Chapter 11- Essential Peripherals
Blank
Full-Speed USB- Newer version of USB that runs at a maximum of 12 Mbps
USB Host Controller- Integrated circuit built into a chipset that controls every USB side
USB Root Hub- Host that has physical ports
USB Thumb Drive- Portable flash drive that connects via USB
Low-Speed USB- Older version of USB that runs at a maximum speed of 1.5 Mbps
Biometrics- Scans body parts for information
Digitizer- Pen tablet that enables drawing on a computer
Touchpad- Moves cursor on a laptop
Power Source- How an electronic gets power
Optical Mouse- Cursor that uses a light to guide it
CDFS- CD File System
CD-R- CD-Recordable
CD-RW- CD-Rewriteable
CD-ROM- Formats CDs into sectors, each holding 2353 bytes
Super-Speed USB- Can reach speeds over 10 Gbps (USB 3.1)
UPC- Universal Product Code
xD-Picture Card- Extreme Digital Picture Card
Touchscreen- Display that you can interact with via touch
FireWire- eSATA version of USB that’s also known as IEEE 1394
KVM Switch- Keyboard, Video and Mouse Switch
Showing posts with label defined. Show all posts
Showing posts with label defined. Show all posts
Wednesday, March 11, 2020
Monday, March 2, 2020
A+ Chapter 12 Power Words - Blank
Chapter 12 - Building a PC
- Audio Interface
- HTPC
- Log File
- Migration
- Home Server PC
- Thin Client
- Thick Client
- Windows Easy Transfer
- Upgrade Installation
- Section Partition
- End User License
- Patch
- Gaming PC
- Service Patch
- Boot Method
- Recovery Partition
- Video Editing Workstation
- Net Boot
- Image Development
- Virtualization Workstation
A+ Chapter 12 Power Words - Defined
Chapter 12 - Building a PC
- Audio Interface – What controls all your system audio
- HTPC- Hyper text protocol
- Log File – Record of events that have recently taken place in your PC.
- Migration - Moving data from one server or hard drive to another
- Home Server PC - The main PC in a home server.
- Thin Client - Client to communicate with the server.
- Thick Client - Implements its own features.
- Windows Easy Transfer – Transfers Windows files from system to system.
- Upgrade Installation – Installation for a recent update.
- Section Partition – A partition broke into sections
- End User License Agreement – Consent for usage
- Patch – Mini update usually for bugs.
- Gaming PC – High powered PC made for gaming
- Service Patch – Patch that is directly applied to a service
- Boot Method – How to start your computer
- Recovery Partition – A partition that is saved and kept so later can be restored if needed.
- Video Editing Workstation – Workstation for editing
- Net Boot – Allows iOS to boot from a network.
- Image Development – How an image is processed and made.
- Virtualization Workstation – A virtualized place to test different things.
Thursday, February 27, 2020
Network+ Chapter 18 Power Words - Defined
Chapter 18 – Managing Risk
Blank
Blank
- Acceptable Group Policy - a feature of the Microsoft Windows NT family of operating systems that controls the working environment of user accounts and computer accounts
- Aircrack-ng - a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic
- Approval Process - the method an organization uses to approve anything from documents, invoices, budgets, and purchase orders, to a new process that a company wants to institute
- Archive - place or store (something)
- Backup - an extra copy of data from a computer
- Business Continuity Plan (BCP) - the process of creating systems of prevention and recovery to deal with potential threats to a company. In addition to prevention, the goal is to enable ongoing operations before and during execution of disaster recovery
- Chain of custody - a document that is borrowed from law enforcement that tracks evidence from the time the Computer Forensics Examiner gains possession of the item until it is released back to the owner
- Change management - the control of the supply chain as a process from supplier to manufacturer to wholesaler to retailer to consumer. ... In computing, SCM typically is used in reference to software applications that enable more efficient management of the supply chain
- Change management team – Team that does change management
- Change request - a message sent between objects.
- Cold site - a business location that is used for backup in the event of a disruptive operational disaster at the normal business site.
- Computer forensics – forensics on a computer
- Contingency plan - A plan involving suitable backups, immediate actions and longer term measures for responding to computer emergencies such as attacks or accidental disasters. ... Also called a "disaster plan," a contingency plan must be updated periodically
- Disaster recovery – Recovery for a disaster
- Documentation – Recording what has been done
- Electronic discovery - refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case
- Electrostatic discharge (ESD) – Discharge that can harm you from working on computers
- Exit plan – Plan for exit
- Fail closed - is when a device or system is set, either physically or via software, to shut down and prevent further operation when failure conditions are detected
- Fail open - does not shut down when failure conditions are present. Instead, the system remains “open” and operations continue as if the system were not even in place. This strategy is used when access is deemed more important that authentication
- First responder – First people to respond to an emergency
- Forensics report – Report from forensics
- Ground loop - occurs when two points of a circuit both intended to be at ground reference potential have a potential between them.
