Term
|
Definition
relationship between two computer programs |
|
|
Term
|
Definition
software framework dedicated to execution of procedures |
|
|
Term
|
Definition
connect equipment to network-connects lands together |
|
|
Term
|
Definition
small hardware device-joins multiple computers with 1 LAN |
|
|
Term
|
Definition
connects netwroks together based on IP address |
|
|
Term
|
Definition
|
|
Term
|
Definition
intermediary for requests from client seeking resources |
|
|
Term
|
Definition
device to deny network transmissions |
|
|
Term
|
Definition
incorporated advanced encryption and authentication techniques |
|
|
Term
|
Definition
redundancy in case we lose information |
|
|
Term
|
Definition
regenerate incoming electrical, wireless, and optical signals |
|
|
Term
|
Definition
routes data traffic, provides guidelines data has to follow 1. physical- media signal and binary transmission 2. data link-physical addressing 3. network-path determination and logical addressing 4. transport-end-to-end connections 5. session-interhost communications 6. presentation- data representation 7. application- network process |
|
|
Term
|
Definition
1. network interface 2. internet 3. transport 4. application |
|
|
Term
State the difference between IPv4 and IPv6 |
|
Definition
IPv4- 32 bit IP Address IPv6- 128 bit IP address |
|
|
Term
|
Definition
|
|
Term
|
Definition
program that copies itself |
|
|
Term
|
Definition
Self replicating malware program |
|
|
Term
|
Definition
malware that appears to perform a desirable function |
|
|
Term
|
Definition
method of bypassing normal authentication |
|
|
Term
|
Definition
criminally fraudulant process of awuiring sensitive information |
|
|
Term
What is the functionality of PKI |
|
Definition
Public Key Infrastructure -set of hardware needed for digital certificates -in cryptography- binds users certificate authority -for each user |
|
|
Term
|
Definition
Domain Name System -naming system for computers connected to private network -associated various information assigned to participants |
|
|
Term
|
Definition
computer activity that shares services retrieved |
|
|
Term
|
Definition
overruns buffer boundary and overwrites buffer software |
|
|
Term
|
Definition
Code injection exploits security vulnerability |
|
|
Term
|
Definition
defeats a cipher by determining decryption key |
|
|
Term
|
Definition
act of exploiting bug or design flaw in software |
|
|
Term
|
Definition
Strategy used to break encryption data |
|
|
Term
|
Definition
act of manipulation people into perfoming actions |
|
|