100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Cyb 210 Networking Terms Questions and Answers Latest Update 100% Correct.

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
22-09-2024
Written in
2024/2025

Simple Mail Transfer Protocol (SMTP) - ️️The standard email protocol on the internet and part of the TCP/IP protocol suite, as defined by IETF RFC 2821. It defines the message format and the message transfer agent (MTA), which stores and forwards the mail. It was originally designed for only plain text (ASCII text), but MIME and other encoding methods enable executable programs and multimedia files to be attached to and transported with the email message (PC Magazine, 2018). T1 Line - ️️A 1.544-Mbps point-to-point, dedicated, digital circuit provided by the telephone companies. With the monthly cost typically based on distance, these are widely used for connecting an organization's PBX to the telephone company or a local network (LAN) to an internet provider (ISP). They are also used for internet access in buildings that have no DSL, cable, or fixed wireless coverage (PC Magazine, 2018). IPv4 Addressing (Internet Protocol Version 4) - ️️The previous version of the IP protocol, which was introduced in 1981 and continues to be used alongside the subsequent Version 6 (PC Magazine, 2018). IPv6 Addressing (Internet Protocol Version 6) - ️️The latest generation of the IP protocol. The specification was completed in 1997 by the Internet Engineering Task Force (IETF) and first deployed in 2004 when the Internet Corporation for Assigned Names and Numbers (ICANN) added IPv6 records to its DNS root servers for Japan and Korea. IPv6 is backward compatible with IPv4 and was designed to fix its shortcomings, such as data security and maximum number of user addresses (PC Magazine, 2018). Netstat (Network Statistics) - ️️A command-line utility that reports the status of TCP/IP and Ethernet connections. It comes with all major operating systems, but the Linux/Unix versions provide the most command options. GUI-based versions for Windows, such as NetStat Live and X-NetStat, are also available. Network Mapper (Nmap) - ️️A free, open-source security scanner for auditing networks that runs on most platforms and is written by Fyodor (a person). When aimed at a particular host, it can determine which ports are open, which operating system and version is running, what services are offered, and what firewalls are used (PC Magazine, 2018). Packet Internet Groper (Ping) - ️️An internet utility used to determine whether a particular IP address is reachable online by sending out a packet and waiting for aresponse. It is used to test and debug a network as well as see if a user or server is online (PC Magazine, 2018). Hypertext Transfer Protocol (HTTP) - ️️The communications protocol used to connect to web servers on the internet or on a local network (intranet). Its primary function is to establish a connection with the server and send HTML pages back to the user's browser. It is also used to download files from the server either to the browser or to any other requesting application that uses HTTP (PC Magazine, 2018). Secure Shell (SSH) - ️️A security protocol for logging into a remote server. It provides an encrypted session for transferring files and executing server programs. Also serving as a secure client/server connection for applications such as database access and email, it supports a variety of authentication methods. Voice Over IP (VoIP) - ️️A digital telephone service that uses the internet for transport, as well as private IP networks. IP stands for "internet protocol." In order for calls to originate and terminate from regular telephones, connections to the public telephone network (PSTN) are also provided. Telephone companies, cable companies, and dedicated providers offer this type of calling for a fixed monthly fee or low perminute charge. Customers must have existing internet access (PC Magazine, 2018). Demilitarized Zone (DMZ) - ️️A middle ground between an organization's trusted internal network and an untrusted, external network such as the internet. Also called a "perimeter network," it is a subnetwork (subnet) that may sit between firewalls or off one leg of a firewall. Organizations typically place their web, mail, and authentication servers in it. It is a military term that refers to the area between two enemies (PC Magazine, 2018). Local Area Network (LAN) - ️️A communications network that is typically confined to a building or premises. The "clients" are user workstations running the Windows, Mac, or Linux operating systems, while the "servers" hold programs and data shared by the clients. Servers come in a wide range of sizes, from PC-based servers to mainframes (PC Magazine, 2018).

Show more Read less
Institution
Cyb 210 Networking Terms
Course
Cyb 210 Networking Terms









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cyb 210 Networking Terms
Course
Cyb 210 Networking Terms

Document information

Uploaded on
September 22, 2024
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Cyb 210 Networking Terms
Simple Mail Transfer Protocol (SMTP) - ✔️✔️The standard email protocol on the
internet and part of the TCP/IP protocol suite, as defined by IETF RFC 2821. It defines
the message format and the message transfer agent (MTA), which stores and forwards
the mail. It was originally designed for only plain text (ASCII text), but MIME and other
encoding methods enable executable programs and multimedia files to be attached to
and transported with the email message (PC Magazine, 2018).