- Heating, ventilation, and air conditioning (HVAC) – Cooling and heating systems
- High availability (HA) – Availability that is high
- Hot site - a commercial disaster recovery service that allows a business to continue computer and network operations in the event of a computer or equipment disaster
- Incident - an event that is not part of normal operations that disrupts operational processes
- Incident response – Response to an incident
- Legal hold - a situation wherein a business or organization makes changes to its method of records management in order to preserve information because of a pending litigation
- Maintenance window – Windows for maintenance
- Material safety data sheet (MSDS) – Data sheet that shows safety for materials
- Memorandum of understanding (MOU) - A metric used to compute billing and/or statistics for telephone calls or other network use
- Metasploit - An open source attack framework
- Microsoft baseline security analyzer (MBSA) – Baseline security analyzer developed by Microsoft
- Multi-source agreement (MSA) – Agreement with multiple sources
- Nessus - an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools
- Network access policy – Access policy for a network
- Nmap - a free and open-source network scanner
- Penetration testing (PENTEST) – testing on a device to see if it can be penetrated or not
- Recovery point objective (RPO) – Objective for recovery points
- Recovery time objective (RTO) – Objective for time points
- Risk management - the process of identifying, assessing and controlling threats to an organization's capital and earnings
- Security policy – Policy for security
- Service level agreement (SLA) – Level agreement for services
- Single point of failure – Point where the failure occurs
- Statement of work (SOW) - a document that enables offeror's to clearly understand the government's needs for the work to be done in developing or producing the goods or services to be delivered by a contractor
- Succession planning – Planning for succession
- Virtual IP – Virtual Internet Protocol
- Vulnerability management – Management for vulnerability
- Vulnerability scanner – Scanner that scans for vulnerability in your device
- Warm site - a type of facility an organization uses to recover its technology infrastructure when its primary data center goes down
Network+ Chapter 6B Power Words - Blank
Network+ Chapter 6B
- Near End Crosswalk
- Race way
- Run
- Solid Core
- Split Pair
- Punch down tool
- Wire map
- Work Area
- Patch panel
- Patch Cables
- Smart Jacks
- Stranded core –
- Solid Core
- Near End Crosswalk
- Unit
- Split Paire.
- Punch down tool
- Wire map
- Work Area
- Near End Crosswalk
Wednesday, February 26, 2020
Network+ Chapter 9B Power Words - Defined
Chapter 9B - TCP/IP Applications
Blank
1. Open port- Socket that is prepared to respond to IP packets destined to the packet's port number
2. POP3 - Post Office Protocol Version 3
3. Private Port Number- Web client's source number ranging from 49152 to 65535
4. Registered Port- Port numbers 1024 to 49151
5. SSH- Secure Shell
6. SSL- Secure Sockets Layer
7. Sendmail- Linux/UNIX method to send emails
8. Session- Communication between two or more computers
9. SMTP- Simple Mail Transfer Protocol
10. Socket-Session information stored in RAM
11. Socket Pairs- Data stored between two computer's TCP/IP applications
12. TCP/IP Suite- All aspects and protocols that make up TCP/IP
13. TCP Three-Way Handshake- Session information sent to two other computers from one server
14. Telnet- Protocol that can access different protocols
15. TLS- Transport Layer Security
16. TCP-- Transmission Control Protocol
17. TFTP- Trivial File Transfer Protocol
18. Unsecure Protocol- Common network vulnerabilities or threats, ex. HTTP
19. UDP- User Datagram Protocol
20. Web Services- Applications accessed on the Internet
21. Well-Known Port Number- Port numbers ranging from 0 to 1023
Blank
1. Open port- Socket that is prepared to respond to IP packets destined to the packet's port number
2. POP3 - Post Office Protocol Version 3
3. Private Port Number- Web client's source number ranging from 49152 to 65535
4. Registered Port- Port numbers 1024 to 49151
5. SSH- Secure Shell
6. SSL- Secure Sockets Layer
7. Sendmail- Linux/UNIX method to send emails
8. Session- Communication between two or more computers
9. SMTP- Simple Mail Transfer Protocol
10. Socket-Session information stored in RAM
11. Socket Pairs- Data stored between two computer's TCP/IP applications
12. TCP/IP Suite- All aspects and protocols that make up TCP/IP
13. TCP Three-Way Handshake- Session information sent to two other computers from one server
14. Telnet- Protocol that can access different protocols
15. TLS- Transport Layer Security
16. TCP-- Transmission Control Protocol
17. TFTP- Trivial File Transfer Protocol
18. Unsecure Protocol- Common network vulnerabilities or threats, ex. HTTP
19. UDP- User Datagram Protocol
20. Web Services- Applications accessed on the Internet
21. Well-Known Port Number- Port numbers ranging from 0 to 1023
Monday, February 24, 2020
A+ Chapter 3 Power Words - Defined
Chapter 3 - The Visible Computer
Blank
Blank
- App – Downloaded application
- Control Panel – motherboard of windows
- File Extension – Letter occurring after period in file name
- Gadget – small electronic tool
- Hardware – Physical elements that make up a computer
- User interface – the way the user and computer interact
- Task bar – allows quick access
- File explorer – file manager
- Desktop - working area on your computer screen
- PC – Computer assigned to you
- Windows explorer – windows manager
- System tool – used to do tasks on the system
- Settings app – controls how the computer works
- Administrative tools – tools for administrator
- Start button – turns on computer
- Network connection – connects computers to the internet
- Metro UI – user interface
- Charm – control
- Charm bar – control bar
- Processing – how long it takes to happen or to finish
A+ Chapter 14 Power Words - Defined
Chapter 14 - Users, Groups, and Permissions.
