NETWORK+ Terms I's Flashcards

(59 cards)

1
Q
An organization responsible
for IP addresses, domain
names, and protocol parameters.
Some functions of IANA, such as
domain name assignment, have been
devolved into other organizations.
A

IANA (Internet Assigned Numbers

Authority)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A network layer Internet
protocol documented in RFC 792
that reports errors and provides
other information relevant to IP
packet processing. Utilities such as
ping and tracert use functionality
provided by ICMP.
A

ICMP (Internet Control Message

Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The use of one device with access to
the Internet as an access point for
other devices to connect.

A

ICS (Internet Connection Sharing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Some networks use multiple
wiring closets. When this is the
case, the wiring closet, known as the
main distribution frame (MDF),
connects to secondary wiring closets,
or intermediate distribution
frames (IDFs). See also MDF.
A

IDF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A software application or hardware
device that monitors a network or
system for malicious or nonpolicy
related activity and reports to a centralized
management system.
A

IDS (Intrusion Detection System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
IEEE (Institute of Electrical and
Electronics Engineers) A professional
organization that, among
other things, develops standards for
networking and communications.
A

IEEE (Institute of Electrical and

Electronics Engineers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IEEE 1394

A
A standard that defines
a system for connecting up to 63
devices on an external bus. IEEE
1394 is commonly used with consumer
electronic devices such as
video cameras and MP3 players.
IEEE 1394 is based on a technology
developed by Apple Computers
called FireWire.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A standard that defines
the OSI model’s physical and data
link layers. This standard allows two
IEEE LAN stations to communicate
over a LAN or WAN and is often
called the internetworking standard.
A

IEEE 802.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
An IEEE security
standard designed for authenticating
wireless devices. This standard uses
Extensible Authentication Protocol
(EAP) to provide a central authentication
server to authe
A

IEEE 802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A standard that defines
the LLC sublayer of the data link
layer for the entire series of protocols
covered by the 802.x standards.
This standard specifies the adding
of header fields, which tell the
receiving host which upper layer
sent the information.
A

IEEE 802.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A standard that specifies
physical layer attributes, such as
signaling types, data rates, and
topologies, as well as the media
access method used. It also defines
specifications for the implementation
of the physical layer and the MAC sublayer of the data link layer,
using CSMA/CD. This standard also
includes the original specifications
for Fast Ethernet.
A

IEEE 802.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A standard that defines
how production machines should
communicate. It establishes a common
protocol for use in connecting
these machines. It also defines specifications
for the implementation of the
physical layer and the MAC sublayer
of the data link layer, using
A

IEEE 802.4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A standard used to
define token ring. However, it does
not specify a particular topology or
transmission medium. It provides
specifications for the implementation
of the physical layer and the MAC
sublayer of the data link layer, using
a token-passing media access method
on a ring topology.
A

IEEE 802.5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A standard that defines
the distributed queue dual-bus technology
to transfer high-speed data
between nodes. It provides specifications
for the implementation of
MANs.

A

IEEE 802.6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A standard that defines
the design, installation, and testing
of broadband-based communications
and related physical media connectivity.

A

IEEE 802.7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A standard that defines
the Fiber Optic Technical Advisory
Group, which advises the other 802
standards committees on various fiberoptic
technologies and standards.
A

IEEE 802.8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A standard that defines
the integration of voice and data
transmissions using isochronous
Ethernet.

A

IEEE 802.9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
A standard that focuses
on security issues by defining a
standard method for protocols and
services to exchange data securely
by using encryption mechanisms.
A

IEEE 802.10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The original IEEE
wireless standard, which defines
standards for wireless LAN communication.

A

IEEE 802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
A wireless networking
standard operating in the 5GHz
band. 802.11a supports a maximum
theoretical data rate of 54Mbps.
Depending on interference, 802.11a
could have a range of 150 feet at the
lowest speed setting. Higher-speed
transmissions would see a lower
range. 802.11a uses the CSMA/CA
media access method and is incompatible
with 802.11b and 802.11g.
A

IEEE 802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
A commonly
deployed IEEE wireless standard
that uses the 2.4GHz RF range and
offers speeds up to 11Mbps. Under
ideal conditions, the transmission
range can be as far as 75 meters.
A

IEEE 802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
An IEEE wireless
standard that is backward compatible
with 802.11b. 802.11g offers a
data rate of 54Mbps. Like 802.11b,
802.11g uses the 2.4GHz RF range
A

IEEE 802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
The 802.11n standard
significantly increase throughput
in both the 2.4GHz and 5GHz
frequency range. The baseline goal
of the standard reaches speeds of
100Mbps, but given the right conditions,
802.11n speeds may reach
600Mbps. In practical operation,
802.11n speeds are much less.
A

