Communications and Network Security Domain Flashcards

1
Q

Provides connection-oriented data management and reliable data transfer

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A diagnostic tool that displays the path a packet traverses between a source and destination host

A

Traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Layering model structured into four layers (link layer, network layer, transport layer, application layer)

A

TCP/Ip or DoD model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A method commonly used to modulate information into manageable bits that are sent over the air wirelessly

A

Spread Spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The first line of protection between trusted and untrusted networks

A

Security Perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A program which can extract data from output on a display intended for a human

A

Screen Scraper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Represent the ability to allow for the executing of objects across hosts

A

Remote Procedure Calls (RPC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Involves a pair of keys - a public key and a private key - associated with an entity that needs to authenticate its identity electronically or to sign or encrypt data

A

Public-key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A basic network mapping technique that helps narrow the scope of an attack

A

Ping scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Layering model structured into seven layers

A

OSI reference model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Allow users remote access to a network via analog phone lines

A

Modems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A client/server based directory query protocol loosely based upon X.500, commonly used for managing user information

A

Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application Layer

- SSH/SSH2

A

Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Presentation Layer

A

Layer 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Session Layer

- Socks

A

Layer 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Transport Layer

- SSL/TLS

A

Layer 4

17
Q

Network Layer

- IPSec

A

Layer 3

18
Q

Data-Link Layer

- PPTP, L2F, L2TP

A

Layer 2

19
Q

Physical Layer

A

Layer 1

20
Q

Provides a means to send error messages for non-transient error conditions and provides a way to probe the network in order to determine general characteristics about the network.

A

Internet Control Messsage Protocol (ICMP)

21
Q

Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules

A

Firewalls

22
Q

A stateful protocol that requires two communication channels

A

File Transfer Protocol (FTP)

23
Q

The process of transforming encrypted data back into its original form, so it can be understood

A

Decryption

24
Q

Layer 2 devices that filter traffic between segments based on Media Access Control (MAC) addresses

A

Bridges

25
Q

Sublayer that provides application specific services (protocols)

A

Specific Application Service Element (SASE)

26
Q

This wireless technology spreads its signal over rapidly changing frequencies

A

Frequency Hopping Spread Spectrum (FHSS)

27
Q

A lightweight encapsulation protocol and lacks the reliable data transport of the TCP layer

A

Fibre Channel over Ethernet (FCoE)

28
Q

Multiplex connected devices into one signal to be transmitted on a network

A

Concentrators

29
Q

Sublayer that provides services for the application layer and request services from the session layer

A

Common Application Service Element (CASE)

30
Q

Serve as a gateway between a trusted and untrusted network that gives limited, authorized access to untrusted hosts

A

Bastion Hosts

31
Q

An authentication protocol used mainly in networked environments, such as ISPs, or for similar services requiring single sign-on for layer 3 network access, for scalable authentication combined with an acceptable degree of security

A

Remote Authentication Dial-In User Service (RADIUS)

32
Q

A type of wirelss network that connects several wireless LANs

A

Wireless Metropolitan Area Networks

33
Q

A wireless network made up of radio nodes organized in a mesh topology

A

Wireless mesh network

34
Q

Links two or more devices over a short distance using a wireless distribution method, usually providing a connection through an access point for Internet access

A

Wireless Local Area Network (WLAN)

35
Q

A technology that allows you to make voice calls using a broadband internet connection instead of a regular (or analog) phoneline

A

Voice over Internet Protocol (VoIP)

36
Q

An encrypted tunnel between two hosts that allows them to securely communicate over an untrusted network

A

Virtual Private Network (VPN)

37
Q

Provides a lightweight service for connectionless data transfer without error detection and correction

A

User Datagram Protocol (UDP)

38
Q

Interconnect devices within a relatively small area that is generally within a person’s reach

A

Wireless Personal Area Networks (WPANs)

39
Q

A wireless technology that spreads a transmission over a much larger frequency bank, and with corresponding smaller amplitude

A

Direct Sequence Spread Spectrum (DSSS)