Blank
Blank
- User account applet: include adding or removing hardware and software, controlling user accounts
- local user account: An established relationship created on a computer that identifies a user and the user's settings and permissions when logged in.
- authorization: the action or fact of authorizing or being authorized.
- owner: The owner
- group: A group
- UAC (User Account Control):
- Inheritance: a feature that represents the "is a" relationship between different classes.
- Chown: A Unix command that allows the root user to change the owner and group assigned to files, directories and links.
- BitLocker Drive Encryption: a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers.
- EFS (Encrypting File System): a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption.
- BitLocker: a full volume encryption feature included with Microsoft Windows.
- UAC: a feature that was designed to prevent unauthorized changes to your computer.
- administrative shares: hidden network shares created by Windows NT family of operating systems that allow system administrators to have remote access to every disk volume on a network-connected system.
- Ownership: You own this
- Standard user: Just a normal User
- Chmod: a UNIX command that changes the access permissions of files or directories in order to read, write or execute files.
- User Group: A group of normal users
- NTFS Permissions: affect local users as well as network users and they are based on the permission granted to each individual user
Thursday, February 20, 2020
Network+ Chapter 21 Power Words - Defined
Network+ Chapter 21 Power Words - Network Troubleshooting
- ARP- Address Resolution Protocol
- Arping- Uses ARP frames instead of ICMP
- Broadcast Storm- One of more devices sending nonstop broadcast frames to a network
- Butt Set- Tests if certain telephone lines can function correctly
- Cable Stripper- Supports creating UTP cables
- Cable Tester- Checks if a wire map is correct
- Certifier- Tests if a cable can handle a certain amount of capacity
- Dig- Linux command that diagnoses DNS problems
- End-to-end principle- In early days of networking, stated that apps and work only happens at endpoints in a network
- EoP- Ethernet over Power
- Hardware Tool- Tools that help configure a network
- HEC- HDMI Ethernet Channel
- Hostname- Command that displays your computer’s host name
- IEEE 1905.1- A hybrid networking standard with the goal of flexibility
- Ifconfig- UNIX command to display IP configurations
- IoT- Internet of Things
- Ip- Linux command to display IP configurations
- Ipconfig- Windows command to display IP configurations
- Light Meter- Another name for an optical power meter
- Line Tester- Checks the integrity of telephone writing
- Link Aggregation- Enables connections to work together simultaneously
- Looking Glass Site- Remote servers accessible by browser
- Multimeter- Tests voltage resistance and continuity
- Mtr- My Traceroute
- Nbtstat- Windows command that displays systems running in a network
- Netstat- Command that displays the current state of all running IP processes
- Network Appliance- Device that has to do with networking
- NIC teaming- Enables connections to work together simultaneously
- NSlookup- Windows command that diagnoses DNS problems
- nVoy- Branding for IEEE 1906.1
- Optical Power Meter- Measures the amount of light loss
- Packet Sniffer-Intercepts and logs network packets
- Pathping- Combines the commands ping and tracert
- Ping- Uses ICMP packets to query by IP or name
- Ping -6- A command used in Windows Command prompt
- Ping6- A command used in Linux and Unix command prompts
- Port Scanner- Program that probes ports on another system
- Protocol Analyzer- Monitor the different protocol
- Proxy ARP- Process of making remotely connected computers act like they are on a single LAN
- Punchdown Tool- Puts UTP wires into 66- and 110- blocks
- Route- Command that displays and edits local system routing tables
- Routing Loop- When network traffics repeats and slows down
- Snip- Synonym for cable stripper
- Speed-test Site- Used for internet connection throughput
- Switching Loop- Connecting and configuring multiple switches in a circle
- Temperature Monitor- Detects heat issues in server rooms
- Tone Generator- Backbone to a tone probe
- Tone Probe- Locates cables
- Traceroute- Traces all routers from one point to another
- Traceroute6- Displays IPv6 addresses for tracert in UNIX/Linux
- Tracert- Traces all routers from one point to another in Windows
- Tracert -6- Displays IPv6 addresses for tracert in Windows
- Voltage Event Recorder-Detects electricity issues in server rooms
- Wireshark- Popular GUI packet sniffer and analyzer
Network+ Chapter 14 Power Words - Defined
Network+ Chapter 14
Blank
Blank
- 3G: Third generation of wireless mobile telecommunications technology.
