100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

Cyb 210 Networking Terms Questions and Answers Latest Update 100% Correct.

Puntuación
-
Vendido
-
Páginas
7
Grado
A+
Subido en
22-09-2024
Escrito en
2024/2025

Simple Mail Transfer Protocol (SMTP) - ️️The standard email protocol on the internet and part of the TCP/IP protocol suite, as defined by IETF RFC 2821. It defines the message format and the message transfer agent (MTA), which stores and forwards the mail. It was originally designed for only plain text (ASCII text), but MIME and other encoding methods enable executable programs and multimedia files to be attached to and transported with the email message (PC Magazine, 2018). T1 Line - ️️A 1.544-Mbps point-to-point, dedicated, digital circuit provided by the telephone companies. With the monthly cost typically based on distance, these are widely used for connecting an organization's PBX to the telephone company or a local network (LAN) to an internet provider (ISP). They are also used for internet access in buildings that have no DSL, cable, or fixed wireless coverage (PC Magazine, 2018). IPv4 Addressing (Internet Protocol Version 4) - ️️The previous version of the IP protocol, which was introduced in 1981 and continues to be used alongside the subsequent Version 6 (PC Magazine, 2018). IPv6 Addressing (Internet Protocol Version 6) - ️️The latest generation of the IP protocol. The specification was completed in 1997 by the Internet Engineering Task Force (IETF) and first deployed in 2004 when the Internet Corporation for Assigned Names and Numbers (ICANN) added IPv6 records to its DNS root servers for Japan and Korea. IPv6 is backward compatible with IPv4 and was designed to fix its shortcomings, such as data security and maximum number of user addresses (PC Magazine, 2018). Netstat (Network Statistics) - ️️A command-line utility that reports the status of TCP/IP and Ethernet connections. It comes with all major operating systems, but the Linux/Unix versions provide the most command options. GUI-based versions for Windows, such as NetStat Live and X-NetStat, are also available. Network Mapper (Nmap) - ️️A free, open-source security scanner for auditing networks that runs on most platforms and is written by Fyodor (a person). When aimed at a particular host, it can determine which ports are open, which operating system and version is running, what services are offered, and what firewalls are used (PC Magazine, 2018). Packet Internet Groper (Ping) - ️️An internet utility used to determine whether a particular IP address is reachable online by sending out a packet and waiting for aresponse. It is used to test and debug a network as well as see if a user or server is online (PC Magazine, 2018). Hypertext Transfer Protocol (HTTP) - ️️The communications protocol used to connect to web servers on the internet or on a local network (intranet). Its primary function is to establish a connection with the server and send HTML pages back to the user's browser. It is also used to download files from the server either to the browser or to any other requesting application that uses HTTP (PC Magazine, 2018). Secure Shell (SSH) - ️️A security protocol for logging into a remote server. It provides an encrypted session for transferring files and executing server programs. Also serving as a secure client/server connection for applications such as database access and email, it supports a variety of authentication methods. Voice Over IP (VoIP) - ️️A digital telephone service that uses the internet for transport, as well as private IP networks. IP stands for "internet protocol." In order for calls to originate and terminate from regular telephones, connections to the public telephone network (PSTN) are also provided. Telephone companies, cable companies, and dedicated providers offer this type of calling for a fixed monthly fee or low perminute charge. Customers must have existing internet access (PC Magazine, 2018). Demilitarized Zone (DMZ) - ️️A middle ground between an organization's trusted internal network and an untrusted, external network such as the internet. Also called a "perimeter network," it is a subnetwork (subnet) that may sit between firewalls or off one leg of a firewall. Organizations typically place their web, mail, and authentication servers in it. It is a military term that refers to the area between two enemies (PC Magazine, 2018). Local Area Network (LAN) - ️️A communications network that is typically confined to a building or premises. The "clients" are user workstations running the Windows, Mac, or Linux operating systems, while the "servers" hold programs and data shared by the clients. Servers come in a wide range of sizes, from PC-based servers to mainframes (PC Magazine, 2018).

Mostrar más Leer menos
Institución
Cyb 210 Networking Terms
Grado
Cyb 210 Networking Terms









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Cyb 210 Networking Terms
Grado
Cyb 210 Networking Terms

Información del documento

Subido en
22 de septiembre de 2024
Número de páginas
7
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Cyb 210 Networking Terms
Simple Mail Transfer Protocol (SMTP) - ✔️✔️The standard email protocol on the
internet and part of the TCP/IP protocol suite, as defined by IETF RFC 2821. It defines
the message format and the message transfer agent (MTA), which stores and forwards
the mail. It was originally designed for only plain text (ASCII text), but MIME and other
encoding methods enable executable programs and multimedia files to be attached to
and transported with the email message (PC Magazine, 2018).