IEEE 802.11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
A standard that
defines 100BaseVG-AnyLAN,
which uses a 1Gbps signaling rate
and a special media access method
that enables 100Mbps data traffic
over voice-grade cable.
25
A group of research volunteers responsible for specifying the protocols used on the Internet and the architecture of the Internet.
IETF (Internet Engineering Task | Force)
26
A command used on Linux, UNIX, and OS/2 systems to obtain configuration for and configure network interfaces.
ifconfig
27
``` A protocol used for communication between devices within the same multicast group. IGMP provides a mechanism for systems to detect and make themselves aware of other systems in the same group. ```
IGMP (Internet Group Management | Protocol)
28
``` The interior gateway protocol (IGP) identifies the protocols used to exchanging routing information between routers within a LAN or interconnected LANs. See EGP. ```
IGP
29
A web server application and supporting services created by Microsoft for Microsoft Windows.
IIS (Internet Information Services)
30
An IPSec protocol that uses X.509 certificates for authentication
IKE (Internet Key Exchange)
31
``` A protocol that enables email to be retrieved from a remote server. It is part of the TCP/IP suite, and it is similar in operation to POP3 but offers more functionality. ```
IMAP4 (Internet Message Access | Protocol version 4)
32
``` A backup of only files that have been created or changed since the last backup. In an incremental backup, the archive bit is cleared to indicate that a file has been backed up. ```
incremental backup
33
A wireless data communication method that uses light pulses in the infrared range as a carrier signal
infrared
34
``` A wireless topology that defines a wireless network composed of an access point connected to a wired LAN. Wireless devices communicate with the wired LAN through the access point (AP). ```
infrastructure topology
35
``` The file system or directory access rights valid at a given point as a result of those rights being assigned at a higher level in the directory structure. ```
inherited rights
36
A hub or switch that contains some management or monitoring capability
intelligent hub/switch
37
``` A UPS that has associated software for monitoring and managing the power provided to the system. For information to be passed between the UPS and the system, the UPS and system must be connected, which normally is achieved through a serial or USB connection. ```
intelligent UPS
38
``` A device, such as a card or plug, that connects pieces of hardware with a computer so that information can be moved from place to place (for example, between computers and printers, hard disks, and other devices, or between two or more nodes on a network). Also, the part of an application or operating system that the user sees. ```
interface
39
``` Anything that can compromise a signal’s quality. On bound media, crosstalk and EMI are examples of interference. In wireless environments, atmospheric conditions that degrade a signal’s quality would be considered interference. ```
interference
40
``` Functionality built into the TCP/IP stack that enables you to verify the correct functioning of the stack. You can ping any IPv4 address in the 127.x.x.x range, except the network address (127.0.0.0) or the broadcast address (127.255.255.255). The address 127.0.0.1 is most commonly used. In IPv6, the localhost (loopback) address is 0:0:0:0:0:0:0:1. ```
internal loopback address
41
``` The name of an area of the DNS namespace. The Internet domain name normally is expressed along with the toplevel domain to which it belongs (for example, comptia.org). ```
Internet domain name
42
``` In the TCP/IP architectural model, the layer responsible for addressing, packaging, and routing functions. Protocols that operate at this layer are responsible for encapsulating packets into Internet datagrams. All necessary routing algorithms are run here. ```
Internet layer
43
A group of networks connected by routers or other connectivity devices so that the networks function as one network.
internetwork
44
The process or procedures that warn you about successful or failed unauthorized access to a system.
intrusion detection
45
``` A network layer protocol, documented in RFC 791, that offers a connectionless internetwork service. IP provides features for addressing, packet fragmentation and reassembly, type-ofservice specification, and security. ```
IP (Internet Protocol)
46
``` The unique address used to identify the network number and node address of a device connected to a TCP/IP network. IPv4 addresses typically are expressed in dotted-decimal format, such as 192.168.1.1. A typical IPv6 address looks like 2001:0:4137:9e76:18d1: 2094:b980:a30. ```
IP address
47
A network device that continually scans the network, looking for inappropriate activity
IPS (Intrusion Prevention System)
48
``` A Windows command that provides information about the configuration of the TCP/IP parameters, including the IP address. ```
ipconfig
49
A protocol used to provide strong security standards for encryption and authentication on virtual private networks
IPSec (IP Security)
50
A suite of protocols used for communication on a local area network and for accessing the Internet.
IPv4 (Internet Protocol version 4)
51
The new version of IP, which has a larger range of usable addresses than the current version of IP, IPv4, and enhanced security.
IPv6 (Internet Protocol version 6)
52
A wireless networking technology that uses infrared beams to send data transmissions between devices.
IrDA
53
Defined by RFC 2408, ISAKMP is a protocol typically used by IKE for key exchange.
ISAKMP (Internet Security Association and Key Management Protocol) Defined by RFC 2408, ISAKMP
54
``` An internationally adopted standard for providing endto- end digital communications between two points. ISDN is a dialup technology allowing data, voice, and other source traffic to be transmitted over a dedicated link ```
ISDN (Integrated Services Digital | Network)
55
A device that enables communication over an ISDN link.
ISDN terminal adapter
56
``` Intermediate System-to- Intermediate System. A link-state protocol that discovers the shortest path for data to travel using the shortest path first (SPF) algorithm. IS-IS routers distribute topology information to other routers, allowing them to make the best path decisions. ```
IS-IS
57
``` A voluntary organization founded in 1946 that is responsible for creating international standards in many areas, including communications and computers. This also includes the development of the OSI model. ```
ISO (International Organization for | Standardization)
58
A company or organization that provides facilities for clients to access the Internet.
ISP (Internet service provider)
59
``` A fixed size input used in cryptography. The larger initialization vector, the more it increases the difficulty in cracking and minimizes the risk of replay. ```
IV (Initialization Vector)