- 4G: A mobile communications standard intended to replace 3G, allowing wireless Internet access at a much higher speed.
- ADSL: Asymmetric digital subscriber line is a type of digital subscriber line technology.
- ATM: Asynchronous Transfer Mode; It is a switching technique that uses time division multiplexing for data communications.
- BRI: Basic Rate Access is an Integrated Services Digital Network configuration intended primarily for use in subscriber lines similar to those that have long been used for voice-grade telephone service.
- Baud: A common measure of symbol rate, one of the components that determine the speed of communication over a data channel.
- Baud rate: Rate at which information is transferred in a communication channel.
- B Channel: The channel that carries the main data.
- BERT: A neural network-based technique for natural language processing pre-training.
- Bridged Connection: A bridge allows you to connect two or more network segments together allowing devices to join the network when it's not possible to connect them directly to a router or switch.
- CCITT: Primary international body for fostering cooperative standards for telecommunications equipment and systems.
- Central Office: A locality to which subscriber home and business lines are connected on what is called a local loop.
- CSU/DSU: A hardware device that converts a digital data frame from the communications technology used on a local area network.
- Circuit Switching: a method of implementing a telecommunications network in which two network nodes establish a dedicated communications channel.
- CWDM: A wavelength multiplexing technology for city and access network.
- DOCSIS: An international telecommunications standard that allows for the addition of high-bandwidth data transfer to an existing coaxial cable TV system.
- dB: A relative unit of measurement corresponding to one tenth of bel.
- Dedicated Line: A communications cable or other facility dedicated to a specific application.
- D Channel: A term which refers to the ISDN channel in which the control and signaling information is carried.
- Demultiplexer: A device that takes a single input line and routes it to one of several digital output lines.
- DWDM: A technology which multiplexes a number of optical carrier signals onto a single optical fiber by using different wavelengths of laser light.
- Dial-Up Line: A telephone connection in a system of many lines shared by many users.
Network+ Chapter 20 Power Words - Defined
Chapter 20 – Network Monitoring
Blank
Blank
- Log Management – a collection process that uses generation, transmission, and analysis.
- Managed device – A device that is currently being used in management.
- Managed network – A network that is currently being used in management.
- MIB – Management information base
- Netflow – A feature used in cisco
- Netflow collector – Collects all of the recently sent data.
- NOC – Network operations center
- Packet analyzer – You can see the information being sent in basic packets
- Packet sniffer – Searches a ip to sniff out individual data packets.
- Performance monitors – Used to see how well a pc is running
- PDU – Protocol data unit
- Response Time – How fast a computer can respond to something.
- SIEM – Security information and events management
- Set – The overall process of connecting to another pc.
- SMS – Simple message service
- SNMP manager – Used to collect basic management information.
- SNM – Simple network manager
- Top listener – The pc that is receiving the most information
- Top talker – Port that is sending the most information
- Trap – A basic type of getting someone’s information
- Variable – The changeable subject
- Wireshark – A program used to see what is being sent threw ports.
Wednesday, February 19, 2020
Network+ Chapter 13 Power Words - Defined
Chapter 13 - IPv6
Blank
Blank
- 4to6 - It is an Internet interoperation mechanism allowing Internet Protocol version 4 (IPv4) to be used in an IPv6 only network
- 6in4 - 6in4 is an IPv6 transition mechanism for migrating from Internet Protocol version 4 to IPv6.
- 6to4 - is an Internet transition mechanism for migrating from Internet Protocol version 4 to version 6
- Aggregation - is a collection, or the gathering of things together. Your baseball card collection might represent the aggregation of lots of different types of cards.
- Anycast - is a network addressing and routing methodology in which a single destination address has multiple routing paths to two or more endpoint destinations
- EUI-64 - is a method we can use to automatically configure IPv6 host addresses. An IPv6 device will use the MAC address of its interface to generate a unique 64-bit interface ID is a method we can use to automatically configure IPv6 host addresses. An IPv6 device will use the MAC address of its interface to generate a unique 64-bit interface ID
- Global Unicast broadcast - Referring to the transmission of a signal or packet from a single device to another single device over a circuit or network. See also anycast, anycast address, broadcast, global unicast address, and multicast
- IPV4 - is the fourth revision of the Internet Protocol (IP) used to to identify devices on a network through an addressing system. The Internet Protocol is designed for use in interconnected systems of packet-switched computer communication networks.
