Final Exam Study Guide - definitions Flashcards

1
Q

SMF

A

Single-mode fiber (SMF) cables

In the context of fiber optic cables, a mode defines the method in which a wave travels through space. A SMF optic cable is constructed to transmit only one mode of light through the fiber (in a direction parallel to the fiber). Thus, these cables consist of a core with a diameter that is quite small in relation to the diameter of the cladding, since it only needs to accommodate a single mode of light. For example, one type of SMF cable is called 9/125 fiber, which means that the core is 9 μm in diameter, while the cladding is 125 μm. Light through SMF can consist of multiple frequencies, but all of these frequencies follow a single path through the fiber.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MMF

A

MMF cables are constructed with much larger diameters than their SMF counterparts. For example, one common type of MMF is 62.5/125, meaning that the cable has a diameter of 62.5 μm, compared to the 9 μm of some SMF cables.

This wider core allows multiple modes of light to propagate through the fiber, giving rise to additional losses due to phenomenon such as modal dispersion, and limiting the maximum link length to much lower distances than SMF. However, because of the wider core diameter, less precise transceivers can be used, allowing the cost of MMF systems to be generally lower than equivalent SMF systems. For example, MMF transceivers may be constructed using cheaper LEDs instead of lasers as light sources. Therefore, engineers …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CSMA/CD

A

Carrier-sense multiple access with collision detection (CSMA/CD) is a media access control (MAC) method used most notably in early Ethernet technology for local area networking.

It uses carrier-sensing to defer transmissions until no other stations are transmitting. This is used in combination with collision detection in which a transmitting station detects collisions by sensing transmissions from other stations while it is transmitting a frame. When this collision condition is detected, the station stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame.[1]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ipv4 loopback

A

The Internet Protocol (IP) specifies a loopback network with the (IPv4) address 127.0. 0.0/8. Most IP implementations support a loopback interface (lo0) to represent the loopback facility. … The most commonly used IP address on the loopback network is 127.0. 0.1 for IPv4 and ::1 for IPv6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HOP

A

The address of the next router in a path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Gateway

A

A default gateway is a device that forwards data from one network to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP

A

Transmission Control Protocol (TCP) is a standard that defines how to establish and maintain a network conversation by which applications can exchange data. TCP works with the Internet Protocol (IP), which defines how computers send packets of data to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

UDP

A

UDP (User Datagram Protocol) is a long standing protocol used together with IP for sending data when transmission speed and efficiency matter more than security and reliability. … UDP provides checksums for data integrity, and port numbers for addressing different functions at the source and destination of the datagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Connection-oriented protocol

A

Connection-oriented service involves the creation and termination of the connection for sending the data between two or more devices. In contrast, connectionless service does not require establishing any connection and termination process for transferring the data over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Connectionless protocol

A

A connectionless protocol refers to the communication between two network endpoints without a prior arrangement in which one network endpoint simply sends a message to the other. At the sending end, the device transmits the unit of data before ensuring that the receiving end’s device is ready.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HTTP

A

HyperText Transfer Protocol) The communications protocol used to connect to Web servers on the Internet or on a local network (intranet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

https

A

HTTPS stands for Hypertext Transfer Protocol Secure. It is the protocol where encrypted HTTP data is transferred over a secure connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SSH

A

SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.

Encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Telnet

A

a network protocol that allows a user on one computer to log into another computer
no encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Nslookup

A

NsLookup is a tool included in many operating systems that can look up IP addresses and perform other searches on DNS domains and servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Traceroute

A

Traceroute is a utility that records the route (the specific gateway computers at each hop) through the Internet…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

VPN

A

an arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Access port on switch

A

one vlan per port. used for pc, printer, etc…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

truck port on switch

A

more than one vlan per port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Promiscuous mode

A

Promiscuous mode is a type of computer networking operational mode in which all network data packets can be accessed and viewed by all network adapters operating in this mode. It is a network security, monitoring and administration technique that enables access to entire network data packets by any configured network adapter on a host system.

Promiscuous mode is used to monitor traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CRC

A

Cyclic redundancy check
A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Tunneling

A

Tunneling is a protocol that allows for the secure movement of data from one network to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Ipconfig

A

show ip information
Internet Protocol CONFIGuration) A Windows command line utility that is used to manage the IP address assigned to the machine it is running in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

(Linux) ip

A

ifconfig or ip a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

redundancy

A

Network redundancy is a process through which additional or alternate instances of network devices, equipment and communication mediums are installed within network infrastructure. It is a method for ensuring network availability in case of a network device or path failure and unavailability. As such, it provides a means of network failover.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

modem

A

modulate / demodulate

converts digital to analog signals to send data of a phone line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Session Initial Protocol (SIP)

A

The Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, and terminating real-time sessions that include voice, video and messaging applications.[1] SIP is used for signaling and controlling multimedia communication sessions in applications of Internet telephony for voice and video calls, in private IP telephone systems, in instant messaging over Internet Protocol (IP) networks as well as mobile phone calling over LTE (VoLTE).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Asynchronous Transfer Mode (ATM)

A

Asynchronous Transfer Mode (ATM) is a telecommunications standard defined by ANSI and ITU-T (formerly CCITT) for digital transmission of multiple types of traffic, including telephony (voice), data, and video signals in one network without the use of separate overlay networks.

