Chapter 4 Flashcards

1
Q

Application programming interface (API)

A

set of routines, standards, protocols, and tools for building software applications
Allow different software applications to communicate with eachother to exchange data, features, and functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bit

A

Representation of data (zero or 1) at Layer 1 of the Open Systems Interconnection (OSI) Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Broadcast

A

one to many form of sending internet traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Byte

A

unit of digital information that most commonly consists of eight bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cloud computing

A

model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Community cloud

A

cloud infrastructure provisioned for exclusive use by specific community of consumers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

De-encapsulation

A

opposite process of encapsulation, where bundles of data are unpacked or revealed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

File Transfer Protocol (FTP)

A

standard internet protocol (and program) used for the transfer of computer files from a server to a client on a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fragment attack

A

Attacker fragments traffic in such a way that the system is unable to put data packets back together- exploiting the IP fragmentation process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hybrid cloud

A

combination of public cloud storage and private cloud storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Infrastructure as a Service (IaaS)

A

provider of core computing, storage and network hardware and software that is the foundation organizations can build and then deploy applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet Control Message Protocol (ICMP)

A

IP network protocol standardized by Internet Engineering Task Force (IETF) through RFC 792 to determine if a particular service or host is available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Man-in-the-Middle

A

attack where adversaries position themselves in between the user and system so they can intercept and alter data traveling between them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Internet Protocol (IPv4)

A

standard protocol for transmission of data from source to destinations in packet switched communications networks and interconnected systems of such networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Microsegmentation

A

Part of zero-trust strategy that breaks LANs into very small, highly localized zones using firewalls or similar technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Oversized Packet Attack

A

purposely sending a network packet that is larger than expected or larger than can be handled by the receiving system, causing the receiving system to fail unexpectedly

17
Q

Packet

A

Representation of data at Layer 3 of the Open Systems Interconnection (OSI) model

18
Q

Payload

A

primary action of a malicious code attack

19
Q

Payment Card Industry Data Security Standard (PCI DSS)

A

information security standard that applies to merchants and service providers who process credit or debit transactions

20
Q

Platform as a Service (PaaS)

A

web application development middleware environment that allows applications to be built in the cloud before they’re deployed as SaaS assets

21
Q

Private cloud

A

cloud computing platform implemented within corporate firewall under control of the IT department

22
Q

Protocols

A

set of rules to implement and control some type of association between systems

23
Q

Public cloud

A

cloud infrastructure provisioned for open use by general public

24
Q

Simple Mail Transport Protocol

A

standard communication protocol for sending and receiving emails between senders and receivers

25
Q

Software as a Service (SaaS)

A

cloud customer uses a cloud provider’s applications running within a cloud infrastructure

26
Q

Spoofing

A

faking the ending address of a transmission to gain illegal entry into a secure system

27
Q

Transport Control Protocol/Internet Protocol (TCP/IP) Model

A

Internetworking protocol model created by the IETF: specifies 4 layers of functionality

-Link Layer (physical communications)
-Internet Layer (network-to-network connection)
-Transport Layer (basic channels for connections and connectionless exchange of data between hosts)
-Application Layer- other protocols and user application programs make use of network services

a foundational network communication framework that defines how data is transmitted over networks, including the internet, using a four-layer architecture: application, transport, internet, and network access

28
Q

VLAN

A

virtual local area network (VLAN)- logical group of workstations, servers, and network devices that appear to be on the same LAN despite their geographical distribution

29
Q

VPN

A

virtual private network (VPN)- built on top of existing networks to provide secure communications for transmission between networks

30
Q

WLAN

A

wireless local area network (WLAN)- group of computers and devices in the same vicinity, forming a network based on radio transmissions rather than wired communications

31
Q

Zenmap

A

graphical user interface (GUI) for Nmap Security Scanner- open source application that scans networks to determine everything is connected

32
Q

Zero Trust

A

removing design belief that the network has any trusted space. Security managed at every level