- IPV6 - Internet Protocol Version 6 (IPv6) is a network layer protocol that enables data communications over a packet switched network. ... The explosive growth in mobile devices including mobile phones, notebook computers, and wireless handheld devices has created a need for additional blocks of IP addresses.
- Interface identifier - The interface ID identifies an interface of a particular node. An interface ID must be unique within the subnet. ... Neighbor Discovery automatically generates the interface ID, based on the MAC or EUI-64 address of the host's interface.
- Mired - Mired is a Tirado tunneling client designed to allow full IPv6 connectivity to computer systems which are on the IPv4-based Internet but which have no direct native connection to an IPv6 network. Mired is included in many Linux and BSD distributions and is also available for recent versions of Mac OS X.
Network+ Chapter 15 Power Words - Defined
Chapter 15 - Wireless Networking
Blank
Blank
- 802.1X – IEEE Standard for port-based Network Access Control (PNAC).
- 802.11 – evolving family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE).
- 802.11a – an IEEE standard for transmitting data over a wireless network.
- 802.11a-ht - technical terms for mixed mode 802.11a/802.11g operation.
- 802.11b – one of several Wi-Fi standards developed by the Institute of Electrical and Electronics Engineers (IEEE).
- 802.11g – a Wi-Fi standard developed by the IEEE for transmitting data over a wireless network.
- 802.11g-ht – a Wi-Fi standard developed by the IEEE for transmitting data over a wireless network.
- 802.11i – a standard for wireless local area networks (WLANs) that provides improved encryption for networks that use the popular 802.11a, 802.11b (which includes Wi-Fi) and 802.11g standards.
- 802.11n – a Wi-Fi standard that was introduced by the IEEE in 2007 and officially published in 2009.
- Ad hoc mode – The mode of operation in a peer-to-peer wireless network, such as Wi-Fi or Bluetooth, in which computers communicate with each other rather than to a central base station (access point).
- AES – is a symmetric block cipher chosen by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data.
- Bandwidth saturation – is a phenomenon that occurs when all a circuits available bandwidth in a given direction is being utilized by a large upload or download.
- BSS – Basic Server Set.
- BSSID – Basic Server Set Identifier.
- Bounce – a method of hiding the source of a user's network connection.
- BYOD – Bring Your Own Device.
- CSMA/CA – Carrier Sense Multiple Access / Collision Avoidance.
- Channel – refers either to a physical transmission medium such as a wire, or to a logical connection over a multiplexed medium such as a radio channel in telecommunications and computer networking.
- Channel bonding – a practice commonly used in IEEE 802.11 implementations in which two adjacent channels within a given frequency band are combined to increase throughput between two or more wireless devices.
- Dead spot – a location within the coverage area of a wireless network where a signal is not received.
- Dipole Antenna – the simplest type of radio antenna, consisting of a conductive wire rod that is half the length of the maximum wavelength the antenna is to generate.
- DSSS – Direct Sequence Spread Spectrum.
- DCF – Distributed Coordination Function.
- Encryption – the process of encrypting or encoding data and messages transmitted or communicated over a computer network.
- Evil Twin – a fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications.
- ESS – Extended Service Set.
- ESSID – Extended Service Set Identifier.
- EAP – Extendable Authentication Protocol.
- FHSS – Frequency Hopping Spread Spectrum.
- Gain – the ratio of an output power to an input power.
- Greenfield Mode – an operational mode of an 802.11n network that can maximize the speed of data transfers.
- IBSS – Independent Basic Service Set.
- Infrastructure Mode – an 802.11 networking framework in which devices communicate with each other by first going through an Access Point (AP).
- IFG – Interframe Gap.
- Latency – is the amount of time a message takes to traverse a system.
- Legacy Mode – is the generic name assigned to any old network, which is rarely used today and not part of the TCP/IP protocol suite.
- Link State – is a complex routing technique in which each router shares information with other routers about the reachability of other networks and the metric to reach the other networks in order to determine the best path.
- MAC addressing filtering – a security access control method whereby the MAC address assigned to each network card is used to determine access to the network.
- Mixed Mode – an operational mode of an 802.11n network that can maximize the speed of data transfers.
- MIMO – Multiple in Multiple Out.
- NAS – Network Access Server.
- Network Name – a text string that devices use to reference a particular computer network.
- OFDM – Orthogonal Frequency Division Multiplexing.
- Peer-to-peer mode – computer systems which are connected to each other via the Internet.
- PAN – Personal Area Network.
- PCF – Point Coordination Function.
