CompTIA Network 2 Flashcards

IP address
Terms Definitions
Port 123
Port 22
802.11g frequency
Cat 5
100 Mbps
function in cryptography
Fast Ethernet(100 mbps)
IEEE 802.5
Token Ring
Packet-switching communication protocol designed for long-distance analog data transmission rather than the circuit-switching technology used by the telephone system.
ICFInternet Connection Firewall
XP firewall
port-authentication network access control mechanism for networks
IPSec operating layer
Layer 3
IRQ for COM 2
802.11g max speed
54 mbps
thinnet cable
RG58/U coaxial cable.
IEEE 802.14
standards for cable modems
IEEE 802.2
Logical Link Control LLC
fiber connector with 2 fibers
thicknet cable
RG-8 or RG-11 cable.
Event Viewer
The Windows logging utility.
WAN connection technology that connects through a cell phone or laptop's cellular network PC card on a cellular phone network.
digital signal rate created by converting analog sound into 8 bit chunks 8000 times a second,64kbps simplest data stream
based on bus topology, 802.3 subcommitte defines specs
DMZDemilitarized Zone
lightly protected subnet network between firewall and Intranet, public servers like Web server
Destination Port
fixed predetermined number that defines the function or session type in TCP/IP network
Far end crosstalk, crosstalk on opposite end of a cable from the source
IASInternet Authentication Server
RADIUS server for MS
method of addressing group of computers a though they were a single computer. Many computers with same IP, advanced routers send data to closest computers
B Channel of BRI ISDN
64 kbps
Two co-axial cable connectors:
F-Type and BNC
small form factor fiber-optic connectors
Coaxial cabling used for Ethernet networks.
50-ohm stranded core coaxial cables used for backbones.
Ethernet standards run over fiber optic cable.
A routable network protocol supported by Apple Macintosh computers.
A UNIX-based version of IPCONFIG—a command-line utility used to display and modify the current TCP/IP stack.
Ethernet LAN on UTP. 100Mbps (Uses four-pair Cat 3 or better)(100BaseT made obsolete)
AAA (Authentication, Authorization, and Accounting)
Security philosophy, computer connecting to network must have credentials to connect, limitable permissions, records session information about client
passage of a packet through a router
Digital Signature
string of characters created from private encryption key, verifies sender's identity
part of fiber that does the reflecting
physical connection of wires in a network
An analog cycle on a telephone line
Digital signaling that only has one signal on the cable at a time, Signal in 1 of 3 states, on, off or idle
Cable Tray
for organizing cables in drop ceilings
# of pins for an RJ-45 connector
File and Print Services for Netware allows Novel clients to access files and printers on a Windows server
At what percentage expiration of its DHCP lease will the client try to renew the lease?
IrDA 1.1 max distance
1 meter (3 feet)
An attack that tricks e-mail servers into sending data through a third node.
A wireless technology that use signals sent over electromagnetic radio waves to transmit data between devices, allowing transmissions to pass through most nonmetallic obstructions and around corners.
A piece of information that determines the result of an encryption algorithm.
A defined namespace in RADIUS, which helps determine which server should be used to authenticate a connection request.
Network Monitor
A simple protocol analyzer for Microsoft Windows operating systems.
war chalking
The process of marking buildings, curbs, and other landmarks indicating the presence of an available access point and its connection details by utilizing a set of symbols and shorthand.
