2020-10-09T13:09:00+03:00[Europe/Moscow] en true 10Base standards, 802.11, 802.2, 802.3, 802.x, A, AAAA, AC (Alternating Current), access control, accountability, ACL (Access Control List), active hub, active IDS, ad-hoc mode, address munging, adware, AH protocol (Authentication Header protocol), algorithm, amplitude, analog modulation, analog signal, ANS (Authoritative Name Server), ANSI (American National Standards Institute), antivirus software, AP (Access Point), APIPA (Automatic Private IP Addressing), Application layer, application-based IDS, ARP (Address Resolution Protocol), ARP cache, arp utility, AS (Autonomous System), asynchronous communications, ATM (Asynchronous Transfer Mode), attack, attacker, attenuation, auditing, AUI connector (Attachment Unit Interface connector), authentication, authentication by assertion, authorization, availability, backoff, bandwidth, baseband transmission, baseline, BGP (Border Gateway Protocol), biometrics, black hat, bluejacking, bluesnarfing, Bluetooth, BOOTP (Bootstrap Protocol), border router, botnet, bottleneck, bounded media, BPL (Broadband over Powerlines), branching factor, bridge, broadband transmission, broadcast domain, broadcast radio, broadcast transmission, brute force attack, BSS (Basic Service Set), buffer overflow, buffering, butt set, CA (Certificate Authority), cable certifiers, cable Internet access, cable modem, cable tester, cache, caching engine, CAN (Campus Area Network), CARP (Common Address Redundancy Protocol), carrier signal, CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol), cell, cell switching network, centralized network, certificate management system, certificate repository, change management, CHAP (Challenge Handshake Authentication Protocol), Checksum, chips, CIA triad (Confidentiality, Integrity, Availability), CIDR (Classless Inter Domain Routing), cipher, ciphertext, circuit switching, circuit tester, Class A addresses, Class B addresses, Class C addresses, Class D addresses flashcards

CompTIA Network+ Exam

Vocab Flash Cards for CompTIA Network+ Exam

  • 10Base standards
    A set of standards that describes the media type and the speeds at which each type of media operates
  • 802.11
    An IEEE standard that specifies an over-the-air interface between a wireless client and a base station or between two wireless clients.
  • 802.2
    An IEEE standard used to address the need for MAC sub-layer addressing in bridges.
  • 802.3
    An IEEE standard used to standardize Ethernet and expand it to include a wide range of cable media.
  • 802.x
    A family of networking standards developed by IEEE.
  • A
    A DNS record that maps the host name to its IP address using a 32-bit IPv4 address.
  • AAAA
    A DNS record that maps the host name to its IP address using a 128-bit IPv6 address.
  • AC (Alternating Current)
    An electrical current that switches its flow back and forth in a circuit
  • access control
    In security terms, the process of determining and assigning privileges to various resources, objects, and data.
  • accountability
    In security terms, the process of determining who to hold responsible for a particular activity or event.
  • ACL (Access Control List)
    A set of data (user names, passwords, time and date, IP address, MAC address, etc.) that is used to control access to a resource such as a computer, file, or network.
  • active hub
    A hub that regenerates the signal similar toa repeater.
  • active IDS
    An IDS that detects a security breach according to the parameters it has been configured with, logs the activity, and then takes the appropriate action to block the user from the suspicious activity.
  • ad-hoc mode
    A peer-to-peer wireless configuration where each wireless workstation talks directly to other workstations.
  • address munging
    A method used by end users to provide a fake name or address to post on consumer websites or newsgroups.
  • adware
    Software that automatically displays or downloads advertisements when it is used.
  • AH protocol (Authentication Header protocol)
    A protocol that IPSec uses to provide data integrity through the use of MDS and SHA. AH takes an IP packet and uses either MDS or AH to hash the IP header and the data payload, and then adds its own header to the packet.
  • algorithm
    In encryption, the rule, system, or mechanism used to encrypt data.
  • amplitude
    The crest or trough of a wave from the midpoint of the waveform to its top or bottom.
  • analog modulation
    The process of superimposing a low frequency data signal over a high frequency carrier waveform.
  • analog signal
    A signal that oscillates over time between minimum and maximum values and can take on any value between those limits.
  • ANS (Authoritative Name Server)
    A name server that responds to name-related queries in one or more zones.
