Chapters 7-8 Flashcards

1
Q

Host, endpoint

A

A computing device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Client

A

Intermittent connection, requests services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Server

A

Stable connection, waits for service requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Core

A

Routers and switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Middle boxes

A

Firewalls, NATs, VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protocol

A

Set of rules/standards that govern an interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP

A

Reliable, has ordered delivery, congestion and flow control. Sets up a connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

UDP

A

Unreliable, unordered delivery, connectionless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DHCP

A

Dynamically assigns IP addresses when a host enters a subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Parity bit

A

A bit which serves to detect and sometimes correct bit errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reason why signal gets exponentially weaker the further away from the source

A

Inverse Square Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Infrastructure mode

A

All devices connect to a central access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ad-hoc mode

A

Devices communicate directly with each other. There is no central access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mesh Network

A

A combination of both Infrastructure and Ad-hoc, devices self-organize to relay messages, with each device serving as a router and/or switch for the other devices that it can hear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CSMA-CA

A

Listens before transmitting, requests to transmit, receives permission, transmits, receives ACK from access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Passive scanning

A

listens for beacon frames from access points, beacon frame includes the SSID of the access point

17
Q

Active scanning

A

Device sends a request for points to identify themselves

18
Q

Association Process

A

Device sends association request frame to specific AP, selected AP sends association response frame, the DHCP usually happens

19
Q

4G and 5G

A

IP cores

20
Q

CIA triad

A

Confidentiality, Integrity, Availiability

21
Q

Confidentiality

A

Only authorized persons should be able to access system

22
Q

Integrity

A

Only authorized persons should be able to modify data

23
Q

Availability

A

System needs to be accessible when needed

24
Q

Substitution cipher

A

Uses confusion

25
Q

Transposition cipher

A

Uses diffusion

26
Q

Stream cipher

A

Operates on one bit at a time, can only use confusion

27
Q

Block cipher

A

Operates on blocks of bits, normally described based on the size of the block on which it operates

28
Q

Symmetric key cipher

A

The same key is used for encryption and decryption

29
Q

Asymmetric key cipher

A

Two related keys, one for encryption and the related key for decryption

30
Q

Brute-Force Attack

A

Systematically trying every possible key until you find the correct one

31
Q

Break

A

Any attack that is more efficient than a brute-force attack

32
Q

Checksums

A

Produce fixed-size output no matter the input size, used to detect transmission errors

33
Q

SSL

A

Broken security protocol, do not use

34
Q

TLS

A

Transport layer security, provides confidentiality, integrity, and authentication

35
Q

IPSEC

A

Network layer, provides confidentiality, integrity, and authentication. Used in VPNs

36
Q

WEP

A

Broken wifi security protocol, do not use

37
Q

WPA 2 and 3

A

WiFi security Protocols which are good

38
Q
A