CHAPTER 8: Networking Flashcards
A IEEE standard designed to enhance security of wireless networks by authenticating a user to a central authority.
802.1x
A group of IEEE standards that defi ne how to transfer Ethernet 802.3 data over wireless networks.
802.11
A group of IEEE standards that defi ne the transfer of data over wired Ethernet based networks.
802.3
The fi rst portion of an IP address that allows the identifi cation of that addresses type and therefore purpose.
address prefix
A group of wireless computers sharing data directly with each other without the use of a wireless access point.
ad hoc network
A method for sharing folders that allows you to pick the specifi c options you want. NTFS permissions are not confi gured.
Advanced sharing
A set of static IP confi guration information that is used instead of APIPA when a computer is unable to contact a DHCP server.
alternate IP confi guration
A command-line utility that can be used to display and manage the ARP table, which maps IPv4 addresses to physical MAC addresses.
arp
Parts of the computer, applications, and operating system components that can be attacked by hackers, viruses, and malware during their attempts to intrude on a computer system.
attack surface
A system used to automatically assign an IP address on the 169.254.x.x network to a computer that is unable to communicate with a DHCP server. A default gateway setting is not confi gured with APIPA.
Automatic Private IP Addressing (APIPA)
A device that converts network signals from the cable company to a standard Ethernet.
cable modem
A notation technique that summarizes the number of binary bits in an IP address that identify the network an IP address belongs to, counted starting from the left-hand side of the IP address as written in binary form. The number of bits is written at the end of the IP address with a slash ?/? symbol separating the two values (e.g. 192.168.1.0/24 or FE80::/64).
Classless Inter-Domain Routing (CIDR)
A client allows you to communicate with a particular service running on a remote computer.
client
The client that allows Windows 7 to access fi les and printers shared on other Windows computers by using the SMB protocol.
Client for Microsoft Networks
The clients, services, and protocols that are confi gured for a network card.
connection (network connection)
A wizard in Computer Management to create shared folders that does not confi gure NTFS permissions.
Create A Shared Folder Wizard
A router on the local network that is used to deliver packets to remote networks.
default gateway
A high-speed Internet connection over telephone lines.
Digital subscriber line (DSL)
A system for converting computer host names to IP addresses.
Domain Name System (DNS)
The location type that is used when a computer joined to a domain is on the domain network, for example, a corporate offi ce.
domain network
A device that converts DSL signals to standard Ethernet.
DSL modem
An automated mechanism to assign IP addresses and IP confi guration information over the network.
Dynamic Host Confi guration Protocol (DHCP)
The service that allows Windows 7 to share fi les and printers by using the SMB protocol.
File and Printer Sharing for Microsoft Networks
A command-line utility that can be used to display the MAC address for network adapters on a system.
getmac
The location type that is used for highly trusted networks where security is minimal and convenient sharing with other computers is a priority.
Home network
A feature that allows fi le sharing between computers on a hoe network without a complicated setup process.
homegroup network
A command-line utility that can be used to identify the name of the computer.
hostname
A professional society that promotes and nurtures the development of standards used in the application of electronic technology.
IEEE (Institute of Electrical and Electronics Engineers)
A Windows 7 feature that allows multiple computers to share an Internet connection by performing NAT.
Internet Connection Sharing (ICS)
The standard protocol used on corporate networks and the Internet.
Internet Protocol Version 4 (TCP/IPv4)
An updated version of TCP/IPv4 with a much larger address space.
Internet Protocol Version 6 (TCP/IPv6)
The unique address used by computers on an IPv4 or IPv6 network. An IPv4 address is commonly displayed in dotted decimal notation. For example, 10.10.0.50.
IP address
A command-line utility that can be used to display and manage IP address settings for network interfaces on a computer.
ipconfi g
A protocol that is used to secure and authenticate an IPv4 connection.
IPsec
The protocol responsible for discovering network devices on the network and determining network speed.
Link Layer Topology Discovery Mapper I/O Driver
The protocol responsible for responding to discovery requests from other computers.
