Domain 4: Communication and Network Security Flashcards

1
Q

Acknowledgment (ACK)

A

An acknowledgment of a signal being received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Address Resolution Protocol (ARP)

A

Used at the Media Access Control (MAC) layer to provide for direct communication between two devices within the same LAN segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Advanced Persistent Threat (APT)

A

An adversary with sophisticated levels of expertise and significant resources who is able to use multiple different attack vectors (e.g., cyber, physical, and deception) to achieve its objectives. These are typically to establish and extend footholds within the organization’s IT infrastructure to continually exfiltrate information; undermine or impede critical aspects of a mission, program, or organization; or place itself in a position to do so in the future. Moreover, the APT pursues its objectives repeatedly over an extended period, adapting to a defender’s efforts to resist it, and with determination to maintain the level of interaction needed to execute its objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Application Programming Interface (API) Object Notation (JSON).

A
  1. Mobile code mechanisms that provide ways for applications to share data, methods, or functions over a network. Usually implemented either in XML or JavaScript 2. A reference to a software access point or library function with a well-defined syntax and welldefined functionality.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bandwidth

A

The amount of information transmitted over time. A process consisting of learning or education could necessitate higher bandwidth than a quick status update, which would require a lower bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bit

A

Most essential representation of data (zero or one) at Layer 1 of the OSI 7-Layer Model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bluetooth (Wireless Personal Area Network IEEE 802.15)

A

Bluetooth wireless technology is an open standard for short-range RF communication used primarily to establish wireless personal area networks (WPANs). It has been integrated into many types of business and consumer devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bound Network

A

Network in which devices are connected at Layer 1 by means of physical cables, wires or fiber. Often referred to as wired networks or Ethernet networks or by wiring or cable standard used, (e.g., fiber network, Cat 5, or Cat 6 network). See also Unbound (wireless) Network(s).

physically bound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Boundary Routers

A

Primarily advertise routes that external hosts can use to reach internal ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bridges

A

A device that creates a single aggregate network from separate network segments. Using the OSI model, this device aggregates networks at Layer 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

A

A method of flow control in a network. To prevent more than one station from accessing the network simultaneously, the sending station announces its intent to send, and other stations wait until the sending station announces its completion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cellular Network

A

A radio network distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base station.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Circuit-Switched Network

A

A network that establishes a dedicated circuit between endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Code-Division Multiple Access (CDMA)

A

Every call’s data is encoded with a unique key, then the calls are all transmitted at once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Concentrators

A

Multiplex connected devices into one signal to be transmitted on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Content Distribution Network (CDN)

A

A large, distributed system of servers deployed in multiple data centers, which moves content to achieve QoS and availability requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Control Plane

A

Control of network functionality and programmability is directly made to devices at this layer. OpenFlow was the original framework/protocol specified to interface with devices through southbound interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Converged Protocols

A

A protocol that combines or converges standard protocols such as TCP/IP with proprietary or other nonstandard protocols. These can sometimes provide greatly enhanced functionality and security to meet the needs of specific situations or industries. Adopting them can also complicate enterprise-wide security engineering efforts by requiring additional specialist knowledge and skills to manage and secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Domain Name Service (DNS)

A

This acronym can be applied to three interrelated elements: a service, a physical server, and a network protocol.

Translates friendly-names into IP addresses that can then be routed using Address resolution protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Driver (Device Driver)

A

Software layer that provides an interface for accessing the functions of hardware devices. Typically used by the OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Dynamic Host Configuration Protocol (DHCP)

A

An industry standard protocol used to dynamically assign IP addresses to network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Dynamic or Private Ports

A

Ports 49152– 65535. Whenever a service is requested that is associated with well-known or registered ports, those services will respond with a dynamic port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

East-West Data Flow (or Traffic)

A

Network data traffic that flows laterally across a set of internal systems, networks, or subnetworks within an IT architecture. These can flow within a data center or between geographically dispersed locations. Contrast with north-south data flows, in which northbound data is leaving the organization and southbound data is entering it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Fiber Distributed Data Interface (FDDI)

A

A LAN standard, defined by ANSI X3T9.5, specifying a 100 Mbps token-passing network using fiber- optic cable, with transmission distances of up to two kilometers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Fibre Channel over Ethernet (FCoE)

A

A lightweight encapsulation protocol that lacks the reliable data transport of the TCP layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

File Transfer Protocol (FTP)

A

The internet protocol (and program) used to transfer files between hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Firewalls

A

Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Firmware

A

Computer programs and data stored in hardware typically in read-only memory (ROM) or programmable read-only memory (PROM)— such that the programs and data cannot be dynamically written or modified during execution of the programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Frame

A

Data represented at Layer 2 of the OSI 7-Layer Model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Gateway Device

A

A firewall or other device sitting at the edge of a network to regulate traffic and enforce rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Hypertext Transfer Protocol (HTTP)

A

A communication protocol used to connect to servers on the World Wide Web. Its primary function is to establish a connection with a web server and transmit HTML pages to the client browser. The protocol used to transport hypertext files across the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Internet Control Message Protocol (ICMP)

A

An IP network protocol standardized by the IETF through RFC 792 to determine whether a particular service or host is available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Internet Group Management Protocol (IGMP)

A

Used to manage multicasting groups that are a set of hosts anywhere on a network listening for a transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Internet of Things (IoT)

A

A virtual network made up of small, dedicated-use devices that are typically designed as small form factor, embedded hardware with a limited functionality OS. They may interface with the physical world and tend to be pervasively deployed where they exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Internet Protocol (IPv4)

A

The dominant protocol that operates at Layer 3 of the OSI 7-Layer Model. IP is responsible for addressing packets so that they can be transmitted from the source to the destination hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Internet Protocol (IPv6)

A

A modernization of IPv4 that includes a much larger address field: IPv6 addresses are 128 bits that support 2128 hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Internetworking

A

Two different sets of servers and communications elements using network protocol stacks to communicate with each other and coordinate their activities with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Kill Chain, Cyber Kill Chain

A

A generalized attack model consisting of actions on the objective and six broad, overlapping sets of operational activities: reconnaissance, weaponization, delivery, exploitation, installation, and command and control. APT actors often combine these operations in complex ways to achieve their goals; such attacks may span many months. For defenders, the kill chain model highlights the temporary gain in security that can result by improved systems and organizational hardening across any or all these areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Lightweight Directory Access Protocol (LDAP)

A

Authentication is specified as simple (basic), simple using SSL/TLS, or Simple Authentication and Security Layer (SASL).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Logical Link Control (LLC)

A

One of two sublayers that together make up the data link layer in the OSI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Man-in-the-Middle (MITM)

