Showing posts with label defined. Show all posts
Showing posts with label defined. Show all posts

Wednesday, March 11, 2020

A+ Chapter 11 Power Words - Defined

Chapter 11- Essential Peripherals
Blank

Full-Speed USB- Newer version of USB that runs at a maximum of 12 Mbps
USB Host Controller- Integrated circuit built into a chipset that controls every USB side
USB Root Hub- Host that has physical ports
USB Thumb Drive- Portable flash drive that connects via USB
Low-Speed USB- Older version of USB that runs at a maximum speed of 1.5 Mbps
Biometrics- Scans body parts for information
Digitizer- Pen tablet that enables drawing on a computer
Touchpad- Moves cursor on a laptop
Power Source- How an electronic gets power
Optical Mouse- Cursor that uses a light to guide it
CDFS- CD File System
CD-R- CD-Recordable
CD-RW- CD-Rewriteable
CD-ROM- Formats CDs into sectors, each holding 2353 bytes
Super-Speed USB- Can reach speeds over 10 Gbps (USB 3.1)
UPC- Universal Product Code
xD-Picture Card- Extreme Digital Picture Card
Touchscreen- Display that you can interact with via touch
FireWire- eSATA version of USB that’s also known as IEEE 1394
KVM Switch- Keyboard, Video and Mouse Switch

Monday, March 2, 2020

A+ Chapter 12 Power Words - Blank


Chapter 12 - Building a PC
  1. Audio Interface
  2. HTPC
  3. Log File
  4. Migration
  5. Home Server PC
  6. Thin Client
  7. Thick Client
  8. Windows Easy Transfer
  9. Upgrade Installation
  10. Section Partition
  11. End User License
  12. Patch
  13. Gaming PC
  14. Service Patch
  15. Boot Method
  16. Recovery Partition
  17. Video Editing Workstation
  18. Net Boot
  19. Image Development
  20. Virtualization Workstation


A+ Chapter 12 Power Words - Defined


Chapter 12 - Building a PC
  1. Audio Interface – What controls all your system audio
  2. HTPC- Hyper text protocol
  3. Log File – Record of events that have recently taken place in your PC.
  4. Migration - Moving data from one server or hard drive to another
  5. Home Server PC - The main PC in a home server.
  6. Thin Client - Client to communicate with the server.
  7. Thick Client - Implements its own features.
  8. Windows Easy Transfer – Transfers Windows files from system to system.
  9. Upgrade Installation – Installation for a recent update.
  10. Section Partition – A partition broke into sections
  11. End User License Agreement – Consent for usage
  12. Patch – Mini update usually for bugs.
  13. Gaming PC – High powered PC made for gaming
  14. Service Patch – Patch that is directly applied to a service
  15. Boot Method – How to start your computer
  16. Recovery Partition – A partition that is saved and kept so later can be restored if needed.
  17. Video Editing Workstation – Workstation for editing
  18. Net Boot – Allows iOS to boot from a network.
  19. Image Development – How an image is processed and made.
  20. Virtualization Workstation – A virtualized place to test different things.


