CCBC Network+ Quizlet PDF
CCBC Network+ Quizlet PDF
CCBC Network+ Quizlet PDF
1Pv4
address
2.
1Pv6
address
3.
10Base
standards
4.
802.2
5.
802.3
11.
access control
12.
accountability
13.
ACL (Access
Control List)
14.
active hub
15.
active IDS
16.
address
munging
17.
ad-hoc mode
18.
adware
19.
AH protocol
(Authentication
Header
protocol)
20.
algorithm
21.
amplitude
22.
analog
modulation
802.11
802.x
8.
9.
AAAA
10.
AC
(Alternating
Current)
23.
analog signal
38.
attacker
24.
ANS
(Authoritative
Name Server)
39.
attenuation
40.
auditing
25.
ANSI (American
National
Standards
Institute)
41.
antivirus
software
AUI connector
(Attachment
Unit Interface
connector)
42.
authentication
27.
AP (Access
Point)
43.
28.
APIPA
(Automatic
Private IP
Addressing)
authentication
by assertion
44.
authorization
29.
applicationbased IDS
45.
availability
30.
Application
layer
46.
backoff
31.
ARP (Address
Resolution
Protocol)
47.
bandwidth
32.
ARP cache
48.
33.
arp utility
baseband
transmission
49.
baseline
34.
AS (Autonomous
System)
50.
BGP (Border
Gateway
Protocol)
asynchronous
communications
51.
biometrics
52.
black hat
26.
35.
36.
ATM
(Asynchronous
Transfer Mode)
53.
bluejacking
37.
attack
54.
bluesnarfing
55.
Bluetooth
56.
BOOTP
(Bootstrap
Protocol)
57.
border
router
58.
botnet
59.
bottleneck
60.
bounded
media
61.
BPL
(Broadband
over
Powerlines)
62.
branching
factor
63.
bridge
64.
broadband
transmission
65.
broadcast
domain
66.
broadcast
radio
67.
broadcast
transmission
68.
brute force
attack
69.
BSS (Basic
Service Set)
70.
buffering
71.
buffer
overflow
72.
butt set
73.
cable
certifiers
74.
cable Internet
access
75.
cable modem
76.
cable tester
77.
CA
(Certificate
Authority)
78.
cache
79.
caching
engine
80.
CAN (Campus
Area Network)
81.
CARP
(Common
Address
Redundancy
Protocol)
82.
carrier signal
83.
CCMP
(Counter Mode
with Cipher
Block
Chaining
Message
Authentication
Code
Protocol)
84.
cell
85.
cell switching
network
86.
centralized
network
87.
certificate
management
system
88.
certificate
repository
89.
change
management
101.
Class C
addresses
102.
Class D
addresses
103.
Class E
addresses
104.
cleartext
105.
client
106.
client/server
network
107.
CNAME
(Canonical
name record)
108.
coax
109.
coaxial cable
110.
codec
CHAP
(Challenge
Handshake
Authentication
Protocol)
An encrypted remote-access
authentication method that enables
connections from any authentication
method requested by the server, except for
PAP and SPAP unencrypted
authentication.
91.
Checksum
92.
chips
93.
CIA triad
(Confidentiality,
Integrity,
Availability)
111.
cold site
94.
CIDR
(Classless Inter
Domain
Routing)
112.
cold spare
95.
cipher
113.
collision
domain
96.
ciphertext
114.
compulsory
tunnels
97.
circuit
switching
115.
computer
network
circuit tester
116.
confidentiality
117.
connection
118.
connector
119.
contentionbased media
access
90.
98.
99.
100.
Class A
addresses
Class B
addresses
120.
contention
domain
135.
121.
controlled media
access
136.
data packet
137.
data theft
138.
data
transmission
139.
data window
140.
DC (Direct
Current)
141.
DCE (Data
Communications
Equipment)
142.
DDoS attack
(Distributed
Denial of
Service attack)
143.
deciphering
144.
dedicated lines
145.
CSMA/CA
(Carrier Sense
Multiple
Access/Collision
Avoidance)
deencapsulation
146.
default gateway
130.
