Communications & Network Security Flashcards

1
Q

Serve as a gateway between a trusted & untrusted network that gives limited, authorized access to untrusted hosts.

A

Bastion Hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Interconnect devices within a relatively small area that is generally within a person’s reach.

A

Wireless Personal Area Networks (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A type of wireless network that connects several wireless LAN’s.

A

Wireless Metropolitan Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A wireless network made up of radio nodes organized in a mesh topology.

A

Wireless Mesh Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Links two or more devices over a short distance using a wireless distribution method, usually providing a connection through an access point for internet access.

A

Wireless Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A technology that allows you to make voice calls using a broadband internet connection instead of a regular (or analog) phone line.

A

Voice over Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An encrypted tunnel between two hosts that allows them to securely communicate over an untrusted network.

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Provides a lightweight service for connectionless data transfer without error detection & correction

A

User Datagram Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Provides connection-oriented data management & reliable data transfer

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A diagnostic tool that displays the path a packet traverses between a source & destination host

A

Traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layering model structured into four layers (link, network, transport, application)

A

TCP/IP Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A method commonly used to modulate information into manageable bits that are sent over the air wirelessly

A

Spread Spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sublayer that provides application specific services (protocols)

A

Specific Application Service Element

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The first line of protection between trusted & untrusted networks

A

Security Perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A program which can extract data from output on a display intended for a human

A

Screen Scraper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Represent the ability to allow for the executing of objects across hosts

A

Remote Procedure Calls (RPC)

17
Q

Authentication protocol used mainly in networked environments, such as ISPs, or for similar services requiring single sign-on for layer 3 network access, for scalable authentication combined with an acceptable degree of security.

A

Remote Authenication Dial-in User Services (RADIUS)

18
Q

Involves a pair of keys a public key & a private key-associated with an entity that needs to authenticate its identity electronically or to sign or encrypt data

A

Public Key Encryption

19
Q

A basic network mapping technique that helps narrow the scope of an attack

A

Ping Scanning

20
Q

Layering model structured into seven layers (physical, data link, network, transport, session, presentation, application)

21
Q

Allow users remote access to a network via analog phone lines

22
Q

A client/server-based directory query protocol loosely based upon X.500 commonly used for managing user information.

A

Lightweight Directory Access Protocol (LDAP)

23
Q

Provides a means to send error message for non-transient error conditions & provides a way to probe the network in order to determine general characteristics about the network

A

Internet Control Message Protocol (ICMP/Ping)

24
Q

Wireless technology that spreads its signal over rapidly changing frequencies

A

Frequency Hopping Spread Spectrum (FHSS)

25
Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules
Firewalls
26
Stateful protocol that requires two communication channels
File Transfer Protocol (FTP)
27
A lightweight encapsulation protocol & lacks the reliable data transport of the TCP layer
Fiber Channel over Ethernet (FCoE)
28
Process of transforming encrypted data back into its original form, so it can be understood.
Decryption
29
Wireless technology that spreads a transmission over a much larger frequency band & with corresponding smaller amplitude
Direct Sequence Spread Spectrum (DSSS)
30
Multiplex connected device into one signal to be transmitted on a network
Concentrators
31
Layer 2 devices that filter traffic between segments based on Media Access Control (MAC) addresses.
Bridges