T1 Line - ✔️✔️A 1.544-Mbps point-to-point, dedicated, digital circuit provided by the
telephone companies. With the monthly cost typically based on distance, these are
widely used for connecting an organization's PBX to the telephone company or a local
network (LAN) to an internet provider (ISP). They are also used for internet access in
buildings that have no DSL, cable, or fixed wireless coverage (PC Magazine, 2018).

IPv4 Addressing (Internet Protocol Version 4) - ✔️✔️The previous version of the IP
protocol, which was introduced in 1981 and continues to be used alongside the
subsequent Version 6 (PC Magazine, 2018).

IPv6 Addressing (Internet Protocol Version 6) - ✔️✔️The latest generation of the IP
protocol. The specification was completed in 1997 by the Internet Engineering Task
Force (IETF) and first deployed in 2004 when the Internet Corporation for Assigned
Names and Numbers (ICANN) added IPv6 records to its DNS root servers for Japan
and Korea. IPv6 is backward compatible with IPv4 and was designed to fix its
shortcomings, such as data security and maximum number of user addresses (PC
Magazine, 2018).


Netstat (Network Statistics) - ✔️✔️A command-line utility that reports the status of
TCP/IP and Ethernet connections. It comes with all major operating systems, but the
Linux/Unix versions provide the most command options. GUI-based versions for
Windows, such as NetStat Live and X-NetStat, are also available.

Network Mapper (Nmap) - ✔️✔️A free, open-source security scanner for auditing
networks that runs on most platforms and is written by Fyodor (a person). When aimed
at a particular host, it can determine which ports are open, which operating system and
version is running, what services are offered, and what firewalls are used (PC
Magazine, 2018).

Packet Internet Groper (Ping) - ✔️✔️An internet utility used to determine whether a
particular IP address is reachable online by sending out a packet and waiting for a

, response. It is used to test and debug a network as well as see if a user or server is
online (PC Magazine, 2018).

Hypertext Transfer Protocol (HTTP) - ✔️✔️The communications protocol used to
connect to web servers on the internet or on a local network (intranet). Its primary
function is to establish a connection with the server and send HTML pages back to the
user's browser. It is also used to download files from the server either to the browser or
to any other requesting application that uses HTTP (PC Magazine, 2018).

Secure Shell (SSH) - ✔️✔️A security protocol for logging into a remote server. It
provides an encrypted session for transferring files and executing server programs. Also
serving as a secure client/server connection for applications such as database access
and email, it supports a variety of authentication methods.


Voice Over IP (VoIP) - ✔️✔️A digital telephone service that uses the internet for
transport, as well as private IP networks. IP stands for "internet protocol." In order for
calls to originate and terminate from regular telephones, connections to the public
telephone network (PSTN) are also provided. Telephone companies, cable companies,
and dedicated providers offer this type of calling for a fixed monthly fee or low per-
minute charge. Customers must have existing internet access (PC Magazine, 2018).

Demilitarized Zone (DMZ) - ✔️✔️A middle ground between an organization's trusted
internal network and an untrusted, external network such as the internet. Also called a
"perimeter network," it is a subnetwork (subnet) that may sit between firewalls or off one
leg of a firewall. Organizations typically place their web, mail, and authentication servers
in it. It is a military term that refers to the area between two enemies (PC Magazine,
2018).

Local Area Network (LAN) - ✔️✔️A communications network that is typically confined
to a building or premises. The "clients" are user workstations running the Windows,
Mac, or Linux operating systems, while the "servers" hold programs and data shared by
the clients. Servers come in a wide range of sizes, from PC-based servers to
mainframes (PC Magazine, 2018).


Personal Area Network (PAN)`
Transmitting data wireless over a short distance. Bluetooth and Wi-Fi Direct are
examples of this (PC Magazine, 2018).

Protected Enclaves - ✔️✔️Subdivision of the internal network so that it is not one large
zone with no internal protections. This architectural approach to information security
defense in depth can be accomplished in a number of ways, including network
admissions control, firewalls, VLANs, and VPN (Northcutt, n.d.).
$7.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
ACADEMICMATERIALS City University New York
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
562
Miembro desde
2 año
Número de seguidores
186
Documentos
10590
Última venta
1 semana hace

4.1

95 reseñas

5
53
4
11
3
21
2
3
1
7

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes