Section 4 Flashcards

1
Q

Sharing information and resources through linked computer systems

A

Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network type that is normally used for short-range communications.

A

PAN (Personal Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network type that consists of a collection of computers in a single building or complex

A

LAN (Local Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network type that links systems over a greater distance; including machines on opposite sides of the world

A

WAN (Wide Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A classification of networks considers the topology of the network or pattern in which machines are connected

A

Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A topology that has a single machine serving a central point to which all others are connected

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A topology that connects devices directly to each other as a peer

A

Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A topology that connects every device in a network to every other device

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Communication that allows the activities/processes on different computers within a network to coordinate actions and complete tasks

A

Interprocess Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Communication model in which computers are connected through a switch

A

Client-Server Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the data that travels through a network using communication channels that connect the network components

A

Transmission Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What kind of cable was commercially used in the 1940s and was used for both baseband and broadband data communication services

A

Coaxial Cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of coaxial cable has a signal at a very narrow frequency range on which data/information is superimposed and then transmitted

A

Baseband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of coaxial cable is considered high-capacity transmission technologies that are used to transmit data, voice, and video across long distances and at high speeds

A

Broadband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What cable uses the concept of reflection of light through a core made up of glass or plastic

A

Fiber-optic cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the media is sometimes more convenient and practical than installing cables

A

Wireless transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What device can extend the range of cabling types so connections can be made by increasing the strength of the network signal

A

Repeaters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What device is used to connect different types of networks and provide management of the message

A

Bridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What device is used on LANs to reduce network traffic by management of network messages

A

Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What device makes internet possible

21
Q

List of minimum to maximum bandwidth

A

CAT1
CAT2
CAT3
CAT4
CAT5
CAT5e
CAT6
CAT7

22
Q

What is the individual networks comprising the internet are constructed and maintained by

A

Internet Service Providers (ISPs)

23
Q

What tier of ISPs is at the top of the hierarchy and consist of high-speed, capacity, and international WANs

24
Q

What tier is more common and regional in scope and are essentially networks of routers that collectively provide the internet’s communication infrastructure

25
What tier is typically independent internets, operated by a single organization that supplies internet access to homes and business
Tier 3
26
What does the internet use as unique identifiers
IP (Internet Protocol)
27
What is the name of the nonprofit organization that coordinates the internet's operations
ICANN (Internet Corporation for Assigned Names and Numbers)
28
What is a hierarchical and decentralized system that translates human-readable domain names into numerical IP adressses
DNS (Domain name system)
29
What are easy-to-read names that are used to navigate the internet
Domain names
30
What is the DNS system arranged by
Hierarchy
31
What is the process of translating a domain name into an IP address called
DNS Resolution
32
What are rules, procedures, and formats that govern the communication of multiple devices over a network
Network Protocol
33
What is the name given to each hypertext document available through the World Wide Web
URL (Unique Resource Locator)
34
What is the way of encoding a document called
HTML (HyperText Markup Language)
35
What generalized language provides a standardized style for designing notational systems for representing data as text files
XML (Extensible markup language)
36
What is composed of a hypertext document format for embedding hyperlinks to other documents, networks, and a server process that supplies hypertext pages upon requests
WWW (World Wide Web)
37
What is any software intentionally designed to cause damage to a computer, server, client, or computer network
Malware
38
What type of malware is a software program that inflicts a computer by inserting itself into programs that already reside in the machine
Virus
39
What type of malware is an autonomous program that forwards copies of itself to other machines in a network and could result in detriment of individual machines or the network
Worm
40
What type of malware resides on a computer, collecting information about the computer's activities and reporting back to the instigator
Spyware
41
What type of malware obtains private information by simply asking
Phishing
42
What form of attack is the process of overloading a computer with messages and results in suffocating the network resources
DoS(Denial-of-Service)
43
What form of attack is when the attacker intercepts the data as it travels to or from the victim's device
MITM(Man in the Middle)
44
What form of attack is where the attacker uses all possible combinations of characters to learn a user's password
Brute force attack
45
What form of attack is preformed by using an application and a large dictionary text file with just words
Dictionary attacks
46
What preventative tool is a software that acts as an intermediary between a client and a server to shield the client from adverse actions to the server
Proxy server
47
What preventative tool is a software that monitors network behaviors looking for anomalies to proactively or reactively mitigate unwanted occurrences
Network auditing
48
What preventative tool detects and removes known viruses from the network
Antivirus