Communications and Network Security Domain Flashcards
Provides connection-oriented data management and reliable data transfer
TCP
A diagnostic tool that displays the path a packet traverses between a source and destination host
Traceroute
Layering model structured into four layers (link layer, network layer, transport layer, application layer)
TCP/Ip or DoD model
A method commonly used to modulate information into manageable bits that are sent over the air wirelessly
Spread Spectrum
The first line of protection between trusted and untrusted networks
Security Perimeter
A program which can extract data from output on a display intended for a human
Screen Scraper
Represent the ability to allow for the executing of objects across hosts
Remote Procedure Calls (RPC)
Involves a pair of keys - a public key and a private key - associated with an entity that needs to authenticate its identity electronically or to sign or encrypt data
Public-key encryption
A basic network mapping technique that helps narrow the scope of an attack
Ping scanning
Layering model structured into seven layers
OSI reference model
Allow users remote access to a network via analog phone lines
Modems
A client/server based directory query protocol loosely based upon X.500, commonly used for managing user information
Lightweight Directory Access Protocol (LDAP)
Application Layer
- SSH/SSH2
Layer 7
Presentation Layer
Layer 6
Session Layer
- Socks
Layer 5
Transport Layer
- SSL/TLS
Layer 4
Network Layer
- IPSec
Layer 3
Data-Link Layer
- PPTP, L2F, L2TP
Layer 2
Physical Layer
Layer 1
Provides a means to send error messages for non-transient error conditions and provides a way to probe the network in order to determine general characteristics about the network.
Internet Control Messsage Protocol (ICMP)
Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules
Firewalls
A stateful protocol that requires two communication channels
File Transfer Protocol (FTP)
The process of transforming encrypted data back into its original form, so it can be understood
Decryption
Layer 2 devices that filter traffic between segments based on Media Access Control (MAC) addresses
Bridges