456 |
settings_ethernet
|
Power-on self-test (POST) |
tests all the hardware components |
0
|
|
455 |
settings_ethernet
|
Differentiated Services (DS) |
used to determine the priority of each packet
|
0
|
|
454 |
settings_ethernet
|
Payload |
Contains the Layer 4 segment information and the actual data.
|
0
|
|
453 |
settings_ethernet
|
IP Media Independent |
IP operates independently of the media that carry the data at lower layers of the protocol stack.
|
1
|
|
452 |
settings_ethernet
|
Best Effort Delivery |
Unreliable simply means that IP does not have the capability to manage and recover from undelivered or corrupt packets
|
1
|
|
451 |
settings_ethernet
|
Store-and-forward |
Store-and-forward switch receives the entire frame and computes the CRC. (Check frame) |
0
|
|
450 |
settings_ethernet
|
Data Collision |
It is process will fail and two devices will transmit at the same time. If this occurs, the data sent by both devices will be corrupted and will need to be resent.
|
0
|
|
449 |
settings_ethernet
|
CMSA |
CSMA process is used to first detect if the media is carrying a signal.
|
0
|
|
448 |
computer
|
Hexadecimal |
relating to or using a system of numerical notation that has 16 rather than 10 as its base. |
1
|
|
447 |
settings_ethernet
|
Logical Link Control (LLC) |
is used to communicate with the upper layers of the application, and transition the packet to the lower layers for delivery. |
1
|
|
446 |
settings_ethernet
|
Ethernet |
Is a operation in the data link and Physical Layer, which support different media, bandwidths (Supports data bandwidths of 10, 100, 1000, 10,000, 40,000, and 100,000 Mbps (100 Gbps)
)
|
0
|
|
445 |
settings_ethernet
|
Network Access Layer |
Controls the hardware devices and media that make up the network |
0
|
|
444 |
settings_ethernet
|
IANA |
Is an Organization which used to manage all public IP in which using in the word. |
0
|
|
443 |
settings_ethernet
|
ICANN |
Is an Organization which used to manage all domain in which hosting in the word. |
0
|
|
442 |
settings_ethernet
|
Message Format |
Form of Message which used to send to destination. |
1
|
|
441 |
settings_ethernet
|
Message Encoding |
is the process of converting information into another, acceptable form, for transmission. |
1
|
|
440 |
settings_ethernet
|
IPv6 |
Internet Protocol Version 6 (IPv6) is an Internet Protocol (IP) used for carrying data in packets from a source to a destination over various networks. IPv6 is the enhanced version of IPv4 and can support very large numbers of nodes as compared to IPv4. |
1
|
|
439 |
settings_ethernet
|
configuration mode |
Global configuration mode is used to configure your system globally, or to enter specific configuration modes to configure specific elements such as interfaces or protocols |
1
|
|
438 |
settings_ethernet
|
EXEC mode |
Usually called, privileged mode is a path where Cisco IOS used to allow IT administrator can use with the basic command (show,copy...) |
1
|
|
437 |
settings_ethernet
|
Copy startup-config running-config |
Command used to save the configuration on Cisco IOS from Memory into NVRAM |
0
|
|
436 |
settings_ethernet
|
reload |
is keyword/command is the same with restart which used for restart the restart or service. |
0
|
|
435 |
settings_ethernet
|
Zero-day attacks |
an attack that occurs on the first day that a vulnerability becomes known |
0
|
|
434 |
settings_ethernet
|
Cellular |
is what mobile phone networks are based on, and it's the technology that gave mobile phones the name “cell phones”. |
0
|
|
433 |
settings_ethernet
|
Broadband cable |
Typically offered by cable television service providers, the Internet data signal is carried on the same coaxial cable that delivers cable television |
1
|
|
432 |
settings_ethernet
|
Intranet |
is a term often used to refer to a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorization.
