Networks Flashcards

1
Q

Protocol

A

A set of rules governing the exchange or transmission of data between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hypertext Transfer Protocol (HTTP)

A

protocol that defines how messages are formatted and transmitted over the World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

File Transfer Protocol (FTP)

A

a simple network protocol that allows the transfer of files between two computers on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Transmission Control Protocol (TCP)

A

provides reliable, ordered, and error-checked delivery of a stream of packets on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internet Protocol (IP)

A

A communication standard that enables computers to route communications traffic from one network to another as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Post Office Protocol (POP)

A

An application layer over the internet standard protocol is used by local email clients to retrieve email from a remote server over a TCP/IP connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internet Message Access Protocol (IMAP)

A

A protocol that resides on an incoming mail server. Similar to POP, but is more powerful. Allows sharing of mailboxes and multiple mail server access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Simple Message Transfer Protocol (SMTP)

A

the basic communications protocol used to send e-mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

UDP (User Datagram Protocol)
.

A

Protocol that operates instead of TCP in applications where delivery speed is important and quality can be sacrificed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Application Layer

A

provides services to ensure that effective communication between computer programs on a network is possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transport Layer

A

A set of protocols that ensure that data are transferred from point A to point B reliably and without errors. This layer of services includes flow control, acknowledgment, error correction, segmentation, reassembly, and sequencing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet Layer

A

A layer responsible for addressing, packaging, and routing messages on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Link Layer

A

handles all the physical details of interfacing with the cable, including the network interface card and a device driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Local Area Network (LAN)

A

Connects a group of computers in close proximity, such as in an office building, school, or home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Wide Area Network (WAN)

A

A network that connects devices in geographically separated areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Domain Name System (DNS)

A

The system administered by the Internet Corporation for Assigned Names (ICANN) that assigns names to each site on the Internet.

15
Q

Uniform Resource Locator (URL)

A

The set of letters that identifies the address of a specific resource on the Web.

16
Q

IP Address

A

A number that uniquely identifies each computer or device connected to the Internet.

16
Q

Packet Switching

A

Occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer

17
Q

Spyware

A

software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.

18
Q

Circuit Switching

A

a dedicated connection is formed between two points and the connection remains active for the duration of the transmission

19
Q

Denial of Service (DoS)

A

attack floods a network or server with service requests to prevent legitimate users’ access to the system

20
Q

SQL Injection

A

An attacker issues a command to a web server as part of the URL or as input to a form on a company’s website; web server might pass the command onto the database which then allows potentially anything to be done to the database

20
Q

Phishing

A

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

20
Q

Pharming

A

An online scam that attacks the browser’s address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.

21
Q

Firewall

A

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

22
Q

Modem

A

A device that allows computers to communicate over telephone lines

23
Q

Router

A

A device that transfers data from one network to another in an intelligent way

24
Q

Network Switch

A

More functional than a hub; records and recognizes the local network addresses (MAC or IP) or all computers connected to it

25
Q

Network Interface Card

A

An interface fitted inside a personal computer or network terminal allows it to communicate with other machines over a network.

26
Q

Fibre Optic Cable

A

A connection that uses light to transmit information.

27
Q

Ethernet Cable

A

cable that connects computers to the LAN which allows the computers to communicate with each other and other peripherals.

28
Q

Client Server Network

A

A network that uses centrally administered computers, known as servers, to enable resource sharing for and to facilitate communication between the other computers on the network.

29
Q

Peer-to-peer network

A

any network without a central file server and in which all computers in the network have access to the public files located on all other workstations

29
Q

Ring Topology

A

A LAN configuration in which all nodes are connected in a closed loop

30
Q

Star Topology

A

A topology with one central node that has each computer or network device attached to the central node. All data first goes into the central node and then is sent out to its destination. (Think of it like a bicycle wheel with spokes.)

31
Q

Mesh Topology

A

Devices are connected with many redundant interconnections between network nodes.