Communications and Network Security Domain Flashcards

1
Q

Bastion hosts

A

Serve as a gateway between a trusted and untrusted network that gives limited; authorized access to untrusted hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bridges

A

Layer 2 devices that filter traffic between segments based on Media Access Control (MAC) addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Common application service element (CASE)

A

Sublayer that provides services for the application layer and request services from the session layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Concentrators

A

Multiplex connected devices into one signal to be transmitted on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Direct-Sequence Spread Spectrum (DSSS)

A

A wireless technology that spreads a transmission over a much larger frequency band; and with corresponding smaller amplitude

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Decryption

A

The process of transforming encrypted data back into its original form; so it can be understood.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fibre Channel over Ethernet (FCoE)

A

A lightweight encapsulation protocol and lacks the reliable data transport of the TCP layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

File Transfer Protocol (FTP)

A

A stateful protocol that requires two communication channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewalls

A

Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Frequency-Hopping Spread Spectrum (FHSS)

A

This wireless technology spreads its signal over rapidly changing frequencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internet Control Message Protocol (ICMP)

A

Provides a means to send error messages for non-transient error conditions and provides a way to probe the network in order to determine general characteristics about the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Layer 1

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Layer 2

A

Data-Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Layer 3

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Layer 4

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Layer 5

A

Session Layer

17
Q

Layer 6

A

Presentation Layer

18
Q

Layer 7

A

Application Layer

19
Q

Lightweight Directory Access Protocol (LDAP)

A

A client/server-based directory query protocol loosely based upon X.500; commonly used for managing user information

20
Q

Modems

A

Allow users remote access to a network via analog phone lines

21
Q

OSI reference model

A

Layering model structured into seven layers (physical layer; data-link layer; network layer; transport layer; session layer; presentation layer; application layer)

22
Q

Ping scanning

A

A basic network mapping technique that helps narrow the scope of an attack

23
Q

Public-key encryption

A

Involves a pair of keys-a public key and a private key-associated with an entity that needs to authenticate its identity electronically or to sign or encrypt data

24
Q

Remote Authentication Dial-in User Service (RADIUS)

A

An authentication protocol used mainly in networked environments; such as ISPs; or for similar services requiring single sign-on for layer 3 network access; for scalable authentication combined with an acceptable degree of security.

25
Q

Remote Procedure Calls (RPC)

A

Represent the ability to allow for the executing of objects across hosts

26
Q

Screen Scraper

A

A program which can extract data from output on a display intended for a human

27
Q

Security perimeter

A

The first line of protection between trusted and untrusted networks

28
Q

Specific application service element (SASE)

A

Sublayer that provides application specific services (protocols)

29
Q

Spread spectrum

A

A method commonly used to modulate information into manageable bits that are sent over the air wirelessly

30
Q

TCP/IP or Department of Defense (DoD) model

A

Layering model structured into four layers (link layer; network layer; transport layer; application layer)

31
Q

Traceroute

A

A diagnostic tool that displays the path a packet traverses between a source and destination host

32
Q

Transmission Control Protocol (TCP)

A

Provides connection-oriented data management and reliable data transfer

33
Q

User Datagram Protocol (UDP)

A

Provides a lightweight service for connectionless data transfer without error detection and correction

34
Q

Virtual Private Network (VPN)

A

An encrypted tunnel between two hosts that allows them to securely communicate over an untrusted network

35
Q

Voice over Internet Protocol (VoIP)

A

A technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line

36
Q

Wireless local area network (WLAN)

A

Links two or more devices over a short distance using a wireless distribution method; usually providing a connection through an access point for Internet access.

37
Q

Wireless mesh network

A

A wireless network made up of radio nodes organized in a mesh topology

38
Q

Wireless metropolitan area networks

A

A type of wireless network that connects several wireless LANs

39
Q

Wireless personal area networks (WPANs)

A

Interconnect devices within a relatively small area that is generally within a person’s reach