IS3220 CHAPTER 5 Flashcards
A legacy protocol developed by Apple Inc. for use in networks hosting mainly Macintosh computers. Mostly replaced by TCP/IP and is called ___?
APPLETALK
Portions of a software system that unauthenicated users can run is called ___?
ATTACK SURFACE
A form of password or encryption key cracking attack that tries all possible valid combinations from a defined set of possibilities is called ___?
This will eventually generate a valid solution given enough time, assuming the hacker uses the correct set of possibilities. This is called ___?
BRUTE FORCE ATTACK
A network design based on a single backbone cable to which all host segments connect is called ___?
Ethernet is logically this type of technology, although it can operate in numerous other phial topologies.
BUS TOPOLOGY
A form of password or encryption key-cracking attack that uses a pre-contructed list of potential passwords or encryption keys is called ___?
DICTIONARY ATTACK
A protocol and a data exchange system commonly used over TCP/IP networks, including the Internet, but which is unencrypted and performs authentication and data transfer in plaintext is called ___?
FILE TRANSFER PROTOCOL (FTP)
A network design that establishes all possible connections between hosts is called ___?
This is the most fault-tolerating topology possible, but is also the least resistant to propagation of malware.
FULL MESH TOPOLOGY
A form of password or encryption key-cracking attack that combines dictionary attacks with brute force attacks is called ___?
A dictionary list provides seed values to a brute force attack tool that makes modifications to the seed value. A very effective attack against users who mistakenly believe that changing a few characters or adding a few characters to a base password is actually improving the password’s strength.
HYBRID ATTACK
The entity responsible for global coordination of IP addressing, DNS root, and other Internet protocol resources is called ___?
INTERNET ASSIGNED NUMBERS AUTHORITY (IANA)
The accumulation of delay each time a communication signal crosses a node or host is called ___?
Some amount of delay occurs between reception on one interface and transmission out another interface.
LATENCY
A network design in which hosts are connected end-to-end, each system being connected to no more than two others is called ___?
LINE TOPOLOGY
A description of the arrangement of network devices and how they communicate with each other and is a function of network protocols that may not reflect the actual physical topology of the network is called ___?
LOGICAL TOPOLOGY
The process of simulating and testing a new concept, design, programming, technique, and so forth before deployment into a production environment is called ___? It often occurs before piloting.
MODELING
A transport layer protocol used for file and printer sharing over TCP/IP is called ___?
Originally developed in 1983 as an application-programming interface (API) for software communications, the protocol was extended to encapsulate this information in TCP and UDP packets.
NETBIOS
An application-programming interface (API) developed by IBM in 1985 to emulate NetBIOS on a token ring network and still used by Microsoft to describe a transport layer protocol for file and print sharing over Ethernet is called ___? It makes extensive use of broadcast messages and thus introduces additional traffic to a network.
NETBIOS EXTENDED USER INTERFACE (NETBEUI)
The protocol used by the USENET message service. USENET is a persistent message service that allows anyone to post and read messages from over 100,000 named categorized, topical newsgroups is called ___?
NETWORK NEWS TRANSFER PROTOCOL (NNTP)
A mesh network design that establishes many but not all possible host-to-host links is called ___?
PARTIAL MESH TOPOLOGY
The actual cable structure connecting hosts and nodes together is called ___? This may be independent of logical topology.
PHYSICAL TOPOLOGY
Using a new service, device, configuration, software, and so on to a limited number of testing hosts before rolling out the new component to the entire production environment is called ___?
This often occurs after modeling. AKA beta testing.
PILOTING
An application layer protocol used by email clients to receive messages from an email server is called ___? The default TCP/IP port is 110, and it does not encrypt communications. The companion SMTP protocol sends messages to an email server.
POST OFFICE PROTOCOL (POP)