What is asynchronous transfer mode?
Asynchronous transfer mode (ATM) is a switching technique used by telecommunication networks that uses asynchronous time-division multiplexing to encode data into small, fixed-sized cells. This is different from Ethernet or internet, which use variable packet sizes for data or frames.

29
Q

SONET

A

SONET stands for Synchronous Optical Network. SONET is a communication protocol, developed by Bellcore – that is used to transmit a large amount of data over relatively large distances using optical fibre. With SONET, multiple digital data streams are transferred at the same time over the optical fibre.

Key Points:

30
Q

frequency-division multiplexing (FDM)

A

In telecommunications, frequency-division multiplexing (FDM) is a technique by which the total bandwidth available in a communication medium is divided into a series of non-overlapping frequency bands, each of which is used to carry a separate signal.

31
Q

multiplexer

A

multiplexer is a device that takes multiple analog signals and forwards the selected input into a single line. These devices are used to increase the amount of data that can be transmitted over a network. … Like other types of network equipment, network multiplexers support specific network protocols like Ethernet

32
Q

Spread Spectrum

A

Spread Spectrum Technology
Spread spectrum refers to the manner in which data signals travel through a radio frequency. With spread spectrum, data does not travel straight through a single RF band; this type of transmission is known as narrowband transmission. Spread spectrum requires that data signals either alternate between carrier frequencies or constantly change their data pattern. Although the shortest distance between two points is a straight line (narrowband), spread spectrum is designed to trade off bandwidth efficiency for reliability, integrity, and security. Spread spectrum signal strategies use more bandwidth than in the case of narrowband transmission, but the trade-off is a data signal that is clearer and easier to detect. This chapter reviews three types of spread spectrum technologies: frequency hopping, direct sequence, and Orthogonal Frequency Division Multiplexing (OFDM).

33
Q

OFDM

A

orthogonal frequency-division multiplexing (OFDM) is a type of digital transmission and a method of encoding digital data on multiple carrier frequencies. … In OFDM, multiple closely spaced orthogonal subcarrier signals with overlapping spectra are transmitted to carry data in parallel.

34
Q

Ad hoc wireless network

A

A wireless ad hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected

35
Q

ess

A

In the Extended Service Set (ESS) configuration, there will be two or more Access Points (APs), and users can freely roam between the Access Points without any disconnection or reconfiguration. BSS will use only one Access Point.

36
Q

BSS

A

In “ad-hoc” or Independent Basic Service Set (IBSS) configuration there is no backbone infrastructure. An IBSS is one BSS or Basic Service Set. Mobiles can talk to each other without the use of an Access Point (AP).

37
Q

IBSS

A

In “ad-hoc” or Independent Basic Service Set (IBSS) configuration there is no backbone infrastructure. An IBSS is one BSS or Basic Service Set. Mobiles can talk to each other without the use of an Access Point (AP).

38
Q

BSSID

A

BSSIDs Identify Access Points and Their Clients
Packets bound for devices within the WLAN need to go to the correct destination. The SSID keeps the packets within the correct WLAN, even when overlapping WLANs are present. However, there are usually multiple access points within each WLAN, and there has to be a way to identify those access points and their associated clients. This identifier is called a basic service set identifier (BSSID) and is included in all wireless packets.

39
Q

Virtualization

A

create a virtual version of a server

40
Q

Hypervisor

A

software that sits between the OS and hardware that facilitates multiple virtual OSs to run on the hardware.

41
Q

TDMA

A

The Global System for Mobile Communications (GSM) initially used time-division multiple access (TDMA) to provide multiuser access by chopping up the channel into sequential time slices. Each user of the channel takes turns to transmit and receive signals and, ideally, this happens so quickly that the user is unaware of it. TDMA was replaced in later implementations by code-division multiple access (CDMA) which (instead of splitting the channel into time slices) uses different frequencies for each user to provide various means of cell phone coverage.

42
Q

TDMA Data Rate

A

ExamAlert

Data rate refers to the theoretical maximum of a wireless standard, such as the 600 Mbps for 802.11n or the 10 Gbps for 802.11ax. Throughput refers to the actual speeds achieved after all implementation and interference factors.

43
Q

MIMO

A

Multiple input, multiple output (MIMO) and multiuser multiple input, multiple output (MU-MIMO) are advanced antenna technologies that are key in wireless standards such as 802.11n, 802.11ac, 802.11ax, and LTE.

44
Q

data rate vs throughput

A

Data rate refers to the theoretical maximum of a wireless standard, such as the 600 Mbps for 802.11n or the 10 Gbps for 802.11ax. Throughput refers to the actual speeds achieved after all implementation and interference factors.