A

A form of active attack in which the attacker inserts themselves into the physical or logical communications flow between two parties and falsifies or alters data exchanged as the attacker chooses to. Machine- in-the-browser (MITB) attacks focus on Layer 7 vulnerabilities to masquerade as client to the server and as server to the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Media Access Control (MAC)

A

The 48-bit hex number assigned to all network cards. The first 24 bits are assigned to the card manufacturer with the send being a unique value (address) for that card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Microsegmented Networks, Microsegmentation

A

Part of a zero trust strategy that breaks LANs into small, highly localized zones using firewalls or similar technologies. At the limit, this places a firewall at every connection point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Modem

A

Provides modulation and demodulation of binary data into analog signals for transmission through telephone, cable, fiber, or other signaling systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Multiprotocol Label Switching (MPLS)

A

A WAN protocol that operates at both Layer 2 and Layer 3 and does label switching.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Network Function Virtualization (NFV)

A

Alternately referred to as virtual network function. The objective of NFV is to decouple functions, such as firewall management, intrusion detection, NAT, and name service resolution, away from specific hardware implementation and move them into software solutions. NFV’s focus is to optimize distinct network services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Network Management

A

Monitors network performance and identifies attacks and failures. Mechanisms include components that enable network administrators to monitor and restrict resource access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

North-South Network Data Flow (or Traffic)

A
  1. Data flowing either from the organization to external destinations (northbound) or into the organization from external sources (southbound). 2. In SDN terms, data flowing up (northbound) or down (southbound) the stack of data/control/applications planes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Open Shortest Path First (OSPF)

A

An interior gateway routing protocol developed for IP networks based on the shortest path first or link-state algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

OSI Layer 1

A

Physical Layer. converts a frame into bits for transmission over the physical connection medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

OSI Layer 2

A

Data Link Layer. It is the layer where media access control (MAC) addresses reside and frames are transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

OSI Layer 3

A

Network Layer. h is responsible for logical addressing and translating logical names into physical addresses. This layer also controls the routing of data from source to destination as well as the building and dismantling of packets.

IP Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

OSI Layer 4

A

Transport Layer. It’s responsible for checking that data packets created in the Session layer are received error- free. If necessary, it also changes the length of messages for transport up or down the remaining layers

TCP, UDP, TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

OSI Layer 5

A

Session Layer. It determines how two computers establish, use, and end a session. Security authentication and network- naming functions required for applications occur here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

OSI Layer 6

A

Presentation Layer. is responsible for formatting data exchange, such as graphic commands, and converting character sets.

it presents data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

OSI Layer 7

A

Application Layer.

This layer deals with how applications access the network and describes application functionality, such as file transfers, messaging, and so on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Packet

A

Representation of data at Layer 3 of the OSI 7-Layer Model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Packet Loss

A

Degradation of VoIP or other streaming data caused by lost packets. A technique called packet loss concealment (PLC) is used in VoIP communications to mask the effect of dropped packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Packet-Switched Networks

A

Networks that do not use a dedicated connection betweenendpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Peering

A

A voluntary interconnection of administratively separate networks to exchange traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Point-to-Point Protocol (PPP)

A

Provides a standard method for transporting multiprotocol datagrams over point-to-point links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Port Address Translation (PAT)

A

An extension to network address translation (NAT) to translate all addresses to one routable IP address and translate the source port number in the packet to a unique value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Quality of Service (QoS)

A

Refers to the capability of a network to provide better service to selected network traffic over various technologies, including frame relay, ATM, Ethernet and 802.1 networks, SONET, and IP-routed networks that may use any or all these underlying technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Registered Ports

A

Ports 1024–49151. These ports typically accompany nonsystem applications associated with vendors and developers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Remote Procedure Call (RPC)

A

A protocol that enables one system to execute instructions on other hosts across a network infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Root of Trust (RoT)

A

Hardware-based mechanisms that guarantee the integrity of the hardware prior to loading the OS of a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Segment

A
  1. Data representation (or datagram name) at Layer 4 of the OSI 7-Layer Model. 2. A portion of a larger network, usually isolated by firewalls or routers at either end from other portions of the network. See also Microsegmented Networks, Microsegmentation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Simple Network Management Protocol (SNMP)

A

An IP protocol for collecting and organizing information about managed devices on IP networks. It can be used to determine the “health” of networking devices including routers, switches, servers, workstations, printers, and modem racks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Smurf

A

ICMP echo request sent to the network broadcast address of a spoofed victim causing all nodes to respond to the victim with an echo reply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Software-Defined Networking (SDN)

A

Any of a broad range of techniques that enable network management, routing, forwarding, and control functions to be directed by software. This is generally done by abstracting the control and management planes from the data plane and its forwarding functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Software-Defined Wide Area Network (SD-WAN)

A

An extension of the SDN practices to connect to entities spread across the internet to support WAN architecture especially related to cloud migration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Terminal Emulation Protocol (Telnet)

A

A command-line protocol designed to give command-line access from one host to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Transmission Control Protocol (TCP)

A

The major transport protocol in the internet suite of protocols that provides reliable, connection- oriented, full-duplex streams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Transmission Control Protocol over Internet Protocol (TCP/IP)

A

The name of the IETF’s four-layer networking model, and its protocol stack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Transport Control Protocol/Internet Protocol (TCP/ IP) Model

A

Internetworking protocol model created by the IETF, which specifies four layers of functionality: link layer (physical communications), internet layer (network-to- network communication), transport layer (basic channels for connections and connectionless exchange of data between hosts), and application layer, where other protocols and user applications programs make use of network services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Trusted Platform Module (TPM)

A

A tamper-resistant integrated circuit built into some computer motherboards that can perform cryptographic operations (including key generation) and protect small amounts of sensitive information, such as passwords and cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Unbound (Wireless) Network(s)

A

Network in which physical layer interconnections are done using radio, light, or other means not confined to wires, cables, or fibers. Devices on unbound networks may or may not be mobile. See also Bound Networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Virtual Local Area Networks (VLANs)

A

Allow network administrators to use switches to create software-based LAN segments that can be defined based on factors other than physical location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Voice over Internet Protocol (VoIP)

A

A set of technologies that enables voice to be sent over a packet network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Web Application Firewall (WAF)

A

A software-based firewall, which monitors and filters exchanges between an applications program and a host. WAFs usually involve inspection and filtering of HTTP and HTTPS conversations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Wi-Fi (Wireless LAN IEEE 802.11x)

A

Primarily associated with computer networking, Wi-Fi uses the IEEE 802.11x specification to create a wireless LAN either public or private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

WiMAX (Broadband Wireless Access IEEE 802.16)

A

A well-known example of wireless broadband. WiMAX can potentially deliver data rates of more than 30 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Zero Trust Model/ Architecture

