Module 3 Networking Terms (Networking and OS)

¡Supera tus tareas y exámenes ahora con Quizwiz!

Address

*Address* reservation. When a DHCP server assigns a static IP address to a DHCP client. For example, a network printer might require a static IP address so that computers on the network can find the printer.

Dial-up

A dial-on-demand service, which means that a telephone number must be dialed when connecting to an ISP (Internet service provider). This service is not affected by adverse atmospheric conditions such as clouds, rain, snow, and fog.

Firewall

A host-based tool (host-based meaning it is installed and configured on the workstation itself) can most likely be configured to block traffic to websites by way of content filtering.

Whitelist

A network-based Criteria for filtering can draw from lists of what can be accessed.

Blacklist

A network-based Criteria for filtering can draw from lists of what cannot be accessed (restricted/blocked).

A wireless local area network (WLAN) covers a small local area, such as an office or a home. The devices in a WLAN are connected in either ____ mode (no wireless access point) or infrastructure mode (using an access point).

ADHOC

Mac Filtering

Allows you to restrict access to your network to certain computers or devices. If a MAC address is not entered in the table of MAC addresses, the device is not allowed to connect to the network.

Satellite

An always-on Internet technology that can be severely degraded (or impossible to use) under adverse weather and atmospheric conditions such as clouds, rain, snow, and fog.

Parental Controls

App gives parents the ability to manage the kind of content allowed from the Internet. Parents can also monitor websites and the content accessed.

Single Factor

Authentication requires a user to provide one passphrase only. The entered passphrase is analyzed, and if it is found to be accurate, the user is then granted access to the system. Comparatively less secure than multi-factor authentication. Ideally, this authentication should not be used for securing sensitive information.

Cable Internet

Broadband technology that uses cable TV. The TV signal to your TV and data signals to your computer/LAN share the same coaxial cable. Coaxial cables are cables with a single copper wire in the middle and braided shield around it.

ipconfig /all

CLI command displays a network connection's configuration information, including the MAC address.

ipconfig /renew

CLI command leases a new IP address from a DHCP server. Make sure you release the IP address before you renew it.

Coaxial

Cable connection using F-type connectors.

Hotspot

Can be used to share the Internet connection on a mobile device with other mobile devices or computers using the device's Wi-Fi. This is a connect-as-needed technology.

Fourth generation

Cellular technology uses LTE technology with speeds ranging from 100 Mbps to 1 Gbps.

Ping

Command-line command that tests connectivity by sending an echo request to a remote computer. If the remote computer is online, detects the signal, and is configured to respond, it responds.

The ___ server, which automatically assigns IP address information to network clients with either wired or wireless connections. The host device is configured to obtain IP address information automatically.

DHCP

The domain name address is used to connect to a _____ server that is used to resolve the address. This allows you to use a name like www.microsoft.com instead of trying to remember the IP address of the web server.

DNS

_____ SSID broadcast hides the SSID; it will not be seen by anyone. If they don't know the SSID, they can't get on the company's network.

Disabling

At the bare minimum, use at least ___characters in the passphrase.

Eight

Adding an access point will not stop someone from gaining access to the company's wireless network. It will ___ the size of the wireless network.

Extend

DSL (Digital Subscriber Line)

Filters use RJ-11 connections. Filters are used when simultaneous voice and data are desired. This filter is required for on each analog telephone connection when simultaneous voice and data are desired.

The ___ is the address on the router that allows your traffic to move from your local network to the Internet. You use this to route your requests for addresses outside your local network.

Gateway

UPnP

Helps computers on the local network automatically discover and communicate with services provided by other computers on the local network.

Cable

Internet connection that is always-on, wired technology and is not affected by atmospheric conditions such as clouds, rain, snow, and fog.

WPA2 Enterprise

Is considered the most secure of the wireless choices settings given. However, it requires an authentication server and a considerable amount of technical configuration resulting in additional costs to the customer.

DMZ

Is enabled on a SOHO router to forward all protocols (ports) from the public untrusted network to a host on the private LAN. Use this setting carefully on a SOHO device as it can have serious security ramifications to all hosts on the private network. A computer or network that is not protected by a firewall or has limited protection.

WAP

It enables wireless devices to connect to the network. These wireless connections can be secured using wireless security features.