CSMA/CD
(Carrier Sense
Multiple
Access/Collision
Detection)
147.
demand priority
131.
CSU/DSU
(Channel
Service
Unit/Data
Service Unit)
148.
demarc
149.
demarc
extension
132.
custom TCP/IP
subnet
133.
cycle
150.
demodulation
134.
daemon
151.
demultiplexer
122.
copper media
123.
cost
124.
counter
125.
cracker
126.
CRC (Cyclic
Redundancy
Check)
crossover cable
127.
128.
129.
cryptography
152.
demultiplexing
153.
DES (Data
Encryption
Standard)
154.
DET (Directory
Entry Table)
155.
DFS
(Distributed
File System)
156.
DHCP
(Dynamic Host
Configuration
Protocol)
157.
DHCP relay
agent
158.
dialectric
159.
160.
dial-up lines
dial-up modem
161.
Diameter
162.
dictionary
attack
163.
differential
signaling
164.
digital
certificate
165.
digital signal
166.
digital signal
modulation
167.
digital
signature
168.
directional
antenna
169.
disaster
170.
disaster
recovery
171.
disaster
recovery plan
172.
distancevector routing
173.
DMZ
(demilitarized
zone)
174.
DNSBLs (DNS
blacklists)
175.
DNS (Domain
Name
System)
176.
domain
177.
domain name
178.
DoS attack
(Denial of
Service
attack)
179.
drain
180.
drone
181.
DS
(Distribution
System)
182.
DSH (Digital
Signal
Hierarchy)
183.
DSL (Digital
Subscriber
Line)
184.
DSSS (Direct
Sequence
Spread
Spectrum)
DTE (Data
Termination
Equipment)
186.
DVM (Digital
Volt Meter)
187.
DWDM (Dense
Wavelength
Division
Multiplexing)
188.
EAP
(Extensible
Authentication
Protocol)
189.
EAPOL
(Extensible
Authentication
Protocol over
LAN)
190.
EAP-TLS
(EAPTransport
Layer
Security)
eavesdropping
attack
185.
191.
197.
EIGRP
(Enhanced
Interior
Gateway
Routing
Protocol)
198.
electrical
noise
199.
encapsulation
200.
enciphering
201.
encoding
202.
encryption
203.
encryption
devices
204.
endpoint
205.
enterprise
network
206.
environment
monitor
207.
error detection
208.
ES (Edge
System)
209.
ESP protocol
(Encapsulating
Security
Payload
protocol)
192.
EDAC (Error
Detection and
Correction)
193.
EDC (Error
Detection
Code)
210.
ESS (Extended
Service Set)
EFS
(Encrypting
File System)
211.
Ethernet
195.
EGP (Exterior
Gateway
Protocol)
212.
Ethernet frame
196.
EIA
(Electronic
Industries
Alliance)
213.
exterior router
214.
extranet
194.
215.
fall-back
plan
216.
Fast
Ethernet
217.
FAT (File
Allocation
Table)
fault
tolerance
219.
FC (Face
Contact)
220.
FCS (Frame
Check
Sequence)
221.
FDDI (Fiber
Distributed
Data
Interface)
FDM
(FrequencyDivision
Multiplexing)
218.
222.
223.
224.
225.
230.
FQDN
(Fully
Qualified
Domain
Name)
231.
Frame
Relay
232.
frequency
233.
FTP bounce
attack
234.
FTP (File
Transfer
Protocol)
235.
full duplex
236.
gain
237.
gateway
238.
GBIC
(Gigabit
Interface
Converter)
239.
FHSS
(Frequency
Hopping
Spread
Spectrum)
GIF
(Graphics
Interchange
Format)
240.
Gigabit
Ethernet
fiber optic
cable
241.
firewall
GPS
(Global
Positioning
System)
242.
Grounding
226.
first
responder
243.
group
policy
227.
fixed length
window
244.
guessing
245.
guessing
attack
246.
guideline
228.
flooding
229.
flow control
247.
hacker
265.
hotfix
266.
hot site
267.
hot spare
268.
HSM
(Hardware
Security
Module)
269.