Thursday, February 27, 2020

Network+ Chapter 18 Power Words - Defined

Chapter 18 – Managing Risk
Blank
  1. Acceptable Group Policy - a feature of the Microsoft Windows NT family of operating systems that controls the working environment of user accounts and computer accounts
  2. Aircrack-ng - a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic
  3. Approval Process - the method an organization uses to approve anything from documents, invoices, budgets, and purchase orders, to a new process that a company wants to institute
  4. Archive - place or store (something)
  5. Backup - an extra copy of data from a computer
  6. Business Continuity Plan (BCP) - the process of creating systems of prevention and recovery to deal with potential threats to a company. In addition to prevention, the goal is to enable ongoing operations before and during execution of disaster recovery
  7. Chain of custody -  a document that is borrowed from law enforcement that tracks evidence from the time the Computer Forensics Examiner gains possession of the item until it is released back to the owner
  8. Change management - the control of the supply chain as a process from supplier to manufacturer to wholesaler to retailer to consumer. ... In computing, SCM typically is used in reference to software applications that enable more efficient management of the supply chain
  9. Change management team – Team that does change management
  10. Change request - a message sent between objects.
  11. Cold site -  a business location that is used for backup in the event of a disruptive operational disaster at the normal business site.
  12. Computer forensics – forensics on a computer
  13. Contingency plan - A plan involving suitable backups, immediate actions and longer term measures for responding to computer emergencies such as attacks or accidental disasters. ... Also called a "disaster plan," a contingency plan must be updated periodically
  14. Disaster recovery – Recovery for a disaster
  15. Documentation – Recording what has been done
  16. Electronic discovery - refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case
  17. Electrostatic discharge (ESD) – Discharge that can harm you from working on computers 
  18. Exit plan – Plan for exit
  19. Fail closed  - is when a device or system is set, either physically or via software, to shut down and prevent further operation when failure conditions are detected
  20. Fail open - does not shut down when failure conditions are present. Instead, the system remains “open” and operations continue as if the system were not even in place. This strategy is used when access is deemed more important that authentication
  21. First responder – First people to respond to an emergency
  22. Forensics report – Report from forensics
  23. Ground loop -  occurs when two points of a circuit both intended to be at ground reference potential have a potential between them.
  24. Heating, ventilation, and air conditioning (HVAC) – Cooling and heating systems
  25. High availability (HA) – Availability that is high
  26. Hot site -  a commercial disaster recovery service that allows a business to continue computer and network operations in the event of a computer or equipment disaster
  27. Incident - an event that is not part of normal operations that disrupts operational processes
  28. Incident response – Response to an incident 
  29. Legal hold -  a situation wherein a business or organization makes changes to its method of records management in order to preserve information because of a pending litigation
  30. Maintenance window – Windows for maintenance
  31. Material safety data sheet (MSDS) – Data sheet that shows safety for materials
  32. Memorandum of understanding (MOU) - A metric used to compute billing and/or statistics for telephone calls or other network use
  33. Metasploit - An open source attack framework 
  34. Microsoft baseline security analyzer (MBSA) – Baseline security analyzer developed by Microsoft
  35. Multi-source agreement (MSA) – Agreement with multiple sources
  36. Nessus - an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools
  37. Network access policy – Access policy for a network
  38. Nmap -  a free and open-source network scanner
  39. Penetration testing (PENTEST) – testing on a device to see if it can be penetrated or not
  40. Recovery point objective (RPO) – Objective for recovery points
  41. Recovery time objective (RTO) – Objective for time points
  42. Risk management - the process of identifying, assessing and controlling threats to an organization's capital and earnings
  43. Security policy – Policy for security
  44. Service level agreement (SLA) – Level agreement for services 
  45. Single point of failure – Point where the failure occurs
  46. Statement of work (SOW) - a document that enables offeror's to clearly understand the government's needs for the work to be done in developing or producing the goods or services to be delivered by a contractor
  47. Succession planning – Planning for succession
  48. Virtual IP – Virtual Internet Protocol 
  49. Vulnerability management – Management for vulnerability 
  50. Vulnerability scanner – Scanner that scans for vulnerability in your device
  51. Warm site -  a type of facility an organization uses to recover its technology infrastructure when its primary data center goes down


Network+ Chapter 6B Power Words - Blank

Network+ Chapter 6B
  1. Near End Crosswalk 
  2. Race way 
  3. Run 
  4. Solid Core 
  5. Split Pair
  6. Punch down tool 
  7. Wire map 
  8. Work Area 
  9. Patch panel 
  10. Patch Cables 
  11. Smart Jacks 
  12. Stranded core –
  13. Solid Core 
  14. Near End Crosswalk 
  15. Unit 
  16. Split Paire.
  17. Punch down tool 
  18. Wire map 
  19. Work Area 
  20. Near End Crosswalk 



Wednesday, February 26, 2020

Network+ Chapter 9B Power Words - Defined

Chapter 9B - TCP/IP Applications
Blank

1. Open port- Socket that is prepared to respond to IP packets destined to the packet's port number
2. POP3 - Post Office Protocol Version 3
3. Private Port Number- Web client's source number ranging from 49152 to 65535
4. Registered Port- Port numbers 1024 to 49151
5. SSH- Secure Shell
6. SSL- Secure Sockets Layer
7. Sendmail- Linux/UNIX method to send emails
8. Session- Communication between two or more computers
9. SMTP- Simple Mail Transfer Protocol
10. Socket-Session information stored in RAM
11. Socket Pairs- Data stored between two computer's TCP/IP applications
12. TCP/IP Suite- All aspects and protocols that make up TCP/IP
13. TCP Three-Way Handshake- Session information sent to two other computers from one server
14. Telnet- Protocol that can access different protocols
15. TLS- Transport Layer Security
16. TCP-- Transmission Control Protocol
17. TFTP- Trivial File Transfer Protocol
18. Unsecure Protocol- Common network vulnerabilities or threats, ex. HTTP
19. UDP- User Datagram Protocol
20. Web Services- Applications accessed on the Internet
21. Well-Known Port Number- Port numbers ranging from 0 to 1023

Monday, February 24, 2020

A+ Chapter 3 Power Words - Defined

Chapter 3 - The Visible Computer
Blank
  1. App – Downloaded application
  2. Control Panel – motherboard of windows
  3. File Extension – Letter occurring after period in file name
  4. Gadget – small electronic tool
  5. Hardware – Physical elements that make up a computer
  6. User interface – the way the user and computer interact
  7. Task bar – allows quick access
  8. File explorer – file manager
  9. Desktop  - working area on your computer screen
  10. PC – Computer assigned to you
  11. Windows explorer – windows manager
  12. System tool – used to do tasks on the system
  13. Settings app – controls how the computer works
  14. Administrative tools – tools for administrator
  15. Start button – turns on computer
  16. Network connection – connects computers to the internet
  17. Metro UI – user interface
  18. Charm – control
  19. Charm bar – control bar
  20. Processing – how long it takes to happen or to finish  