  • ANSI (American National Standards Institute)
    The national standards institute of the United States, which facilitates the formation of a variety of national standards, as well as promoting those standards internationally.
  • antivirus software
    A software program that scans a computer or network for known viruses, Trojans, worms, and other malicious software.
  • AP (Access Point)
    A device or software that facilitates communication and provides enhanced security to wireless devices.
  • APIPA (Automatic Private IP Addressing)
    A service that enables a DHCP client computer to configure itself automatically with an IP address on the 169.254.0.0 network in case no DHCP servers respond to the client's DHCP discover broadcast.
  • Application layer
    The OSI layer provides services and utilities that enable applications to access the network and its resources.
  • application-based IDS
    An IDS software component that monitors a specific application on a host.
  • ARP (Address Resolution Protocol)
    A communications protocol that resolves IP addresses to MAC addresses.
  • ARP cache
    A table used to maintain a correlation between each MAC address and its corresponding IP address.
  • arp utility
    A command that enables an administrator to view and manipulate the ARP cache, including deleting it or adding an entry to it.
  • AS (Autonomous System)
    A self-contained network on the Internet that deploys a single protocol and has a single administration.
  • asynchronous communications
    A communication method in which special start and stop bit patterns are inserted between each byte of data allowing the receiver to distinguish between the bytes in the data stream.
  • ATM (Asynchronous Transfer Mode)
    A cell-switching network technology designed for the high-speed transfer of voice, video, and data in LANs, WANs, and telephone networks.
  • attack
    Any technique that is used to exploit a vulnerability in any application on a computer system without authorization.
  • attacker
    A term for a user who gains unauthorized access to computers and networks for malicious purposes.
  • attenuation
    The fading or degradation of a signal as it travels across a network medium.
  • auditing
    In security terms, the process of tracking and recording system activities and resource access. Also known as accounting.
  • AUI connector (Attachment Unit Interface connector)
    A 15-pin D-shaped connector. Also known as a DIX connector, named for the three companies that invented it Digital Equipment Corporation (DEC), Intel, and Xerox.
  • authentication
    A network security measure in which a computer user or some other network component proves its identity in order to gain access to network resources.
  • authentication by assertion
    Authentication based entirely on a user name/password combination.
  • authorization
    In security terms, the process of determining what rights and privileges a particular entity has.
  • availability
    The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.
  • backoff
    The random amount of time a node in a CSMA/CD network waits after a collision has occurred; a typical backoff period is a few milliseconds long.
  • bandwidth
    The average number of bits of data that can be transmitted from a source to a destination over the network in one second.
  • baseband transmission
    A transmission technique in which digital signaling is used to send data over a single transmission medium using the entire bandwidth of that medium.
  • baseline
    A record of a system's performance statistics under normal operating conditions.
  • BGP (Border Gateway Protocol)
    A path-vector protocol used by ISPs to establish routing between one another.
  • biometrics
    Authentication schemes based on an individual's physical characteristics.
  • black hat
    A hacker who exposes vulnerabilities for financial gain or for some malicious purpose.
  • bluejacking
    A method used by attackers to send out unwanted Bluetooth signals from PDAs, mobile phones, and laptops to other Bluetooth-enabled devices.
  • bluesnarfing
    A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
  • Bluetooth
    A wireless technology that facilitates short-range wireless communication between devices such as personal computers, laptop, cellular phones, and gaming consoles, thus creating a WPAN.
  • BOOTP (Bootstrap Protocol)
    A UDP network protocol that helps diskless workstation computers get an IP address before loading an advanced operating system.
  • border router
    A router situated on the edge of an AS that connects the AS to one or more remote networks.
  • botnet
    A collection of software robots run by a command and control program that is controlled by a person.
  • bottleneck
    A component of a system that performs poorly when compared to other components and reduces the overall system performance.
  • bounded media
    A networking medium that uses a physical conductor, typically made of metal or glass.
  • BPL (Broadband over Powerlines)
    A technology that allows domestic power lines for broadband transmission.
  • branching factor
    In a physical tree topology, the number of point-to-point connections that are consistently found between a node and the nodes beneath it in the tree structure.
  • bridge
    A network device that divides a logical bus network into subnets.
  • broadband transmission
    A transmission technique in which analog signaling is used to send data over a transmission medium using a portion of the medium's bandwidth.