HTTP
(Hypertext
Transfer
Protocol)
248.
half duplex
249.
hardware
loopback
plug
250.
hash
251.
hashing
encryption
252.
HCC
(Horizontal
crossconnect)
253.
hertz
270.
HTTPS (HTTP
Secure)
254.
high
availability
271.
hub
255.
high
bandwidth
application
272.
256.
HIPS
(Hostbased IPS)
HVAC
(Heating,
Ventilating,
and Air
Conditioning)
273.
hoax
hybrid
password
attack
274.
hybrid
topology
275.
IaaS
(Infrastructure
as a Service)
276.
IBSS
(Independent
Basic Service
Set)
277.
ICA
(Independent
Computing
Architecture)
278.
ICANN
(Internet
Corporation
for Assigned
Names and
Numbers)
257.
258.
honeynet
259.
honeypot
260.
hop
261.
host-based
IDS
262.
host
computer
263.
host name
264.
HOSTS file
279.
ICC
(intermediate
cross-connect)
293.
impedance
280.
ICMP (Internet
Control
Message
Protocol)
294.
impersonation
281.
ICS (Internet
Connection
Sharing)
295.
implicit deny
296.
282.
IDF
(Intermediate
Distribution
Frame)
incident
management
297.
infrared
transmission
IDS (Intrusion
Detection
System)
298.
infrastructure
mode
IEEE 802.1 x
299.
in phase
300.
integrity
301.
intelligent hub
302.
interactive
mode
303.
inter-domain
routing
304.
interference
305.
interior router
306.
Internet
307.
intra-domain
routing
308.
intranet
309.
intrusion
detection
310.
IP filtering
283.
284.
285.
IEEE 1394
IEEE (Institute
of Electrical
and
Electronics
Engineers)
IETF (Internet
Engineering
Task Force)
IGMP (Internet
Group
Management
Protocol)
289.
IGP (Interior
Gateway
Protocol)
290.
IGRP (Interior
Gateway
Routing
Protocol)
IKE (Internet
Key Exchange)
IMAP4 (Internet
Message
Access
Protocol)
286.
287.
288.
291.
292.
311.
IP (Internet
Protocol)
312.
IPSec driver
313.
314.
IPSec (Internet
Protocol
Security)
IPSec policy
325.
ITU (International
Telecommunication
Union)
326.
IV attack
327.
IV (Initialization
Vector)
328.
jitter
329.
JPEG (Joint
Photographic
Experts Group)
330.
key
331.
key-pair encryption
332.
333.
label switching
334.
lANA (Internet
Assigned Number
Authority)
An international organization
established in 1993 to govern the use
of Internet IP addresses. ICANN is now
responsible for leasing IP addresses
worldwide.
335.
315.
IPSec Policy
Agent
316.
IP Security
Monitor
317.
IPS (Intrusion
Prevention
System)
318.
IP spoofing
attack
319.
IRP (Incident
Response
Policy)
320.
ISDN (Integrated
Services Digital
Network)
IS-IS
(Intermediate
System to
Intermediate
System)
322.
I SOC (Internet
Society)
323.
ISO
(International
Organization for
Standardization)
336.
latency
324.
iterative query
337.
latency sensitivity
321.
338.
LC (Local
Connector)
339.
LDAP
(Lightweight
Directory
Access
Protocol)
340.
LEAP
(Lightweight
Extensible
Authentication
Protocol)
341.
least
privilege
342.
link
redundancy
343.
link state
routing
344.
LLC (Logical
Link Control)
353.
logical
topology
354.
logic bomb
355.
LTE (Long
Term
Evolution)
356.
MAC address
357.
MAC (Media
Access
Control)
358.
malicious
code attack
359.
malware
360.
managed hub
361.
Manchester
encoding
345.
load balancer
346.
load
balancing
347.
log file
348.
logical bus
topology
362.
man-in-themiddle
attack
349.
logical
network
diagram
363.
350.
logical ring
topology
MAN
(Metropolitan
Area
Network)
364.
MCC (Main
crossconnect)
365.
MDF (Main
Distribution
Frame)
366.
media
access
method
367.
media
converter
351.
352.
logical star
topology
logical state
368.