A+ Chapter 14 Power Words - Defined


Chapter 14 - Users, Groups, and Permissions.
Blank
  1. User account applet: include adding or removing hardware and software, controlling user accounts
  2. local user account: An established relationship created on a computer that identifies a user and the user's settings and permissions when logged in.
  3. authorization: the action or fact of authorizing or being authorized.
  4. owner: The owner
  5. group: A group
  6. UAC (User Account Control):
  7. Inheritance: a feature that represents the "is a" relationship between different classes.
  8. Chown: A Unix command that allows the root user to change the owner and group assigned to files, directories and links.
  9. BitLocker Drive Encryption: a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers.
  10. EFS (Encrypting File System): a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption.
  11. BitLocker: a full volume encryption feature included with Microsoft Windows.
  12. UAC: a feature that was designed to prevent unauthorized changes to your computer.
  13. administrative shares: hidden network shares created by Windows NT family of operating systems that allow system administrators to have remote access to every disk volume on a network-connected system.   
  14. Ownership: You own this
  15. Standard user: Just a normal User
  16. Chmod: a UNIX command that changes the access permissions of files or directories in order to read, write or execute files.
  17. User Group: A group of normal users
  18. NTFS Permissions: affect local users as well as network users and they are based on the permission granted to each individual user

Thursday, February 20, 2020

Network+ Chapter 21 Power Words - Defined

 Network+ Chapter 21 Power Words - Network Troubleshooting

  1. ARP- Address Resolution Protocol
  2. Arping- Uses ARP frames instead of ICMP
  3. Broadcast Storm- One of more devices sending nonstop broadcast frames to a network
  4. Butt Set- Tests if certain telephone lines can function correctly
  5. Cable Stripper- Supports creating UTP cables
  6. Cable Tester- Checks if a wire map is correct
  7. Certifier- Tests if a cable can handle a certain amount of capacity
  8. Dig- Linux command that diagnoses DNS problems
  9. End-to-end principle- In early days of networking, stated that apps and work only happens at endpoints in a network
  10. EoP- Ethernet over Power
  11. Hardware Tool- Tools that help configure a network
  12. HEC- HDMI Ethernet Channel
  13. Hostname- Command that displays your computer’s host name
  14. IEEE 1905.1- A hybrid networking standard with the goal of flexibility
  15. Ifconfig- UNIX command to display IP configurations
  16. IoT- Internet of Things
  17. Ip- Linux command to display IP configurations
  18. Ipconfig- Windows command to display IP configurations
  19. Light Meter- Another name for an optical power meter
  20. Line Tester- Checks the integrity of telephone writing
  21. Link Aggregation- Enables connections to work together simultaneously
  22. Looking Glass Site- Remote servers accessible by browser
  23. Multimeter- Tests voltage resistance and continuity
  24. Mtr- My Traceroute
  25. Nbtstat- Windows command that displays systems running in a network
  26. Netstat- Command that displays the current state of all running IP processes
  27. Network Appliance- Device that has to do with networking
  28. NIC teaming- Enables connections to work together simultaneously
  29. NSlookup- Windows command that diagnoses DNS problems
  30. nVoy- Branding for IEEE 1906.1
  31. Optical Power Meter- Measures the amount of light loss
  32. Packet Sniffer-Intercepts and logs network packets
  33. Pathping- Combines the commands ping and tracert
  34. Ping- Uses ICMP packets to query by IP or name
  35. Ping -6- A command used in Windows Command prompt
  36. Ping6- A command used in Linux and Unix command prompts
  37. Port Scanner- Program that probes ports on another system
  38. Protocol Analyzer- Monitor the different protocol
  39. Proxy ARP- Process of making remotely connected computers act like they are on a single LAN
  40. Punchdown Tool- Puts UTP wires into 66- and 110- blocks
  41. Route- Command that displays and edits local system routing tables
  42. Routing Loop- When network traffics repeats and slows down
  43. Snip- Synonym for cable stripper
  44. Speed-test Site- Used for internet connection throughput
  45. Switching Loop- Connecting and configuring multiple switches in a circle
  46. Temperature Monitor- Detects heat issues in server rooms
  47. Tone Generator- Backbone to a tone probe
  48. Tone Probe- Locates cables
  49. Traceroute- Traces all routers from one point to another
  50. Traceroute6- Displays IPv6 addresses for tracert in UNIX/Linux
  51. Tracert- Traces all routers from one point to another in Windows
  52. Tracert -6- Displays IPv6 addresses for tracert in Windows
  53. Voltage Event Recorder-Detects electricity issues in server rooms
  54. Wireshark- Popular GUI packet sniffer and analyzer

