Term 151-200 Flashcards

1
Q

what is a PoE

A

Power over Ethernet (PoE) is technology that passes electric power over twisted-pair Ethernet cable to powered devices (PD), such as wireless access points, IP cameras, and VoIP phones in addition to the data that cable usually carries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is netsh winsock

A

netsh winsock reset is a command in windows to recover the computer from any socket errors which arise when you download some unknown file, or due to some malicious script on the computer. Winsock settings contain your computer’s configuration for Internet connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Multicast

A

In computer networking, multicast is group communication where data transmission is addressed to a group of destination computers simultaneously. Multicast can be one-to-many or many-to-many distribution. Multicast should not be confused with physical layer point-to-multipoint communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is CNAME

A

A Canonical Name record is a type of resource record in the Domain Name System that maps one domain name to another. This can prove convenient when running multiple services from a single IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is RDP

A

Remote Desktop Protocol is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is Fingerprinting

A

What is a fingerprint in cybersecurity? … Fingerprinting (also known as Footprinting) is the art of using that information to correlate data sets to identify network services, operating system number and version, software applications, databases, configurations and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Social engineering

A

In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. This differs from social engineering within the social sciences, which does not concern the divulging of confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is Smurf attack

A

The Smurf attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol packets with the intended victim’s spoofed source IP are broadcast to a computer network using an IP broadcast address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is PKI

A

A public key infrastructure is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly