Domain 4: Communications and Network Security Flashcards
IEEE 802.3
Ethernet Protocol
SPX
Archaic OSI Layer 4 (transport layer) protocol.
Four network Topologies
Ring - all endpoints are conneted in ring
Bus - one central trunk each pc connects to
Star - central router or hub
Mesh - every endpoint is connected to every other endpoint.
Layer 6 OSI
The Presentation Layer. The presentation layer transforms data into format structures that other systems can understand. Examples of presentation layer formats include JPEG, MPEG, ASCII, and GIF.
Layer 5 OSI
Session Layer: The Session layer of the Open Systems Interconnection (OSI) model is used primarily to track application dialogue. The Session layer (Layer 5) establishes, coordinates, and terminates communication sessions between applications. Examples of Session layer protocols are Remote Procedure Call (RPC) and Network File System (NFS).
DTE vs DCE on old Serial Equipment
Data terminal equipment (DTE) is a term for the interface a customer will connect to when using older serial-based wide-area network (WAN) connections. This is common in Frame Relay and Asynchronous Transfer Mode (ATM) connections. The circuit-terminating equipment (DCE) end connects to the provider.
Layer 2 TCP/IP
Internet layer
802.1AE
MACsec
802.1AE, also known as MACsec, is an Institute of Electrical and Electronics Engineers (IEEE) standard that provides confidentiality and integrity at the data link layer of the Open Systems Interconnection (OSI) model.
WEP
IEEE 802.11
Uses a shared key between clients and APs.
Not considered secure.
Is IP considered a connectionless protocol?
Yes
Is Web Security Gateway an actual term?
Yes - once upon a time this was a dedicated appliance for content filtering.
Most firewalls have this built in as a feature now.
Packet Switching Protocol
TCP, UDP, GRE, SPX, etc
CSMA/CD and CSMA/CA
Carrier-sense multiple access with collision detection
Carrier-sense multiple access with collision avoidance
DSSS
Direct-sequence spread spectrum
Direct-sequence spread spectrum (DSSS) is a modulation technology that increases bandwidth and adds redundancy by adding sub-bits to messages. These sub-bits are called “chips” and can be used to reconstruct data similar to how RAID-5 reconstructs data after a drive failure.
Most fundamental component of a VPN
Tunneling
The communication between the two endpoints is encapsulated and travels through another network medium. Since a VPN is impossible without encapsulation or tunneling, it is the most crucial component.