  • broadcast domain
    A logical area in a computer network where any node connected to the computer network can directly transmit to any other node in the domain without a central routing device.
  • broadcast radio
    A form of RF networking that is non-directional, uses a single frequency for transmission, and comes in low- and high-power versions.
  • broadcast transmission
    A transmission method in which data goes from a source node to all other nodes on a network.
  • brute force attack
    A type of password attack where an attacker uses an application to exhaustively try every possible alphanumeric combination to try to crack encrypted passwords.
  • BSS (Basic Service Set)
    A service set that defines the way a WLAN is configured.
  • buffer overflow
    An attack that targets system vulnerability to cause the device operating system to crash or reboot and may result in loss of data or execute rogue code on devices.
  • buffering
    A flow control technique in which received data is stored on a temporary high-speed memory location.
  • butt set
    A special type of telephone used by telecom technicians when installing and testing local lines. Also known as a lineman's test set.
  • CA (Certificate Authority)
    A server that can issue digital certificates and the associated public/private key pairs.
  • cable certifiers
    A type of certifier that can perform tests, such as cable testing and validity testing.
  • cable Internet access
    A WAN connectivity technology that uses a cable television connection and a cable modem to provide high-speed Internet access to homes and small businesses.
  • cable modem
    Hardware that connects subscribers to a service provider's cable systems.
  • cable tester
    An electrical instrument that verifies if a signal is transmitted by a cable. Also called a media tester.
  • cache
    A buffer that is used when reading information from a disk or RAM.
  • caching engine
    An application or service that stores requested data in order to provide faster responses to future requests for the data.
  • CAN (Campus Area Network)
    A network that covers an area equivalent to an academic campus or business park.
  • CARP (Common Address Redundancy Protocol)
    A redundancy protocol that allows a number of computers to be grouped together to use a single virtual network interface between them.
  • carrier signal
    A high frequency signal that is superimposed on an analog signal to carry information.
  • CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)
    An AES cipher-based encryption protocol used in WPA2.
  • cell
    The area covered by a wireless access point Alternatively, a cell is a type of network, similar to a packet switching network, in which data is transmitted as fixed-length packets called cells.
  • cell switching network
    A type of network, similar to a packet switching network, in which data is transmitted as fixed-length packets called cells.
  • centralized network
    A network in which a central host computer controls all network communication and performs data processing and storage on behalf of clients.
  • certificate management system
    A system that provides the software tools to perform the day-to-day functions of a PKI.
  • certificate repository
    A database containing digital certificates.
  • change management
    A systematic way of approving and executing change in order to assure maximum security, stability, and availability of information technology services.
  • CHAP (Challenge Handshake Authentication Protocol)
    An encrypted remote-access authentication method that enables connections from any authentication method requested by the server, except for PAP and SPAP unencrypted authentication.
  • Checksum
    A value to let the receiver test the integrity of received data.
  • chips
    Multiple data signals generated in the DSSS technique.
  • CIA triad (Confidentiality, Integrity, Availability)
    The three principles of security control and management: confidentiality, integrity, and availability. Also known as the information security triad or information security triple.
  • CIDR (Classless Inter Domain Routing)
    A subnetting method that selects a subnet mask that meets an individual network's networking and node requirements and then treats the mask like a 32-bit binary word.
  • cipher
    A method for concealing the meaning of text.
  • ciphertext
    Data that has been encoded with a cipher and is unreadable.
  • circuit switching
    A switching technique in which one endpoint creates a single path connection to another, depending on the requirement.
  • circuit tester
    An electrical instrument that displays whether an electrical outlet is wired correctly.
  • Class A addresses
    A block of iP addresses from 1.0.0.0 to 127.255.255.255 that provides the largest number of nodes (16,777,214) for the smallest number of networks (126), thus increasing the number of nodes per network.
  • Class B addresses
    A block ofiP addresses from 128.0.0.0 to 191.255.255.255 that provides a good balance between the number of networks and the number of nodes per network-16,382 networks of 65,534 nodes each.
  • Class C addresses
    A block of IP addresses from 192.0.0.0 to 223.255.255.255 that provides the largest number of networks (2,097,150) and the smallest number of nodes per network (254).
  • Class D addresses
    A block of IP addresses from 224.0.0.0 to 239.255.255.255 used to support multicast sessions.