T1 Line - ✔️✔️A 1.544-Mbps point-to-point, dedicated, digital circuit provided by the
telephone companies. With the monthly cost typically based on distance, these are
widely used for connecting an organization's PBX to the telephone company or a local
network (LAN) to an internet provider (ISP). They are also used for internet access in
buildings that have no DSL, cable, or fixed wireless coverage (PC Magazine, 2018).

IPv4 Addressing (Internet Protocol Version 4) - ✔️✔️The previous version of the IP
protocol, which was introduced in 1981 and continues to be used alongside the
subsequent Version 6 (PC Magazine, 2018).

IPv6 Addressing (Internet Protocol Version 6) - ✔️✔️The latest generation of the IP
protocol. The specification was completed in 1997 by the Internet Engineering Task
Force (IETF) and first deployed in 2004 when the Internet Corporation for Assigned
Names and Numbers (ICANN) added IPv6 records to its DNS root servers for Japan
and Korea. IPv6 is backward compatible with IPv4 and was designed to fix its
shortcomings, such as data security and maximum number of user addresses (PC
Magazine, 2018).


Netstat (Network Statistics) - ✔️✔️A command-line utility that reports the status of
TCP/IP and Ethernet connections. It comes with all major operating systems, but the
Linux/Unix versions provide the most command options. GUI-based versions for
Windows, such as NetStat Live and X-NetStat, are also available.

Network Mapper (Nmap) - ✔️✔️A free, open-source security scanner for auditing
networks that runs on most platforms and is written by Fyodor (a person). When aimed
at a particular host, it can determine which ports are open, which operating system and
version is running, what services are offered, and what firewalls are used (PC
Magazine, 2018).

Packet Internet Groper (Ping) - ✔️✔️An internet utility used to determine whether a
particular IP address is reachable online by sending out a packet and waiting for a

, response. It is used to test and debug a network as well as see if a user or server is
online (PC Magazine, 2018).

Hypertext Transfer Protocol (HTTP) - ✔️✔️The communications protocol used to
connect to web servers on the internet or on a local network (intranet). Its primary
function is to establish a connection with the server and send HTML pages back to the
user's browser. It is also used to download files from the server either to the browser or
to any other requesting application that uses HTTP (PC Magazine, 2018).

Secure Shell (SSH) - ✔️✔️A security protocol for logging into a remote server. It
provides an encrypted session for transferring files and executing server programs. Also
serving as a secure client/server connection for applications such as database access
and email, it supports a variety of authentication methods.


Voice Over IP (VoIP) - ✔️✔️A digital telephone service that uses the internet for
transport, as well as private IP networks. IP stands for "internet protocol." In order for
calls to originate and terminate from regular telephones, connections to the public
telephone network (PSTN) are also provided. Telephone companies, cable companies,
and dedicated providers offer this type of calling for a fixed monthly fee or low per-
minute charge. Customers must have existing internet access (PC Magazine, 2018).

Demilitarized Zone (DMZ) - ✔️✔️A middle ground between an organization's trusted
internal network and an untrusted, external network such as the internet. Also called a
"perimeter network," it is a subnetwork (subnet) that may sit between firewalls or off one
leg of a firewall. Organizations typically place their web, mail, and authentication servers
in it. It is a military term that refers to the area between two enemies (PC Magazine,
2018).

Local Area Network (LAN) - ✔️✔️A communications network that is typically confined
to a building or premises. The "clients" are user workstations running the Windows,
Mac, or Linux operating systems, while the "servers" hold programs and data shared by
the clients. Servers come in a wide range of sizes, from PC-based servers to
mainframes (PC Magazine, 2018).


Personal Area Network (PAN)`
Transmitting data wireless over a short distance. Bluetooth and Wi-Fi Direct are
examples of this (PC Magazine, 2018).

Protected Enclaves - ✔️✔️Subdivision of the internal network so that it is not one large
zone with no internal protections. This architectural approach to information security
defense in depth can be accomplished in a number of ways, including network
admissions control, firewalls, VLANs, and VPN (Northcutt, n.d.).
R137,29
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Document also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ACADEMICMATERIALS City University New York
Follow You need to be logged in order to follow users or courses
Sold
562
Member since
2 year
Number of followers
186
Documents
10590
Last sold
1 week ago

4,1

95 reviews

5
53
4
11
3
21
2
3
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions