CF Domain 4 Flash Cards
All of Domain 4
Address Resolution Protocol
(ARP)
Is used at the Media Access Control (MAC) Layer to provide for direct communication between two devices within the same LAN segment.
ACK
an acknowledgment of a signal being received
Active-active, active-passive clustering
a data resiliency architecture in which client workloads are distributed across two or more nodes in a cluster to keep your data safe and available in the event of an unexpected component failure; active-active can use the full throughput capability of both devices; active-passive can only handle throughput of a single device allowing the secondary device to remain ready (but not passing traffic) until needed
Advanced Persistent Threat (APT)
is an agent/org that plans, organizes, and carries out highly sophisticated attacks against a target person, org, or industry over a period of time (months or even years); usually with a strategic goal in mind
Application Programming Interface(API)
code mechanisms that provide ways for apps to share data, emthods, or functions over a network (usually implemented in XML or JavaScript Object Notation (JSON))
Bit
Most essential representation of data (zero or one) at Layer 1 of the Open Systems Interconnection (OSI) model.
Bluetooth (Wireless Personal
Area Network IEEE 802.15)
Bluetooth wireless technology is an open standard for short-range radio frequency communication used primarily to establish wireless personal area networks (WPANs), and it has been integrated into many types of business and consumer devices.
Bridges
Layer 2 devices that filter traffic between segments based on Media Access Control (MAC) addresses.
Bandwidth
mount of information transmitted over a period of time; can be applied to moving bits over a medium, or human processes like learning or education
Bound networks
AKA wired/Ethernet networks, where devices are connected by physical cables
Boundary routers
they advertise routes that external hosts can use to reach internal hosts
Cellular network
A radio network distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base station.
Code division multiple access
(CDMA)
Every call’s data is encoded with a unique key, then the calls are all transmitted at once. Developed to decrease the chances of collisions when 2 or more stations start sending their signals over the datalink layer. Requires that each station first check the state of the medium before sending.
Concentrators
Multiplex connected devices into one signal to be transmitted on a network.
provides communication capability between many low-speed, usually asynchronous channels and one or more high-speed, usually synchronous channels. Usually different speeds, codes, and protocols can be accommodated on the low-speed side; multiplexed into one signal
Content Distribution
Network (CDN)
Is a large distributed system of servers deployed in multiple data centers across the internet, often used to cache commonly accessed data, with a goal of Quality of Service (QoS) and availability requirements
Challenge-Handshake Authentication Protocol (CHAP)
used by PPP servers to authenticate remote clients; encrypts both username and password, and performs periodic session reauthentication to prevent replay attacks
CAM Table Flooding
attack where switches don’t know where to send traffic; prevented by enabling switch port security
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
is a method of network flow control operating on layer 2; Attempts to avoid collisions by granting only a single permission to communicate at any given time. IEEE standard 802.11 Wireless because wireless tries to avoid collision
Carrier Sense Multiple Access with Collision Detection(CSMA/CD)
is a method of network flow control, where if > 1 station accesses the network at the same time, other stations detect and re-try their transmission; reponds to collisions by having each member of the collision domain wait for a short but random period of time before starting the process over. Common in IEEE standard 802.3 ethernet protocol.
Circuit-switched network
network that uses a dedicated circuit between endpoints
Code-Division Multiple Access(CDMA)
a method of encoding several sources of data so they can all be transmitted over a single RF carrier by one transmitter, or by using a single RF carrier frequency with multiple transmitters; the data from each call is encoded with a unique key, and calls are transmitted at once
Collision Domain
set of systems that can cause a collision if they transmitted at the same time; note that broadcast domain is the set of systems that can receive a broadcast from each other
Control plane
part of a network that controls how data packets are forwarded — meaning how data is sent from one place to another; e.g. the process of creating a routing table is considered part of the control plane; control of network functionality and programmability is directly made to devices at this layer
Converged protocol
combines/converges standard protcols (such as TCP/IP) with proprietary/non-standard ones; they can complicate enterprise-wide security engineering efforts requiring specialist knowledge
Dynamic or Private Ports
Ports 49152-65535. Whenever a service is requested that associated with Well-Known or Registered Ports those services with response with a dynamic port
Domain Name Service (DNS)
is three interrelated elements. A service, a physical server, and a network protocol. Hierarchical and distributed name service that provides a naming system for computers, services, and other resources on the Internet
Dynamic Host Configuration Protocol (DHCP)
is an industry standard used to dynamically assign IP addresses to network devices.
Fibre Channel over Ethernet (FCoE)
A lightweight encapsulation protocol and lacks the reliable data transport of the TCP layer
Fiber Distributed Data Interface (FDDI)
is an ANSI X3T9.5 LAN Standard; 100Mbps, token-passing using fiber optic using fiber optic, up to 2 kilometers.
Firewalls
Devices that enforce administrative security policies by filtering incoming traffic based on set of rules
Frame
Data represented at Layer 2 of the open systems interconnection model (OSI)
Global System of Mobiles (GSM)
Each call is transformed into digital data that is given a channel and a time slot