- Point-to-multipoint – communication which is accomplished via a distinct type of one-to-many connection, providing multiple paths from a single location to multiple locations.
- Point-to-point – communication which is accomplished via a distinct type of one-to-many connection, providing multiple paths from a single location to multiple locations.
- PoE – Power over Ethernet.
- RFI – Radio Frequency Interference.
- RADIUS server – a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
- Roaming – the ability for a customer of mobile communications to automatically make and receive telephone calls, send and receive data, or access other services while travelling outside the geographical coverage area of the home network, by means of using a network of another operator.
- Rouge AP – an access point that has been installed on a secure network without explicit authorization from a system administrator.
- SSID – Service Set Identifier.
- Signal Strength – the magnitude of an electric field at a reference point, which is located at a significant distance from the transmitting antenna. This is expressed in terms of the signal power of the receiver or the voltage per length received by the reference antenna.
- Site Survey – the process of planning and designing a wireless network, to provide a wireless solution that will deliver the required wireless coverage, data rates, network capacity, roaming capability and Quality of Service.
- SSID broadcast – the name of your wireless network.
- Supplicant – an entity at one end of a point-to-point LAN segment that seeks to be authenticated by an authenticator attached to the other end of that link.
- TKIP – Temporal Key Integrity Program.
- Thick client – full-featured computers that are connected to a network.
- Thin Client – a client designed to be especially small so that the bulk of the data processing occurs on the server.
- Transmit beamforming – a technique that focuses a wireless signal towards a specific receiving device, rather than having the signal spread in all directions from a broadcast antenna, as it normally would.
- Unidirectional antenna – Basically give off bad signals.
- VLAN pooling – a feature that enables you to group multiple wireless controller VLANs to form a VLAN pool.
- Wi-Fi – an abbreviation for wireless fidelity.
- Wi-Fi analyzer – a useful software application that can tell you many things about your wireless network and the networks around you, helping you optimize your Wi-Fi for best performance.
- WPA – Wi-Fi Protected Access.
- WPA2 – Wi Fi Protected Access 2.
- WPS – Wi-Fi Protected Setup.
- WEP – Wired Equivalent Privacy.
- WAP – Wireless Access Point.
- Wireless analyzer – a useful software application that can tell you many things about your wireless network and the networks around you, helping you optimize your Wi-Fi for best performance.
- Wireless bridge – A device that connects two LAN segments together via infrared or microwave transmission.
- Wireless controller – used in combination with the Lightweight Access Point Protocol to manage light-weight access points in large quantities by the network administrator or network operations center.
- WLAN – Wireless LAN.
- Wireless Network – a computer network that uses wireless data connections between network nodes.
- Wireless Survey tool – a physical survey of the premises where the wireless network will be installed.
- WPA2-Enterprise – is the security method added to WPA for wireless networks that provides stronger data protection and network access control.
Network+ Chapter 17 Power Words - Defined
Chapter 17 - Building a Real World Network
- Air Gap - Separating one network from another
- CAN - Campus Area Network
- CoS - Class of Service
- Compatibility Requirements - If a new network will perform with issues or not
- Device Types/Requirements - Equipment need to build and organize a network
- DiffServ - Differentiated Services
- DCS - Distributed Control System
- Environment Limitations - Building space required for a network
- Equipment Limitations - If a new network can use certain kinds of cables, apps, etc.
- H.320 - used to run multimedia over ISDN based networks
- H.323 - Video Presentation Codec
- HMI - Human Machine Interface
- ICS Server - Internet Connection Sharing Server
- ICS - Industrial Control System
- List of Requirements - Features that a network needs to function
- MGCP - Media Gateway Control Protocol
- Medianet - Network of far-flung routers and servers
- Metro Ethernet - An Ethernet MAN, based on ethernet standards
- Operator - Someone who is running the machine
- Power Converter - Changes power type from AC to DC
- Power Redundancy - Keeping the network running while using less electricity
- PLC - Programmable Logic Controller
- RTP - Real-time Transport Protocol
- Real-time Video - A video broadcasted over real-time
- RTU - Remote Terminal Unit
- Security Considerations - If a network can defend against other computers and viruses
- SIP - Session Initiation Protocol
- SCADA - Supervisory Control and Data Acquisition
- UC Device - Unified Communications Device
- UC Gateway - Edge device that adds a few extra services to an edge router
- UC Server - Unified Communications Server
- UC - Unified Communication
- - Services that use the same voice
- VTC - Video Teleconferencing
- Wired/Wireless Considerations - Considerations of the advantages and disadvantages of wired/wireless networks.
Network+ Chapter 16 Power Words - Defined
Network+ Chapter 16
Blank
Blank
- Community cloud – A cloud than anyone in a community can upload to.
- Emulator – Simulates a system on a different type of system
- FC – Fiber channel
- guest – Whoever is connected to the host
- host hybrid cloud – A hybrid cloud that is controlled by the host.
