Shared Flashcard Set

Details

Comptia Networking + 008 Part 9
Glossery Defenintions V-Z
79
Computer Networking
Not Applicable
04/24/2022

Additional Computer Networking Flashcards

 


 

Cards

Term
variable (SNMP)
Definition
Value of an SNMP management information base (MIB) object. That value can be read with a Get PDU or changed with a Set PDU.
Term
variable-length subnet masking (VLSM)
Definition
The basis of allocating and routing classless addresses, not restricting subnet masks to /8, /16, or /24, which classful addressing did. Based on variable-length subnet masking (VLSM), where subnets can be allocated according to the needs of an organization, such as /26 for a network with 254 or fewer node, or /30 for a network with only two nodes.
Term
vertical cross-connect
Definition
Main patch panel in a telecommunications room.
Term
very-high-bit-rate DSL (VDSL)
Definition
The latest form of DSL with download and upload speeds of up to 100 Mbps. VDSL was designed to run on copper phone lines, but many VDSL suppliers use fiber-optic cabling to increase effective distances.
Term
video surveillance
Definition
Security measures that use remotely monitored visual systems that include IP cameras and closed-circuit televisions (CCTVs).
Term
video teleconferencing (VTC)
Definition
The classic, multicast-based presentation where one presenter pushes out a stream of video to any number of properly configured and properly authorized multicast clients.
Term
virtual desktop infrastructure (VDI)
Definition
Technologies that use virtual machines to provide and manage virtual desktops. VDI can provide benefits like flexible management when the desktop VMs are centralized on a smaller number of servers.
Term
virtual disk
Definition
Block-level storage provided via a storage area network (SAN) that functions for the client computer as a physical, directly attached hard drive.
Term
virtual firewall
Definition
A firewall that is implemented in software within a virtual machine in cases where it would be difficult, costly, or impossible to install a traditional physical firewall.
Term
virtual IP (VIP) address
Definition
A single IP address shared by multiple systems. This is commonly the single IP address assigned to a home or organization that uses NAT to have multiple IP stations on the private side of the NAT router. Virtual IP addresses are also used by First Hop Redundancy Protocol (FHRP).
Term
virtual local area network (VLAN)
Definition
A common feature among managed switches that enables a single switch to support multiple Layer 2 broadcast domains and provide isolation between hosts on different VLANs. Critical for modern network performance and security.
Term
virtual machine (VM)
Definition
A virtual computer accessed through a class of programs called a hypervisor or virtual machine monitor. A virtual machine runs inside your actual operating system, essentially enabling you to run two or more operating systems at once.
Term
virtual machine monitor (VMM)
Definition
In virtualization, a layer of programming that creates, supports, and manages a virtual machine.
Term
Virtual Network Computing (VNC)
Definition
A remote access program and protocol.
Term
virtual network interface card (vNIC)
Definition
Software-based NIC that functions identically to a physical NIC and uses a software connection to pass traffic from the real NIC to the virtual one.
Term
virtual PBX
Definition
Software that functionally replaces a physical PBX telephone system.
Term
virtual private network (VPN)
Definition
A network configuration that enables a remote user to access a private network via the Internet. VPNs employ an encryption methodology called tunneling, which protects the data from interception.
Term
virtual router
Definition
A router that is implemented in software within a virtual machine. The scalability of a virtual machine makes it easy to add capacity to the router when it is needed. Virtual routers are easily managed and are highly scalable without requiring the purchase of additional network hardware.
Term
Virtual Router Redundancy Protocol (VRRP)
Definition
Open standard FHRP that provides high availability by taking multiple routers and grouping them together into a single virtual router with a single virtual IP address that clients use as a default gateway. See First Hop Redundancy Protocol (FHRP).
Term
virtual switch
Definition
Software that performs Layer 2 switching within a hypervisor and enables virtual machines (VMs) to communicate with each other without going outside of the host system.
Term
virtualization
Definition
Generally, the process of running software (called a hypervisor) on a host computer to create a virtual machine (VM) that models (virtualizes) the hardware you’d find on a physical computer. Also, a pattern that involves replacing existing components with software (virtual) versions that are roughly indistinguishable to any programs, devices, or users that interact with them.
Term
virtualized network functions (VNFs)
Definition
Network functions such as firewalls, load balancers, and routers that are run using network function virtualization infrastructure (NFVI).
Term
virtualized network function components (VNFCs)
Definition
Virtual machines (or containers) that can be interconnected to work collectively as a VNF, such as a VPN concentrator or firewall.
Term
virus
Definition
A program that can make a copy of itself on a system without the user being aware of it. All viruses carry some payload that may or may not do something malicious. Computer viruses generally require a host file or program to run.