A

Replaces trust, but verify as security design principle by asserting that all activities attempted, by all users or entities, must be subject to control, authentication, authorization, and management at the most granular level possible. NIST and others have proposed zero trust architectures as guidance frameworks for organizations to use as they combine microsegmentation, access control, behavior modeling, and threat intelligence (among other techniques) in moving toward a zero trust implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Open Systems Interconnection (OSI) model

A

A standardized reference model defined by ISO to categorize the process of communication between computers in terms of seven layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

deencapsulation

A

The process of stripping a layer’s header and footer from a protocol data unit (PDU) as it travels up the OSI model layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

encapsulation

A

The act of enclosing or encasing one item inside another. Commonly used to describe tunneling, in which one protocol is enclosed in another or, in the context of the Open Systems Interconnection (OSI) model, each layer’s content is encapsulated as the payload in the next- lower layer and a header is added. The inverse of encapsulation is de- encapsulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

peer layer communication

A

Within the OSI model, the information removed by each layer contains instructions, checksums, and so on that can be understood only by the peer layer that originally added or created the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

protocol data unit (PDU)

A

The name of the network container at OSI layers 7, 6, and 5 (Application, Presentation, and Session).

Goes on to segments/datagrams, packets, frames, bits in lower layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Protocol Analyzer

A

A physical device that listens in on (sniffs) network traffic and looks for items it can make sense of. There is a legitimate purpose for these devices: administrators use them to analyze traffic. However, when they’re used by sources other than the administrator, they become security risks. Aka protocol analyzer, network evaluator, network analyzer, traffic monitor, or packet capturing utility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Telnet

A

A protocol that functions at the Application layer of the OSI model, providing terminal- emulation capabilities. Telnet has been deprecated in favor of Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Trivial File Transfer Protocol (TFTP)

A

A protocol similar to FTP that doesn’t provide the security or error- checking features of FTP. This is a network application that supports an exchange of files that does not require authentication. Used to host network device configuration files and can support multicasting. TFTP should not be used since it operates in cleartext. See File Transfer Protocol (FTP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

File Transfer Protocol (FTP)

A

A protocol used over TCP/IP that permits the transferring of files between computer systems. Because FTP has been implemented on numerous types of computer systems, files can be transferred between disparate systems (for example, a personal computer and a minicomputer).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Simple Mail Transfer Protocol (SMTP)

A

The primary protocol used to transfer or send email messages from clients to servers and from server to server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Simple Network Management Protocol (SNMP)

A

The management protocol created for sending information about the health of the network to network management consoles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Internet Message Access Protocol (IMAP)

A

A protocol used to transfer email messages from an email server to an email client. Allows for messages to be saved or archived on the email server rather than the client (as is the limitation with Post Office Protocol [POP]).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Post Office Protocol (POP)

A

An email access program that can be used to retrieve email from an email server. POP results in archiving messages only on the client; they are fully removed from the server. See Internet Message Access Protocol (IMAP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Dynamic Host Configuration Protocol (DHCP)

A

A protocol used to assign TCP/IP configuration settings to systems upon bootup, including TCP/IP addresses, default gateways, subnet masks, and DNS configurations. DHCP uses UDP port 67 for server point- to- point response and port 68 for client request broadcast. DHCP supports centralized control and management of network addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Hypertext Transfer Protocol (HTTP)

A

The protocol used to transmit web page elements from a web server to web browsers (over the well- known service TCP/UDP port address 80).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Hypertext Transfer Protocol Secured (HTTPS)

A

The encrypted form of HTTP that currently uses TLS (previously used SSL) and mostly operates over TCP port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Line Printer Daemon (LPD)

A

This is a network service that is used to spool print jobs and send print jobs to printers. port 515

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

X Window

A

A GUI API for command- line operating systems. Port 6000-6063

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Network File System (NFS)

A

A protocol that enables users to access files on remote computers as if the files were local. TCP Port 2049

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

User Datagram Protocol (UDP)

A

A connectionless protocol located at layer 4 of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

connection oriented

A

Describes communications between two hosts that have a previous session established for synchronizing sent data. The receiving system acknowledges the data. This method allows for guaranteed delivery of data between systems. Within the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite, TCP is used for connection- oriented communication. A connection- oriented protocol such as TCP provides increased reliability but has more overhead and is therefore slower.

105
Q

connectionless

A

Describes communications between two hosts that have no previous session established for synchronizing sent data. The data isn’t acknowledged at the receiving end. This method can allow data loss. Within the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite, User Datagram Protocol (UDP) is used for connectionless communication. The advantage of a connectionless protocol such as UDP is increased speed; however, this comes with less reliability.

106
Q

fully qualified domain name (FQDN)

A

The human- friendly name of a system or resource that is associated with an IP address. An FQDN is composed of a hostname or subdomain, a registered domain name, and a top- level domain (TLD) name.

107
Q

DNSSEC (DNS Security)

A

A security improvement to the existing Domain Name System (DNS) infrastructure. The primary function of DNSSEC is to provide reliable authentication between devices during DNS operations. Each DNS server is issued a digital certificate, which is then used to perform mutual certificate authentication.

108
Q

DNS poisoning

A

The act of falsifying the Domain Name System (DNS) information used by a client to reach a desired system. Usually employed by planting false information into a zone file, caching DNS system, or a HOSTS file. Often the malicious site looks exactly like the site the user intended to visit and can be difficult to identify.

109
Q

rogue DNS server

A

A false DNS server that can listen in on network traffic for any DNS query or specific DNS queries related to a target site. Then the rogue DNS server sends a DNS response to the client with false IP information. Once the client receives the response from the rogue DNS server, the client closes the DNS query session, which causes the response from the real DNS server to be dropped and ignored as an out- of- session packet.

110
Q

DNS cache poisoning

A

An attack against a caching DNS server where false data is injected. This can potentially occur without notice for a significant period of time.

111
Q

pharming, DNS pharming

A

The malicious redirection of a valid website’s URL or IP address to a fake website that hosts a false version of the original valid site.

112
Q

DNS query spoofing

A

A type of attack that occurs when the hacker is able to eavesdrop on a client’s query to a DNS server. The attacker then sends back a reply with false information. In order for this to be successful, the false reply must include the correct query ID (QID) cloned from the query.

113
Q

proxy falsification

A

Attacks that could modify the local system proxy configuration, the configuration script, or the routing table to redirect communications to a false proxy. This method works only against web communications (or other services or protocols that use a proxy). A rogue proxy server can modify traffic packets to reroute requests to whatever site the hacker wants.

114
Q

split DNS, split- DNS

A

Deploying a DNS server for public use and a separate DNS server for internal use. All data in the zone file on the public DNS server is accessible by the public via queries or probing. Aka split- horizon DNS, split- view DNS, and split- brain DNS.

115
Q

DNS sinkhole

A

Systems that provide false responses to DNS queries from malware, such as bots. This technique is effectively DNS spoofing. It can be used for both malicious and benign/investigative/defensive purposes. This is a specific example of a false telemetry system. Aka sinkhole server, internet sinkhole, and blackhole DNS.

