Domain 4: Communication and Network Security Pt 3 Flashcards

1
Q
  • UTP category
  • Throughput: Voice only
  • Not suitable for networks but usable by modems
A

Cat 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • UTP category
  • Throughput: 4 Mbps
  • Not suitable for most networks; often employed for host-to-terminal connections on mainframes
A

Cat 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • UTP category
  • Throughput: 10 Mbps
  • Primarily used in 10BaseT Ethernet networks (only 4 Mbps on Token Ring networks) and as telephone cables
A

Cat 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • UTP category
  • Throughput: 16 Mbps
  • Primarily used in Token Ring networks
A

Cat 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • UTP category
  • Throughput: 100 Mbps
  • Used in 100BaseTX, FDDI, and ATM networks
A

Cat 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • UTP category
  • Throughput: 1000 Mbps
  • Used in 100BaseT and 1000BaseT
A

Cat 5e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • STP or UTP
  • Throughput: 1000 Mbps
  • Used in high-speed networks
A

Cat 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • STP
  • Throughput: 10 Gbps
  • Near-field communication (NFC)
  • Standard that establishes radio communications between devices in close proximity
  • Derivative technology from RFID
  • Used to performs device-to-device data exchanges, set direct communications
A

Cat 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • LAN media technology that performs communications using a digital token
  • Possession of the token allows a host to transmit data
    i. e. Token ring networks such as FDDI
A

Token passing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • One system is labeled as the primary, all other systems are labeled as secondary
  • The primary system inquires each secondary system to determine whether they have a need to transmit data
  • When a secondary system indicates a need, it is granted permission to transmit
A

Polling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authentication technique that redirects a newly connected wireless client to portal access control page

A

Captive portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Antenna that send and receive signals in all directions perpendicular to the line of the antenna itself

A

Omnidirectional antennas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name some directional antennas

A
  • Yagi
  • Cantenna
  • Panel
  • Parabolic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network service that is used to spool print jobs and to send print jobs to printers.

A

Line Print Daemon (LPD) TCP Port 515

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Protocol used to transmit email messages from a client to an email server and from one email server to another

A

SMTP TCP port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Protocol used to pull email messages from an inbox on an email server down to an email client

A

POP3 TCP port 110

17
Q
  • Protocol used to pull email messages from an inbox on an email server down to an email client
  • More secure and offers the ability to pull headers down from the email server as well as delete messages directly off the server without have to download to the local client first
A

IMAP TCP port 143

18
Q
  • Network topology
  • Connects each system as points on a circle
  • Only one system can transmit data at a time, must need to be in possession of a token to do so
  • If any segment of the loop is broken, all communication around the loop is broken
A

Ring

19
Q
  • Network topology
  • Connects each system to a trunk or backbone cable
  • All systems on the network can hear each other
A

Bus

20
Q
  • Network topology
  • Each system is connected to the central hub device i.e. switch
  • If one segment fails, the other segments can continue to function
A

Mesh

21
Q
  • Dedicated physical pathway created between the two communicating parties
A

Circuit switching

22
Q
  • Occurs when the message or communication is broken up into small segments and sent across the intermediary networks to the destination
A

Packet switching

23
Q
  • Legacy WAN protocol
  • Provided no authentication, only half-duplex, no error detection capabilities and requires manual link establishment and teardown
A

Serial Line Internet Protocol (SLIP)

24
Q
  • Attack uses an automated call to the user explaining a problem with a credit card account.
  • User is then encouraged to validate their credit info
A

Vishing

25
Q

Attack which various types of technology are used to circumvent the phone system to make free long-distance calls, alter the function of the telephone service, steal specialized services.

A

Phreaking

26
Q

Refer to traditional landline telephone connections

A

POTS and PSTN

27
Q
  • Protocol used to transfer files over the internet
  • Performs the task of forwarding and transferring data
    Transfers data when in active mode
A

FTP TCP port 20

28
Q
  • Protocol used to transfer files over the internet

- Listens to all of the commands and provides a flow control for data

A

FTP TCP port 21

29
Q

Protocol that provides connection between server and remote computer in clear text

A

Telnet TCP port 23

30
Q

What are alternate ports for HTTP?

A

HTTP TCP ports 591, 8008, and 8080

31
Q

Protocol used to synchronize network devices (i.e. PCs, routers, switches) to a time reference used to ensure accurate time

A

NTP UDP port 123

32
Q

SMB/NetBIOS ports open to allow applications and services on Windows network computers to communicate with each other talk to each other

A

Windows File Sharing ports 135, 137–139, 445

33
Q

Microsoft SQL Server database management system (MSSQL) server

A

Microsoft SQL Server TCP/ UDP port 1433

34
Q

Microsoft SQL Server database management system (MSSQL) monitor

A

Microsoft SQL Server TCP/ UDP port 1434

35
Q
  • Default Oracle database listener

- Handles network requests to be passed to a database instance.

A

Oracle TCP port 1521

36
Q

Protocol widely used in IP based video conferencing, Voice over Internet Protocol (VoIP) and Internet telephony

A

H.323 TCP/ UDP port 1720

37
Q

Protocol is an obsolete method for implementing virtual private networks.

A

PPTP TCP port 1723

38
Q

Protocol that provides a user with a graphical interface to connect to another computer over a network connection

A

RDP TCP/ UDP port 3389

39
Q

Protocol used for printing in certain network printers

A

HP JetDirect printing TCP port 9100