45
Q

CDMA

A

TDMA was replaced in later implementations by code-division multiple access (CDMA) which (instead of splitting the channel into time slices) uses different frequencies for each user to provide various means of cell phone coverage.

46
Q

Bluetooth modes

A

receiver, tranmitter, off

47
Q

ICS

A

Industrial control system (ICS) is a collective term used to describe different types of control systems and associated instrumentation, which include the devices, systems, networks, and controls used to operate and/or automate industrial processes.

48
Q

Security policy for organization

A

IT security policies should always include the purpose, scope, policy, and procedures, if they are not listed on a separate document. They should outline rules for user and IT personnel behavior, while also identifying consequences for not adhering to them. Policies should define the main risks within the organization and provide guidelines on how to reduce these risks. Policies should be customized based on the organization’s valuable assets and biggest risks.

49
Q

SLA

A

service level agreement
A service-level agreement (SLA) is an agreement between you or your company and a service provider, typically a technical support provider. SLAs are also usually part of network availability and other agreements. They stipulate the performance you can expect or demand by outlining the expectations a vendor has agreed to meet. They define what is possible to deliver and provide the contract to make sure what is delivered is what was promised.

50
Q

SOW

A

A statement of work (SOW) is a document routinely employed in the field of project management. It is the narrative description of a project’s work requirement.[1] It defines project-specific activities, deliverables and timelines for a vendor providing services to the client. The SOW typically also includes detailed requirements and pricing, with standard regulatory and governance terms and conditions. It is often an important accompaniment to a master service agreement or request for proposal (RFP).

51
Q

Metasploit

A

he Metasploit framework is a very powerful tool which can be used by cybercriminals as well as ethical hackers to probe systematic vulnerabilities on networks and servers. Because it’s an open-source framework, it can be easily customized and used with most operating systems.

With Metasploit, the pen testing team can use ready-made or custom code and introduce it into a network to probe for weak spots. As another flavor of threat hunting, once flaws are identified and documented, the information can be used to address systemic weaknesses and prioritize solutions.

52
Q

Aircrack-ng

A

Aircrack- ng is a complete suite of tools to assess WiFi network security.

53
Q

Armitage

A

Armitage is a fantastic Java-based GUI front-end for the Metasploit Framework developed by Raphael Mudge.

54
Q

Optimum time to design IP addressing scheme

A

Early in the design but when you understand the number of hosts, networks needed

55
Q

Nessus

A

vulnerability scanning tool

56
Q

DDos

A

distributed denial of service attack

57
Q

DOS

A

denial of service attack

58
Q

Man-in-the-Middle

A

What is man in the middle attack?
Image result for man-in-the-middle attack
A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

59
Q

Phishing

A

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. … An attack can have devastating results.

60
Q

DHCP snooping

A

DHCP Snooping is a layer 2 security technology incorporated into the operating system of a capable network switch that drops DHCP traffic determined to be unacceptable. DHCP Snooping prevents unauthorized (rogue) DHCP servers offering IP addresses to DHCP clients. The DHCP Snooping feature performs the following activities:

Validates DHCP messages from untrusted sources and filters out invalid messages.
Builds and maintains the DHCP Snooping binding database, which contains information about untrusted hosts with leased IP addresses.
Utilizes the DHCP Snooping binding database to validate subsequent requests from untrusted hosts.

61
Q

Smurf attacks

A

The Smurf attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim’s spoofed source IP are broadcast to a computer network using an IP broadcast address.

62
Q

Wireshark

A

Wireshark is the world’s foremost and widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level

63
Q

NetFlow

A

NetFlow is a protocol used to collect metadata on IP traffic flows traversing a network device. Developed by Cisco Systems, NetFlow is used to record metadata about IP traffic flows traversing a network device such as a router, switch, or host.

64
Q

Syslog

A

The syslog protocol has been in use for decades as a way to transport messages from network devices to a logging server, typically known as a syslog server. Due to its longevity and popularity, the syslog protocol has support on most major operating systems, including macOS, Linux, and Unix

65
Q

Disaster recovery

A

isaster recovery (DR) is an organization’s ability to respond to and recover from an event that negatively affects business operations. The goal of DR methods is to enable the organization to regain use of critical systems and IT infrastructure as soon as possible after a disaster occurs.

66
Q

Incidence response

A

Incident response (IR) is the steps used to prepare for, detect, contain, and recover from a data breach.

67
Q

Business continuity

A

Flood. Cyber attack. Supply chain failure or losing a key employee. Disruptions to your business can happen at any moment.

Business continuity is about having a plan to deal with difficult situations, so your organization can continue to function with as little disruption as possible.

Whether it’s a business, public sector organization, or charity, you need to know how you can keep going under any circumstances.

68
Q

Change management

A

Change management is a systematic approach to dealing with the transition or transformation of an organization’s goals, processes or technologies. The purpose of change management is to implement strategies for effecting change, controlling change and helping people to adapt to change