- hypervisor – A computer software that runs a Virtual Machine
- IAAS – In fracture as a service
- ISCS - Internet small computer system
- Jumbo Frame – A frame worth 1500 Bytes.
- NAS – Network attached storage
- PAAS – Platform as a service
- private cloud – A cloud service only certain people can upload to.
- public cloud – A cloud that anyone can publicly upload to.
- Snapshot – State of a system at a point in time.
- SAAS- Software as a service
- SDN – Software defined network
- SAN – Storage area network
- VF – Virtual Firewall
- VM – virtual machine
- VS – Virtual switch
Tuesday, February 18, 2020
Network+ Chapter 10A Power Words - Defined
Network+ Chapter 10A
- A record – A collection of Data on a Drive.
- Active Directory – Technology used to manage computers and other devices on a network.
- Authoritative DNS server – a nameserver (DNS Server) that holds the actual DNS records (A, CNAME, PTR, etc) for a particular domain/ address.
- Authoritative name server – Resolves DNS queries.
- Cached lookups – A tool used to find data in a data cache.
- Cache-only DNS server – Receives queries from clients, performs the queries against other name servers, caches the results, and returns those results to the client.
- CNAME – Canonical Name.
- DNS root server – Domain Name System Root Server.
- DNS server – Domain Name System Server.
- DNS tree – Domain Name System.
- DIG – Domain Information Grouper.
- DNS – Domain Name System.
- DDNS – Dynamic Domain Name System.
- Flat Name Space – A Name space without hierarchy.
- Forward Lookup Zone – A DNS zone in which hostname to IP address relations are stored.
- FQDN – Fully Qualified Domain Name.
- Hierarchical Name Space – A name Space that has a system to determine Hierarchy.
- Host Name – a simple string of alphanumeric characters.
- Hosts File – An operating system file that maps hostnames to IP addresses.
Network+ Chapter 12b Power Words - Defined
Chapter 12b –
Advanced Networking Devices
- Out-of-brand Management - a function of marketing that uses techniques to increase the perceived value of a product line or brand over time
- Peer-to-Peer - denoting or relating to computer networks in which each computer can act as a server for the others, allowing shared access to files and peripherals without the need for a central server
- Point-To-Point Tunneling Protocol (PPTP) - an obsolete method for implementing virtual private networks. PPTP has many well known security issues. PPTP uses a TCP control channel and a Generic Routing Encapsulation tunnel to encapsulate PPP packets. Many modern VPNs use various forms of UDP for this same functionality
- Port Authentication -enables configuration of parameters for each port
- Port Mirroring - also known as SPAN (Switched Port Analyzer), is a method of monitoring network traffic. With port mirroring enabled, the switch sends a copy of all network packets seen on one port (or an entire VLAN) to another port, where the packet can be analyzed
- Proxy Server - sits in between clients and external servers, essentially pocketing the requests from the clients for server resources and making those requests itself
- Quality of Service (QoS) - the description or measurement of the overall performance of a service, such as a telephony or computer network or a cloud computing service, particularly the performance seen by the users of the network
- Reverse Proxy Server – acts on behalf of the servers
- Routing and Remote Access Service (RRAS) - a Microsoft API and server software that makes it possible to create applications to administer the routing and remote access service capabilities of the operating system, to function as a network router. Developers can also use RRAS to implement routing protocols
- Site-to-Site - a type of VPN connection that is created between two separate locations. It provides the ability to connect geographically separate locations or networks, usually over the public Internet connection or a WAN connection
- SSL VPN – Secure Sockets Layer Virtual Private Network
- Traffic Shaping - bandwidth management technique that delays the flow of certain types of network packets in order to ensure network performance for higher priority applications
- Trunk Port – a port or switch configured to carry all traffic
- Trunking – process of transferring VLAN traffic between two or more switches
- Virtual Local Area Network (VLAN) – segments networks using owned switches
- Virtual Private Network (VPN) -
- VLAN Trunking Protocol (VTP)
- VPN Concentrator – VPN-capable router
Network+ Chapter 11A Power Words - Defined
Network + Chapter 11A
- 802.1x: A port-authentication network access control mechanism for networks.
- access control list (ACL): A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource.
- Advanced Encryption Standard (AES): A block cipher created in the late 1990s that uses a 128-bit block size and a 128-, 192-, or 256-bit key size. Practically uncrackable.
- Algorithm: A set of rules for solving a problem in a given number of steps.
- asymmetric-key algorithm: An encryption method in which the key used to encrypt a a message and the key used to decrypt it are different, or asymmetrical.
- Authentication: A process that proves good data traffic truly came from where it says it originated by verifying the sending and receiving users and computers.
