Ch 3. Network Tech and Tools Flashcards

1
Q

TCP

A

Transmission Control Protocol; uses a three way handshake to provide connection-oriented traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

UDP

A

User Datagram Protocol; non-guaranteed delivery, does not use three way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IP

A

Internet Protocol; identifies hosts in a TCP/IP network and delivers traffic from one host to another using IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ICMP

A

Internet Control Message Protocol; used for testing basic connectivity and includes tools such as ping, pathping, and tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ARP

A

Address Resolution Protocol; resolves IPv4 addresses to media access control (MAC) addresses (physical/hardware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NDP

A

Neighbor Discovery Protocol; performs several functions on IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RTP

A

Real-time Transport Protocol; delivers audio and video over IP networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SRTP

A

Secure Real-time Transport Protocol; provides encryption, message authentication, and integrity for RTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

FTP

A

File Transfer Protocol; uploads and downloads large files to and from an FTP server. By default data is transmitted in cleartext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TFTP

A

Trivial File Transfer Protocol; used to transfer smaller amounts of data, commonly disabled because it’s a non-essential protocol on most networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSH

A

Secure Shell; encrypts traffic in transit and be used to encrypt other protocols such as FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SSL

A

Secure Sockets Layer; primary method used to secure HTTP traffic as HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TLS

A

Transport Layer Security; the designated replacement for SSL (STARTTLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IPsec

A

encapsulates and encrypts IP packet payloads and uses Tunnel mode to protect VPN traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SFTP

A

Secure File Transfer Protocol; an extension of SSH that secures FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FTPS

A

File Transfer Protocol Secure; uses TLS to encrypt FTP traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SMTP

A

Simple Mail Transfer Protocol; transfers email between clients and SMTP servers. Uses TCP port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

POP3/Secure POP

A

Post Office Protocol; transfers emails from servers down to clients. Uses TCP port 110/995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IMAP4/Secure IMAP

A

Internet Message Access Protocol; used to store email on an email server. Uses TCP port 143/993

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

HTTP

A

Hypertext Transfer Protocol; transmits web traffic on the Internet and in intranets. Uses TCP port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

HTTPS

A

Hypertext Transfer Protocol Secure; encrypts web traffic to ensure it is secure while in transit. Uses TCP port 443

22
Q

RDP

A

Remote Desktop Protocol; used to connect to other systems from a remote location

23
Q

NTP

A

Network Time Protocol; most commonly used protocol for time synchronization

24
Q

DHCP

A

Dynamic Host Configuration Protocol; dynamically assigns IP addresses to hosts

25
Q

DNS

A

Domain Name System; resolves host names to IP addresses, zone/client queries are TCP port 53/UDP port 53

26
Q

DNS Poisoning

A

attackers modify the DNS cache with a bogus IP address

27
Q

DNSSEC

A

Domain Name Security Extension; a suite of extensions to DNS that provides validation for DNS responses, and adds a digital signature to each record

28
Q

nslookup/dig

A

used to troubleshoot problems related to DNS; dig is used for Linux

29
Q

Unicast

A

one-to-one traffic; one host sends traffic to another host, using a destination IP address

30
Q

Broadcast

A

one-to-all traffic; one host sends traffic to call other hosts on the subnet using a broadcast address. Every host that receives it will process it.

31
Q

Switch

A

a network device used to connect devices. Layer 2 switches send traffic to ports based on their MAC addresses. Layer 3 sends traffic to ports based on IP addresses and support VLANs

32
Q

Loop Prevention

A

a method of preventing switching loop or bridge loop problems through use of STP/RSTP

33
Q

Flood Attack

A

an attacker send a large amount of traffic with spoofed MAC addresses to the same port on a switch; when the switch runs out of memory it enters a fail-open state and starts acting like a hub

34
Q

Router

A

connects multiple network segments together into a single network and routes traffic between segments

35
Q

ACL

A

Access Control List; rules implemented on a router/firewall to identify what traffic is allowed/denied.

36
Q

Implicit Deny

A

all traffic that isn’t explicitly allowed is implicitly denied

37
Q

Spoofing

A

to impersonate or masquerade as someone or something else, such as by replacing an IP address

38
Q

Bridge

A

connects multiple networks together and can be used instead of a router in some situations; directs traffic based on destination MAC addressses

39
Q

Aggregate Switch

A

connects multiple switches together in a network

40
Q

Firewall

A

filters incoming and outgoing traffic for a single host or between networks using an ACL

41
Q

Stateless Firewall Rules

A

Uses an ACL to statically inspect packets, does not keep track of the state of network connections

42
Q

Stateful Firewall

A

blocks traffic based n the state of the packet within a session

43
Q

DMZ

A

demilitarized zone; a buffered zone between a private network and the Internet

44
Q

NAT

A

Network Address Translation; a protocol that translates public IP addresses to private IP addresses back to public

45
Q

Airgap

A

a metaphor for physical isolation, indicating that there is a gap of air between an isolated system and other systems

46
Q

VLAN

A

virtual local area network; uses a switch to group several different computers into a virtual network

47
Q

proxy

A

a server used to forward requests for services such as HTTP/HTTPS

48
Q

Load Balancer

A

hardware or software that balances the load between two or more servers. Scheduling methods include source address IP affinity and round-robin

49
Q

UTM

A

Unified Threat Management; combines multiple security controls into a single appliance. They can inspect data streams and often include URL filtering, malware inspection, and contention inspection components.

50
Q

Mail Gateway

A

a server that examines all incoming and outgoing email and attempts to reduce risks associated with email