64
PPPoE
Point-to-Point Protocol over Ethernet
65
DOCSIS
Data Over Cable Service Interface Specification
66
802.16
Wireless Standard - WIMAX
67
MANs
Metropolitan Area Networks
68
LTE
Long Term Evolution
69
HSPA
High-Speed Packet Access - 3G, HSPA+ is 4G
70
PON
Passive Optical Network - uses single fiber to the neighborhood switch and then individual fiber runs to each final destination.
71
BPL
Broadband over Power Line
72
PLC
Powerline Communications
73
Remote Access
Uses WAN and LAN connections to enable a computer user to log onto a network from the other side of a city, a state, or even the globe.
74
Dial-up to the Internet
Using a dial-up connection to your ISP
75
Private dial-up
Using a dial-up connection to your private network.
76
Virtual Private Network
Using an Internet connection to connect to a private network
77
Dedicated Connection
Using a non-dial-up connection to another private network or the Internet.
78
Remote Terminal
Using a terminal emulation program to connect to another computer
79
VoIP
Voice over Internet
80
RAS
Remote Access Server
81
Remote Terminal
A Connection on a faraway computer that enables you to control that computer as if you were sitting in front of it, logged in.
82
ICA
Independent Computer Architecture
83
RDP
Remote Desktop Protocol
84
RDC
Remote Desktop Connection
85
RTP
Real-Time Transport Protocol
86
SIP
Session Initiation Protocol
87
H.323
A VoIP standard that handles the initiation, setup, and delivery of VoIP sessions.
88
Worldwide, most voice and data SONET rings use this cell-based packet switching standard.
ATM
89
Which of the following is NOT a version of DSL service?
DDSL
90
Which of the following is the DSL device that is located in a central office, connecting multiple DSL customers to the Internet?
DSLAM
91
What is the maximum distance between a user’s demarc and the central office for all versions of DSL?
18,000 feet
92
A common standard for VOIP is RTP.
True
93
DSSS
Direct Sequence Spread Spectrum
94
FHSS
Frequency Hopping Spread Spectrum
95
OFDM
Orthogonal Frequency Division Multiplexing
96
802.11
Wireless Standard
97
WAP
Wireless Access Point
98
Ad hoc mode
A wireless networking mode where each nodes in direct contact with every other node in a decentralized free-for-all. Ad hoc mode is similar to the mesh topology.
99
Infrastructure Mode
Mode in which wireless networks use one or more wireless access points to connect the wireless network nodes centrally. This configuration is similar to the star topology of a wired network.
100
CSMA/CD
Carrier Sense Multiple Access with Collision Detection
101
CSMA/CA
Carrier Sense Multiple Access with Collision Avoidance
102
POE
Power Over Ethernet
103
Network Threat
Any number of things that share one essential feature: the potential to damage network data, machines, or users.
104
NAC
Network Access Control
105
Fault Tolerance
The capability of any system to continue functioning after soem part of the system has failed. RAID is an example of a hardware device that provides fault tolerance for hard drives.
106
Malware
Any program or code (macro, script, and so on) that's designed to do something on a system or network that you don't want to have happen.
107
Virus
A program that can make a copy of itself without you necessarily being aware of it. Some viruses can destroy or damage files, and generally the best protection is always to maintain backups of your files.
108
Worm
A very special form of virus. Unlike other viruses, a worm does not infect other files on the computer. Instead, it replicates by making copies of itself on other systems on a network by taking advantage of security weaknesses in networking protocols.
109
Macro
A specially written application macro (collection of commands) that performs the same functions as a virus. These macros normally autostart when the application is run and then make copies of themselves, often propagating across networks.
110
Trojan
A virus that masquerades as a file with a legitimate purpose, so that a user will run it intentionally. The classic example is a file that runs a game, but also causes some type of damage to the player's system.
111
Rootkit
A Trojan that takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools.
112
Adware
A program that monitors the types of Web sites you frequent and uses that information to generate targeted advertisements, usually pop-up windows.
113
Spyware
Any program that sends information about your system or your actions over the internet.
114
Social Engineering
The process of using or manipulating people inside the networking environment to gain access to that network from the outside.
115
Phishing
The attacker poses as some sort of trusted site, like an online version of your bank or credit card company, and solicits you to update your financial information, such as a credit card number.
116
Man in the Middle
A person inserts him into a conversation between two others, covertly intercepting traffic thought to be only between those other people.
117
DoS
Denial of Service attacks are the work of hackers whose only interest is in bringing a network to its knees by flooding the network with so manny requests that it becomes overwhelmed and ceses functioning.
118
Smurf Attack
When an attacker floods a network with ping packets sent to the broadcast address. The return address of the pings is spoofed to that of the intended victim.
119
DDoS
Distributed Denial of Service Attacks - Uses multiple computers under the control of a single operator to launch a devastating attack.
120
Zombie
A single computer under the control of an operator.
121
Botnet
A group of computers under the control of one operator.
122
Leeching
Using another person's wireless network without that person's permission.
123
Rogue Access Point
An unauthorized acces point (WAP) installed in a computer network.
124
Evil Twin
An attack that lures people into logging into a rogue access point that looks similar to a legitimate access point.
125
Internal Threats
All the things that a network's own users do to create problems on the network. Examples include accidental deletion of files, accidental damage to hardware devices or cabling, and abuse of rights and permissions.
126
Authentication
A person can prove their identity.
127
Multifactor Authentication
A form of authentication where a user must use two or more factors to prove their identity.
128
Knowledge Factor
Something the user knows, like a password or personal identification number (PIN).
129
Ownership Factor
Something the user has, like an ID card or security token.
130
Inherent Factor
Something that is part of the user, like a fingerprint or retinal scan.
131
Two-factor Authentication
Typically some sort of physical token that, when inserted, prompts for a password. Using what she has and knows.
132
Passwords
A series of characters that enables a user to gain access to a file, a folder, a PC or program.
133
Smart Devices
Devices such as credit cards, USB keys, etc. that you insert into your PC in lieu of entering a password.
134
Biometric Devices
Devices that scan fingerprints, retinas, or even the sound of the user's voice to provide a foolproof replacement for both passwords and smart devices.
135
Principle of Least Privilege
The control over what a legitimate account can do.
136
External Threats
Threats to your network through external means; examples include virus attacks and the exploitation of users, security holes in the OS, or the network hardware itself.
137
NAT
Network Address Translation
138
Port Filtering/Port Blocking
Preventing the passage of any TCP or UDP segments or datagrams through any ports other than the ones prescribed by the system administrator.
139
Stateless Filtering
.
140
Stateful filtering or Stateful inspection
.
141
MAC Filtering
.
142
Honeypot
A device (or set of functions within a firewall) that creates a fake network called a honeynet.
143
DMZ
Demilitarized Zone - A lightly protected network positioned between your firewall and the internet.
144
Intranet
A private, protected network.
145
NMAP
A utility program that scans a network to determine things like open ports, passive applications, and more.