Network+ Chapter 14 Power Words - Defined

Network+ Chapter 14
Blank
  1. 3G: Third generation of wireless mobile telecommunications technology.
  2. 4G: A mobile communications standard intended to replace 3G, allowing wireless Internet access at a much higher speed.
  3. ADSL: Asymmetric digital subscriber line is a type of digital subscriber line technology.
  4. ATM: Asynchronous Transfer Mode; It is a switching technique that uses time division multiplexing for data communications.
  5. BRI: Basic Rate Access is an Integrated Services Digital Network configuration intended primarily for use in subscriber lines similar to those that have long been used for voice-grade telephone service.
  6. Baud: A common measure of symbol rate, one of the components that determine the speed of communication over a data channel.
  7. Baud rate: Rate at which information is transferred in a communication channel.
  8. B Channel: The channel that carries the main data. 
  9. BERT: A neural network-based technique for natural language processing pre-training.
  10. Bridged Connection:  A bridge allows you to connect two or more network segments together allowing devices to join the network when it's not possible to connect them directly to a router or switch.
  11. CCITT:  Primary international body for fostering cooperative standards for telecommunications equipment and systems.
  12. Central Office: A locality to which subscriber home and business lines are connected on what is called a local loop.
  13. CSU/DSU: A hardware device that converts a digital data frame from the communications technology used on a local area network.
  14. Circuit Switching: a method of implementing a telecommunications network in which two network nodes establish a dedicated communications channel.
  15. CWDM: A wavelength multiplexing technology for city and access network.
  16. DOCSIS: An international telecommunications standard that allows for the addition of high-bandwidth data transfer to an existing coaxial cable TV system.
  17. dB: A relative unit of measurement corresponding to one tenth of bel.
  18. Dedicated Line: A communications cable or other facility dedicated to a specific application.
  19. D Channel: A term which refers to the ISDN channel in which the control and signaling information is carried.
  20. Demultiplexer: A device that takes a single input line and routes it to one of several digital output lines.
  21. DWDM: A technology which multiplexes a number of optical carrier signals onto a single optical fiber by using different wavelengths of laser light.
  22. Dial-Up Line: A telephone connection in a system of many lines shared by many users.



Network+ Chapter 20 Power Words - Defined

Chapter 20 – Network Monitoring
Blank

  1. Log Management – a collection process that uses generation, transmission, and analysis.
  2. Managed device – A device that is currently being used in management.
  3. Managed network – A network that is currently being used in management.
  4. MIB – Management information base
  5. Netflow – A feature used in cisco
  6. Netflow collector – Collects all of the recently sent data.
  7. NOC – Network operations center
  8. Packet analyzer – You can see the information being sent in basic packets
  9. Packet sniffer – Searches a ip to sniff out individual data packets.
  10. Performance monitors – Used to see how well a pc is running
  11. PDU – Protocol data unit
  12. Response Time – How fast a computer can respond to something.
  13. SIEM – Security information and events management
  14. Set – The overall process of connecting to another pc.
  15. SMS – Simple message service
  16. SNMP manager – Used to collect basic management information.
  17. SNM – Simple network manager
  18. Top listener – The pc that is receiving the most information
  19. Top talker – Port that is sending the most information
  20. Trap – A basic type of getting someone’s information
  21. Variable – The changeable subject
  22. Wireshark – A program used to see what is being sent threw ports.



Wednesday, February 19, 2020

Network+ Chapter 13 Power Words - Defined


Chapter 13 - IPv6
Blank
  1. 4to6 - It is an Internet interoperation mechanism allowing Internet Protocol version 4 (IPv4) to be used in an IPv6 only network
  2. 6in4 - 6in4 is an IPv6 transition mechanism for migrating from Internet Protocol version 4 to IPv6.
  3. 6to4 - is an Internet transition mechanism for migrating from Internet Protocol version 4 to version 6
  4. Aggregation - is a collection, or the gathering of things together. Your baseball card collection might represent the aggregation of lots of different types of cards.
  5. Anycast - is a network addressing and routing methodology in which a single destination address has multiple routing paths to two or more endpoint destinations
  6. EUI-64 - is a method we can use to automatically configure IPv6 host addresses. An IPv6 device will use the MAC address of its interface to generate a unique 64-bit interface ID  is a method we can use to automatically configure IPv6 host addresses. An IPv6 device will use the MAC address of its interface to generate a unique 64-bit interface ID
  7. Global Unicast broadcast - Referring to the transmission of a signal or packet from a single device to another single device over a circuit or network. See also anycast, anycast address, broadcast, global unicast address, and multicast
  8. IPV4 -  is the fourth revision of the Internet Protocol (IP) used to to identify devices on a network through an addressing system. The Internet Protocol is designed for use in interconnected systems of packet-switched computer communication networks.
  9. IPV6 - Internet Protocol Version 6 (IPv6) is a network layer protocol that enables data communications over a packet switched network. ... The explosive growth in mobile devices including mobile phones, notebook computers, and wireless handheld devices has created a need for additional blocks of IP addresses.
  10. Interface identifier - The interface ID identifies an interface of a particular node. An interface ID must be unique within the subnet. ... Neighbor Discovery automatically generates the interface ID, based on the MAC or EUI-64 address of the host's interface.
  11.  Mired - Mired is a Tirado tunneling client designed to allow full IPv6 connectivity to computer systems which are on the IPv4-based Internet but which have no direct native connection to an IPv6 network. Mired is included in many Linux and BSD distributions and is also available for recent versions of Mac OS X. 