Term
virus definition or data files
Definition
Enables the virus protection software to recognize the viruses on your system and clean them. These files should be updated often. Also called signature files, depending on the virus protection software in use.
Term
virus shield
Definition
Anti-malware program that passively monitors a computer’s activity, checking for viruses only when certain events occur, such as a program executing or a file being downloaded.
Term
VLAN hopping
Definition
A Layer 2 attack that enables an attacker to access hosts on a VLAN the attacker is not a part of. Traditionally this attack used switch spoofing or double tagging.
Term
VLAN pooling
Definition
A method to load-balance wireless network clients associated with a single SSID. Distributes clients across many VLANs to avoid excessive levels of broadcast traffic.
Term
VLAN Trunking Protocol (VTP)
Definition
Cisco proprietary protocol to automate the process of syncing VLANs across switches.
Term
Voice over IP (VoIP)
Definition
Using an IP network to conduct voice calls.
Term
VoIP gateway
Definition
Interface between a traditional switched telephone network and a VoIP service provider.
Term
VoIP PBX
Definition
A private branch exchange that uses VoIP instead of the traditional switched telephone circuits.
Term
volt (V)
Definition
Unit of measurement for voltage.
Term
voltage
Definition
The pressure of the electrons passing through a wire.
Term
voltage event recorder
Definition
Tracks voltage over time by plugging into a power outlet. Also known as a voltage quality recorder
Term
VPN concentrator
Definition
A server program that supports many VPN connections (L2TP, SSL VPN, etc.). Typically part of a VPN-capable router.
Term
VPN tunnel
Definition
A connection over the Internet between a client and a server; the VPN tunnel enables the client to access remote resources as if they were local, securely.
Term
vulnerability
Definition
A potential weakness in an infrastructure that a threat actor might exploit.
Term
vulnerability management
Definition
The ongoing process of identifying vulnerabilities and dealing with them.
Term
vulnerability scanner
Definition
A tool that scans a network for potential attack vectors.
Term
WAN (wide area network)
Definition
A geographically dispersed network created by linking various computers and LANs over long distances, generally using leased phone lines. There is no firm dividing line between a WAN and a LAN.
Term
warm site
Definition
Facility with all of the physical resources, computers, and network infrastructure to recover from a primary site disaster. A warm site does not have current backup data and it may take a day or more to recover and install backups before business operations can recommence.
Term
wattage (watts or W)
Definition
The amount of amps and volts needed by a particular device to function.
Term
wavelength
Definition
In the context of laser pulses, the distance the signal has to travel before it completes its cyclical oscillation and starts to repeat. Measured in nanometers, wavelength can be loosely associated with colors.
Term
Web server
Definition
A server that speaks the HTTP protocol, often secured with TLS. Historically used to deliver only HTML Web sites, has since became the backbone for almost all network-based apps.
Term
Web services
Definition
Applications and processes that can be accessed over a network, rather than being accessed locally on the client machine. Web services include things such as Web-based e-mail, network-shareable documents, spreadsheets and databases, and many other types of cloud-based applications.
Term
well-known port numbers
Definition
Port numbers from 0 to 1023 that are used primarily by client applications to talk to server applications in TCP/IP networks.
Term
wide area network (WAN)
Definition
A geographically dispersed network created by linking various computers and LANs over long distances, generally using leased phone lines. There is no firm dividing line between a WAN and a LAN.
Term
Wi-Fi 4
Definition
An 802.11 standard (marketed as Wi-Fi 4) that increases transfer speeds and adds support for multiple input/multiple output (MIMO) by using multiple antennas. 802.11n can operate on either the 2.4- or 5-GHz frequency band and has a maximum throughput of 400 Mbps. Superseded by 802.11ac, but used with many IoT devices.
Term
Wi-Fi 5
Definition
A wireless standard that operates in the frequency range of 5 GHz and offers throughput of up to 1 Gbps. 802.11ac is marketed as Wi-Fi 5.
Term
Wi-Fi 6
Definition
Wireless standard that brings improvements in high-density areas such as stadiums and conferences in comparison to previous standards. Marketed as both Wi-Fi 6 and Wi-Fi 6E. Wi-Fi 6 operates at the 2.4-GHz and 5-GHz bands, while Wi-Fi 6E operates at the 6-GHz band. 802.11ax offers a maximum throughput of up to 10 Gbps.
Term
Wi-Fi
Definition
The most widely adopted wireless networking type in use today. Technically, only wireless devices that conform to the extended versions of the 802.11 standard—802.11a, b, g, n, ac, and ax—are Wi-Fi certified.
Term
Wi-Fi analyzer
Definition
Any device that finds and documents all wireless networks in the area.
Term
Wi-Fi Protected Access (WPA)
Definition