116
Q

domain hijacking, domain theft

A

The malicious action of changing the registration of a domain name without the authorization of the valid owner. This may be accomplished by stealing the owner’s logon credentials; using XSRF, session hijacking, or MitM; or exploiting a flaw in the domain registrar’s systems.

117
Q

homograph attack

A

A DNS attack that leverages the similarities in character sets to register phony international domain names (IDNs) that to the naked eye appear legitimate.

118
Q

Class A

A

1-126 first octet

119
Q

Class B

A

128-191 First Octet

120
Q

Class C

A

192-223 First Octet

121
Q

Class D

A

224-239 first Octet

122
Q

Class E

A

240-255 First Octet

123
Q

loopback, loopback address

A

A means to reference the local machine, often used in testing for network faults. Often the IPv4 address of 127.0.0.1 is used, but the entire Class A range of 127 was set aside to be used for this purpose. In IPv6, the loopback address is ::/128. The loopback address is used to create a software interface that connects to itself via TCP/IP. The loopback address is handled by software alone. It permits testing of the TCP/IP protocol stack even if network interfaces or their device drivers are missing or damaged.

124
Q

Class A Default subnet Mask

A

255.0.0.0 /8

125
Q

Class B Default subnet Mask

A

255.255.0.0 /16

126
Q

Class C Default Subnet Mask

A

255.255.255.0 /24

127
Q

Classless Inter-Domain Routing (CIDR)

A

CIDR provides for a subnet masking notation
that uses mask bit counts rather than a full dotted-decimal notation subnet mask. Thus, instead of 255.255.0.0, a CIDR notation is added to the IP address after a slash, as in
172.16.1.1/16, for example.

128
Q

Internet Control Message Protocol (ICMP)

A

A message and management protocol for
TCP/IP. The ping utility uses ICMP. See also ping and Transmission Control Protocol/Internet
Protocol (TCP/IP).

129
Q

Internet Group Management Protocol (IGMP)

A

A protocol used for multicasting operations across the Internet.

130
Q

ARP cache poisoning, ARP poisoning

A

An attack where an attacker inserts bogus
information into the ARP cache (the local memory store of discovered IP to MAC relationships). Aka ARP spoofing.

131
Q

gratuitous ARP

A

A gratuitous Address Resolution Protocol (ARP) broadcast may be sent
as an announcement of a node’s existence, to update an ARP mapping due to a change in IP
address or MAC address, or when redundant devices are in use that share an IP address and
may also share the same MAC address (regularly occurring gratuitous ARP announcements
help to ensure reliable failover). This occurs when a system announces its MAC-to-IP mapping without being prompted by an ARP query. Aka unsolicited ARP.

132
Q

Kerberos

A

A ticket-based authentication mechanism that employs a trusted third party to
provide identification and authentication. Typically used in private LANs as an SSO solution.

133
Q

Internet Protocol Security (IPsec)

A

The standard of IP security extensions used as an addon for IPv4 and integrated into IPv6. IPsec provides encrypted communication tunnels between individual systems or entire networks. See Authentication Header (AH), Encapsulating
Security Payload (ESP), Internet Key Exchange (IKE), and Internet Security Association and
Key Management Protocol (ISAKMP).

134
Q

Secure Remote Procedure Call (S-RPC)

A

An authentication service. S-RPC is a means to
prevent unauthorized execution of code on remote systems.

135
Q

Transport Layer Security (TLS)

A

Based on SSL technology, TLS incorporated many security enhancements and was eventually adopted as a replacement for SSL in most applications. Early versions of TLS supported downgrading communications to SSL v3.0 when both parties did not support TLS. However, in 2011, TLS v1.2 dropped this backward compatibility. TLS uses TCP port 443.

136
Q

converged protocols

A

The merging of specialty or proprietary protocols with standard protocols, such as those from the TCP/IP suite. Some common examples of converged protocols
are FCoE, MPLS, iSCSI, and VoIP

137
Q

storage area network (SAN)

A

A secondary network (distinct from the primary communications network) used to consolidate and manage various storage devices.

138
Q

FCoE (Fibre Channel over Ethernet)

A

A means to encapsulate Fibre Channel communications over Ethernet networks. FCoE typically requires 10 Gbps Ethernet to support the Fibre Channel protocol.

139
Q

FCIP (Fibre Channel over IP)

A

An alternate implementation of Fibre Channel signaling that
no longer requires any specific network speed and operates over standard Ethernet cables.
It is the SAN equivalent of VoIP.

140
Q

multiprotocol label switching (MPLS)

A

A high-throughput, high-performance network
technology that directs data across a network based on short path labels rather than longer
network addresses.

141
Q

Real-time Transport Protocol (RTP)

A

A common protocol of VoIP that supports the
transmission of the data packets of the conversation. See Secure Real-time Transport Protocol (SRTP).

142
Q

Secure Real-time Transport Protocol (SRTP, Secure RTP)

A

A security improvement over
the Real-time Transport Protocol (RTP) that is used in many Voice over IP (VoIP) communications. SRTP aims to minimize the risk of VoIP DoS through robust encryption and reliable
authentication.

143
Q

software-defined network (SDN), software defined network, software-defined networking, software defined networking

A

A unique approach to network operation, design,
and management. The concept is based on the theory that the complexities of a traditional network with on-device configuration (i.e., routers and switches) often force an organization to
stick with a single device vendor and limit the flexibility of the network to changing physical
and business conditions. SDN aims at separating the infrastructure layer (i.e., hardware and
hardware-based settings) from the control layer (i.e., network services of data transmission
management). SDN offers a new network design that is directly programmable from a central
location, is flexible, is vendor neutral, and is based on open standards. See Network Functions
Virtualization (NFV). Aka virtualized network, virtual network, and network virtualization.

144
Q

software-defined storage (SDS)

A

Another derivative of SDN. SDS is a SDN version of a SAN or NAS. SDS is storage management and provisioning solution that is policy driven and is independent of the actual underlying storage hardware. It is effectively virtual storage.

145
Q

ad hoc, ad hoc mode

A

A peer-to-peer 802.11 wireless network connection between two
(or more) individual systems without the need for a wireless base station. Ad hoc does not
support encryption. An updated version is known as Wi-Fi Direct. See also peer-to-peer mode
and Wi-Fi Direct.

146
Q

Wi-Fi Direct

A

The name for the wireless topology of ad hoc or peer-to-peer connections.
It is a means for wireless devices to connect directly to each other without the need for an
intermediary mbase station.

147
Q

extended service set identifier (ESSID)

A

The name of a wireless network when a wireless
base station or wireless access point (WAP) is used (that is, infrastructure mode).