Microsoft
Management
Console
(MMC)
369.
microwave
transmission
370.
mixed mode
network
371.
MME (Mesh
Made Easy)
372.
modem
373.
modulator
374.
MPLS
(Multiprotocol
Label
Switching)
MPPE
(Microsoft
Point-to-Point
Encryption)
MT-RJ
(Mechanical
Transfer
Registered
Jack)
377.
MTR (My
traceroute)
378.
multicast
transmission
375.
376.
379.
multi-factor
authentication
380.
multimeter
381.
multimode
fiber
382.
multiplexer
383.
multiplexing
384.
multipoint
connections
385.
mutual
authentication
386.
mux
(multiplexer)
387.
MX (Mail
Exchange)
388.
NaaS (Network
as a Service)
389.
NAC (Network
Access Control)
390.
NAT (Network
Address
Translation)
391.
NBTSTAT
392.
NetBIOS
393.
NETSTAT
394.
network
acknowledgment
395.
network address
396.
network
administration
397.
network
analyzer
398.
network
backbone
399.
network-based
IDS
400.
network
baseline
401.
networking
standard
402.
Network layer
403.
network
management
404.
network
media
405.
network
model
406.
network name
407.
network
policy
408.
network
reconstruction
plan
network
scanner
NFS (Network
File System)
409.
410.
NIC (Network
Interface
Card)
NIPS
(Networkbased IPS)
NNI (Networkto-Network
Interface)
NNTP
(Network
News Transfer
Protocol)
415.
node
416.
noise
417.
noninteractive
mode
411.
412.
413.
414.
418.
non-repudiation
419.
420.
421.
nslookup
422.
NS (Name
Server)
423.
NT (Network
Termination)
424.
NTP (Network
Time Protocol)
425.
NTU (Network
Termination
Unit)
426.
OCx (Optical
Carrier x)
427.
ohm
428.
omnidirectional
antenna
429.
on-off keying
430.
open system
network
431.
oscilloscope
432.
OSI reference
model (Open
Systems
Interconnection)
433.
OSPF (Open
Shortest Path
First)
434.
OTDR (Optical
Time-Domain
Reflectometer)
435.
OUI
(Organizationally
Unique Identifier)
452.
patch
management
436.
out of phase
453.
pathping
454.
437.
PaaS (Platform
as a Service)
path-vector
routing
438.
packet
439.
packet loss
455.
440.
packet sniffer
PAT (Port
Address
Translation)
441.
packet sniffing
456.
PBX parachute
457.
442.
packet switching
network
PDH
(Plesiochronous
Digital
Hierarchy)
458.
443.
PAN (Personal
Area Network)
444.
PAP (Password
Authentication
Protocol)
PEAP
(Protected
Extensible
Authentication
Protocol)
459.
peer
445.
parallel data
transmission
460.
peer-to-peer
network
446.
parity check
461.
performance
monitor
447.
partial mesh
462.
permission
463.
pharming
464.
phase
465.
phishing
466.
physical bus
topology
467.
Physical layer
448.
passive hub
449.
passive IDS
450.
password attack
451.
patch
468.
physical mesh
topology
469.
physical
network
diagram
physical ring
topology
physical
security
470.
471.
486.
POP3 (Post
Office
Protocol
version 3)
487.
port
488.
port filtering
489.
port
mirroring
490.
port scanner
491.
port
scanning
attack
492.
PPP (Pointto-Point
Protocol)
493.
PPTP (Pointto-Point
Tunneling
Protocol)
494.
premise
wiring
495.
Presentation
layer
496.
private IP
address
497.
private key
498.
privilege
bracketing
499.
procedure
500.
promiscuous
mode
physical star
topology
473.
physical
topology
474.
physical tree
topology
472.
475.
ping
476.
PKI (Public
Key
Infrastructure)
477.
plaintext
478.
plenum
479.
plenum cable
480.
PoE (Power
over Ethernet)
481.
point-to-point
connection
poison
reverse
482.
483.
policy
statement
484.
polling
485.
PON (Passive
Optical
Network)
501.
protocol
analyzer
502.
protocol
binding
503.
proxy server
504.
