Communications and Network Security Domain Flashcards

1
Q

Provides connection-oriented data management and reliable data transfer

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A diagnostic tool that displays the path a packet traverses between a source and destination host

A

Traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Layering model structured into four layers (link layer, network layer, transport layer, application layer)

A

TCP/Ip or DoD model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A method commonly used to modulate information into manageable bits that are sent over the air wirelessly

A

Spread Spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The first line of protection between trusted and untrusted networks

A

Security Perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A program which can extract data from output on a display intended for a human

A

Screen Scraper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Represent the ability to allow for the executing of objects across hosts

A

Remote Procedure Calls (RPC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Involves a pair of keys - a public key and a private key - associated with an entity that needs to authenticate its identity electronically or to sign or encrypt data

A

Public-key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A basic network mapping technique that helps narrow the scope of an attack

A

Ping scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Layering model structured into seven layers

A

OSI reference model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Allow users remote access to a network via analog phone lines

A

Modems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A client/server based directory query protocol loosely based upon X.500, commonly used for managing user information

A

Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application Layer

- SSH/SSH2

A

Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Presentation Layer

A

Layer 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Session Layer

- Socks

A

Layer 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Transport Layer

- SSL/TLS

17
Q

Network Layer

- IPSec

18
Q

Data-Link Layer

- PPTP, L2F, L2TP

19
Q

Physical Layer

20
Q

Provides a means to send error messages for non-transient error conditions and provides a way to probe the network in order to determine general characteristics about the network.

A

Internet Control Messsage Protocol (ICMP)

21
Q

Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules

22
Q

A stateful protocol that requires two communication channels

A

File Transfer Protocol (FTP)

23
Q

The process of transforming encrypted data back into its original form, so it can be understood

A

Decryption

24
Q

Layer 2 devices that filter traffic between segments based on Media Access Control (MAC) addresses

25
Sublayer that provides application specific services (protocols)
Specific Application Service Element (SASE)
26
This wireless technology spreads its signal over rapidly changing frequencies
Frequency Hopping Spread Spectrum (FHSS)
27
A lightweight encapsulation protocol and lacks the reliable data transport of the TCP layer
Fibre Channel over Ethernet (FCoE)
28
Multiplex connected devices into one signal to be transmitted on a network
Concentrators
29
Sublayer that provides services for the application layer and request services from the session layer
Common Application Service Element (CASE)
30
Serve as a gateway between a trusted and untrusted network that gives limited, authorized access to untrusted hosts
Bastion Hosts
31
An authentication protocol used mainly in networked environments, such as ISPs, or for similar services requiring single sign-on for layer 3 network access, for scalable authentication combined with an acceptable degree of security
Remote Authentication Dial-In User Service (RADIUS)
32
A type of wirelss network that connects several wireless LANs
Wireless Metropolitan Area Networks
33
A wireless network made up of radio nodes organized in a mesh topology
Wireless mesh network
34
Links two or more devices over a short distance using a wireless distribution method, usually providing a connection through an access point for Internet access
Wireless Local Area Network (WLAN)
35
A technology that allows you to make voice calls using a broadband internet connection instead of a regular (or analog) phoneline
Voice over Internet Protocol (VoIP)
36
An encrypted tunnel between two hosts that allows them to securely communicate over an untrusted network
Virtual Private Network (VPN)
37
Provides a lightweight service for connectionless data transfer without error detection and correction
User Datagram Protocol (UDP)
38
Interconnect devices within a relatively small area that is generally within a person's reach
Wireless Personal Area Networks (WPANs)
39
A wireless technology that spreads a transmission over a much larger frequency bank, and with corresponding smaller amplitude
Direct Sequence Spread Spectrum (DSSS)