148
Q

infrastructure mode

A

A configuration of an 802.11 wireless network in which a wireless
access point (WAP) is used to support connections of wireless clients for communication with
each other as well as to an attached wired network.

149
Q

stand-alone mode, standalone mode

A

A wireless network that uses a wireless access point
to connect wireless clients together but does not offer any access to a wired network. Aka
stand-alone mode infrastructure.

150
Q

wired extension mode

A

A wireless network configuration where the wireless access point
acts as a connection point to link the wireless clients to the wired network. Aka wired
extension mode infrastructure.

151
Q

enterprise extended mode infrastructure

A

An arrangement in which multiple wireless
access points (WAPs) are used to support a single wireless network over a larger geographic
area than could be supported by a single wireless access point and connect a large physical
area to the same wired network.

152
Q

fat access point

A

A base station that is a fully managed wireless system, which operates as a
standalone wireless solution

153
Q

bridge mode, bridge mode infrastructure

A

A form of wireless access point deployment
that is used to link two wired networks together over a wireless bridged connection.

154
Q

thin access point

A

A WAP that is little more than a wireless transmitter/receiver, which
must be managed from a separate external centralized management console called a wireless
controller.

155
Q

wireless controller

A

A separate external centralized management console used to control
thin access points.

156
Q

basic service set identifier (BSSID)

A

The name of a wireless network when in ad hoc or
peer-to-peer mode (that is, when a base station or wireless access point isn’t used).

157
Q

beacon frame

A

A type of wireless network packet that broadcasts the presence of the
wireless network. This management frame contains various information such as the Service
Set Identifier (SSID), beacon interval, time stamp, and so on.

158
Q

independent service set identifier (ISSID)

A

The SSID used by Wi-Fi Direct and ad hoc
mode networks.

159
Q

channels

A

Subdivisions of wireless frequencies. Aka wireless channels.

160
Q

wireless cell

A

An area within a physical environment where a wireless device can connect to
a wireless access point (WAP).

161
Q

heat map

A

(1) A mapping of wireless signal strength measurements over a building’s blueprint. A site survey often produces a heat map. (2) See risk matrix.

162
Q

site survey

A

A formal assessment of wireless signal strength, quality, and interference
using an RF signal detector. A site survey is performed by placing a wireless base station in
a desired location and then collecting signal measurements from throughout the area. A site
survey often produces a heat map.

163
Q

open system authentication (OSA)

A

A connection scheme for wireless networks where no
real authentication is required; as long as a radio signal can be transmitted between the client
and WAP, communications are allowed. An open Wi-Fi network with no authentication and
no encryption.

164
Q

shared key authentication (SKA)

A

One of the original authentication options of 802.11 in
relation to WEP. A fixed value, similar to a password, is used to authenticate as well as
encrypt the session.

165
Q

Temporal Key Integrity Protocol (TKIP)

A

A security solution designed as the replacement
for Wired Equivalent Privacy (WEP) without requiring replacement of legacy wireless
hardware. TKIP was implemented in 802.11 wireless networking under the name Wi-Fi Protected Access (WPA). TKIP and WPA were officially replaced by WPA2 in 2004.

166
Q

Wi-Fi Protected Access (WPA) A

A

An early alternative to WEP was Wi-Fi Protected
Access (WPA), which was based on a secret passphrase and employed the LEAP and TKIP
cryptosystems. WPA uses the RC4 algorithm and employs the Temporal Key Integrity
Protocol (TKIP) or the Cisco alternative Lightweight Extensible Authentication Protocol
(LEAP). However, it is no longer secure enough to use. It is attackable through passphrase
guessing and encryption key compromise/discovery. WPA can be deployed using authentication in personal mode with a preshared key authentication or in enterprise mode using
802.1X to use existing network authentication.

167
Q

Wi-Fi Protected Access 2 (WPA2)

A

A revision of WPA that upgraded the encryption to an
Advanced Encryption Standard (AES) variant known as Counter Mode with Cipher Block
Chaining Message Authentication Code Protocol (CCMP). WPA2 supports two authentication options: preshared key (PSK) or personal (PER) and IEEE 802.1X or enterprise (ENT).
Aka IEEE 802.11i.

168
Q

Wi-Fi Protected Access 3 (WPA3)

A

The replacement or upgrade of wireless authentication and encryption of WPA2. WPA3-ENT uses 192-bit AES CCMP encryption. WPA3-PER
replaces the preshared key authentication with Simultaneous Authentication of Equals
(SAE). WPA3 also implements IEEE 802.11w-2009 management frame protection so that a
majority of network management operations have confidentiality, integrity, authentication of
source, and replay protection.

169
Q

Wi-Fi Protected Setup (WPS)

A

A wireless technology intended to simplify the effort
involved in adding new clients to a secured wireless network. It operates by autoconnecting
the first new wireless client to seek the network once WPS is triggered. WPS can be initiated
by a button on the WAP or a code or PIN that can be sent to the base station remotely. This
can allow for a brute-force guessing attack to discover the WPS code in less than six hours.

170
Q

Lightweight Extensible Authentication Protocol (LEAP)

A

A Cisco proprietary alternative
to the Temporal Key Integrity Protocol (TKIP) for Wi-Fi Protected Access (WPA). This was
developed to address deficiencies in TKIP before the 802.11i/WPA2 system was ratified as a
standard. LEAP is now a legacy solution to be avoided.

171
Q

Simultaneous Authentication of Equals (SAE)

A

An authentication option of WPA3 that
uses a password, but it no longer encrypts and sends that password across the connection.
Instead, SAE performs a zero-knowledge proof process known as Dragonfly Key Exchange,
which is itself a derivative of Diffie–Hellman. The process uses a preset password and the
MAC addresses of the client and AP to perform authentication and session key exchange.

172
Q

Extensible Authentication Protocol (EAP)

A

An authentication expansion system in which
new or custom mechanisms to perform authentication can be added to existing systems.

173
Q

Protected Extensible Authentication Protocol (PEAP)

A

A protocol tool that encapsulates
EAP methods within a Transport Layer Security (TLS) tunnel that provides authentication
and potentially encryption

174
Q

MAC filter, MAC filtering

A

A list of authorized wireless client interface media access control
(MAC) addresses that is used by a wireless access point (WAP) to block access to all nonauthorized devices. See MAC limiting.

175
Q

direct sequence spread spectrum (DSSS)

A

A wireless or radio wave communication process that employs all the available frequencies simultaneously in parallel.

176
Q

Frequency Hopping Spread Spectrum (FHSS)

A

An early implementation of the spread
spectrum concept. This wireless access technology transmits data in a series while constantly
changing the frequency in use.

177
Q

spread spectrum

A

Communication that occurs over multiple frequencies at the same time.