|
1
|
|
431 |
settings_ethernet
|
extranet |
provide secure and safe access to individuals who work for a different organizations, but require company data. |
1
|
|
430 |
settings_ethernet
|
NTP |
Network Time Protocol (NTP) a protocol used to synchronize the clocks of computer systems through networks |
0
|
|
429 |
settings_ethernet
|
Access Control List (ACL) |
A list of rules which you use them to allow or deny network traffic. |
0
|
|
428 |
settings_ethernet
|
Network Bridge |
An old version of switch device which has two ports. |
0
|
|
427 |
settings_ethernet
|
IP Address |
An unique address assigned to a computer in order to be able to communicate with each other over the network or the Internet. |
0
|
|
426 |
settings_ethernet
|
MAC Address |
A MAC (Media Access Control) address is a hardware identification number that uniquely identifies each device on a network. Sometimes, it is called physical address or hardware address. |
1
|
|
425 |
settings_ethernet
|
Full duplex |
A type of transmission which the data can be transmitted in both directions at the same time. |
0
|
|
424 |
settings_ethernet
|
Unshielded Twisted Pair (UTP) |
a cable commonly used in company network. |
0
|
|
423 |
settings_ethernet
|
Half duplex |
A communication system allows the transmission of signals in both directions but not simultaneously(at the same time). |
0
|
|
422 |
settings_ethernet
|
VLAN Trunking Protocol (VTP) |
a protocol created by Cisco used to manage VLAN on different switches. |
0
|
|
421 |
settings_ethernet
|
Virtual Router Redundancy Protocol (VRRP) |
A standard protocol that provides redundancy default gateways for clients. |
0
|
|
420 |
settings_ethernet
|
Transmission Control Protocol/Internet Protocol (TCP/IP) |
the basic communication language or protocol of the Internet. |
0
|
|
419 |
settings_ethernet
|
Virtualization |
the act of running multiple virtual servers on a single physical server. |
0
|
|
418 |
settings_ethernet
|
Designated Router (DR) |
In OSPF, DR is a router that is responsible for managing the exchange of routing update information. |
1
|
|
417 |
settings_ethernet
|
Backup Designated Router (BDR) |
A router which works just like DR when DR fails. |
1
|
|
416 |
settings_ethernet
|
Circuit Switching |
a telecommunication technology that is used to provide a dedicated connection or a single path between two nodes. |
0
|
|
415 |
settings_ethernet
|
Trivial File Transfer Protocol (TFTP) |
A simple form of FTP which you do not need authentication. |
1
|
|
414 |
settings_ethernet
|
Winbox |
a software used to remote to manage MikroTik router. |
1
|
|
413 |
settings_ethernet
|
Putty |
A terminal program for Windows and Unix platforms that enables users to remotely access computers over the Internet. It supports several network protocols, including SCP, SSH, Telnet, rlogin, and raw socket connection. It can also connect to a serial port. |
0
|
|
412 |
settings_ethernet
|
EtherChannel |
A technology allows grouping of several physical Ethernet links to create one logical Ethernet link for the purpose of providing fault-tolerance and high-speed links between switches, routers and servers. |
0
|
|
411 |
settings_ethernet
|
Wireless Access Point (WAP) |
A wireless device which is used to share wifi (internet) for home and small business network. |
0
|
|
410 |
settings_ethernet
|
Active Directory (AD) |
a database or a directory service allows you to manage user account and computer account centrally. |
0
|
|
409 |
settings_ethernet
|
Computer Account |
An account in Active Directory which is created for every computer normally after joined the domain. |
0
|
|
408 |
settings_ethernet
|
Group Policy |
A settings used for managing Active Directory objects such as user or computer accounts. |
0
|
|
407 |
settings_ethernet
|
Database |
a collection of information organized in such a way that can access or select data from it easily. |
1
|
|
406 |
settings_ethernet
|
Group |
In Active Directory, a group is an object that can contain other groups or user accounts as its members. |
0
|
|
405 |
settings_ethernet
|
Network device |
Any device used to connect computers together like Switch or Router. |
0
|
|
404 |
settings_ethernet
|
Personal Area Network (PAN) |
Type of network used to wirelessly connect personal devices like computer, phone or mouse using bluetooth. |
0
|
|
403 |
settings_ethernet
|
Data Center |
Normally refer to a standard room for housing servers or storage systems equipped with cooling system and fast network. |
2
|
|
402 |
settings_ethernet
|
Domain name |
a format like facebook.com or pnc.lan and used to identify an organization |
1
|
|
401 |
settings_ethernet
|
Distribution Denial of Service (DDoS) |
Type of attack where multiple systems attack a single target system. It is sometimes called Zombie attack. |
0
|
|
400 |
settings_ethernet
|
Firewall |
a hardware or system that can protect your network from threats. |
0
|
|
399 |
settings_ethernet
|
iptables |
Is the program used to control the packet filtering capabilities of the netfilter framework in the Linux kernel. |
0
|
|
397 |
settings_ethernet
|
Multicast |
the process of sending a packet from one host to a selected group of hosts, possibly in different networks |
1
|
|
396 |
settings_ethernet
|
Unicast |
the process of sending a packet from one host to an individual host. |
0
|
|
395 |
settings_ethernet
|
Flow Control |
Referring to how much information can be sent and the speed that it can be delivered |
0
|
|
394 |
settings_ethernet
|
Message Delivery Options |
is the way, which source send information/data to destination (one to one or one to many) |
1
|
|
393 |
settings_ethernet
|
Message Timing |
is a period which message has been sent from source to the destination. |
0
|
|
392 |
settings_ethernet
|
Message size |
is necessary to break the message into smaller pieces for transmission |
0
|
|
391 |
settings_ethernet
|
Encoding |
is the process of converting information into another, acceptable form, for transmission |
1
|
|
390 |
settings_ethernet
|
Banner Motd |
Banner Motd is a option which has in Switch or Router for notification for users while they are login into Switch or Router |
1
|
|
389 |
settings_ethernet
|
Putty |
A terminal program for Windows and Unix platforms that enables users to remotely access computers over the Internet. It supports several network protocols, including SCP, SSH, Telnet, rlogin, and raw socket connection. It can also connect to a serial port. |
1
|
|
388 |
settings_ethernet
|
In-of-band |
It used to remote from Secure Shell (SSH) and Telnet in the network, while network devices already assigned the IP address.