error detection method adds a bit at end that reflects dumber of data bits in a packet
IFSInterframe Space
short period of silence in CSMA/CA when a device detects activity
Bus Topology
Network Topology using a single bus cable that connects all computers in a line. Requires termination
Asymmetric-Key Algorithm
Encryption Method in which key to encrypt is different than the key to decrypt
DNSDomain Name Service
TCP/IP name resolution system that resolves host names to IPs
Static image of a system or network's performance when all elements are known to be working properly
point at which all the routing tables for all routers in a network are updated
predefined event that is recorded to a log file
Continuity Tester
cheap network tester can only check for continuity on wire
Connectionless Communication
protocol that does not establish and verify before transmitting data. UDP
Configuration Management
set of docs, procedures, and policies that help to maintain and update a network logically
Effective Permissions
permissions of all groups combined in any Network OS
Biometric Devices
Scan fingerprints or retinas, soind of users voice, fool proof replacement for passwords and smart devices
SMB Protocol
Server Message Block via Samba allows Windows computers to access resources on UNIX/LINUX Machines
LAN (local area network)
A specifically designed configuration of computers and other devices located within a confined area, such as a home or office building, and connected by wires or radio waves that permit the devices to communicate with one another to share data and services.
horizontal cross-connect
The junction point for the workstation cables.
Temporary or quick fix designed to fix a security vulnerability, compatibility or operating issue.
Wi-Fi (Wireless Fidelity)
The most widely used wireless technology at present; began as 802.11b IEEE standard, although most implementations have been upgraded to use the newer 802.11g.
ESSExtended Service Set
Single WAP servicing an area, extended by adding more APs
DNS root servers
highest in hierarchy of DNS servers running the Internet
DSP - Digital Signal Processor
specialized processor that processes digital signals
2 or more NICs in a system working together to increase performance
ICMP Port and definition
Internet Control Message Protocol - Port ??
NAC (Network Access Control)
A process or architecture through which computers are verified to be in compliance, and brought into compliance if they fall short, before they are permitted access to the network.
SYN flood
An attack where a server is inundated with half open TCP connections which prevent valid users from being able to access the server.
port address
A number between 0 and 65,535 that identifies a program running on a computer.
signal-regenerating repeater
A repeater that reads the signal and then creates an exact duplicate of the original signal before sending it on. Also called an intelligent repeater.
service pack
A collection of updates as a single installation.
Web spoofing
Users are tricked into visiting a Web site that looks and acts like an official, legitimate Web site. The imposter Web site is set up to dupe the victim into providing information such as user names, passwords, credit card numbers, and other personal information.
SSH (Secure Shell)
A popular tool for remote command-line system access and management, with current implementations supporting secure file transport (over Secure FTP, or SFTP).
network ID
The portion of an IP address which represents the network on which a device resides.
OTDR (optical time-domain reflectometer)
Version of TDR for optical cable.
consolidation point
The point in a horizontal run where two cables are interconnected using a reusable connector such as a punch-down block.
DSL (Digital Subscriber Line)
WAN connection technology that uses high-speed connections made over regular analog phone lines.
CRL (certificate revocation list)
A data structure containing revoked certificates.
Uses something about a user, such as a fingerprint, retinal scan, or voice print, to secure an account or resource.
CA (certificate authority)
The person or entity responsible for issuing certificates.
HTTP (Hypertext Transfer Protocol)
An OSI Application layer protocol which defines the commands that Web browsers can send and how Web servers are capable of responding.
FCSFrame Check Sequence
bits placed ina frame used to check data for errors
ACL - Access Control List
List of permissions that specifies what an authenticated user may perform on a shared resource
Authoratative DNS Servers
DNS servers that hold IP addresses and names of systems for domain/domains in its forward lookup zone
A Records
List of the IP addresses and names of all systems on a DNS server domain
What command do you use to add a static entry to the ARP table
arp -s
screened host
A router used to filter all traffic to the private intranet but also to allow full access to the computer in the DMZ.
port scanner
A tool that examines a host or network to determine which ports are being monitored by applications on the scanned hosts.
MDF (main distribution frame)
A network rack that contains the devices used to manage the connections between external communication cables and the cables of your internal network.
RARP (Reverse Address Resolution Protocol)
Converts physical MAC addresses to logical IP addresses.
AES - Advanced Encryption Standard
block cipher, uses 128-bit block size, and 128-,192-, or 256-bit key size
Cached Lookup
list kept by a DNS server of IPs it has resolved, prevents re-resolving
Layer for data delivery across an individual link
data link / layer 2
ISDN (Integrated Services Digital Network)
Uses a telephone line to transmit data, but unlike POTS, the data isn't converted to analog form. An ISDN line is digital and consists of two phone circuits, both carried on one pair of wires along with a slower, third circuit used for control signals.
RADIUS (Remote Access Dial-in User Service)
Uses a specialized server for authentication and WEP for data encryption.
CSU/DSU (Channel Service Unit/Digital Service Unit)
A two-in-one device that cleans and formats data before sending it on a T1 line. The Channel Service Unit (CSU) acts as a safe electrical buffer between the LAN and a public network accessed by the T1 line. The Digital Service Unit or Data Service Unit (DSU) ensures that the data is formatted correctly before it's allowed on the T1 line.
ATM - Asynchronous Transfer Mode
Network technology using Cat 5 or better UTP/fiber. 25 to 622 Mbps
IGMP (Internet Group Management Protocol)
An OSI Network layer protocol used for the management of multicast groups.
Minimum # Drives for RAID 10
4 - Two striped disks, mirrored on two more
Port 80
Port 137
IEEE Internetworking
Port 220
Bluetooth frequency
IEEE 802.3
CSMA/CD (ethernet)
"Port 15 "
Layer 3
Network-routers-logical addressing--IPX, IP, NetBEUI
Original, unencrypted information.
central glass of fiber
T1 Max Speed
1.544 Mbps
SSL operating layer?
Session Layer
IRQ for COM 1
IEEE 100 mbps technologies
Intermediate System to Intermediate Systemsimilar to OSPF w IPv6 support
VoIP standard handles initiation, setup, and delivery of VoIP sessions
Gigabit Etherent standard using multimode fiber. Max distance 5km
IrDA 1.1 max speed
4 Mbps
Max length of 10BaseF
2k meters
Bluetooth 2.0 max speed
2.1 Mbps
Alternating electrical current flowing through a wire creates an electromagnetic field around the wire which affects the current flow in any adjacent cables.
Device that connects 2 networks, passes traffic based on node address. OSI layer 2
Technically accurate but little used name for 100BaseT
Gigabit Ethernet standard. 802.3z. All gigabit standards except 1000BaseT (802.3ab standard)
grouping of users, computers, and/or networks. MS group that shares database and security policy. Internet share element of DNS hierarchical name
10-Gbe standard using 850-nm multimode fiber. Max distance, 300m
Connection-Oriented Communication
protocol that establishes between hosts before transmitting data. TCP
Max Distance for 1000BaseLX - multimode
WAP operates at what layer?
Layer 2
Client Services for Netware allows windows workstations to access netware resources without going through a windows server gateway
Minimum category cable for gigabit ethernet (1000Base-TX)
/12 Private IP Range -
A high-speed network link connecting network segments.
Kerberos v5
The primary authentication protocol used in Active Directory Domain Services environments.
A location where signals are distributed to various destinations.
WAN connection technology that uses connections made by sending and receiving signals from satellites in orbit around the earth.
Horizontal Cabling
cabling connecting the equipment room to work areas
Ethernet LAN on fiber. 100Mbps via baseband signaling. Max distance 400m/half duplex or 2km/full duplex
signaling method used by T1 lines, simple frame consisting of 25 pieces, framing bit and 24 channels each channel holds 8 bit DS0. 193-bits per DS1 frame, 1.544 Mbps
process of placing packets from one protocol into another, i.e TCP/Ip encapsulation in Ethernet
Content Switch
advanced networking device works at Layer 7 hides servers behind a single IP
Dipole Antenna
standard straight wire antenna, omni directional
Bridge Loop
negative situation when switches are configured in a loop. SPF protocol prevents by turning off looping ports
Bluetooth 1.1 max speed
1mbps theoretical, 723kbps practical
# of simultaneous drive failures RAID 5 can recover from
Layer for router
Network Layer / Layer 3
Min category rating for 10BaseT network?