178
Q

Orthogonal Frequency-Division Multiplexing (OFDM)

A

A wireless technology that
employs a digital multicarrier modulation scheme that allows for a more tightly compacted
transmission. It is a variation on frequency multiplexing that employs a digital multicarrier
modulation scheme that allows for a more tightly compacted transmission.

179
Q

bluejacking

A

The process of sending messages to Bluetooth-capable devices without the permission of the owner/user.

180
Q

bluesmacking

A

A denial-of-service (DoS) attack against a Bluetooth device.

181
Q

bluesnarfing

A

An attack that allows hackers to connect with your Bluetooth devices
without your knowledge and extract information from them. This form of attack can offer
attackers access to your contact lists, your data, and even your conversations.

182
Q

bluesniffing

A

Eavesdropping or packet-capturing Bluetooth communications.

183
Q

Bluetooth (IEEE 802.15)

A

A 2.4 GHz wireless protocol used to pair devices together to
support communications and control.

184
Q

Bluetooth Low Energy (Bluetooth LE, BLE), Bluetooth Smart

A

A low-power consumption
derivative of standard Bluetooth. BLE was designed for Internet of Things, edge/fog devices,
mobile equipment, medical devices, and fitness trackers. It uses less power while maintaining a similar transmission range to that of standard Bluetooth. Standard Bluetooth and BLE are
not compatible, but they can coexist on the same device.

185
Q

bluebugging

A

An attack that grants hackers remote control over the hardware and software
features and functions of a Bluetooth device. This could include the ability to turn on the
microphone to use the phone as an audio bug

186
Q

near-field communication (NFC)

A

A standard that establishes radio communications between devices in close proximity. It lets you perform a type of automatic synchronization and
association between devices by touching them together or bringing them within inches of
each other. NFC is a derivative technology from RFID and is itself a form of field-powered or
field-triggered device

187
Q

radio frequency identification (RFID)

A

A tracking technology based on the ability to power
a radio transmitter using current generated in an antenna when placed in a magnetic field.
RFID can be triggered/powered and read from a considerable distance away (often hundreds of meters). Each RFID tag includes a unique identifier so that when a nearby antenna/
transceiver activates the tag, it transmits that identifier back to the antenna, where that value
is recorded or used to trigger some kind of action. RFID devices may also be used to track
individuals (carrying tags), equipment (bearing tags), and so forth, within the premises of an
enterprise for security monitoring.

188
Q

war driving

A

The act of searching for wireless networks using any of a variety of wirelessdetection tools, from handheld scanners to notebook computers. Originally named after the
method of driving around office buildings looking for open access points.

189
Q

evil twin

A

An attack in which a hacker operates a false wireless access point (WAP) that will
automatically clone, or twin, the identity of another access point based on a client device’s
automatic request to reconnect to a known wireless network from its connection history. See
rogue access point.

190
Q

disassociation

A

One of the many types of wireless management frames. An attack can send
repeated disassociation frames to a client to prevent reassociation, thus causing a denial of
service (DoS).

191
Q

light fidelity (LiFi)

A

A technology for wireless communications using light. It is used to
transmit both data and position information between devices. It uses visible light, infrared,
and the ultraviolet light spectrums to support digital transmissions. It has a theoretical transmission rate of 100 Gbps. LiFi has the potential to be used in areas where interference to
electromagnetic radiation would be a problem for radio wave–based solutions. Although
direct line of sight between devices provides optimum throughput, signals can be transmitted
off reflective surfaces in order to maintain at least some level of data transmission.

192
Q

satellite communication (SATCOM)

A

A means of audio and data transmission using satellites orbiting in near-earth orbit.

193
Q

geostationary orbit (GEO)

A

Satellites can be positioned in three primary orbits: low Earth
orbit (LEO), 160–2,000 km, medium Earth orbit (MEO), 2,000–35,786 km, and geostationary orbit (GEO), 35,786 km. GEO satellites appear motionless in the sky as they are
rotating around the earth at the same angular velocity as the earth rotates. Thus, GEO satellites maintain a fixed position above a terrestrial location. GEO satellites have a larger
transmission footprint than MEO satellites but also a higher latency. But GEO satellites do
not require that a ground station track the movement of the satellite across the sky as is
necessary with LEO and MEO satellites, so GEO ground stations can use fixed antennas. See
low Earth orbit (LEO) and medium Earth orbit (MEO).

194
Q

narrow-band, narrow-band wireless

A

A type of radio wave communication that is widely
used by SCADA systems to communicate over a distance or geographic space where cables or
traditional wireless are ineffective or inappropriate.

195
Q

Zigbee

A

An IoT equipment communication’s concept that is based on Bluetooth. Zigbee has
low power consumption, has a low throughput rate, and requires close proximity of devices.

196
Q

content distribution network (CDN), content delivery network

A

A collection of resource
services deployed in numerous data centers across the internet in order to provide low
latency, high performance, and high availability of the hosted content. CDNs provide the
desired multimedia performance quality demanded by customers through the concept of
distributed data hosts. Rather than having media content stored in a single central location
to be transmitted to all parts of the internet, the media is distributed to numerous geographically distributed prestaging internet locations that are closer to groups of customers.

197
Q

extranet

A

A privately controlled network segment or subnet that functions as a screened
subnet for business-to-business transactions. It allows an organization to offer specialized services to a limited number of specific outsiders but not the entire public, such as
business partners, suppliers, distributors, or high-end customers. Often access into an extranet from the internet requires a virtual private network (VPN) connection. Extranets are
often used in business-to-business (B2B) applications, between customers and suppliers. See
screened subnet.

198
Q

screened subnet

A

A method of placing web and other servers that serve the general public
outside the firewall and, therefore, isolating them from internal network access. These servers
should be hardened and trust relationships limited to prevent transitive trust attacks. Placing
virtualized servers inside the screened subnet is considered a bad security practice for similar
reasons, even though virtualization security has improved significantly in the last few years.
Previously known as DMZ. See extranet.

199
Q

repeater

A

A network device used to amplify signals on network cabling to allow for longer
distances between nodes. Aka a concentrator or amplifier.

200
Q

hub

A

A network device used to connect multiple systems together in a star topology.
Hubs repeat inbound traffic over all outbound ports. Hubs are a legacy networking device
that you are unlikely to find in standard networks today.

201
Q

modem

A

(1) A traditional landline modem (modulator-demodulator) is a communications
device that covers or modulates between an analog carrier signal and digital information in
order to support computer communications of PSTN (public switched telephone network)
lines. (2) With the advancement of digital broadband communication technologies, the term
modem is now often used to refer to the intermediary device between business or personal
equipment and the broadband network (typically internet) carrier or service (such as DSL,
cable, cellular/wireless/mobile, Wi-Fi, ISDN, etc.), even when modulation and demodulation
are not actually taking place.

202
Q

bridge

A

A network device used to connect networks with different speeds, cable types, or
topologies that still use the same protocol. A bridge is a layer 2 device.