PSTN (Public
Switched
Telephone
Network)
505.
PTR (Pointer)
506.
public key
507.
punch down
tool
508.
PVC
(Permanent
Virtual Circuit)
509.
PVC (Polyvinyl
Chloride)
510.
QoS (Quality of
Service)
518.
RDP (Remote
Desktop
Protocol)
519.
recursive
query
520.
redistribution
point
521.
refraction
522.
Remote
Access
523.
remote
access
protocol
524.
Remote
desktop
525.
remote
networking
526.
repeater
527.
replay attack
528.
RFB (Remote
Framebuffer)
529.
RF (Radio
Frequency)
530.
RIP (Routing
Information
Protocol)
531.
risk
511.
radiated
connection
512.
radio
networking
513.
RADIUS
(Remote
Authentication
Dial-In User
Service)
RAID
(Redundant
Array of
Independent or
Inexpensive
Disks)
RA
(Registration
Authority)
532.
rogue access
point
RARP (Reverse
Address
Resolution
Protocol)
533.
rollup
RAS (Remote
Access
Services)
514.
515.
516.
517.
534.
rootkit
550.
SC
(Subscriber
Connector or
Standard
Connector)
535.
routable
protocol
536.
route
convergence
551.
SDH
(Synchronous
Digital
Hierarchy)
537.
router
552.
Router
discovery
protocols
security
incident
538.
553.
security
policy
539.
routing
554.
segment
540.
routing loop
555.
serial cable
541.
routing table
556.
serial data
transmission
557.
server
542.
RSS feeds
543.
SA (Security
Association)
558.
service pack
544.
satellite
Internet
559.
545.
satellite
phone
session
hijacking
attack
560.
546.
satellite
television
Session
layer
561.
547.
scope
SFP (Small
Form Factor
Pluggable)
562.
548.
SCP (Secure
Copy
Protocol)
shared-key
encryption
549.
SCSI (Small
Computer
System
Interface)
563.
shielding
564.
signal
565.
signal
bounce
566.
simplex
567.
sine wave
568.
singlemode
fiber
569.
SLA
(Service
Level
Agreement)
sliding
window
570.
571.
smart card
572.
smart jack
573.
SMA (Sub
Multi
Assembly
or Sub
Miniature
type A)
SMB
(Server
Message
Block)
SMTP
(Simple
Mail
Transfer
Protocol)
sniffing
attack
SNIPS
(System and
Network
Integrated
Polling
Software)
SNMP
(Simple
Network
Management
Protocol)
574.
575.
576.
577.
578.
579.
SOA (Start of
Authority)
580.
social
engineering
attack
581.
socket
582.
software
attack
583.
SOHO (Small
office/home
office)
584.
SONET
(Synchronous
Optical
Network)
585.
spam
586.
spim
587.
SPI (Security
Parameters
Index)
588.
split horizon
589.
spoofing
590.
spread
spectrum
591.
spyware
592.
SRV (Service
Locator)
593.
SSH (Secure
Shell)
594.
SSID
(Service Set
Identifier)
595.
SSL (Secure
Sockets
Layer)
596.
SSL VPN
(Secure
Socket Layer
VPN)
A VPN format that works with a web browserinstalling a separate client is not necessary.
SSO (Single
Sign-On)
SSTP (Secure
Socket
Tunneling
Protocol)
599.
standard
600.
STA (Station)
601.
stateful
firewall
602.
stateless
firewall
597.
598.
603.
static routing
604.
store and
forward
605.
STP
(SpanningTree
Protocol)
606.
strong
password
607.
ST (Straight
Tip)
608.
stub
autonomous
systems
609.
subnet
610.
subnet mask
611.
subnetting
612.
SVC (Switched
Virtual Circuit)
613.
switch
614.
switched
Ethernet
615.
switching
616.
synchronous
communications
617.
TACACS+
(TACACS Plus)
618.
TACACS
(Terminal
Access
Controller
Access Control
System)
619.
TA (Terminal
Adapters)
620.
T -carrier
system
621.
TCP/IP model
622.
TCP/IP
(Transmission
Control
Protocol/Internet
Protocol)
623.
