Communications and Network Security Domain Flashcards

1
Q

Bastion hosts

A

Serve as a gateway between a trusted and untrusted network that gives limited; authorized access to untrusted hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bridges

A

Layer 2 devices that filter traffic between segments based on Media Access Control (MAC) addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Common application service element (CASE)

A

Sublayer that provides services for the application layer and request services from the session layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Concentrators

A

Multiplex connected devices into one signal to be transmitted on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Direct-Sequence Spread Spectrum (DSSS)

A

A wireless technology that spreads a transmission over a much larger frequency band; and with corresponding smaller amplitude

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Decryption

A

The process of transforming encrypted data back into its original form; so it can be understood.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fibre Channel over Ethernet (FCoE)

A

A lightweight encapsulation protocol and lacks the reliable data transport of the TCP layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

File Transfer Protocol (FTP)

A

A stateful protocol that requires two communication channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewalls

A

Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Frequency-Hopping Spread Spectrum (FHSS)

A

This wireless technology spreads its signal over rapidly changing frequencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internet Control Message Protocol (ICMP)

A

Provides a means to send error messages for non-transient error conditions and provides a way to probe the network in order to determine general characteristics about the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Layer 1

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Layer 2

A

Data-Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Layer 3

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Layer 4

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Layer 5

A

Session Layer

17
Q

Layer 6

A

Presentation Layer

18
Q

Layer 7

A

Application Layer

19
Q

Lightweight Directory Access Protocol (LDAP)

A

A client/server-based directory query protocol loosely based upon X.500; commonly used for managing user information

20
Q

Modems

A

Allow users remote access to a network via analog phone lines

21
Q

OSI reference model

A

Layering model structured into seven layers (physical layer; data-link layer; network layer; transport layer; session layer; presentation layer; application layer)

22
Q

Ping scanning

A

A basic network mapping technique that helps narrow the scope of an attack

23
Q

Public-key encryption

A

Involves a pair of keys-a public key and a private key-associated with an entity that needs to authenticate its identity electronically or to sign or encrypt data

24
Q

Remote Authentication Dial-in User Service (RADIUS)

A

An authentication protocol used mainly in networked environments; such as ISPs; or for similar services requiring single sign-on for layer 3 network access; for scalable authentication combined with an acceptable degree of security.

25
Remote Procedure Calls (RPC)
Represent the ability to allow for the executing of objects across hosts
26
Screen Scraper
A program which can extract data from output on a display intended for a human
27
Security perimeter
The first line of protection between trusted and untrusted networks
28
Specific application service element (SASE)
Sublayer that provides application specific services (protocols)
29
Spread spectrum
A method commonly used to modulate information into manageable bits that are sent over the air wirelessly
30
TCP/IP or Department of Defense (DoD) model
Layering model structured into four layers (link layer; network layer; transport layer; application layer)
31
Traceroute
A diagnostic tool that displays the path a packet traverses between a source and destination host
32
Transmission Control Protocol (TCP)
Provides connection-oriented data management and reliable data transfer
33
User Datagram Protocol (UDP)
Provides a lightweight service for connectionless data transfer without error detection and correction
34
Virtual Private Network (VPN)
An encrypted tunnel between two hosts that allows them to securely communicate over an untrusted network
35
Voice over Internet Protocol (VoIP)
A technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line
36
Wireless local area network (WLAN)
Links two or more devices over a short distance using a wireless distribution method; usually providing a connection through an access point for Internet access.
37
Wireless mesh network
A wireless network made up of radio nodes organized in a mesh topology
38
Wireless metropolitan area networks
A type of wireless network that connects several wireless LANs
39
Wireless personal area networks (WPANs)
Interconnect devices within a relatively small area that is generally within a person’s reach