Chapter 3: Network Technologies and Tools Aconyms and Defintions Flashcards

1
Q

MAC

A

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IP

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TCP

A

Transmission Control Protocol

Connection-oriented protocol that provides guarenteed delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

UDP

A

User Datagram Protocol

Connectionless protocol that provides “best effort” delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FTP

A

File Transfer Protocol

Uploads and downloads files to and from an FTP server.
Transmits data in clear text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TFTP

A

Trivial File Transfer Protocol

Used to transfer a smaller amounts of data, such as when communicating with network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SSL

A

Secure Sockets Layer

Primarily used to secure HTTP traffic as HTTPS
Has been compromised and is not recommended for use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TLS

A

Transport Layer Security

Replacement for SSL
Secure HTTP traffic as HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPsec

A

Internet Protocol Security

Used to encrypt IP traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSH

A

Secure Shell

Encrypts data traffic it transittransit and can be used to encrypt other protocols such as FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SCP

A

Secure Copy

Based on SSH and used to copy and encrypted files over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SFTP

A

Secure File Transfer Protocol

Secure implementation of FTP
And extinction of secure shell using SSH to transmit the files in an encrypted format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FTPS

A

File Transfer Protocol Secure

Another secure implementation of FTP.
It uses TLC to encrypt FTP traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SMTP

A

Simple Mail Transfer Protocol

Transfers, mail between clients and SMTP servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SMTPS

A

Simple Mail Transfer Protocol Secure

Adds TLS encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

POP3

A

Post Office Protocol

Transfers emails from servers to end users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IMAP

A

Internet Message Access Protocol

Used to store email on a mail server and it allows you to organize and manage email and folders on the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

HTTP

A

Hyper Text Transfer Protocol

Transmits web traffic between web service and browsers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

HTTPS

A

Hyper Text Transfer Protocol Secure

Adds TLS encryption to protect the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SPF

A

Sender Policy Framework

Uses DNS records to define which IP addresses are authorized to send emails on behalf of a domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DKIM

A

DomainKeys Identified Mail

Uses public key photography to sign in verify an emails domain and content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DMARC

A

Domain-based Message Authentication, Reporting, and Conformance

Builds on top of SPF and DKIM by allowing domain owners to set policies for how to handle emails that fail authentication checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

AD DS

A

Microsoft Active Directory Domain Services

Database of objects that provides a central access point to manage users, computers, and other directory objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

LDAP

A

Lightweight Directory Access Protocol

Specifies the formats and methods used to query directories, such as Microsoft AD DS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

LDAPS

A

Lightweight Directory Access Protocol Secure

To protect LDAP it encrypts data with TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

RTP

A

Real-time Transport Protocol

Delivers audio and video of IP networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

VoIP

A

Voice over Internet Protocol

Communications, streaming media, video teleconferencing applications, and devices using web-based push to talk features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

SRTP

A

Secure Real-time Transport Protocol

Provides encryption, message authentication, and integrity for RTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

SIP

A

Session Initiation Protocol

Used to initiate, maintain, and terminate voice, video, and messaging sessions.

Uses request and response messages (text) when establishing a session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

GPO

A

Group Policy Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

RDP

A

Remote Desktop Protocol

Used to connect to others systems from remote locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

NTP

A

Network Time Protocol

Most commonly used protocol for time synchronization, allowing their systems to synchronize their time to within tens of milliseconds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

DHCP

A

Dynamic Host Configuration Protocol

Dynamically assigned IP addresses to host

Also assigns other TCP and IP information such as subnet mask, default gateways, DNS server addresses and much more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

ISPs

A

Internet Service Provider

Companies who provide Internet service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

IANA

A

Internet Assigned Numbers Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

IETF

A

Internet Engineering Task Force

37
Q

DNS

A

Domain Name System

For domain resolution, resolves hostnames to IP address

38
Q

A

A

Host Record

A record that holds the host name and IPv4 address and is the most used record in a DNS server

39
Q

AAAA

A

Record that holds the host name for IPv6 address.

40
Q

MX

A

Mail Exchange

A record that identifies a mail server used for mail.

41
Q

CNAME

A

Canonical Name or Alias

Allows a single system to have multiple names associated with a single IP address.

42
Q

SOA

A

Start of Authority

Records include information about a domain or zone and some of its settings

43
Q

TTL

A

Time to Live

A setting used to determine how long to cache
DNS results

TTL times are in seconds, and lower times cause clients to renew the records more often.

44
Q

DNSSEC

A

Domain Name System Security Extensions

Used to prevent DNS cache poisoning

A suite of extensions to DNS that provides validation for DNS responses.

45
Q

RRSIG

A

Resource Record Signature

Referred to as a digital signature and provides data, integrity and authentication for DNS replies

46
Q

RSTP

A

Rapid Spanning Tree Protocol

Provides both broadcast storm prevention and loop prevention for switches

47
Q

BPDU

A

Bridge Protocol Data Unit

Messages that STP sends to detect loops

48
Q

Edge Port

A

A switch port connected to a device, such as computer, server, or printer.