Network+ Chapter 15 Power Words - Defined

Chapter 15 - Wireless Networking
Blank
  1. 802.1X – IEEE Standard for port-based Network Access Control (PNAC).
  2. 802.11 – evolving family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE).
  3. 802.11a – an IEEE standard for transmitting data over a wireless network.
  4. 802.11a-ht - technical terms for mixed mode 802.11a/802.11g operation.
  5. 802.11b – one of several Wi-Fi standards developed by the Institute of Electrical and Electronics Engineers (IEEE).
  6. 802.11g – a Wi-Fi standard developed by the IEEE for transmitting data over a wireless network.
  7. 802.11g-ht – a Wi-Fi standard developed by the IEEE for transmitting data over a wireless network.
  8. 802.11i – a standard for wireless local area networks (WLANs) that provides improved encryption for networks that use the popular 802.11a, 802.11b (which includes Wi-Fi) and 802.11g standards.
  9. 802.11n – a Wi-Fi standard that was introduced by the IEEE in 2007 and officially published in 2009.
  10. Ad hoc mode – The mode of operation in a peer-to-peer wireless network, such as Wi-Fi or Bluetooth, in which computers communicate with each other rather than to a central base station (access point).
  11. AES – is a symmetric block cipher chosen by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data.
  12. Bandwidth saturation – is a phenomenon that occurs when all a circuits available bandwidth in a given direction is being utilized by a large upload or download.
  13. BSS – Basic Server Set.
  14. BSSID – Basic Server Set Identifier.
  15. Bounce – a method of hiding the source of a user's network connection.
  16. BYOD – Bring Your Own Device.
  17. CSMA/CA – Carrier Sense Multiple Access / Collision Avoidance.
  18. Channel – refers either to a physical transmission medium such as a wire, or to a logical connection over a multiplexed medium such as a radio channel in telecommunications and computer networking.
  19. Channel bonding – a practice commonly used in IEEE 802.11 implementations in which two adjacent channels within a given frequency band are combined to increase throughput between two or more wireless devices.
  20. Dead spot – a location within the coverage area of a wireless network where a signal is not received.
  21. Dipole Antenna – the simplest type of radio antenna, consisting of a conductive wire rod that is half the length of the maximum wavelength the antenna is to generate.
  22. DSSS – Direct Sequence Spread Spectrum.
  23. DCF – Distributed Coordination Function.
  24. Encryption – the process of encrypting or encoding data and messages transmitted or communicated over a computer network.
  25. Evil Twin – a fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications.
  26. ESS – Extended Service Set.
  27. ESSID – Extended Service Set Identifier.
  28. EAP – Extendable Authentication Protocol.
  29. FHSS – Frequency Hopping Spread Spectrum.
  30. Gain – the ratio of an output power to an input power.
  31. Greenfield Mode – an operational mode of an 802.11n network that can maximize the speed of data transfers.
  32. IBSS – Independent Basic Service Set.
  33. Infrastructure Mode – an 802.11 networking framework in which devices communicate with each other by first going through an Access Point (AP).
  34. IFG – Interframe Gap.
  35. Latency – is the amount of time a message takes to traverse a system.
  36. Legacy Mode – is the generic name assigned to any old network, which is rarely used today and not part of the TCP/IP protocol suite.
  37. Link State – is a complex routing technique in which each router shares information with other routers about the reachability of other networks and the metric to reach the other networks in order to determine the best path.
  38. MAC addressing filtering – a security access control method whereby the MAC address assigned to each network card is used to determine access to the network.
  39. Mixed Mode – an operational mode of an 802.11n network that can maximize the speed of data transfers.
  40. MIMO – Multiple in Multiple Out.
  41. NAS – Network Access Server.
  42. Network Name – a text string that devices use to reference a particular computer network.
  43. OFDM – Orthogonal Frequency Division Multiplexing.
  44. Peer-to-peer mode – computer systems which are connected to each other via the Internet.
  45. PAN – Personal Area Network.
  46. PCF – Point Coordination Function.
  47. Point-to-multipoint – communication which is accomplished via a distinct type of one-to-many connection, providing multiple paths from a single location to multiple locations.
  48. Point-to-point – communication which is accomplished via a distinct type of one-to-many connection, providing multiple paths from a single location to multiple locations.
  49. PoE – Power over Ethernet.
  50. RFI – Radio Frequency Interference.
  51. RADIUS server – a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
  52. Roaming – the ability for a customer of mobile communications to automatically make and receive telephone calls, send and receive data, or access other services while travelling outside the geographical coverage area of the home network, by means of using a network of another operator.
  53. Rouge AP – an access point that has been installed on a secure network without explicit authorization from a system administrator.
  54. SSID – Service Set Identifier.
  55. Signal Strength – the magnitude of an electric field at a reference point, which is located at a significant distance from the transmitting antenna. This is expressed in terms of the signal power of the receiver or the voltage per length received by the reference antenna.
  56. Site Survey – the process of planning and designing a wireless network, to provide a wireless solution that will deliver the required wireless coverage, data rates, network capacity, roaming capability and Quality of Service.
  57. SSID broadcast – the name of your wireless network.
  58. Supplicant – an entity at one end of a point-to-point LAN segment that seeks to be authenticated by an authenticator attached to the other end of that link.
  59. TKIP – Temporal Key Integrity Program.
  60. Thick client – full-featured computers that are connected to a network.
  61. Thin Client – a client designed to be especially small so that the bulk of the data processing occurs on the server.
  62. Transmit beamforming – a technique that focuses a wireless signal towards a specific receiving device, rather than having the signal spread in all directions from a broadcast antenna, as it normally would.
  63. Unidirectional antenna – Basically give off bad signals.
  64. VLAN pooling – a feature that enables you to group multiple wireless controller VLANs to form a VLAN pool.
  65. Wi-Fi – an abbreviation for wireless fidelity.
  66. Wi-Fi analyzer – a useful software application that can tell you many things about your wireless network and the networks around you, helping you optimize your Wi-Fi for best performance.
  67. WPA – Wi-Fi Protected Access.
  68. WPA2 – Wi Fi Protected Access 2.
  69. WPS – Wi-Fi Protected Setup.
  70. WEP – Wired Equivalent Privacy.
  71. WAP – Wireless Access Point.
  72. Wireless analyzer – a useful software application that can tell you many things about your wireless network and the networks around you, helping you optimize your Wi-Fi for best performance.
  73. Wireless bridge – A device that connects two LAN segments together via infrared or microwave transmission.
  74. Wireless controller – used in combination with the Lightweight Access Point Protocol to manage light-weight access points in large quantities by the network administrator or network operations center.
  75. WLAN – Wireless LAN.
  76. Wireless Network – a computer network that uses wireless data connections between network nodes.
  77. Wireless Survey tool – a physical survey of the premises where the wireless network will be installed.
  78. WPA2-Enterprise – is the security method added to WPA for wireless networks that provides stronger data protection and network access control.


