Shit to remember version 2 Flashcards

(49 cards)

1
Q

Ad hoc mode

A

Ad hoc mode configures a device to communicate directly to another device using the wireless network adapter. With ad hoc mode, a central access point is not required to communicate to another device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IaaS

A

IaaS (Infrastructure as a Service) is a model that provides the computing platform, but no additional software. The user will usually configure the platform with the appropriate CPU, memory, and storage options, and the service provider is only responsible for the uptime and availability of the hardware platform. The user is generally responsible for all software
administration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DaaS

A

DaaS (Desktop as a Service) provides cloud-based desktop access and centralized workstation management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PaaS

A

PaaS (Platform as a Service) is a cloud model that provides a hosted application framework in the cloud. The customer is responsible for development their own application based on the cloud-based framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SaaS

A

SaaS (Software as a Service) provides a fully developed application for end-user access. The cloud service provider handles the hosting, application development, support, and all other aspects of application services. The users only need to login and use the available service from a
browser or app.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hybrid

A

A hybrid cloud deployment model combines both public cloud and private cloud resources. Public cloud resources would be publicly available, usually across the Internet. Private cloud resources would be restricted to a single organization or small group of organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Community

A

A community cloud model is often used by multiple organizations to build a pool of resources with their combined financial contributions. This multi-tenant model provides a shared cloud-based deployment to organizations with similar goals and objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LDAP

A

LDAP 389 tcp udp(Lightweight Directory Access Protocol) is a protocol used to access network directories, such as Microsoft’s Active Directory database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Transfer belt

A

The transfer belt is commonly used on color laser printers to collect
different toner colors and transfer them to the paper.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SCSI

A

SCSI (Small Computer System Interface) connectors are most commonly used with storage devices and storage subsystems. Legacy , ID #, chained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DVD-RW DL

A

A DVD-RW DL (Digital Versatile Disc, Read/Write, Dual-Layer)

provides 8.5 GB (gigabytes) of available storage space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CD-ROM

A

A CD-ROM (Compact Disc ROM) supports 700 MB (megabytes) of

storage space,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Blue-ray DL

A

Blue-ray DL (Dual-Layer) can store 50 GB of data, .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DB-9

A

A DB-9 connector, or less commonly, DE-9 (D-subminiature size E, 9 pin) is a connector used to send serial signals to another device. A DB-9 connector on a computer is commonly used to connect to the management interface of a switch, router, firewall, or another infrastructure device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Riser cards

A

Riser cards extend motherboard expansion slots 90-degrees and allow PCIe (Peripheral Component Interconnect Express) slots to be installed horizontally in a computer or server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

F-connector

A

F-connector
An F-connector is the screw-on connector commonly associated with the coax used for cable television or cable modems. F-connectors and coax are
not commonly used to connect external storage devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TRS

A

TRS (Tip/Ring/Sleeve) is a common connection type for analog headphones and other audio interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BNC

A

BNC (Bayonet Neill–Concelman) connectors are connectors that are commonly used for coaxial cables. BNC interfaces are commonly found on network and video connections. Connectors are often used for enterprise network wide area network links or video connections. The bayonet on a BNC connector twists and locks onto a BNC interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

RS-232

A

RS-232 (Recommended Standard 232) is a serial communication standard that commonly uses DB-25 (D-subminiature size B, 25 pin) or DE-9 (D-subminiature size E, 9 pin) as a connector type. This standard
technically refers to the signal sent between devices and not the connector type, although DB-25 and DE-9 are commonly related to RS-232

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

WMN

A

A WMN (Wireless Mesh Network) is commonly used by Internet of Things (IoT) devices to work together for long distance communications. WMN is not used by itself for Internet access.

21
Q

ISDN

A

ISDN (Integrated Services Digital Network) is a circuit-switched network type that communicates over twisted pair telephone lines. ISDN can be used to communicate with other ISDN devices over the telephone network Proxy .

22
Q

Proxies

A

Proxies are used to sit between a network conversation to provide additional management or security features.

23
Q

Hub

A

Hub
A hub does not make any forwarding decisions based on the contents of a
network frame. When the frame is received by the hub, it sends a copy of
that frame to every other interface on the hub.

24
Q

Unmanaged switch

A

Switches use the destination MAC (Media Access Control) address to
make forwarding decisions. These forwarding decisions are identical in
both managed and unmanaged switches

25
Router
A router makes forwarding decisions based on the destination IP (Internet Protocol) address in the network traffic.
26
Cable tester
A cable tester can quickly perform a wire map to determine if all of the wires were properly crimped or punched down on both ends of the cable
27
Tone generator
A tone generator places an analog audio tone onto the wires of a cable, and an inductive probe is then used on the other side to precisely identify the cable that contains the tone signal. By moving the tone generator to each of the ten cables, the other cable end can easily be identified and labeled.
28
Multimeter
A multimeter can be used to identify voltage levels and continuity, but it's not a useful tool for identifying the ends of two distantly located cables.
29
Loopback plug
Loopback plugs are commonly used to troubleshooting physical network interfaces.
30
SSO
SSO (Single Sign-on)
31
Punch-down tool
Punch-down tools are used to reconnect wires, but only to punch-down blocks such as 66 blocks or 110 blocks. For device connections, a crimper is the only way to attach a new RJ45 connector.
32
MAN (Metropolitan Area Network)
(Metropolitan Area Network) connects locations that are in the same city or metropolitan area. Once the distance is outside the scope of the immediate metro area, the connection is categorized as a WAN (Wide Area Network).
33
Repeater
Repeaters will regenerate signals to extend the overall distance of a network link.
34
F-connectors
F-connectors are the threaded connectors commonly used on cable television and cable modem coax cables.
35
WAP
A WAP (Wireless Access Point) is a device that bridges the 802.11 wireless network together with a wired Ethernet network
36
PRL
Some cellular provides will maintain a PRL (Preferred Roaming List) that the phone uses to connect to the desired cellular tower
37
Emulation
The best environment for running an application is the system architecture in which it was originally designed. However, there may be instances where the original architecture may be unavailable. In those instances, it may be possible to emulate the original system architecture on a completely different computing system.
38
Twisted pair copper
DSL (Digital Subscriber Line) networks use the same twisted pair copper as traditional phone lines.
39
Coax
Coaxial cables are commonly associated with cable television and cable modem networks
40
FireWire
Although the name FireWire is an Apple trademark, the IEEE 1394 standard was used by other manufacturers with the names i.LINK, Lynx, and others. FireWire connectors cannot be plugged in face up or face down.
41
Infrastructure mode
Infrastructure mode uses an access point to communicate with other devices on the network. Ad hoc mode communicates directly to another device without using an access point
42
Long Term Evolution
Long Term Evolution, or LTE, is a converged standard used by mobile providers to provide high-speed communication over cellular frequencies.
43
Integrated Services Digital Network
Integrated Services Digital Network (ISDN) is a wired networking standard that provides digital communication over twisted pair copper
44
On-demand
The characteristic of on-demand self-service is an important aspect of cloud computing. With an on-demand process, system administrators can instantly create, modify, or delete services. This provides the flexibility to build an application infrastructure for any service at any time.
45
Resource pooling
It's common to place all of the computing power in one place to use for all cloud services. As more resources are needed, they are allocated from this central pool of resources.
46
WEP
IV - Initialization Vectors
47
EPA
PSK - Pre Shared Keys
48
WPA2
AES - Advanced Encryption system
49
WPA/WPA2
TKIP - Temporal Key Integrity Protocol