Key Terms 4 Flashcards

1
Q

Used by systems and adjacent routers on IP networks to establish and maintain multicast group memberships.

A

Internet Group Management Protocol (IGMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data communication protocol sublayer of the data link layer specified in the OSI model. It provides hardware addressing and channel access control mechanisms that make it possible for several nodes to communicate within a multiple-access network that incorporates a shared medium.

A

Media access control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A networking protocol used for resolution of network layer IP addresses into link layer MAC addresses.

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network configuration service for hosts on IP networks. It provides IP addressing, DNS server, subnet mask, and other important network configuration data to each host through automation.

A

Dynamic Host Configuration Protocol (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A series of techniques applied to ensure the security of an existing DHCP infrastructure through tracking physical locations, ensuring only authorized DHCP servers are accessible, and hosts use only addresses assigned to them.

A

DHCP snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Networking protocols used by host computers to request the IP address from an administrative configuration server.

A

Reverse Address Resolution Protocol (RARP) and Bootstrap Protocol (BootP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A core protocol of the IP suite used to send status and error messages.

A

Internet Control Message Protocol (ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A DoS attack type on a computer that involves sending malformed or oversized ICMP packets to a target.

A

Ping of Death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A DDoS attack type on a computer that floods the target system with spoofed broadcast ICMP packets.

A

Smurf attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A DDoS attack type on a computer that floods the target system with a large amount of UDP echo traffic to IP broadcast addresses.

A

Fraggle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A protocol within the IP suite that is used for network device management activities through the use of a structure that uses managers, agents, and Management Information Bases.

A

Simple Network Management Protocol (SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A hierarchical distributed naming system for computers, services, or any resource connected to an IP based network. It associates various pieces of information with domain names assigned to each of the participating entities.

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The process of replicating the databases containing the DNS data across a set of DNS servers.

A

DNS zone transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A set of extensions to DNS that provide to DNS clients (resolvers) origin authentication of DNS data to reduce the threat of DNS poisoning, spoofing, and similar attack types.

A

DNSSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly