NETWORK+ Terms I's Flashcards Preview

NETWORK+ Terms > NETWORK+ Terms I's > Flashcards

Flashcards in NETWORK+ Terms I's Deck (59):
1

An organization responsible
for IP addresses, domain
names, and protocol parameters.
Some functions of IANA, such as
domain name assignment, have been
devolved into other organizations.

IANA (Internet Assigned Numbers
Authority)

2

A network layer Internet
protocol documented in RFC 792
that reports errors and provides
other information relevant to IP
packet processing. Utilities such as
ping and tracert use functionality
provided by ICMP.

ICMP (Internet Control Message
Protocol)

3

The use of one device with access to
the Internet as an access point for
other devices to connect.

ICS (Internet Connection Sharing)

4

Some networks use multiple
wiring closets. When this is the
case, the wiring closet, known as the
main distribution frame (MDF),
connects to secondary wiring closets,
or intermediate distribution
frames (IDFs). See also MDF.

IDF

5

A software application or hardware
device that monitors a network or
system for malicious or nonpolicy
related activity and reports to a centralized
management system.

IDS (Intrusion Detection System)

6

IEEE (Institute of Electrical and
Electronics Engineers) A professional
organization that, among
other things, develops standards for
networking and communications.

IEEE (Institute of Electrical and
Electronics Engineers)

7

IEEE 1394

A standard that defines
a system for connecting up to 63
devices on an external bus. IEEE
1394 is commonly used with consumer
electronic devices such as
video cameras and MP3 players.
IEEE 1394 is based on a technology
developed by Apple Computers
called FireWire.

8

A standard that defines
the OSI model’s physical and data
link layers. This standard allows two
IEEE LAN stations to communicate
over a LAN or WAN and is often
called the internetworking standard.

IEEE 802.1

9

An IEEE security
standard designed for authenticating
wireless devices. This standard uses
Extensible Authentication Protocol
(EAP) to provide a central authentication
server to authe

IEEE 802.1X

10

A standard that defines
the LLC sublayer of the data link
layer for the entire series of protocols
covered by the 802.x standards.
This standard specifies the adding
of header fields, which tell the
receiving host which upper layer
sent the information.

IEEE 802.2

11

A standard that specifies
physical layer attributes, such as
signaling types, data rates, and
topologies, as well as the media
access method used. It also defines
specifications for the implementation
of the physical layer and the MAC sublayer of the data link layer,
using CSMA/CD. This standard also
includes the original specifications
for Fast Ethernet.

IEEE 802.3

12

A standard that defines
how production machines should
communicate. It establishes a common
protocol for use in connecting
these machines. It also defines specifications
for the implementation of the
physical layer and the MAC sublayer
of the data link layer, using

IEEE 802.4

13

A standard used to
define token ring. However, it does
not specify a particular topology or
transmission medium. It provides
specifications for the implementation
of the physical layer and the MAC
sublayer of the data link layer, using
a token-passing media access method
on a ring topology.

IEEE 802.5

14

A standard that defines
the distributed queue dual-bus technology
to transfer high-speed data
between nodes. It provides specifications
for the implementation of
MANs.

IEEE 802.6

15

A standard that defines
the design, installation, and testing
of broadband-based communications
and related physical media connectivity.

IEEE 802.7

16

A standard that defines
the Fiber Optic Technical Advisory
Group, which advises the other 802
standards committees on various fiberoptic
technologies and standards.

IEEE 802.8

17

A standard that defines
the integration of voice and data
transmissions using isochronous
Ethernet.

IEEE 802.9

18

A standard that focuses
on security issues by defining a
standard method for protocols and
services to exchange data securely
by using encryption mechanisms.

IEEE 802.10

19

The original IEEE
wireless standard, which defines
standards for wireless LAN communication.

IEEE 802.11

20

A wireless networking
standard operating in the 5GHz
band. 802.11a supports a maximum
theoretical data rate of 54Mbps.
Depending on interference, 802.11a
could have a range of 150 feet at the
lowest speed setting. Higher-speed
transmissions would see a lower
range. 802.11a uses the CSMA/CA
media access method and is incompatible
with 802.11b and 802.11g.

IEEE 802.11a

21

A commonly
deployed IEEE wireless standard
that uses the 2.4GHz RF range and
offers speeds up to 11Mbps. Under
ideal conditions, the transmission
range can be as far as 75 meters.

IEEE 802.11b

22

An IEEE wireless
standard that is backward compatible
with 802.11b. 802.11g offers a
data rate of 54Mbps. Like 802.11b,
802.11g uses the 2.4GHz RF range

IEEE 802.11g

23

The 802.11n standard
significantly increase throughput
in both the 2.4GHz and 5GHz
frequency range. The baseline goal
of the standard reaches speeds of
100Mbps, but given the right conditions,
802.11n speeds may reach
600Mbps. In practical operation,
802.11n speeds are much less.

IEEE 802.11n

24

A standard that
defines 100BaseVG-AnyLAN,
which uses a 1Gbps signaling rate
and a special media access method
that enables 100Mbps data traffic
over voice-grade cable.

IEEE 802.12

25

A group of research volunteers
responsible for specifying the
protocols used on the Internet and
the architecture of the Internet.

IETF (Internet Engineering Task
Force)

26

A command used on
Linux, UNIX, and OS/2 systems to
obtain configuration for and configure
network interfaces.

ifconfig

27

A protocol used for
communication between devices
within the same multicast group.
IGMP provides a mechanism for
systems to detect and make themselves
aware of other systems in the
same group.

IGMP (Internet Group Management
Protocol)

28

The interior gateway protocol
(IGP) identifies the protocols used
to exchanging routing information
between routers within a LAN or
interconnected LANs. See EGP.

IGP

29

A web server application and supporting
services created by
Microsoft for Microsoft Windows.

IIS (Internet Information Services)

30

An
IPSec protocol that uses X.509 certificates
for authentication

IKE (Internet Key Exchange)

31

A protocol
that enables email to be retrieved
from a remote server. It is part of
the TCP/IP suite, and it is similar
in operation to POP3 but offers
more functionality.

IMAP4 (Internet Message Access
Protocol version 4)

32

A backup of
only files that have been created or
changed since the last backup. In an
incremental backup, the archive bit
is cleared to indicate that a file has
been backed up.

incremental backup

33

A wireless data communication
method that uses light pulses in
the infrared range as a carrier signal

infrared

34

A wireless
topology that defines a wireless network
composed of an access point
connected to a wired LAN. Wireless
devices communicate with the wired
LAN through the access point (AP).

infrastructure topology

35

The file system or
directory access rights valid at a
given point as a result of those rights
being assigned at a higher level in
the directory structure.

inherited rights

36

A hub or
switch that contains some management
or monitoring capability

intelligent hub/switch

37

A UPS that has
associated software for monitoring
and managing the power provided to
the system. For information to be
passed between the UPS and the
system, the UPS and system must be
connected, which normally is
achieved through a serial or USB
connection.

intelligent UPS

38

A device, such as a card
or plug, that connects pieces of
hardware with a computer so that
information can be moved from
place to place (for example, between
computers and printers, hard disks,
and other devices, or between two or
more nodes on a network). Also, the
part of an application or operating
system that the user sees.

interface

39

Anything that can
compromise a signal’s quality. On
bound media, crosstalk and EMI are
examples of interference. In wireless
environments, atmospheric conditions
that degrade a signal’s quality
would be considered interference.

interference

40

Functionality built into the TCP/IP
stack that enables you to verify the
correct functioning of the stack. You
can ping any IPv4 address in the
127.x.x.x range, except the network
address (127.0.0.0) or the broadcast
address (127.255.255.255). The
address 127.0.0.1 is most commonly
used. In IPv6, the localhost (loopback)
address is 0:0:0:0:0:0:0:1.

internal loopback address

41

The name
of an area of the DNS namespace.
The Internet domain name normally
is expressed along with the toplevel
domain to which it belongs
(for example, comptia.org).

Internet domain name

42

In the TCP/IP
architectural model, the layer
responsible for addressing, packaging,
and routing functions.
Protocols that operate at this layer
are responsible for encapsulating
packets into Internet datagrams. All
necessary routing algorithms are run
here.

Internet layer

43

A group of networks
connected by routers or other connectivity
devices so that the networks
function as one network.

internetwork

44

The process or
procedures that warn you about successful
or failed unauthorized access
to a system.

intrusion detection

45

A network
layer protocol, documented in RFC
791, that offers a connectionless
internetwork service. IP provides
features for addressing, packet fragmentation
and reassembly, type-ofservice
specification, and security.

IP (Internet Protocol)

46

The unique address
used to identify the network number
and node address of a device connected
to a TCP/IP network. IPv4
addresses typically are expressed in
dotted-decimal format, such as
192.168.1.1. A typical IPv6 address
looks like 2001:0:4137:9e76:18d1:
2094:b980:a30.

IP address

47

A network device that continually
scans the network, looking for inappropriate
activity

IPS (Intrusion Prevention System)

48

A Windows command
that provides information about the
configuration of the TCP/IP
parameters, including the IP
address.

ipconfig

49

A protocol
used to provide strong security standards
for encryption and authentication
on virtual private networks

IPSec (IP Security)

50

A suite of protocols used for communication
on a local area network
and for accessing the Internet.

IPv4 (Internet Protocol version 4)

51

The new version of IP, which has a
larger range of usable addresses than
the current version of IP, IPv4, and
enhanced security.

IPv6 (Internet Protocol version 6)

52

A wireless networking technology
that uses infrared beams to
send data transmissions between
devices.

IrDA

53

Defined by RFC 2408,
ISAKMP is a protocol typically used
by IKE for key exchange.

ISAKMP (Internet Security
Association and Key Management
Protocol) Defined by RFC 2408,
ISAKMP

54

An internationally
adopted standard for providing endto-
end digital communications
between two points. ISDN is a
dialup technology allowing data,
voice, and other source traffic to be
transmitted over a dedicated link

ISDN (Integrated Services Digital
Network)

55

A device
that enables communication over an
ISDN link.

ISDN terminal adapter

56

Intermediate System-to-
Intermediate System. A link-state
protocol that discovers the shortest
path for data to travel using the
shortest path first (SPF) algorithm.
IS-IS routers distribute topology
information to other routers, allowing
them to make the best path
decisions.

IS-IS

57

A voluntary
organization founded in 1946 that is
responsible for creating international
standards in many areas, including
communications and computers.
This also includes the development
of the OSI model.

ISO (International Organization for
Standardization)

58

A
company or organization that provides
facilities for clients to access
the Internet.

ISP (Internet service provider)

59

A fixed
size input used in cryptography. The
larger initialization vector, the more
it increases the difficulty in cracking
and minimizes the risk of replay.

IV (Initialization Vector)