203
Q

switch

A

A layer 2 network device that tracks the media access control (MAC) addresses
of the systems connected on each port. Instead of repeating traffic on every outbound port,
a switch repeats only traffic out of the port on which the destination is known to exist.
Switches offer greater efficiency for traffic delivery, create separate broadcast and collision
domains, and improve the overall throughput of data.

204
Q

router

A

A network device used to control traffic flow on networks. A router determines the
best path for data packets from source to destination. Routers are often used to connect similar networks together and control traffic flow between them. They can function using statically defined routing tables or employ a dynamic routing system.

205
Q

LAN extender

A

A remote access, multilayer switch used to connect distant networks over
WAN links. This is a strange beast of a device in that it creates WANs, but marketers of this
device steer clear of the term WAN and use only the terms LAN and extended LAN. The
idea behind this device was to make the terminology easier to understand and thus make the
device easier to sell than a more conventional WAN device grounded in complex concepts
and terms.

206
Q

jump server, jumpbox

A

A remote access system deployed to make accessing a specific system or
network easier or more secure. A jump server is often deployed in extranets, DMZs, or cloud networks where a standard direct link or private channel is not available or is not considered safe.

207
Q

sensor

A

A hardware or software tool used to monitor digital or physical activities or events
to record information or at least take notice of an occurrence. A sensor may monitor network activity, heat, humidity, wind movement, doors and windows opening, the movement
of data, the types of protocols in use on a network, when a user logs in, any activity against
sensitive servers, and much more. A sensor collects information and then transits it back to a
central system for storage and analysis. Sensors are common elements of fog computing, ICS,
IoT, IDS/IPS, and SIEM/security orchestration, automation, and response (SOAR) solutions.
See collector.

208
Q

collector, security collector

A

Any system that gathers data into a log or record file.
A collector is similar to the functions of auditing, logging, and monitoring. A collector watches
for a specific activity, event, or traffic, and then records the information into a record file.
See sensor.

209
Q

aggregator

A

A type of multiplexor. Numerous inputs are received and directed or transmitted to a single destination. MPLS is an example of an aggregator.

210
Q

network access control (NAC)

A

A concept of controlling access to an environment through
strict adherence to and implementation of security policy. The goals of NAC are to prevent/
reduce zero-day attacks, enforce security policy throughout the network, and use identities to
perform access control.

211
Q

static packet-filtering firewall

A

A firewall that filters traffic by examining data from a message header. Usually, the rules are concerned with source, destination, and port addresses.
Aka screening router.

212
Q

application-level firewall, application-layer firewall

A

A firewall that operates at OSI layer
7, the Application layer, where it filters traffic for a specific application or service, such as a
web proxy. Aka application-level gateway.

213
Q

circuit-level firewall

A

A firewall that filters traffic around a circuit (i.e., communication
session or connection) rather than around only a specific application or protocol. Typically,
a circuit-level gateway functions at layer 4 or 5 of the Open Systems Interconnection (OSI)
model. Aka circuit-level gateway, circuit-level gateway firewall, and circuit proxies.

214
Q

stateful inspection firewall

A

A firewall that evaluates the state or the context of network
traffic. By examining source and destination addresses, application usage, source of origin,
and relationship between current packets with the previous packets of the same session,
stateful inspection firewalls are able to grant a broader range of access for authorized users
and activities and actively watch for and block unauthorized users and activities. A type of
firewall that is aware that any valid outbound communication (especially related to Transmission Control Protocol [TCP]) will trigger a corresponding response or reply from the
external entity. Aka dynamic packet filtering firewall.

215
Q

next-generation firewall (NGFW)

A

A unified threat management (UTM) device that is
based on a traditional firewall with numerous other integrated network and security services,
such as application filtering, deep packet inspection, intrusion prevention, TSL offloading
and/or inspection, domain name and website filtering, QoS, bandwidth management, antimalware, authentication services, and identity management. See unified threat management
(UTM) and multifunction device (MFD).

216
Q

internal segmentation firewall (ISFW)

A

A firewall deployed between internal network segments or company divisions. Its purpose is to prevent the further spread of malicious code or
harmful protocols already within the private network. With an ISFW, network segments can
be created without resorting to air gaps, VLANs, or subnet divisions. An ISFW is commonly
used in microsegmentation architectures.

217
Q

proxy, proxy server

A

A mechanism that copies packets from one network into another. The
copy process also changes the source and destination address to protect the identity of the
internal or private network (i.e., NAT/PAT). Proxies may be transparent or nontransparent.
Proxies may cache static content to improve network throughput. Aka forward proxy, forwarding proxy, standard proxy, common proxy, or reverse proxy

218
Q

forward proxy

A

A standard or common proxy that acts as an intermediary for queries of
external resources. A forward proxy handles queries from internal clients when accessing
outside services.

219
Q

reverse proxy

A

A proxy system that handles inbound requests from external systems to internally
located services. A reverse proxy is similar to the functions of port forwarding and static NAT.

220
Q

nontransparent proxy

A

A proxy that manages client traffic because the client is specifically
configured to send communications to the proxy.

221
Q

proxy auto-config (PAC)

A

The settings for a nontransparent proxy. PAC can be implemented with a script or via DHCP.

222
Q

content inspection (content filtering)

A

The security filtering function in which the contents of the application protocol payload are inspected.

223
Q

coaxial cable

A

A form of copper cable that is no longer in widespread use for networking
because it has been replaced by unshielded twisted pair (UTP), shielded twisted pair (STP),
fiber-optic cables, or wireless. Coaxial cable used for networking is known as 10Base2 and
10Base5. A cable with a center core of copper wire surrounded by a layer of insulation and
then by a conductive braided shielding and finally encased in an insulation sheath. Coaxial
cable is fairly resistant to electromagnetic interference (EMI), has a low cost, and is easy
to install.

224
Q

Twisted pair cable, twisted-pair cabling

A

A form of cable commonly used in network
applications. It’s named after its twisting of pairs of conductors within the cable itself. Standard networking cable has eight wires or four pairs. See also unshielded twisted pair (UTP)
or shielded twisted pair (STP) (if shielded). See 10BaseT.

225
Q

shielded twisted-pair (STP)

A

A twisted-pair wire that includes a metal foil shielding
wrapper inside the outer sheath to provide additional protection from electromagnetic interference (EMI).

226
Q

unshielded twisted-pair (UTP)

A

A twisted-pair wire that does not include additional
electromagnetic interference (EMI) protection. Most twisted-pair wiring is UTP.

227
Q

attenuation

A

Loss of signal strength over a distance of a copper cable or wireless transmission, caused by resistance and noise picked up from the environment. Attenuation is what
limits the maximum use length of a copper cable and is one factor that limits the distance
of wireless transmissions. Fiber-optic connections also experience attenuation in the form of
transmission loss (weaker light over greater distance).

