Term
|
Definition
| relationship between two computer programs |
|
|
Term
|
Definition
| software framework dedicated to execution of procedures |
|
|
Term
|
Definition
| connect equipment to network-connects lands together |
|
|
Term
|
Definition
| small hardware device-joins multiple computers with 1 LAN |
|
|
Term
|
Definition
| connects netwroks together based on IP address |
|
|
Term
|
Definition
|
|
Term
|
Definition
| intermediary for requests from client seeking resources |
|
|
Term
|
Definition
| device to deny network transmissions |
|
|
Term
|
Definition
| incorporated advanced encryption and authentication techniques |
|
|
Term
|
Definition
| redundancy in case we lose information |
|
|
Term
|
Definition
| regenerate incoming electrical, wireless, and optical signals |
|
|
Term
|
Definition
routes data traffic, provides guidelines data has to follow 1. physical- media signal and binary transmission 2. data link-physical addressing 3. network-path determination and logical addressing 4. transport-end-to-end connections 5. session-interhost communications 6. presentation- data representation 7. application- network process |
|
|
Term
|
Definition
1. network interface 2. internet 3. transport 4. application |
|
|
Term
| State the difference between IPv4 and IPv6 |
|
Definition
IPv4- 32 bit IP Address IPv6- 128 bit IP address |
|
|
Term
|
Definition
|
|
Term
|
Definition
| program that copies itself |
|
|
Term
|
Definition
| Self replicating malware program |
|
|
Term
|
Definition
| malware that appears to perform a desirable function |
|
|
Term
|
Definition
| method of bypassing normal authentication |
|
|
Term
|
Definition
| criminally fraudulant process of awuiring sensitive information |
|
|
Term
| What is the functionality of PKI |
|
Definition
Public Key Infrastructure -set of hardware needed for digital certificates -in cryptography- binds users certificate authority -for each user |
|
|
Term
|
Definition
Domain Name System -naming system for computers connected to private network -associated various information assigned to participants |
|
|
Term
|
Definition
| computer activity that shares services retrieved |
|
|
Term
|
Definition
| overruns buffer boundary and overwrites buffer software |
|
|
Term
|
Definition
| Code injection exploits security vulnerability |
|
|
Term
|
Definition
| defeats a cipher by determining decryption key |
|
|
Term
|
Definition
| act of exploiting bug or design flaw in software |
|
|
Term
|
Definition
| Strategy used to break encryption data |
|
|
Term
|
Definition
| act of manipulation people into perfoming actions |
|
|