49
Q

BPDU Guard

A

Bridge Protocol Data Unit Guard

Monitors the ports for unwanted BPDU messages

50
Q

ACLs

A

Access Control Lists

Rules implemented on routers and on firewalls to identify what traffic is allowed and what traffic is denied.

51
Q

Implicit Deny

A

Dictates that all traffic that isn’t explicitly allowed is explicitly denied

52
Q

Route Command

A

A command used to display or modify systems, routing table on both Windows and Linux systems.

53
Q

SNMP

A

Simple Network Management Protocol

Monitors and manages network devices such as routers or switches

SNMPv3 Encrypts credentials before sending them over the wire.

54
Q

Firewall

A

Filters, incoming and outgoing traffic for a single host or between networks

55
Q

Host-based Firewall

A

Monitors traffic going in and out of a single host, such as a server or workstation —monitors traffic passing through the NIC

56
Q

Network-Based Firewall

A

Protects an entire network, and usually a network appliance meaning sold as a hardware unit that already contains all of the software necessary to run as a firewall.

57
Q

Stateless Firewalls

A

Uses rules implemented in access control lists to identify allowed and blocked traffic

Treats each network packet that they see as a new event and don’t track any information

58
Q

Stateful Firewall

A

Inspect traffic and makes decisions based on the traffic context or state keeping track of established sessions inspects traffic based on a state within a session and it blocks traffic that isn’t a part of an established session.

59
Q

WAF

A

Web Application Firewall

A firewall specifically designed to protect a web application, usually placed between the web server and the web server clients.

60
Q

NGFW

A

Next-Generation Firewall

An advanced firewall that performs deep packing inspection, adding application level inspection as a core feature.

62
Q

Fail-open

A

The system allows everything to pass through the system when it fails

63
Q

Fail-closed

A

A system allows nothing to pass through the system when it fails

64
Q

Intranet

A

An Internet is an internal network
Used by people to communicate and share content with each other

65
Q

Extranet

A

Part of a network that can be accessed by authorized entities from outside of the network

66
Q

DMZ

A

Demilitarized Zone

Know as screened subnet, a security zone between a private network in the Internet. Providing a layer of protection for these Internet facing servers while allowing clients to connect to them.

67
Q

CA

A

Certificate Authority

68
Q

NAT

A

Network Address Translation

A protocol that translates public IP addresses to private IP addresses and private IP addresses back to public

69
Q

PAT

A

Port Address Translation

A commonly used form of NAT.

70
Q

Static NAT

A

Static Network Address Translation

Uses a single public IP address in a one-to-one mapping

71
Q

Dynamic NAT

A

Dynamic Network Address Translation

Uses multiple public IP addresses in a one-to-many mapping and decides which public IP address to use based on load.

72
Q

SCADA

A

Supervisory Contoel and Data Acquisition

73
Q

Air Gap

A

A gap of air between an isolated system and other systems.

74
Q

VLAN

A

Virtual Local Area Network

Used by switches to segment traffic between logical groups of users or computers

75
Q

Proxy Server

A

Used to forward request for services for clients also can improve performance by caching content and some proxy servers can restrict users access to inappropriate websites by filtering content.

76
Q

Content Filtering

A

Allows organizations to create block rules that restrict web use.

77
Q

Reverse Proxy

A

Accepts requests from the Internet, typically for a single web server. It appears to clients as a web server, but is forwarding the requests to the web server and serving the pages returned by the web server.

78
Q

UTM

A

Unified Threat Management

A single solution that combines multiple security controls
Goal is to provide better security while also simplifying management requirements

79
Q

Jump Server

A

Aka Jump Box

A hard server used to access and managed devices in a different securities zone

80
Q

ZTNA

A

Zero Trust Network Access

A philosophy that’s end goal is to achieve threat scope reduction, decreasing the risk to the organization.

81
Q

PEP

A

Policy Enforcement Point

A system used zero-trust environment when a user or system wants to access a resource.

82
Q

Control Plane

A

A network where communications are used to control and configure the network.

83
Q

Data Plane

A

Communications used by end users and software to communicate with each other take place here.

84
Q

PE

A

Policy Engine

Decides whether to grant access to a resource for a given subject

85
Q

PA

A

Policy Administrator

Responsible for communicating the decisions made by the PE to the tools on the network

86
Q

PDP

A

Policy Decision Point

PE and PA together

87
Q

3 Data Plane Components

A

Subject
System
Enterprise Resource

88
Q

SASE

A

Secure Access Service Edge

Builds on Zero Trust

•Firewall services
•Secure web gateway
•Anti-malware
•Intrusion Prevention Services
•Cloud access service broker (CASB)
•Data Loss Prevention (DLP)

89
Q

OSI MODEL

A

Physical, Data Link, Network, Transport, Session, Presentation, Application.

(Please Do Not Throw Sausage Pizza Away)