Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
45 Cards in this Set
- Front
- Back
Collaboration Tools |
Allow individuals to communicate with each other, often across real-time interactive video. |
|
Blogs |
"WebLogs" are web pages that are easy to edit and update. Are a mean of communicating thoughts. |
|
Wikis |
Web pages that groups of people can edit and view together. |
|
Podcasting |
Deliver audio records to a wide audience. |
|
Peer-To-Peer File Sharing |
Share files without having to store and download them from a central server. |
|
Network Interface Card [NIC] |
Local Area Network [LAN] Adapter that provides physical connection to the network. |
|
Physical Port |
Connector or outlet on a network device where the network media is connected to an end device or another network device. |
|
Interface |
Specialised ports on a networking device that connect to individual network. |
|
Local Area Network [LAN] |
Provides access to the network in a small geographical area. |
|
Wide Area Network [WAN] |
Provides access to the network in a wide geographical area. |
|
Metropolitan Area Network [MAN] |
Provides access to the network in a range wider than a Local Area Network [LAN] but smaller than a Wide Area Network [WAN]. |
|
Wireless Local Area Network [WLAN] |
Wirelessly provides access to the network in a small geographical area. |
|
Storage Area Network [SAN] |
A network infrastructure designed to support file servers and manage data. |
|
Intranet |
Private connection of Local Area Networks [LANs] and Wide Area Networks [WANs] that belongs to an organization. |
|
Extranet |
Provides secure and safe access to individuals that work for other organization, but still need the access. |
|
Cable Connection |
Provides connection as well as television signal through the same method. |
|
Digital Subscriber Line [DSL] Connection |
Provides connection while it runs through the telephone cable. |
|
Fault Tolerance |
A network that limits the impact of failure, so that the fewest number of devices are affected. Also, it is built in a way that allows quick recovery when a failure occurs. |
|
Scalability |
A network that can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users. |
|
Quality of Service [QoS] |
A network that prevents congestion of bandwidth. |
|
Data Confidentiality |
Only the intended and authorized recipients can access and read data. |
|
Data Integrity |
Having the assurance that the information has not been altered in transmission, from origin to destination. |
|
Data Availability |
Having the assurance of timely and reliable access to data services for authorized users. |
|
Wireless Internet Service Provider [WISP] |
Connect subscribers to a designated access point or hot spot. Commonly used in rural areas. |
|
Wireless Broadband Service |
Uses the same cellular technology used to access the Internet with a smart phone or tablet. Using an antenna that provides wireless connection in a home. |
|
Viruses, worms, and trojan horses |
Malicious software and arbitrary code running on a user device. |
|
Spyware and adware |
Software installed on a user device that secretly collects information about the user |
|
Denial of service attacks |
Attacks designed to slow or crash applications and processes on a network device. |
|
Data interception and theft |
Capture private information from an organization’s network. |
|
Identity theft |
Steal the login credentials of a user in order to access private data. |
|
Anti-virus and anti-spyware |
These are used to protect end devices from becoming infected with malicious software. |
|
Firewall filtering |
This is used to block unauthorized access to the network. |
|
Access control lists [ACL] |
These are used to further filter access and traffic forwarding. |
|
Intrusion prevention systems [IPS] |
These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks. |
|
Virtual private networks [VPN] |
These are used to provide secure access to remote workers. |
|
Command-Line Interface [CLI] |
Access to a computer operating system or an application through visual prompt of commands. |
|
Console |
Physical management port that provides out-of-band access to a Cisco device. |
|
Secure Shell [SSH] |
Method for remotely establishing a secure Command Line Interface [CLI] connection through a virtual interface, over a network. |
|
Telnet |
Insecure method of remotely establishing a Command Line Interface [CLI] session through a virtual interface, over a network. User authentication, passwords, and commands are sent over the network in plaintext. |
|
Legacy Auxiliary Port [AUX] |
Establish a Command Line Interface [CLI] session remotely using a modem. Is out-of-band and does not require networking services to be configured or available. |
|
startup-config [Command] |
The file stored in Non-Volatile Random Access Memory [NVRAM] that contains all of the commands that will be used by the device upon startup or reboot. |
|
running-config [Command] |
The file stored in Random Access Memory [RAM] that reflects the current configuration. |
|
Access Method |
Determines when someone is able to send a message. Hosts on a network need it to know when to begin sending messages and how to respond when errors occur. |
|
Flow Control |
In network communication, source and destination hosts use it to negotiate correct timing for successful communication. |
|
Response Timeout |
Rules that hosts have in the networks to specify how long to wait for responses and what action to take if a response timeout occurs. |