IS4560 T&D CHAPTER 2 Flashcards

1
Q

___ is - Address Resolution Protocol is used to map a known Internet Protocol (IP) address to an unknown physical or MAC address.

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ is Encapsulation refers to the capability of a system or protocol to rewrap or encapsulate one protocol within another.

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___ is Flow control is the process or technique of managing the flow, timing, sending, receiving, and overall transmission of data with the goal of ensuring that the traffic does not overwhelm or exceed the capacity of a connection.

A

Flow control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ is Deny-all principle is a process of securing logical or physical assets by first denying all access and then allowing access on only a case- by-case basis.

A

Deny-all principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ is DNS is a hierarchical system of servers and services specifically designed to translate IP addresses into domain names (forward lookups) as well as the reverse (reverse lookups).

A

Domain Name Service (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ is - A firewall regulates the flow of traffic between different networks. When implemented correctly, a firewall acts as a point of entry and exit to a network, sometimes called a chokepoint.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___ is A frame represents a logical structure that holds addressing, data information, and the payload or data itself.

A

Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ is - is the scientific body that establishes network standards. A standards body that defines several standards, including networking standards such as 802.3 and 802.11.

A

Institute of Electrical and Electronics Engineers (IEEE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ is - A protocol used to enable communication securely between points on a Virtual Private Network (VPN).

A

Layer 2 Tunneling Protocol (L2TP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ is - Media access control (MAC) is the address that is physically embedded or hard-coded into a network card, connection device or appropriate physical layer device that is attached to the network. In practice, all network cards or physical layer devices will have a MAC address hard-coded into the device itself. A MAC address should be unique on a network and in theory on a worldwide scale, but some hacking tools can tamper with this.

A

Media access control (MAC) address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ is - Networking equipment includes the infrastructure that connects the network and allows for the transmission of information. Devices that are included as network equipment include hubs, bridges, switches, and routers.

A

Physical/network equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ is A protocol that resolves MAC addresses to IP addresses; in essence the reverse process of ARP.

A

Reverse Address Resolution Protocol (RARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___ is The primary piece of equipment at the internetwork layer; it differs from a switch in that it directs traffic using logical address rather than physical ones, as a switch does.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___ is - Hardware- or software-based device that has the ability to observe traffic on a network and help a network administrator or an attacker construct what is happening on the network. Also defined as a device implemented via hardware or software that is used to intercept, decode, and in some cases record network traffic. Sniffers are also referred to as protocol analyzers or packet sniffers in some texts and by some individuals.

A

Sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

___ is - A method of separating a network into segments for better management and performance.

A

Subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ is A SYN attack is a type of DoS attack where a stream of packets is sent toward a target, each with a spoofed source address. The attack is carried out when the mechanics of the three-way handshake are exploited. It is when an ACK packet is not returned to a SYN-ACK request during the three-way handshake, leaving what is commonly known as a half-open connection. If a system
is flooded with enough half-open connections, it can become overwhelmed and a DoS results.

A

SYN attack

17
Q

___ is - A mechanism that is used to encrypt communication between two parties.

A

Transport Layer Security (TLS)

18
Q

___ is - UDP is a connectionless protocol that is not designed to provide robust error-recovery features, but instead trades error recovery for higher performance during sending and receiving of information

A

User Datagram Protocol (UDP)

19
Q

___ is A largely obsolete protocol that was originally designed for use in connections established by modems.

A

Serial Line Interface Protocol (SLIP)