CF Domain 4 Flash Cards

All of Domain 4

1
Q

Address Resolution Protocol
(ARP)

A

Is used at the Media Access Control (MAC) Layer to provide for direct communication between two devices within the same LAN segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACK

A

an acknowledgment of a signal being received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active-active, active-passive clustering

A

a data resiliency architecture in which client workloads are distributed across two or more nodes in a cluster to keep your data safe and available in the event of an unexpected component failure; active-active can use the full throughput capability of both devices; active-passive can only handle throughput of a single device allowing the secondary device to remain ready (but not passing traffic) until needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Advanced Persistent Threat (APT)

A

is an agent/org that plans, organizes, and carries out highly sophisticated attacks against a target person, org, or industry over a period of time (months or even years); usually with a strategic goal in mind

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Application Programming Interface(API)

A

code mechanisms that provide ways for apps to share data, emthods, or functions over a network (usually implemented in XML or JavaScript Object Notation (JSON))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bit

A

Most essential representation of data (zero or one) at Layer 1 of the Open Systems Interconnection (OSI) model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bluetooth (Wireless Personal
Area Network IEEE 802.15)

A

Bluetooth wireless technology is an open standard for short-range radio frequency communication used primarily to establish wireless personal area networks (WPANs), and it has been integrated into many types of business and consumer devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bridges

A

Layer 2 devices that filter traffic between segments based on Media Access Control (MAC) addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bandwidth

A

mount of information transmitted over a period of time; can be applied to moving bits over a medium, or human processes like learning or education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bound networks

A

AKA wired/Ethernet networks, where devices are connected by physical cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Boundary routers

A

they advertise routes that external hosts can use to reach internal hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cellular network

A

A radio network distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base station.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Code division multiple access
(CDMA)

A

Every call’s data is encoded with a unique key, then the calls are all transmitted at once. Developed to decrease the chances of collisions when 2 or more stations start sending their signals over the datalink layer. Requires that each station first check the state of the medium before sending.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Concentrators

A

Multiplex connected devices into one signal to be transmitted on a network.
provides communication capability between many low-speed, usually asynchronous channels and one or more high-speed, usually synchronous channels. Usually different speeds, codes, and protocols can be accommodated on the low-speed side; multiplexed into one signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Content Distribution
Network (CDN)

A

Is a large distributed system of servers deployed in multiple data centers across the internet, often used to cache commonly accessed data, with a goal of Quality of Service (QoS) and availability requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Challenge-Handshake Authentication Protocol (CHAP)

A

used by PPP servers to authenticate remote clients; encrypts both username and password, and performs periodic session reauthentication to prevent replay attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CAM Table Flooding

A

attack where switches don’t know where to send traffic; prevented by enabling switch port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

A

is a method of network flow control operating on layer 2; Attempts to avoid collisions by granting only a single permission to communicate at any given time. IEEE standard 802.11 Wireless because wireless tries to avoid collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Carrier Sense Multiple Access with Collision Detection(CSMA/CD)

A

is a method of network flow control, where if > 1 station accesses the network at the same time, other stations detect and re-try their transmission; reponds to collisions by having each member of the collision domain wait for a short but random period of time before starting the process over. Common in IEEE standard 802.3 ethernet protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Circuit-switched network

A

network that uses a dedicated circuit between endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Code-Division Multiple Access(CDMA)

A

a method of encoding several sources of data so they can all be transmitted over a single RF carrier by one transmitter, or by using a single RF carrier frequency with multiple transmitters; the data from each call is encoded with a unique key, and calls are transmitted at once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Collision Domain

A

set of systems that can cause a collision if they transmitted at the same time; note that broadcast domain is the set of systems that can receive a broadcast from each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Control plane

A

part of a network that controls how data packets are forwarded — meaning how data is sent from one place to another; e.g. the process of creating a routing table is considered part of the control plane; control of network functionality and programmability is directly made to devices at this layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Converged protocol

A

combines/converges standard protcols (such as TCP/IP) with proprietary/non-standard ones; they can complicate enterprise-wide security engineering efforts requiring specialist knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Dynamic or Private Ports

A

Ports 49152-65535. Whenever a service is requested that associated with Well-Known or Registered Ports those services with response with a dynamic port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Domain Name Service (DNS)

