Important Acronyms Ch 6 Network Components Flashcards

1
Q

ARP

A

Address Resolution Protocol - ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DLL

A

Dynamic Link Library - Used in Windows for data linking between applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NAT (Firewalls)

A

Network Address Translation - Used by firewalls. Hides actual IP addresses in the network from to the rest of the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL (Firewalls)

A

Access Control List - Used in firewalls to create allow/deny traffic rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SSL / TLS

A

Secure Sockets Layer / Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TCP

A

Transmission Control Protocol - (TCP) is a transport protocol that is used on top of IP to ensure reliable transmission of packets. TCP includes mechanisms to solve many of the problems that arise from packet-based messaging, such as lost packets, out of order packets, duplicate packets, and corrupted packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

UDP

A

The User Datagram Protocol (UDP) is a lightweight data transport protocol that works on top of IP.
UDP provides a mechanism to detect corrupt data in packets, but it does not attempt to solve other problems that arise with packets, such as lost or out of order packets. That’s why UDP is sometimes known as the Unreliable Data Protocol.
UDP is simple but fast, at least in comparison to other protocols that work over IP. It’s often used for time-sensitive applications (such as real-time video streaming) where speed is more important than accuracy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MAC

A

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPSec

A

Internet Protocol Security (asymmetric) - Security for OSI Layer 3. Authentication and encryption for every packet. Very standardized and common. Different firewall brands should have no problem communicating together. Two core IPSec protocols. Authentication Header (AH) protects Integrity, Encapsulation Security Payload (ESP) protects Confidentiality. You can do both AH and ESP separate or simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AH (IPSec)

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ESP (IPSec)

A

Encapsulating Security Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SNMP

Also
SNMPv1 (In the clear)
SNMPv2 (In the clear)
SNMPv3 (Secure)

A

Simple Network Management Protocol - Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Telnet

A

Telnet, developed in 1969, is a TCP/IP protocol that provides a command line interface for communication with a remote device or server, sometimes employed for remote management but also for initial device setup like network hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSH

A

Secure Shell - Secure Shell is a program to log into another computer over a network to execute commands in a remote machine. It’s basically a secure version of Telnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IP

A

IP stands for “Internet Protocol,” which is the set of rules governing the format of data sent via the internet or local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

STP

A

Spanning Tree Protocol - Stops loops from occurring in switches.

17
Q

HSM

A

Hardware Security Module - Peripheral device used to store encryption keys.

18
Q

IKE/IKMP

A

Defined in RFC 7296, IKE is a protocol that enables two systems or devices to establish a secure communication channel over an untrusted network. The protocol uses a series of key exchanges to create a secure tunnel between a client and a server through which they can send encrypted traffic. The security of the tunnel is based on the Diffie-Hellman key exchange.

19
Q

ISAKMP

A

Internet Security Association and Key Management Protocol - One of 3 Key management protocols for IPSec.

20
Q

Oakley

A

One of 3 Key management protocols for IPSec.

21
Q

SKEMI

A

Secure Key Exchange Mechanism for Internet - One of 3 Key management protocols for IPSec.