Link Layer Topology Discovery Responder
A protocol that defi nes methods for name resolution of local neighboring computers without using DNS, WINS, or NetBIOS name resolution services. LLMNR can operate on IPv4 and IPv6 networks with the use of specially crafted multicast addresses to query client names on other computers
Link-Local Multicast Name Resolution (LLMNR)
Describes the type of network: public, private, or domain. Different confi guration settings are applied based on the location type.
location type
A device that converts computer signals to a format that can travel over phones (modulate) and also performs the reverse function (demodulate).
modem
A command-line utility that can be used to display protocol statistics and current TCP/IP connections using NetBIOS over TCP/IP.
nbtstat
A command-line utility that can be used to display, change, add, and delete network confi guration settings on a computer, including basic and advanced settings.
netsh
A command-line utility that can be used to display protocol statistics and current TCP/IP network connections.
netstat
A system that allows multiple computers to share a single IP address when connecting to the Internet.
network address translation (NAT)
A central location to view network status and confi gure network settings.
Network and Sharing Center
The ability for Windows 7 to detect when it is connected to a different network and perform actions based on the change
network location awareness
A feature in Windows 7 that combines two dissimilar network types, such as wireless and wired, into a single network.
network bridge
A setting that controls how your computer views other computers on the network and advertises its presence on the network
network discovery
The software responsible for enabling communication between Windows 7 and the network device in your computer.
network driver
An interface that supports communication between network protocols and network drivers.
Network Driver Interface Specifi cation (NDIS)
A command-line utility that can be used to view or debug the data returned from a DNS server in response to a DNS name resolution query.
nslookup
A command-line utility that can be used to test IP communications between the computer running the utility and a remote target. In addition to the basic IP communication test, the pathping utility will trace the routers involved in establishing the IP communication path.
pathping
A command-line utility that can be used to test IP communications between the computer running the utility and a remote target.
ping
A protocol used to secure connections over most DSL lines.
Point-to-Point Protocol over Ethernet (PPPoE)
A combination of numbers, characters, and symbols that make up a passphrase that both sides of an authenticated and encrypted network connection must know to decode the data delivered between them successfully.
preshared keys
The location type that is used for trusted networks where limited security is required, for example, a small offi ce.
private network
The location type that is used for untrusted networks where high security is required, for example, a public wireless hotspot.
public network
A command-line utility that can be used to display and manage the routing table.
route
Traditionally, a network device that moves packets from one network to another. The routers sold in retail stores are used to share an Internet connection by performing NAT.
router
A data table that is used by Windows 7 to select the next IP address data must be delivered to ultimately deliver data to a given target address.
routing table
A unique ID that identifi es a wireless access point to the wireless networking clients that send data to it.
Security Set Identifi er (SSID)
The protocol used for Windows-based fi le and printer sharing. Windows 7 includes SMB version 2.1.
Server Message Block (SMB)
Provides functionality to remote clients over the network.
service
A wizard that simplifi es the setup process of sharing folders and confi guring relevant share and NTFS permissions.
Share With
A number that defi nes which part of an IP address is the network ID and which part is the host ID.
subnet mask
A system to tunnel IPv6 addressed packets over an IPv4 network, even if NAT is used on the IPv4 network.
Teredo
A command-line utility that can be used to trace the routers involved in establishing an IP communication path between the computer running the command and a target address.
tracert
A legacy interface that supports the NetBIOS protocol used by many older Windows applications.
Transport Device Interface (TDI)
A security protocol for wireless 802.11 networks that provides stronger security than WEP. WPA can be confi gured with a preshared key or with authentication from a central authority.
Wi-Fi Protected Access (WPA)
A host-based fi rewall included with Windows 7 that can perform inbound and outbound packet fi ltering.
Windows Firewall
An utility that is used to confi gure Windows Firewall and IPsec rules.
Windows Firewall and Advanced Security utility
A system used to resolve computer NetBIOS names to IP addresses.
Windows Internet Naming Service (WINS)
An interface that supports communication between user applications such as a Web browser and the TCP/IP protocol.
Windows Sockets (Winsock) user mode
An interface that supports communication between kernel mode software, such as clients and services, and the TCP/IP protocol.
Winsock Kernel (WSK)
A security protocol for wireless 802.11 networks that provides weak authentication methods in comparison to WPA. WEP uses preshared keys that attackers have been able to decipher without much diffi culty. The use of WEP is discouraged where wireless security is a major consideration.
Wired Equivalent Privacy (WEP)
A device that allows wireless devices to connect through it to a wired network.
Wireless Access Point
The location type that is used for trusted networks where limited security is required, for example, a small offi ce.
work network