- Authenticating, Authorization, and Accounting (AAA): A security philosophy wherein a computer trying to connect to a network must first present some form of credential in order to be authenticated and then must have limitable permissions within the network.
- Authentication Server (AS): In Kerberos, a system that hands out Ticket-Granting Tickets to clients after comparing the client hash to it's own. Also known as Ticket Granting Ticket.
- Authorization: A step in the AAA philosophy during which a client's permissions are decided upon.
- block Cipher: An encryption algorithm in which data is encrypted in "chunks" of a certain length at a time. Popular in wired networks.
- Certificate: A public encryption key signed with the digital signature from a trusted third party called a Certificate Authority (CA), which is used to validate the identity of its holder when that person or company sends data to other parties.
- Challenge Handshake Authentication Protocol (CHAP): A remote access authentication protocol in which the serving system challenges the remote client, which must provide an encrypted password.
- Cipher: A series of complex and hard-to-reverse mathematics run on a string of ones and zeroes in order to make a new set of seemingly meaningless ones and zeroes.
- Ciphertext: The output when cleartext is run through a cipher algorithm using a key.
- Cleartext: Unencrypted data in an accessible format that can be read without special utilities. Also known as plaintext.
- Data Encryption Standard (DES): A symmetric-key algorithm develovoped by the US Government in the 1970s and formerly in use in a variety of TCP/IP applications, in which it uses a 64-bit block and a 56-bit key.
- digital signature: An encrypted hash of a private encryption key that verifies a sender's identity to those who receive encrypted data or messages.
- Discretionary Access Control (DAC): Authorization method based on the idea that there is an owner of a resource who may at his or her discretion, assign access to that resource.
Network+ Chapter 12A Power Words - Defined
Network+ Chapter 12A
Blank
Blank
- Access port – Connects a user to a LAN.
- Client/Server – Sends data to separate work stations
- Console Port – Used to connect a computer to a switch or router.
- Content switch – virtual server
- DHCP – Dynamic Host Configuration Protocol
- FPS – Forward Proxy server
- Host to Host – A host connects directly to another host.
- Host to site – A host connects to a website.
- In-Band management – Managing devices threw a common protocol
- InterVLAN routing - divides broadcasts in a LAN environment.
- IDS – intrusion detection system
- IPS – intrusion prevention system
- IP Helper – Help to find your IP
- L2TP – Layer 2 tunneling protocol
- LACP – Link aggregation control panel
- Load balancing – Balances everything currently being loaded to not be unsteady.
- Managed switch – Switch that can be configured
- MLS – Multi Layer Switch
- Native VLAN – The untagged VLAN
Tuesday, February 11, 2020
Network+ Chapter 6B Power Words - Defined
Network+ Chapter 6B
- Near End Crosswalk – an error condition that occurs when connectors are attached to twisted pair
- Race way - is an enclosed conduit that forms a physical pathway for electrical wiring
- Run - internet marketing where an online advertising is applied to a wide collection of websites
- Solid Core - Solid core Systems, Inc. was a software company based in Cupertino, California, that developed software to detect and prevent unwanted change. ... Its products provide change management auditing, configuration control, PCI compliance and system lockdown used by enterprise IT organizations worldwide.
- Split Pair - A split pair is
a wiring error where two wires of a twisted pair are instead connected using two wires from
different pairs,
potentially creating interference.
- Punch down tool - a hand tool used to connect telecommunications and network wires to a patch panel,
- Wire map - basically a continuity checker that determines if pins are correctly connected.
- Work Area - means a room or defined space in a workplace where hazardous chemicals are produced or used, and where employees are present
- Patch panel - a board in a switchboard, computer, or other device with a number of electric sockets that may be connected in various combinations.
- Patch Cables - a length of cable with connectors on each end that is used to connect end devices to power sources
- Smart Jacks - is a smart and intelligent device placed right between telephone company's demarcation and customer premises
- Stranded core –
- Solid Core - Solid core Systems, Inc. was a software company based in Cupertino, California, that developed software to detect and prevent unwanted change. ... Its products provide change management auditing, configuration control, PCI compliance and system lockdown used by enterprise IT organizations worldwide that there is only one fixed conductor in the wire
- Near End Crosswalk – an error condition that occurs when connectors are attached to twisted pair
- Unit - the first and least natural number
- Split Pair - A split pair is a wiring error where two wires of a twisted pair are instead connected using two wires from different pairs, potentially creating interference.
- Punch down tool - a hand tool used to connect telecommunications and network wires to a patch panel,
- Wire map - basically a continuity checker that determines if pins are correctly connected.
- Work Area - means a room or defined space in a workplace where hazardous chemicals are produced or used, and where employees are present
- Near End Crosswalk – an error condition that occurs when connectors are attached to twisted pair
Subscribe to:
Posts (Atom)