Les 1 Flashcards

(38 cards)

1
Q

6 x 2

A

mac adres

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IPv6

A

128 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

LAN

VLAN Virtual

A

WAN

local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

port forwarding

A

Port forwarding of port mapping is het doorsturen van een TCP- of UDP-pakket(User Datagram Protocol) in een
NAT-gateway om een intern netwerk aan een extern netwerk te koppelen door middel van poortnummers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ISP

A

Internet Service Provider which is a company providing Internet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

23

A

telnet is open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

22

A

SSH Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

25

A

SMTP

simple mail transfer protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

53

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

80

A

http

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

110

A

pop3 email ontvanger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

443

A

https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

143

A

imap mail synchronisatie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCP

A

Transmission Control Protocol (TCP) – a connection-oriented communications protocol that facilitates the exchange of messages between computing devices in a network. It is the most common protocol in networks that use the Internet Protocol (IP); together they are sometimes referred to as TCP/IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

UDP

A

User Datagram Protocol

In computer networking, the User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NAT

A

Network address translation (NAT) is a method of remapping an IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.

17
Q

MAN

A

Metropolitan Area Network (MAN) - A network infrastructure that spans a physical area larger than a LAN but smaller than a WAN (a city). MANs are typically operated by a single entity such as a large organization.

18
Q

SAN

A

Storage area network

A network infrastructure designed to support file servers and provide data storage, retrieval, and replication.

19
Q

The Internet Engineering Task Force (IETF)
Internet Corporation for Assigned Names and Numbers (ICANN)
The Internet Architecture Board (IAB)

20
Q

Intranet

21
Q

Extranet

22
Q

Internet

23
Q

DSL

A

Digital subscriber line
A system for sending and receiving information at high speeds over ordinary telephone lines
In some respects, DSL is superior to cable for Internet access.

24
Q

Common conections HOHO

A
Cabel
DSL
Cellular (Phone)
Satellite 
Dial-up-phone
25
Businesses Internet Connections
Dedicated Leased Line Ethernet WAN DSL Satelite
26
Dedicated Lease Line
Leased lines are actually reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
27
Network Architecture
Fault Tolerance Scalability Quality of Service (QoS) Security
28
Fault Tolerance
Use a packet-switched network | Having multiple paths to a destination is known as redundancy.
29
circuit-switched networks
A circuit-switched network is one that establishes a dedicated circuit between the source and destination before the users may communicate
30
QoS
Quality of Service Congestion occurs when the demand for bandwidth exceeds the amount available. Network bandwidth is measured in the number of bits that can be transmitted in a single second, or bits per second (bps). When simultaneous communications are attempted across the network, the demand for network bandwidth can exceed its availability, creating network congestion. When the volume of traffic is greater than what can be transported across the network, devices queue, or hold, the packets in memory until resources become available to transmit them. In the figure, one user is requesting a web page and another is on a phone call. With a QoS policy in place, the router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion.
31
Security
Confidentiality - Data confidentiality means that only the intended and authorized recipients can access and read data. Integrity - Data integrity means having the assurance that the information has not been altered in transmission, from origin to destination. Availability - Data availability means having the assurance of timely and reliable access to data services for authorized users.
32
BYOD
Bring your own device
33
Cloud Computing
``` Public Clouds for the general public like iCloud Private Clouds goverment expensive Hybrid Clouds both private and public Custom Clouds for health care/media for special needs ```
34
Powerline Networking
That uses existing electrical wiring to connect devices. The concept of “no new wires” means the ability to connect a device to the network PLC data communicate using the electricitynet.
35
Wireless Broadband
Wireless Internet Service Provider (WISP)
36
Security Threads
Viruses, worms Trojan horses malicious software and arbitrary code running on a user device Spyware and adware software installed on a user device that secretly collects information about the user Zero-day attacks also called zero-hour attacks - an attack that occurs on the first day that vulnerability becomes known Hacker attacks an attack by a knowledgeable person to user devices or network resources Denial of service attacks attacks designed to slow or crash applications and processes on a network device Data interception and theft an attack to capture private information from an organization’s network Identity theft an attack to steal the login credentials of a user in order to access private data
37
Security Solutions
Antivirus and antispyware Are used to protect end devices from becoming infected with malicious software. Firewall filtering This is used to block unauthorized access to the network. This may include a host-based firewall system that is implemented to prevent unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world. Dedicated firewall systems Are used to provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity. Access control lists (ACL) Are used to further filter access and traffic forwarding. Intrusion prevention systems (IPS) Are used to identify fast-spreading threats, such as zero-day or zero-hour attacks. Virtual private networks (VPN) Are used to provide secure access to remote workers.
38
WLAN
Wireless LAN