Radius

It is a network protocol, which operates on port number 1812. It provides accounting, authorization, and authentication services to its users.

Administrative

It's extremely important to change the *administrative* password on a router as soon as you install it. Every router's password and username is 'admin' when you first login.

Netstat

Lists statistics about the network connection, including the IP addresses of active connections.

A ______ is the device's globally unique hardware number. Unlike the IP address, this address does not change.

Mac Address

Cathy will find the computer's network connection settings in the____ (from the Control Panel). She will also see all the network connection types.

Network and Sharing Center

WEP

No longer considered secure because the key used for encryption doesn't change.

Ethernet

Patch cable uses RJ-45 connectors.

Latency

Performance of a network technology is measured in bandwidth and *latency*.

Each server application running on a computer is addressed by a unique ---.

Port Address

The IP addresses that are used within a network used the ___ network IP address ranges. These IP address ranges are considered to be non-routable and cannot be used on the Internet.

Private

VPN

Protects data by encrypting it from the time it leaves the remote computer until it reaches a server on the corporate network, and vice versa. This application is for a remote employee to connect to his private corporate network via the public untrusted Internet. Windows 10 can be configured to require the connecting user to enter his/her user name and password at the time he/she connects.

nslookup 10.22.209.75, what is this?

Reverse Lookup

If a user were connecting to the network using a wireless connection, these settings should be enabled: ____, authentication and encryption settings.

SSID

The ____is used to identify the network that you are connected to and the node on that network.

Subnet mask

Local Computer

The IP address 127.0.0.1 always refers to the *local computer*. If there is not a response, you can assume there is a problem with the network connection's configuration.

Alternative IP Address Configuration

The computer will first attempt to gather network connection settings from a DHCP server. If a DHCP server is not available on the network, the computer will instead use the new static IP settings you just entered.

Authentication

The process of validating a user. A user would enter their credentials and, if accurate, their credentials are accepted, and access is granted to them.

Username

The user must have a valid ____ and password configured on the Windows domain controller to authenticate on the network thru a wired connection.

Static

There are two methods of guaranteeing that a network host receives the same IP address each time it is booted. First, a technician could configure a *static* assigned IP address to the host. Second, a DHCP reservation could be configured on the DHCP server.

Dedicated Line Using Fiber Optic

This is a line where an ISP is connected to a business without any other business on the line with it. TV, Internet data, and voice communications all share the same broadband fiber-optic cable, a cable that transmits signals as pulses of light over glass or plastic strands inside protected tubing.

WPA2

This security standard also changes the encryption (typically uses AES for encryption) with every packet so that it would be difficult to brute-force the encryption.

TKIP

This wireless encryption is not as secure as AES. Generates a different key for every transmission.

Changing the radio power allows you to prevent the wireless network from going outside the walls of your company. True or False?

True

WPA

Typically uses TKIP for encryption.

A wireless router provides a provision to connect remotely using a___. This is what you will use to first configure the wireless router.

Web Browser

Port Forwarding

When the firewall receives a request for communication from the Internet to the specific computer and port, the request will be allowed and forwarded to that computer on the network.

APIPA

Without an alternate configuration, if the host cannot reach a DHCP server, the host will automatically assign itself an address in the address range 169.254.x.y.

QoS

You notice that one application or device is not getting the best service, you can improve its network performance using this router's feature. A feature that prioritizes network traffic to guarantee delivery of data or improve the performance of a particular application or device.

ifconfig

command can display network configuration information and refresh the TCP/IP assignments for a connection and used on UNIX, Linux, and macOS operating systems

AES

was created to allow users with little to no experience to set up wireless protection using a button and PIN to connect to a wireless router.

WPS

was created to allow users with little to no experience to set up wireless protection using a button and PIN to connect to a wireless router.


Conjuntos de estudio relacionados

Lesson 25: Discrete Trial Teaching

View Set

Chapter 6 - Somatic Symptom and Dissociative Disorders

View Set

IT 250 Final HTML3, PFCS Quiz 3, PFCS Quiz 2, PFCS Quiz 1

View Set

Business 101 Spring Final Exam (MC)

View Set

Homework: Module 3 Practice Quiz: Corporate Governance

View Set