Cat 3
traffic shaper
Software that controls network traffic in order to optimize performance or increase usable bandwidth. Also called a bandwidth shaper.
Trojan horse
An application designed to appear harmless, but delivers malicious code to a computer.
Coaxial cable used to deliver cable television signals to and within homes.
The point at which the communications network owned by one company connects to the communications network owned by another company. Also called demarcation point.
A wireless technology that uses pulses of invisible infrared light to transmit signals between devices, offering relatively low-speed, line-of-sight connections between devices.
Fixes errors in the operating system code.
A program that replicates itself over the network without a user's intervention.
client/server network
A network with computers called servers, which hold data and provide a wealth of services that users can share.
Data can be transmitted across the medium in both directions at the same time.
fingerprint scanner
A biometric hardware security device that scans a user's finger and compares the print to a database of user names and passwords.
Data is transmitted across the medium in both directions, but only in one direction at a time.
point-to-point connection
There's a dedicated connection between two nodes—only those two nodes communicate over the connection.
eye scanner
A biometric hardware security device that scans the surface of a user's retina to obtain the blood vessel patterns found there, then compares it to a database of user names and passwords.
Complete Algorithm
cipher and the methods used to implemenet the cipher
output of cleartext run through a cipher algorithm using a key
Change Management Documentation
set of documents that defines procedures for changes to the network
Device ID
last 6 digits of MAC address, manufacturer's unique serial number for that NIC
Drive Duplexing
writing identical data to two hard drives on different controllers
Drive Mirroring
writing identical data on two hard drives on the same controller
Ethernet LAN run on UTP. 100Mbps via baseband signaling (2 pairs of wires on Cat 5 or greater)
Default Gateway
In TCP/IP network, IP address of router that conencts the LAN to a wider network. The address is necessary for TCP/IP configuration
DOCSISData over cable service interface specification
used by cable modems
Layer for network addressing
Network Layer / Layer 3
1000Base-CX connector
HSSDC (9-pin, copper based High Speed Serial Data)
NAT (network address translation)
Modifies network address information in the packets it transmits from an internal network onto the Internet, allowing a single address from a router to rewrite originating IP addresses from the internal network so that they all appear to come from the router's IP address.
NIC (network interface card)
Provides the communication channel between your computer's motherboard and the network.
The process a modem uses to convert analog data received from a phone line to digital.
dead zone
A network between two routers that uses another network protocol other than TCP/IP.
Ethernet bonding
Combines the bandwidth of two network interface cards as a cost-effective way to increase bandwidth available for data transfers for critical servers, such as firewalls and production servers.
Wi-Fi hijacking
A hacker configures his or her computer to present itself as a wireless router to intercept a user's communication.
twisted-pair cable
Composed of four pairs of copper wires, with the wires in each pair are twisted around each other, then twisted together and bundled within a covering.
Configuration Management Documentation
docs that define the configuration of the network: wiring diagrams, network diagrams, baselines, policy/procedure/config docs
Flat Name Space
naming convention that each device has unique, NetBIOS (non-hierarchical)
Daily Backup
daily copy backup, makes copy of all files that have been changed on that day
Dynamic NAT
type of NAT in which many computers share a pool of routable IPs (fewer IPs than machines)
Global Unicast Address
second IPv6 address that every system needs in order to get on the internet
Classless Subnet
a subnet that does not fall into common A B or C categories
Bridged Connection
early type of DSL, always on network, worked like a LAN
Baud rate
number of bauds per second, due to frequency modulation baud rate can be higher than 1 bps
Class license
contiguous chunk of IPs passed out by IANA
Capturing a Printer
printer uses a local LPT port, supports older programs that can't print directly to a UNC named printer
Incremental Backup
backs up files with archive bit turned on, then turns archive bits off
NAP (Network Access Point)
A major Internet connection point that's used to connect and route traffic between smaller commercial backbones.
proxy server
A server that acts as an intermediary between computers on a network and the Internet.
