NETWORK+ Terms C's Flashcards Preview

NETWORK+ Terms > NETWORK+ Terms C's > Flashcards

Flashcards in NETWORK+ Terms C's Deck (46):
1

A device that provides
Internet access over cable television
lines.

cable modem

2

A tool used to strip the sheathing from copper cabling.

cable stripper

3

A device used to check for electrical continuity along a length of cable.___ ___ is a generic term that can be applied to devices such as volt/ohm meters and
TDRs.

cable tester

4

A type of DNS server that operates the same
way as secondary servers except that a zone transfer does not take place when the this is started.

caching-only server

5

A protocol that enables multiple hosts on the
same network to share a set of IP addresses and thus provides failover redundancy. It is commonly used with routers and firewalls and can provide load balancing.

CARP (Common Address
Redundancy Protocol)

6

A signal that carries data.
The _____ signal is modulated to
create peaks and troughs, which
represent binary bits.

carrier

7

A process in which a detailed record of every change made to the network is documented.

change control

8

A communications path used for data transmission.

channel

9

A protocol that challenges a system to verify identity. ____ ___ ___ ___ is an improvement over Password Authentication
Protocol (PAP) in which one-way hashing is incorporated into a threeway handshake. RFC 1334 applies to both PAP and CHAP.

CHAP (Challenge Handshake
Authentication Protocol)

10

A basic method of error checking that involves calculating the sum of bytes in a section of data and then embedding the
result in the packet. When the packet
reaches the destination, the calculation
is performed again to make sure that the value is still the same.

checksum

11

An IP addressing scheme that
enables a single IP address to designate
many unique IP addresses.
___ ___ ___ ___ addressing uses an IP address followed by a / and the IP network
prefix. An example of a this
address is 192.168.100.0/16. It
is sometimes called supernetting.

CIDR (classless interdomain routing)

12

A type of network security system whereby network traffic is filtered based on
specified session rules and may be
restricted to recognized computers
only.

circuit-level firewall

13

A method of sending data between two parties in which a dedicated circuit is created at the beginning of the conversation
and is broken at the end. All data transported during the session travels over the same path, or circuit.

circuit switching

14

A TCP/IP network that uses addresses from 1 to 126 and supports up to 126 subnets
with 16,777,214 unique hosts each.

Class A network

15

A TCP/IP network that uses addresses from 128 to 191 and supports up to 16,384 subnets with 65,534 unique hosts each.

Class B network

16

A TCP/IP network
that uses addresses from 192
to 223 and supports up to 2,097,152
subnets with 254 unique hosts each.

Class C network

17

A node that uses the services
from another node on a network.

client

18

A networking architecture in which frontend,
or client, nodes request and
process data stored by the back-end,
or server, node.

client/server networking

19

The hosting, storage, and delivery of computing as a service rather than a product. The end user accesses remotely
stored programs and other resources
through the Internet without the
need for expensive local networking
devices, services, and support.

cloud computing

20

A technology that enables two or more computers to act as a single system to provide improved fault tolerance, load balancing, and failover capability.

clustering

21

Specifies an alias or nickname for a
canonical hostname record in a
domain name system (DNS) database.
_______ records are used to
give a single computer multiple
names (aliases).

CNAME (canonical name)

22

A data cable, that is
made of a solid copper core insulated
and surrounded by braided metal
and covered with a thick plastic or
rubber covering. It is the standard
cable used in cable television
and in older bus topology networks.

coaxial cable

23

A disaster recovery site
that provides office space, but the
customer provides and installs all
the equipment needed to continue
operations.

cold site

24

A redundant piece of hardware stored in case a component should fail. Typically used for server systems.

cold spare

25

The result of two frames
simultaneously transmitting on an
Ethernet network and colliding,
thereby destroying both frames.

collision

26

A segment of an Ethernet network between managing nodes, where only one packet
can be transmitted at a time.
Switches, bridges, and routers can
be used to segment a network into
separate___ ____.

collision domain

27

An LED on networking
equipment that flashes to
indicate a collision on the network.
A ____ ____can be used to
determine whether the network is
experiencing many collisions.

collision light

28

The transfer of information between nodes on a network.

communication

29

A device that combines several communications channels into one. It is often used to combine multiple terminals into one line.

concentrator

30

Packet transfer in which delivery is
not guaranteed.

connectionless communication

31

Packet transfer in which
delivery is guaranteed.

connection-oriented communication

32

The linking of nodes
on a network for communication to
take place.

connectivity

33

When a change in
the network routing is made, it takes some time for the routers to detect
and accommodate this change; this
is known as _______.

convergence

34

Normally, a backup of the entire hard drive. A ____ ____ is similar to a full backup, except that the copy backup does not alter the state of the archive bits on files.

copy backup

35

A value used to encourage or
discourage the use of a certain route
through a network. Routes that are
to be discouraged are assigned a
higher one, and those that are to be
encouraged are assigned a lower
one.

cost

36

A person who attempts to
break software code or gain access
to a system to which he or she is not
authorized.

cracker

37

The process of attempting
to break software code, normally
to defeat copyright protection or
alter the software’s functioning. Also
the process of attempting to gain
unauthorized access to a computer
system.

cracking

38

A challenge-response
authentication mechanism.

CRAM-MD5

39

A method used to check for errors
in packets that have been transferred
across a network. A computation
bit is added to the packet and
recalculated at the destination to
determine whether the entire content
of the packet has been correctly
transferred.

CRC (cyclical redundancy check)

40

A tool used to join connectors
to the ends of network
cables.

crimper

41

A cable that can
be used to directly connect two
devices—such as two computer systems—
or as a means to expand networks
that use devices such as hubs
or switches. A traditional ____ ____ is a UTP cable in which the wires are crossed for the purposes of placing the transmit line of one
device on the receive line of the other. A T1 crossover is used to connect two T1 CSU/DSU devices in a back-to-back configuration.

crossover cable

42

Electronic interference
caused when two wires are too close
to each other, and the adjacent cable
creates interference.

crosstalk

43

A contention media access method that
uses collision-avoidance techniques.

CSMA/CA (carrier sense multiple
access with collision avoidance)

44

A contention media access method
that uses collision-detection and
retransmission techniques.

CSMA/CD (carrier sense multiple
access with collision detection)

45

Acts as a translator between the LAN data
format and the WAN data format.
Such a conversion is necessary
because the technologies used on
WAN links are different from those
used on LANs.

CSU/DSU (Channel Service
Unit/Data Service Unit)

46

A switching method that does not
copy the entire packet into the
switch buffers. Instead, the destination
address is captured into the
switch, the route to the destination
node is determined, and the packet
is quickly sent out the corresponding corresponding port. ___ ___ ___
switching maintains a low latency.

cut-through packet switching