|
0
|
|
387 |
settings_ethernet
|
out-of-band |
It used to remote from auxiliary (AUX) and console port by special cable. Serial cable.
|
0
|
|
386 |
settings_ethernet
|
Denial of Service Attacks |
attacks designed to slow or crash applications and processes on a network device
|
0
|
|
385 |
settings_ethernet
|
Powerline Networking |
an emerging trend for home networking that uses existing electrical wiring to connect devices
|
1
|
|
384 |
settings_ethernet
|
Quality of Service |
Quality of Service (QoS) is also an ever increasing requirement of networks today. New applications available to users over internetworks, such as voice and live video transmission |
1
|
|
383 |
settings_ethernet
|
Fault Tolerance |
is one that limits the impact of a failure, so that the fewest number of devices are affected by it. |
1
|
|
382 |
settings_ethernet
|
Converging Networks |
Converged data networks carry multiple services on one network. |
0
|
|
381 |
settings_ethernet
|
Traditional Separate Networks |
Traditional Separate Networks is refer to multiple services are running on multiple network. |
1
|
|
380 |
settings_ethernet
|
Leased Lines |
is a dedicated connection from the service provider to the customer premise. with speed, T1,T3 |
0
|
|
379 |
settings_ethernet
|
Asymmetrical DSL |
s designed to deliver bandwidth at different rates downstream than upstream. |
0
|
|
378 |
settings_ethernet
|
Symmetrical DSL |
is similar to Asymmetric Digital Subscriber Line (ADSL), but provides the same upload and download speeds. |
0
|
|
377 |
settings_ethernet
|
Metro Ethernet |
Metro Ethernet is typically available from a provider to the customer premise over a dedicated copper or fiber connection providing bandwidth speeds of 10 Mb/s to 10 Gb/s. |
0
|
|
376 |
settings_ethernet
|
Dial-up Telephone |
An inexpensive option that uses any phone line and a modem |
0
|
|
375 |
settings_ethernet
|
Satellite |
Satellite service is a good option for homes or offices that do not have access to DSL or cable |
1
|
|
374 |
settings_ethernet
|
Cellular |
Cellular Internet access uses a cell phone network to connect. |
1
|
|
373 |
settings_ethernet
|
DSL |
Digital Subscriber Line: Internet technology for homes and small businesses using telephone lines |
1
|
|
372 |
settings_ethernet
|
WAN |
Wide Area Network (WAN)A network infrastructure that provides access to other networks over a wide geographical area. |
0
|
|
371 |
settings_ethernet
|
NIC |
Network Interface Card (NIC) is a physical interface which built-in with devices such as: Computer, Router, Switch,... |
1
|
|
370 |
settings_ethernet
|
Media |
Media (in Networking) refer to Network connection, which used to connect from one device to another device in the network. Such as: Wireless connection, copper (UTP, Coxial) and Fiber optic. |
1
|
|
369 |
settings_ethernet
|
small network |
It's a simple network with using in small office for using basic services, such as: wireless, printing and play sound. |
0
|
|
346 |
settings_ethernet
|
Legacy Inter-VLAN routing |
it kinds of inter-VLAN for allowing different VLAN can commnicate each other across router but it requires one physical interface on router per VLAN. |
0
|
|
345 |
settings_ethernet
|
Document Network Addressing |
to identify information regarding to network device which connected in the network for operating. |
1
|
|
344 |
settings_ethernet
|
Routers Choose Best Paths |
means router will find the best direction to connect from source to destination on the network |
0
|
|
343 |
settings_ethernet
|
Virtual Local Area Network (VLAN) |
A switch can be logically divided into many different parts called VLAN. |
0
|
|
342 |
settings_ethernet
|
Variable Length Subnet Mask (VLSM) |
A method which helps Network Administrator to divide IP network into smaller sizes according to the requirement. |
0
|
|
341 |
settings_ethernet
|
Physical topology |
A diagram which shows location of network devices such as switches, routers, computers or printers as well as cable installation. |
0
|
|
340 |
settings_ethernet
|
Anonymous |
refer to people which we cannot identified them (everyone) |
0
|
|
339 |
settings_ethernet
|
Spark |
is an Open Source, cross-platform IM client optimized for businesses and organizations. |
1
|
|
338 |
settings_ethernet
|
OpenFire |
is a real time collaboration (RTC) server licensed under the Open Source Apache license. It uses the only protocol for instant messaging. |
1
|
|
337 |
settings_ethernet
|
LdapAdmin |
is a free Windows LDAP client and administration tool for remote into LDAP directory management Service
|
1
|
|
336 |
settings_ethernet
|
Delegation of Control Wizard |
It's the Wizard interface which we used to customize permission based object (Users,group,..) we want manage |
1
|
|
335 |
settings_ethernet
|
Preventing permission Inheritance |
To move permission from inheristance permission |
1
|
|
334 |
settings_ethernet
|
Inheritance permission |
parent container is a permission set on Child containers and their objects inherit permissions. |
1
|
|
333 |
settings_ethernet
|
Non-repudiation |
Nonrepudiation is the assurance that someone cannot deny something.