A

is three interrelated elements. A service, a physical server, and a network protocol. Hierarchical and distributed name service that provides a naming system for computers, services, and other resources on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Dynamic Host Configuration Protocol (DHCP)

A

is an industry standard used to dynamically assign IP addresses to network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Fibre Channel over Ethernet (FCoE)

A

A lightweight encapsulation protocol and lacks the reliable data transport of the TCP layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Fiber Distributed Data Interface (FDDI)

A

is an ANSI X3T9.5 LAN Standard; 100Mbps, token-passing using fiber optic using fiber optic, up to 2 kilometers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Firewalls

A

Devices that enforce administrative security policies by filtering incoming traffic based on set of rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Frame

A

Data represented at Layer 2 of the open systems interconnection model (OSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Global System of Mobiles (GSM)

A

Each call is transformed into digital data that is given a channel and a time slot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Gateway Device

A

A firewall or other device that sits at the edge of the network to regulate traffic and enforce rules

34
Q

Internet Control Message Protocol (ICMP)

A

Provides a means to send error messages and a way to probe the network to determine network availability, ping and traceroute also use ICMP. Standardized by IETF via RFC 792 to determine if a particular host is available

35
Q

Internet Group Management Protocol (IGMP)

A

Used to manage multicasting groups that are a set of hosts anywhere on a network that are listening for a transmission

36
Q

Internerworking

A

two different sets of servers/communication elements using network protocol stacks to communicate and coordinate activities.

37
Q

Multiprotocol Lable Switching (MPLS)

A

Is a wide area networking protocol that operates at both Layer 2 and 3 and does label switching.

38
Q

Microsegmentation

A

part of a zero trust strategy, that breaks LANs into very small highly localized zones using firewalls or similar, note that at the limit this places a firewall at every connection point

39
Q

Northbound/Southbound interface

A

A northbound interface lets a specific component communicate with a higher level component in the same network. A southbound interface enables a specific component to communicate with a lower level component.

40
Q

East/West Traffic

A

network traffice that is within a data, control, or application plane, within a data center or between geo dispersed locations

41
Q

North/South Traffic

A

In software distributed network terms (SDN), data flowing up (northbound) and down (southbound) the stack of data/control/application planes. Data flowing from the organization to external distination (northbound) or into the org from external sources (southbound)

42
Q

Network Function Virtualization (NFV)

A

The objective of NFV is to decouple functions such as firewall management, intrusion detection, network address translation, or name service resolution away from specific hardware implementation into software solutions. The focus is to optimize distinct network services.

43
Q

Nonroutable IP address (Private Networks)

A

From RFC 1918; 10.0.0.0/8 (10.0.0.0 - 10.255.255.255), 172.16.0.0/12 (172.16.0.0-172.31.255.255), 192.168.0.0/16 (192.168.0.0 - 192.168.255.255)

44
Q

Internet Protocol (IPv4)

A

Is the dominant protocol that operates at the OSI Network Layer 3. IP is responsible for addressing packets so that they can be transmitted from the source to the destination hosts.

45
Q

Internet Protocol (IPv6)

A

Is a modernization of IPv4 that includes a much larger address field; IPv6 addresses are 128 bits that support 2^128 hosts

46
Q

Open Shortest Path First (OSPF)

A

An interior gateway routing protocol developed for IP networks based on the shortest path first or link state algorithm.

47
Q

Packet

A

Representation of data a Layer 3 of the OSI model

48
Q

Packet Loss

A

A system on a chip installed on the motherboard of modern computers that is dedicated to carrying out security functions involving the storage of cryptographic keys and digital certificates, symmetric and asymmetric encryption, and hashing.

49
Q

Point to Point Protocol (PPP)

A

Provides a standard method for transporting multiprotocol datagrams over point to point links

50
Q

Port Address Translation (PAT)

A

An extension to NAT to translate all addresses to one routable IP address and translate the source port number in the packet to a unique value

51
Q

Ping Scanning

A

Network mapping technique to detect if host replies to ping, then the attacker knows that a host exists at the address

52
Q

Packet Switched Network

A

A network that doesn’t use a dedicated connection between endpoints

53
Q

Packet Loss Concealment (PLC)

A

Used in VOIP communications to mask the effect of dropped packets

54
Q

Registered Ports

A

Ports 1024-49151. These ports typically accompany non system applications associated with vendors and developers.

55
Q

Remote Procedure Call

A

is a protocol that enables one system to execute instructions on other hosts across a network infrastructure.

56
Q

Root of Trust

A

A source that can always be trusted within a cryptographic system. Because cryptographic security is dependent on keys to encrypt and decrypt data and perform functions such as generating digital signatures and verifying signatures. RoT schemes generally include a hardened hardware module. RoT guarantees the integrity of the hardware prior to loading the OS of a computer

57
Q

Segment

A

Data representation at Layer 4 of the OSI model

58
Q

Session Initiation Protocol (SIP)

A

Is designed to manage multimedia connections.

59
Q

Smurf

A

ICMP Echo Request sent to the network broadcast address of a spoofed victim causing all nodes to respond to the victim with an echo reply

60
Q

Software Defined Networks (SDNs)

A

Separates network systems into 3 components: raw data, how the data is sent, and what purpose the data serves. This involves a focus on data, control, and application (management) functions or “planes”

61
Q

Switches

A

Operates at Layer 2. Establishes a collision domain per port

62
Q

Session Initialization Protocol Secure (SIPS)

A

Secure version of the Session Initialization Protocol for VoIP, adds TLS encryption to keep the session initialization process secure

63
Q

S/MIME

A

provides the following cryptographic security services for electronic messaging applications: Authentication, Message Integrity, Non repudiation of origin (using digital signatures), Privacy, Data Security (using encryption)

64
Q

Simple Network Management Protocol (SNMP)

A

Is a protocol for collecting and organizing info about managed devices on IP networks. It can be used to determine the health of devices such as routers, switches, servers, workstations, etc

65
Q

Service Provisioning Markup Language (SPML)

A

XML based and designed to allow platforms to generate and respond to provisioning request. Uses the concept of requesting authorities issue SPML requests to provision service point. Provisioning service targets are often user accounts and are required to be allowed unique identification of the data in its implementation

66
Q

Secure Real Time Transport Protocol (STRP)

A

is an extension of Real Time Transport Protocol that features encryption, confidentiality, message authentication, and replay protection to audio and video traffic

67
Q

Transmission Control Protocol (TCP)

A

Provides connection oriented data management and reliable data transfer

68
Q

Teardrop Attack

A

Exploits the reassembly of fragmented IP packet in the fragment offset field that indicates the starting position or offset of the data contained in a fragmented packet relative to the data of the original unfragmented packet

69
Q

Transport Control Protocol/Internet Protocol Model (TCP/IP)

A

Layering mode structured into 4 layers (network interface layer, internet layer, transport layer, host to host transport layer, application layer)

70
Q

Multi tiered firewall

A

tiers are not the number of firewalls but the number of zones protected by the firewall; 2-tier protects 2 zones

71
Q

Terminal Emulation Protocol

A

AKA Telnet, is command line protocol designed to provide access between host

72
Q

User Datagram Protocol (UDP)

A

provides connectionless data transfer without error detection and correction.

73
Q

Unbound (Wireless) Network

A

network where the physical layer interconnections are done using radio, light, or some other means; may or may not be mobile

74
Q

Virtual Local Area Networks (VLANs)

A

Allow network administrators to use switches to create software based LAN segments that can be defined based on factors other than physical location

75
Q

Voice over Internet Protocol (VoIP)

A

A technology that allows you to make voice calls using a broadband Internet connection instead of a regular ( or analog) phone line

76
Q

VLAN hopping

A

A method of attacking the network resources of a VLAN by sending packets to a port not usually accessible from an end system. The goal of this form of attack is to gain access to other VLANs on the same network

77
Q

Well Known Ports

A

Ports 0-1023 ports are related to the common protocols that are utilized in the underlying management of TCP/IP system, DNS, SMTP etc

78
Q

Whitelisting/Blacklisting

A

A whitelist is a list of email addresses and/or internet addresses that someone knows as “good senders”. A blacklist is a corresponding list of known “bad” senders.

79
Q

Wi-Fi (Wireless LAN IEEE 802.11x)

A

Primary associated with computer networking, Wi-Fi uses the IEEE 802.11x specification to create a wireless local area network either public or private

80
Q

WiMAX (Broadband Wireless Access IEEE 802.16)

A

One well known example of wireless broadband is WiMAX. WiMAX can potentially deliver data rates of more than 30 megabits per second.

81
Q

Web Application Firewall (WAF)

A

is a software based app monitors and filters exchanges between applications and a host; usually inspect and filter conversions like HTTP/S