Network+ Chapter 17 Power Words - Defined

Chapter 17 - Building a Real World Network

  1. Air Gap - Separating one network from another
  2. CAN - Campus Area Network
  3. CoS - Class of Service
  4. Compatibility Requirements - If a new network will perform with issues or not
  5. Device Types/Requirements - Equipment need to build and organize a network
  6. DiffServ - Differentiated Services
  7. DCS - Distributed Control System
  8. Environment Limitations - Building space required for a network
  9. Equipment Limitations - If a new network can use certain kinds of cables, apps, etc.
  10. H.320 - used to run multimedia over ISDN based networks
  11. H.323 - Video Presentation Codec
  12. HMI - Human Machine Interface
  13. ICS Server - Internet Connection Sharing Server
  14. ICS - Industrial Control System
  15. List of Requirements - Features that a network needs to function
  16. MGCP - Media Gateway Control Protocol
  17. Medianet - Network of far-flung routers and servers
  18. Metro Ethernet - An Ethernet MAN, based on ethernet standards
  19. Operator - Someone who is running the machine
  20. Power Converter - Changes power type from AC to DC
  21. Power Redundancy - Keeping the network running while using less electricity
  22. PLC - Programmable Logic Controller
  23. RTP - Real-time Transport Protocol
  24. Real-time Video - A video broadcasted over real-time
  25. RTU - Remote Terminal Unit
  26. Security Considerations - If a network can defend against other computers and viruses
  27. SIP - Session Initiation Protocol
  28. SCADA - Supervisory Control and Data Acquisition
  29. UC Device - Unified Communications Device
  30. UC Gateway - Edge device that adds a few extra services to an edge router
  31. UC Server - Unified Communications Server
  32. UC - Unified Communication
  33.  - Services that use the same voice
  34. VTC - Video Teleconferencing
  35. Wired/Wireless Considerations - Considerations of the advantages and disadvantages of wired/wireless networks.

Network+ Chapter 16 Power Words - Defined

Network+ Chapter 16
Blank
  1. Community cloud – A cloud than anyone in a community can upload to.
  2. Emulator – Simulates a system on a different type of system
  3. FC – Fiber channel
  4. guest – Whoever is connected to the host
  5. host hybrid cloud – A hybrid cloud that is controlled by the host.
  6. hypervisor – A computer software that runs a Virtual Machine
  7. IAAS – In fracture as a service
  8. ISCS - Internet small computer system
  9. Jumbo Frame – A frame worth 1500 Bytes.
  10. NAS – Network attached storage
  11. PAAS – Platform as a service
  12. private cloud – A cloud service only certain people can upload to.
  13. public cloud – A cloud that anyone can publicly upload to.
  14. Snapshot – State of a system at a point in time.
  15. SAAS- Software as a service
  16. SDN – Software defined network
  17. SAN – Storage area network
  18. VF – Virtual Firewall
  19. VM – virtual machine
  20. VS – Virtual switch


Tuesday, February 18, 2020

Network+ Chapter 10A Power Words - Defined

Network+ Chapter 10A
  1. A record – A collection of Data on a Drive.
  2. Active Directory – Technology used to manage computers and other devices on a network.
  3. Authoritative DNS server – a nameserver (DNS Server) that holds the actual DNS records (A, CNAME, PTR, etc) for a particular domain/ address.
  4. Authoritative name server – Resolves DNS queries.
  5. Cached lookups – A tool used to find data in a data cache.
  6. Cache-only DNS server – Receives queries from clients, performs the queries against other name servers, caches the results, and returns those results to the client.
  7. CNAME – Canonical Name.
  8. DNS root server – Domain Name System Root Server.
  9. DNS server – Domain Name System Server.
  10. DNS tree – Domain Name System.
  11. DIG – Domain Information Grouper.
  12. DNS – Domain Name System.
  13. DDNS – Dynamic Domain Name System.
  14. Flat Name Space – A Name space without hierarchy.
  15. Forward Lookup Zone – A DNS zone in which hostname to IP address relations are stored.
  16. FQDN – Fully Qualified Domain Name.
  17. Hierarchical Name Space – A name Space that has a system to determine Hierarchy.
  18. Host Name – a simple string of alphanumeric characters.
  19. Hosts File – An operating system file that maps hostnames to IP addresses.
  20.  

Network+ Chapter 12b Power Words - Defined


Chapter 12b – Advanced Networking Devices
  1. Out-of-brand Management -   a function of marketing that uses techniques to increase the perceived value of a product line or brand over time
  2. Peer-to-Peer - denoting or relating to computer networks in which each computer can act as a server for the others, allowing shared access to files and peripherals without the need for a central server
  3. Point-To-Point Tunneling Protocol (PPTP) -  an obsolete method for implementing virtual private networks. PPTP has many well known security issues. PPTP uses a TCP control channel and a Generic Routing Encapsulation tunnel to encapsulate PPP packets. Many modern VPNs use various forms of UDP for this same functionality
  4. Port Authentication -enables configuration of parameters for each port
  5. Port Mirroring - also known as SPAN (Switched Port Analyzer), is a method of monitoring network traffic. With port mirroring enabled, the switch sends a copy of all network packets seen on one port (or an entire VLAN) to another port, where the packet can be analyzed
  6. Proxy Server - sits in between clients and external servers, essentially pocketing the requests from the clients for server resources and making those requests itself
  7. Quality of Service (QoS) - the description or measurement of the overall performance of a service, such as a telephony or computer network or a cloud computing service, particularly the performance seen by the users of the network
  8. Reverse Proxy Server – acts on behalf of the servers
  9. Routing and Remote Access Service (RRAS) - a Microsoft API and server software that makes it possible to create applications to administer the routing and remote access service capabilities of the operating system, to function as a network router. Developers can also use RRAS to implement routing protocols
  10. Site-to-Site - a type of VPN connection that is created between two separate locations. It provides the ability to connect geographically separate locations or networks, usually over the public Internet connection or a WAN connection
  11. SSL VPN – Secure Sockets Layer Virtual Private Network
  12. Traffic Shaping - bandwidth management technique that delays the flow of certain types of network packets in order to ensure network performance for higher priority applications
  13. Trunk Port – a port or switch configured to carry all traffic
  14. Trunking – process of transferring VLAN traffic between two or more switches
  15. Virtual Local Area Network (VLAN) – segments networks using owned switches
  16. Virtual Private Network (VPN) -
  17. VLAN Trunking Protocol (VTP)
  18. VPN Concentrator – VPN-capable router