|
0
|
|
332 |
settings_ethernet
|
Information Security |
Information security is the process of protecting the availability, privacy, and integrity of data |
0
|
|
331 |
settings_ethernet
|
Hightly Available (HA) |
It refer to condition or process to make sure service or network in organization can guarantee 99.999% up |
1
|
|
330 |
settings_ethernet
|
Data Encryption |
Is the process to convert data from human readable to binary code or other, in oder to prevent from other seeing. |
1
|
|
329 |
settings_ethernet
|
Physical Access Control |
The concept to protect in company, organization or area from outside which trying to access by physical method |
1
|
|
328 |
settings_ethernet
|
Application Security |
is the software, hardware or procedural methods to protect applications from external network. Sometime called Countermeasure |
0
|
|
327 |
settings_ethernet
|
Loging |
The process of recording events, with automatic on computer program, that can be used to understand the activity of the system and to diagnose problems. |
1
|
|
326 |
settings_ethernet
|
Severity |
The process to identify network or computer in order to diagnose level of problem, in purpose to solve problem before system crash. |
1
|
|
241 |
settings_ethernet
|
IMAP |
all emails are kept on the server and the MUA only checks emails on this server |
1
|
|
240 |
settings_ethernet
|
SMTP |
Simple Mail Transfer Protocol It's a gateway which allow user for sending sms/mail to destination based on address of destination. SMTP works on port 25 and port 465 is SMTPs. |
0
|
|
239 |
settings_ethernet
|
POP3 |
Post Office Protocol Version 3 is used, the email is transferred to the client computer; additionally it can be kept on the server.
|
0
|
|
238 |
settings_ethernet
|
MUA |
Mail User Agent is a process which allow user can download/view mail from mailbox server which delivered by MDA into Mailbox in the server |
0
|
|
237 |
settings_ethernet
|
MDA |
Mail Delivery Agent is the process for delivery email from source to Mailbox of destination based on MTA |
0
|
|
236 |
settings_ethernet
|
MTA |
MTA receives an email, it checks first if the recipient of the email is an existing user on the local machine. |
0
|
|
235 |
settings_ethernet
|
OpenVPN |
is an open-source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities |
1
|
|
234 |
settings_ethernet
|
Site-to-Site VPN |
It is semilar with PPTP VPN but it allows different sites of the same organization, each with its own real network, to connect together to form a VPN. |
1
|
|
233 |
settings_ethernet
|
PPTP VPN |
Refer to technology which enable authorized remote users to connect to the VPN network using their existing Internet connection and then log on to the VPN using password authentication |
1
|
|
232 |
settings_ethernet
|
RADIUS |
is a widely deployed protocol, based on a client/server model, that enables centralized authentication, authorization, and accounting for network access. |
0
|
|
231 |
settings_ethernet
|
Dial-up networking |
s the process of a remote access client making a temporary dial-up connection to a physical port on a remote access server by using the service of a telecommunications provider. |
1
|
|
230 |
settings_ethernet
|
Network access client |
Refer to a client that trying to connect into network structure to be connected |
1
|
|
229 |
settings_ethernet
|
Network access server |
is a system that provides access to a network. |
1
|
|
228 |
settings_ethernet
|
VPN |
A virtual private network also known as a VPN is a private network that extends across a public network or internet. |
1
|
|
227 |
settings_ethernet
|
CUPS |
Common Unix Printing System (CUPS) is the software used to managing printing from applications which operation in Linux based. |
0
|
|
226 |
settings_ethernet
|
Print Queue |
Collection of Print Jobs waiting to be printed by the specific printer.
|
0
|
|
223 |
settings_ethernet
|
Print Job |
Any document sent to printer.
|
1
|
|
222 |
settings_ethernet
|
Printer Driver |
Software that allows application to communicate with specific printers. |
1
|
|