228
Q

logical topology

A

The logical operation of a network. It defines the arrangement and organization of devices as well as the means used to communicate to and with each other. Aka
signal topology.

229
Q

network topology

A

The physical layout and organization of computers and networking
devices. Aka physical topology.

230
Q

ring topology

A

A network structure that connects each system as points on a circle.

231
Q

bus topology

A

A network structure that connects each system to a trunk or backbone cable.
All systems on the bus can transmit data simultaneously, which can result in collisions.

232
Q

star topology

A

A network structure that employs a centralized connection device. This
device can be a simple hub or switch. Each system is connected to the central hub by a dedicated segment.

233
Q

mesh topology

A

A network structure that connects systems to other systems using
numerous paths or links. A full-mesh topology connects each system to all other systems on
the network. A partial-mesh topology connects many systems to many other systems. Mesh
topologies provide redundant connections to systems, allowing multiple segment failures
without seriously affecting connectivity.

234
Q

analog communications

A

A continuous signal that varies in frequency, amplitude, phase,
voltage, and so on. The variances in the continuous signal produce a wave shape (as opposed
to the square shape of a digital signal). The actual communication occurs by variances in the
constant signal.

235
Q

digital communications

A

Network transmissions that occur through the use of a discontinuous electrical signal and a state change (i.e., high and low voltages) or on-off pulses.

236
Q

asynchronous communications

A

A means of data transfer that relies on a stop and start
delimiter bit to manage the transmission of data. Because of the use of delimiter bits and
the stop and start nature of its transmission, asynchronous communication is best suited
for smaller amounts of data. PSTN (public switched telephone network) modems are good
examples of asynchronous communication devices.

237
Q

baseband, baseband technology

A

A form of communication in which the cable or communication media is able to support only a single transmission at a time.

238
Q

broadband, broadband technology

A

A form of communication in which the cable or
communication medium is able to support multiple transmissions at one time.

239
Q

broadcast

A

A communications transmission to multiple but unidentified recipients.

240
Q

multicast

A

A communications transmission to multiple identified recipients. Aka multicasting.

241
Q

unicast

A

A communications transmission to a single identified recipient.

242
Q

Carrier-Sense Multiple Access (CSMA)

A

A LAN media access technology that does not
directly address collisions. If a collision occurs, the communication would not have been successful, and thus an acknowledgment would not be received. This causes the sending system
to retransmit the data and perform the CSMA process again.

243
Q

Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA)

A

A LAN media
access technology that attempts to avoid collisions by granting only a single permission to
communicate at any given time. This system requires designation of a primary system, which
responds to the requests and grants permission to send data transmissions.

244
Q

Carrier-Sense Multiple Access with Collision Detection (CSMA/CD)

A

A LAN media
access technology that responds to collisions by having each member of the collision domain
wait for a short but random period of time before starting the process over. Unfortunately,
allowing collisions to occur and then responding or reacting to collisions causes delays in
transmissions as well as a required repetition of transmissions. This results in about 40 percent loss in potential throughput.

245
Q

token passing

A

A LAN media access technology that performs communications using a
digital token. Possession of the token allows a host to transmit data. Once its transmission is
complete, it releases the token to the next system. Token passing was used by ring topology–
based networks.

246
Q

polling

A

A LAN media access technology that performs communications using a primarysecondary configuration. One system is labeled as the primary system. All other systems
are labeled as secondary. The primary system polls or inquires of each secondary system in
turn whether they have a need to transmit data. If a secondary system indicates a need, it is
granted permission to transmit. Once its transmission is complete, the primary system moves
on to poll the next secondary system. Mainframes often supported polling.

247
Q

Point-to-Point Protocol (PPP)

A

A full-duplex line protocol that supersedes Serial Line Internet Protocol (SLIP), which was used over various non-LAN connections, such as modem
dial-up links.`

248
Q

Serial Line Internet Protocol (SLIP)

A

A legacy protocol that was used in early remote access
environments. SLIP was originally designed to connect Unix systems together in a
dial-up environment, and it only supports serial communications. Was replaced by PPP.

249
Q

Challenge-Handshake Authentication Protocol (CHAP), Challenge Handshake Authentication Protocol

A

A protocol that challenges a system to verify its identity. CHAP is an
improvement over Password Authentication Protocol (PAP), in which one-way hashing is
incorporated into a multistep, nonrepeatable challenge-response handshake.

250
Q

Password Authentication Protocol (PAP)

A

An insecure plaintext password-logon mechanism. A standardized authentication protocol for PPP. PAP transmits usernames and passwords in the clear.

251
Q

Extensible Authentication Protocol (EAP)

A

An authentication expansion system in which
new or custom mechanisms to perform authentication can be added to existing systems.

252
Q

Port security

A

(1) The physical control of all connection points, such as RJ-45 wall jacks
or device ports, so that no unauthorized user or devices can attempt to connect into an open
port. (2) The management of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports through the use of firewall, intrusion detection system (IDS), and intrusion
prevention system (IPS) tools. (3) The need to authenticate to a port before being allowed to
communicate through or across the port. This may be implemented on a switch, router, smart
patch panel, or even a wireless network. This concept is often referred to as IEEE 802.1X,
which is titled Port-Based Network Access Control. (4) Port knocking.

253
Q

quality of service (QoS)

A

The oversight and management of the efficiency and performance
of network communications. Items to measure include throughput rate, bit rate, packet loss,
latency, jitter, transmission delay, and availability.

254
Q

split tunnel

A

A virtual private network (VPN) configuration that allows a VPN-connected
system to access both the organizational network over the VPN as well as the internet
directly at the same time. The split tunnel thus grants a simultaneously open connection to
the internet as well as the organizational network. See full tunnel.

255
Q

full tunnel

A

A virtual private network (VPN) configuration in which all of the client’s traffic
is sent to the organizational network over the VPN link, and then any internet-destined
traffic is routed out of the organizational network’s proxy or firewall interface to the internet. A full tunnel ensures that all traffic is filtered and managed by the organizational network’s security infrastructure. See split tunnel.

256
Q

Point-to-Point Tunneling Protocol (PPTP)

A

An enhancement of PPP that creates encrypted
tunnels between communication endpoints (i.e., virtual private networks [VPNs]). PPTP is
often replaced by L2TP.

257
Q

Layer 2 Tunneling Protocol (L2TP)

A

A tunneling protocol that adds functionality to the
Point-to-Point Protocol (PPP). This protocol was created by Microsoft and Cisco and is often
used with virtual private networks (VPNs). A point-to-point tunneling protocol developed by
combining elements from PPTP and L2F. L2TP uses 802.1X for authentication. L2TP lacks a
built-in encryption scheme but typically relies on IPsec’s ESP as its encryption mechanism.

258
Q
A