S-HTTP (Secure HTTP)
An OSI Application layer protocol used to secure Internet transmissions by securing the individual data packets themselves.
An attack where a host is flooded with ICMP packets.
packet switching
Data is broken up into packets before it's sent over the network; each packet is transmitted individually and is able to follow different routes to its destination.
WPA (Wi-Fi Protected Access)
A wireless encryption technology that uses the RC4 symmetric cipher with a 128-bit key. WPA Personal uses a "pre-shared key" (PSK), which simply means you must enter a passphrase onto both the AP and clients.
demarc terminating device
Device responsible for the code and protocol conversions, as well as the buffering required for communications to and from an ISP and your internal network. Also referred to as the network terminating interface (NTI), network terminating unit (NTU), network terminating device (NTD), smart jack, or an MPOE (minimum point of entry).
CHAP (Challenge Handshake Authentication Protocol)
An authentication method used by Point-to-Point Protocol (PPP) servers. CHAP validates the remote client's identity at the communication session start or at any time during the session.
APIPA (Automatic Private IP Addressing)
The non-routable network used by Windows clients to automatically generate an address in this range if they are configured to obtain an IPv4 address from a DHCP server and are unable to contact one.
back-to-back firewall
The DMZ network is located between two firewalls, the two firewalls between the Internet and the DMZ, and the DMZ and the intranet each have two network cards, as does the server within the DMZ.
DUN (Dial-up networking)
WAN connection technology that uses a modem to connect through regular, analog phone lines.
hybrid topology
Two or more different types of network topologies are combined together into one network.
Forward Lookup Zones
storage area on DNS servers to store IPs and names of systems for a domain/s
Cache only DNS servers
Do not foward lookup zones. Resolve names of systems for the network but do not provide other DNS servers with names
DNS resolver cache
cache used by Windows DNS clients to keep track of DNS info
BSS - Basic Service Set
Wireless networking: a single WAP servicing a given area
Last 3 bytes of a MAC address are what?
Device ID
SMTP (Simple Mail Transfer Protocol)
An OSI Application layer e-mail protocol used to send and receive e-mail messages between e-mail servers; and send e-mail from an e-mail client to an e-mail server.
SONET (Synchronous Optical NETwork)
An ANSI standard protocol for signal transmission on optical networks, which is divided into categories based on a base signal (Synchronous Transport Signal or STS) and an optical carrier (OC) level.
ACL (access control list)
Controls the permissions to allow or deny user access to a folder or printer.
DOS (Denial of Service)
An attack which consumes or disables resources so that services to users are interrupted.
CSMA/ CACarrier Sense Multiple Access with Collision Avoidance
Access method used in wireless networks. Devices send a signal first to check if wire is free, then either sends or waits random amount of time
ARP -Address Resolution Protocol
protocol in the TCP/IP suite used in cmd line to determine MAC address that corresponds with an IP
DCFDistributed Coordination Function
1 of 2 methods for CSMA/CA defined by 802.11 standards, only currently implemented
POTS (plain old telephone service)
The network of the world's public circuit-switched telephone networks (public switched telephone network—PSTN).
rollover cable
A TP cable where the wires in each end are the reverse of one another; used to connect a computer's serial port to the console port of a router or managed switch.
AUP - Acceptable Use Policy
Document that defines what a a person man and may not do on a a computer or network
APIPA - Automatic Private IP Addressing
Networking feature of OSs that enables DHCP clients to self configure IP address and subnet mask when a DHCP server is not available
DDoS (Distributed Denial of Service)
A network attack in which the attacker manipulates several hosts to perform a DoS attack.
Length of a MAC address
48 bits = 6 bytes = 12 hex digits
/ 230

Leave a Comment ({[ getComments().length ]})

Comments ({[ getComments().length ]})


{[ comment.comment ]}

View All {[ getComments().length ]} Comments
Ask a homework question - tutors are online