TCP
(Transmission
Control
Protocol)
A connection-oriented, guaranteeddelivery
protocol used to send data packets
between computers over a network like
the Internet.
624.
TDM (TimeDivision
Multiplexing)
625.
626.
627.
TDR (Time-Domain
Reflectometer)
Telnet
terminal
638.
TIFF (Tagged
Image File
Format)
639.
TKIP (Temporal
Key Integrity
Protocol)
640.
TLS (Transport
Layer Security)
641.
token
642.
Token ring
643.
tone generator
644.
tone locator
645.
top
646.
topology
647.
tracert
648.
Traffic filtering
649.
traffic shaping
650.
transceiver
651.
transit
autonomous
systems
652.
Transport layer
653.
Triple DES
(3DES)
654.
Trojan horse
655.
troubleshooting
628.
terminal emulator
629.
termination
630.
terminator
631.
632.
633.
TE (Terminal
Equipment)
TFTP (Trivial File
Transfer Protocol)
ThickNet
634.
ThinNet
635.
threat
636.
threshold
637.
TIA
(Telecommunications
Industry Association)
656.
troubleshooting
model
657.
trunking
658.
TTL (Time To
Live)
659.
TTS
(Transaction
Tracking
System)
660.
tunnel
661.
tunneling
662.
twisted pair
UDP (User
Datagram
Protocol)
664.
unauthorized
access
665.
unbounded
media
663.
672.
vampire
tap
673.
VCC
(Vertical
CrossConnect)
674.
VER
(Voltage
Event
Recorder)
675.
virtual
circuit
switching
676.
virtual
PBX
677.
virtual
server
678.
virtual
switch
679.
virus
680.
vishing
681.
VLAN
switch
unicast
transmission
682.
UNI (User-toNetwork
Interface)
VLAN
(Virtual
LAN)
683.
668.
UPS
(uninterruptible
power supply)
669.
USB
connection
VLSM
(Variable
Length
Subnet
Mask)
684.
670.
USB (Universal
Serial Bus)
VNC
(Virtual
Network
Computing)
685.
671.
UTP
(Unshielded
Twisted Pair)
voice over
data
systems
686.
VoIP
(Voice
over IP)
666.
667.
687.
voltmeter
688.
voluntary
tunnels
689.
VPN
concentrator
690.
VPN
protocols
691.
VPN (Virtual
Private
Network)
692.
VSAT (Very
Small
Aperture
Terminal)
VTP (VLAN
Trunking
Protocol)
694.
vulnerability
695.
WAN (Wide
Area
Network)
696.
WAP
(Wireless
Access
Point)
693.
697.
698.
699.
704.
WiMAX
(Worldwide
Interoperability
for Microwave
Access)
705.
Windows
security
policies
706.
WINS
(Windows
Internet
Naming
Service)
707.
wire crimper
708.
wireless
antenna
709.
wireless
communication
710.
wireless
security
711.
wireless tester
war
chalking
712.
wiring
schematic
war driving
713.
WLAN
(Wireless
Local Area
Network)
714.
worm
715.
WPA2 (Wi-Fi
Protected
Access v2)
716.
WPAN
(Wireless
Personal Area
Network)
717.
WPA (Wi-Fi
Protected
Access)
warm site
700.
waveform
701.
WEP (Wired
Equivalency
Privacy)
702.
whaling
703.
white hat
718.
Uses the wireless network technology to allow users to check email, surf the web, and connect to
corporate resources accessible within the cellular network boundaries.
719.
X.25
A legacy packet switching network technology developed in the 1970s to move data across less than
reliable public carriers.
720.
X Window system
Uses the X protocol that leverages a client-server relationship to provide graphical user interface and input
device management functionality to applications.
721.
Zeroconf (Zero
Configuration
Networking)
A set of standards used for automatically configuring and allocating IP address on Ethernet as well as
wireless networks.
722.
zombie
Unauthorized software introduced on multiple computers to manipulate the computers into mounting a
DDoS attack. Also called a drone.
723.
zone
A file that physically divides the DNS database and contains the actual IP-to-host name mappings for one
or more domains.