Network+ Chapter 11A Power Words - Defined

Network + Chapter 11A
  1. 802.1x: A port-authentication network access control mechanism for networks.
  2. access control list (ACL): A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource.
  3. Advanced Encryption Standard (AES): A block cipher created in the late 1990s that uses a 128-bit block size and a 128-, 192-, or 256-bit key size. Practically uncrackable.
  4. Algorithm: A set of rules for solving a problem in a given number of steps.
  5. asymmetric-key algorithm: An encryption method in which the key used to encrypt a a message and the key used to decrypt it are different, or asymmetrical.
  6. Authentication: A process that proves good data traffic truly came from where it says it originated by verifying the sending and receiving users and computers.
  7. Authenticating, Authorization, and Accounting (AAA): A security philosophy wherein a computer trying to connect to a network must first present some form of credential in order to be authenticated and then must have limitable permissions within the network.
  8. Authentication Server (AS): In Kerberos, a system that hands out Ticket-Granting Tickets to clients after comparing the client hash to it's own. Also known as Ticket Granting Ticket.
  9. Authorization: A step in the AAA philosophy during which a client's permissions are decided upon.
  10. block Cipher: An encryption algorithm in which data is encrypted in "chunks" of a certain length at a time. Popular in wired networks.
  11. Certificate: A public encryption key signed with the digital signature from a trusted third party called a Certificate Authority (CA), which is used to validate the identity of its holder when that person or company sends data to other parties.
  12. Challenge Handshake Authentication Protocol (CHAP): A remote access authentication protocol in which the serving system challenges the remote client, which must provide an encrypted password.
  13. Cipher: A series of complex and hard-to-reverse mathematics run on a string of ones and zeroes in order to make a new set of seemingly meaningless ones and zeroes.
  14. Ciphertext: The output when cleartext is run through a cipher algorithm using a key.
  15. Cleartext: Unencrypted data in an accessible format that can be read without special utilities. Also known as plaintext.
  16. Data Encryption Standard (DES): A symmetric-key algorithm develovoped by the US Government in the 1970s and formerly in use in a variety of TCP/IP applications, in which it uses a 64-bit block and a 56-bit key.
  17. digital signature: An encrypted hash of a private encryption key that verifies a sender's identity to those who receive encrypted data or messages.
  18. Discretionary Access Control (DAC): Authorization method based on the idea that there is an owner of a resource who may at his or her discretion, assign access to that resource.


Network+ Chapter 12A Power Words - Defined

Network+ Chapter 12A
Blank
  1. Access port – Connects a user to a LAN.
  2. Client/Server – Sends data to separate work stations
  3. Console Port – Used to connect a computer to a switch or router.
  4. Content switch – virtual server
  5. DHCP – Dynamic Host Configuration Protocol
  6. FPS – Forward Proxy server
  7. Host to Host – A host connects directly to another host.
  8. Host to site – A host connects to a website.
  9. In-Band management – Managing devices threw a common protocol
  10. InterVLAN routing -  divides broadcasts in a LAN environment.
  11. IDS – intrusion detection system
  12. IPS – intrusion prevention system
  13. IP Helper – Help to find your IP
  14. L2TP – Layer 2 tunneling protocol
  15. LACP – Link aggregation control panel
  16. Load balancing – Balances everything currently being loaded to not be unsteady.
  17. Managed switch – Switch that can be configured
  18. MLS – Multi Layer Switch
  19. Native VLAN – The untagged VLAN


Tuesday, February 11, 2020

Network+ Chapter 6B Power Words - Defined

Network+ Chapter 6B
  1. Near End Crosswalk – an error condition that occurs when connectors are attached to twisted pair
  2. Race way - is an enclosed conduit that forms a physical pathway for electrical wiring
  3. Run - internet marketing where an online advertising is applied to a wide collection of websites
  4. Solid Core - Solid core Systems, Inc. was a software company based in Cupertino, California, that developed software to detect and prevent unwanted change. ... Its products provide change management auditing, configuration control, PCI compliance and system lockdown used by enterprise IT organizations worldwide.
  5. Split Pair - split pair is a wiring error where two wires of a twisted pair are instead connected using two wires from different pairs, potentially creating interference.
  6. Punch down tool - a hand tool used to connect telecommunications and network wires to a patch panel,
  7. Wire map - basically a continuity checker that determines if pins are correctly connected.
  8. Work Area - means a room or defined space in a workplace where hazardous chemicals are produced or used, and where employees are present
  9. Patch panel - a board in a switchboard, computer, or other device with a number of electric sockets that may be connected in various combinations.
  10. Patch Cables - a length of cable with connectors on each end that is used to connect end devices to power sources
  11. Smart Jacks - is a smart and intelligent device placed right between telephone company's demarcation and customer premises
  12. Stranded core –
  13. Solid Core - Solid core Systems, Inc. was a software company based in Cupertino, California, that developed software to detect and prevent unwanted change. ... Its products provide change management auditing, configuration control, PCI compliance and system lockdown used by enterprise IT organizations worldwide that there is only one fixed conductor in the wire
  14. Near End Crosswalk – an error condition that occurs when connectors are attached to twisted pair
  15. Unit - the first and least natural number
  16. Split Pair - A split pair is a wiring error where two wires of a twisted pair are instead connected using two wires from different pairs, potentially creating interference.
  17. Punch down tool - a hand tool used to connect telecommunications and network wires to a patch panel,
  18. Wire map - basically a continuity checker that determines if pins are correctly connected.
  19. Work Area - means a room or defined space in a workplace where hazardous chemicals are produced or used, and where employees are present
  20. Near End Crosswalk – an error condition that occurs when connectors are attached to twisted pair