A wireless security protocol that addresses weaknesses and acts as an upgrade to WEP. WPA offers security enhancements such as dynamic encryption key generation (keys are issued on a per-user and per-session basis), an encryption key integrity-checking feature, user authentication through the industry-standard Extensible Authentication Protocol (EAP), and other advanced features that WEP lacks. WPA has been replaced by the more secure WPA2.
Term
Wi-Fi Protected Access 2 (WPA2)
Definition
Consumer name for the IEEE 802.11i standard and the replacement for the WPA protocol. It uses the Advanced Encryption Standard algorithm, making it much harder to crack than its predecessor.
Term
Wi-Fi Protected Access 3 (WPA3)
Definition
Wireless encryption standard that is replacing WPA2. Uses Simultaneous Authentication of Equals (SAE), a key exchange based on Diffie-Hellman that generates unique encryption keys between each client and WAP.
Term
Wi-Fi Protected Setup (WPS)
Definition
Automated and semi-automated process to connect a wireless device to a WAP. The process can be as simple as pressing a button on the device or pressing the button and then entering a PIN code. WPS is particularly vulnerable to brute force attacks.
Term
Windows Defender Firewall
Definition
The firewall that has been included in Windows operating systems since Windows XP SP2; originally named Internet Connection Firewall (ICF) but renamed in subsequent versions of Windows.
Term
Windows domain
Definition
A group of computers controlled by a computer running a Windows Server operating system with the Active Directory Domain Controller role installed.
Term
wire map
Definition
A test for copper cables that checks not only for continuity but also that all the wires on both ends of the cable connect to the right spot. A wire map will also pick up shorts and crossed wires.
Term
wire scheme
Definition
A document that usually consists of multiple pages and that shows the following: how the wires in a network connect to switches and other nodes, what types of cables are used, and how patch panels are configured. It usually includes details about each cable run.
Term
work area
Definition
In a basic structured cabling network, often simply an office or cubicle that potentially contains a PC attached to the network.
Term
Workgroup
Definition
A convenient method of organizing computers under Network/My Network Places in Windows operating systems.
Term
workstation
Definition
Computer that a person physically uses to accomplish their work. Often a general computer, but workstations for some occupations need specialized hardware. Traditionally, workstations were stationary computers that were small and cheap enough for it to be practical to set one up at an employee’s physical workstation (in contrast to shared mini/mainframe computers that took up one or more server racks).
Term
worm
Definition
A form of malware. Unlike a classic virus, a worm does not infect other files on the computer. Instead, it autonomously replicates by infecting systems over a network by taking advantage of security weaknesses in networking protocols.
Term
WPA
Definition
A wireless security protocol that addresses weaknesses and acts as an upgrade to WEP. WPA offers security enhancements such as dynamic encryption key generation (keys are issued on a per-user and per-session basis), an encryption key integrity-checking feature, user authentication through the industry-standard Extensible Authentication Protocol (EAP), and other advanced features that WEP lacks. WPA has been replaced by the more secure WPA2.
Term
WPA2
Definition
Consumer name for the IEEE 802.11i standard and the replacement for the WPA protocol. It uses the Advanced Encryption Standard algorithm, making it much harder to crack than its predecessor.
Term
WPA2-Enterprise
Definition
A version of WPA2 that uses a RADIUS server for authentication.
Term
WPA3
Definition
Wireless encryption standard that is replacing WPA2. Uses Simultaneous Authentication of Equals (SAE), a key exchange based on Diffie-Hellman that generates unique encryption keys between each client and WAP.
Term
WPS
Definition
Automated and semi-automated process to connect a wireless device to a WAP. The process can be as simple as pressing a button on the device or pressing the button and then entering a PIN code. WPS is particularly vulnerable to brute force attacks.
Term
WWW (World Wide Web)
Definition
A vast network of servers and clients communicating through the Hypertext Transfer Protocol (HTTP). Commonly accessed using graphical Web-browsing software such as Mozilla Firefox and Google Chrome.
Term
XOR (eXclusive OR)
Definition
An operation commonly used in cryptography. XOR takes two input bits and outputs one bit. If the input bits are the same, the output is 0, while if they are different, the output is 1.
Term
Yost cable
Definition
Cable used to interface with a Cisco device.
Term
zero-configuration networking (zeroconf)
Definition
Automatically generated IP addresses in the 168.254.0.0/16 subnet when a DHCP server is unreachable.
Term
zero-day attack
Definition
New attack that exploits a vulnerability that has yet to be identified.
Term
zero trust
Definition
A cybersecurity paradigm focused on resource protection and the premise that trust is never granted implicitly but must be continually evaluated.
Term
Zigbee
Definition
Wireless home automation control standard.
Term
zombie
Definition
A single computer under the control of an operator that is used in a botnet attack.
Term
Z-Wave
Definition
Wireless home automation control standard.
Supporting users have an ad free experience!