Domain 4 - Communication and Network Security Flashcards
Bastion hosts
Serve as a gateway between a trusted and untrusted network that gives limited, authorized access to untrusted hosts.
Bridges
Layer 2 devices that filter traffic between segments based on Media Access Control (MAC) addresses.
Common application service element (CASE)
Sublayer that provides services for the application layer and request services from the session layer
Concentrators
Multiplex connected devices into one signal to be transmitted on a network
Direct-Sequence Spread Spectrum (DSSS)
A wireless technology that spreads a transmission over a much larger frequency band, and with corresponding smaller amplitude
Decryption
The process of transforming encrypted data back into its original form, so it can be understood.
Fibre Channel over Ethernet (FCoE)
A lightweight encapsulation protocol and lacks the reliable data transport of the TCP layer
File Transfer Protocol (FTP)
A stateful protocol that requires two communication channels
Firewalls
Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules
Frequency-Hopping Spread Spectrum (FHSS)
This wireless technology spreads its signal over rapidly changing frequencies
Internet Control Message Protocol (ICMP)
Provides a means to send error messages for non-transient error conditions and provides a way to probe the network in order to determine general characteristics about the network.
Layer 1
Physical Layer
Layer 2
Data-Link Layer
Layer 3
Network Layer
Layer 4
Transport Layer
Layer 5
Session Layer
Layer 6
Presentation Layer
Layer 7
Application Layer
Lightweight Directory Access Protocol (LDAP)
A client/server-based directory query protocol loosely based upon X.500, commonly used for managing user information
Modems
Allow users remote access to a network via analog phone lines
OSI reference model
Layering model structured into seven layers (physical layer, data-link layer, network layer, transport layer, session layer, presentation layer, application layer)
Ping scanning
A basic network mapping technique that helps narrow the scope of an attack
Public-key encryption
Involves a pair of keys-a public key and a private key-associated with an entity that needs to authenticate its identity electronically or to sign or encrypt data
Remote Authentication Dial-in User Service (RADIUS)
An authentication protocol used mainly in networked environments, such as ISPs, or for similar services requiring single sign-on for layer 3 network access, for scalable authentication combined with an acceptable degree of security.
Remote Procedure Calls (RPC)
Represent the ability to allow for the executing of objects across hosts
Screen Scraper
A program which can extract data from output on a display intended for a human
Security perimeter
The first line of protection between trusted and untrusted networks
Specific application service element (SASE)
Sublayer that provides application specific services (protocols)
Spread spectrum
A method commonly used to modulate information into manageable bits that are sent over the air wirelessly
TCP/IP or Department of Defense (DoD) model
Layering model structured into four layers (link layer, network layer, transport layer, application layer)
Traceroute
A diagnostic tool that displays the path a packet traverses between a source and destination host
Transmission Control Protocol (TCP)
Provides connection-oriented data management and reliable data transfer
User Datagram Protocol (UDP)
Provides a lightweight service for connectionless data transfer without error detection and correction
Virtual Private Network (VPN)
An encrypted tunnel between two hosts that allows them to securely communicate over an untrusted network
Voice over Internet Protocol (VoIP)
A technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line
Wireless local area network (WLAN)
Links two or more devices over a short distance using a wireless distribution method, usually providing a connection through an access point for Internet access.
Wireless mesh network
A wireless network made up of radio nodes organized in a mesh topology
Wireless metropolitan area networks
A type of wireless network that connects several wireless LANs
Wireless personal area networks (WPANs)
Interconnect devices within a relatively small area that is generally within a person’s reach