Network Protocols and System Identification Flashcards

1
Q

Network Protocols

A

A set of rules used by two or more devices on a network to describe the order of delivery and structure of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hypertext Transfer protocol (HTTPS)

A

provides secure connection between client and server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Domain Name System (DNS)

A

Converts domain names to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Transmission Control Protocol (TCP)

A

Allows a connection to be formed between 2 devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Simple Network Management Protocol (SNMP)

A

lsed for monitoring and managing devices on a network.

can reset a password on a network device or change its baseline configuration.

can also send requests to network devices for a report on how much of the network’s bandwidth is being used up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet Control Message Protocol (ICMP)

A

used by devices to tell each other about data transmission errors across the network.

used by a receiving device to send a report to the sending device about the data transmission.

commonly used as a quick way to troubleshoot network connectivity and latency by issuing the “ping” command on a Linux operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IEEE 802.11

A

standards for wireless LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WPA

A

Wireless security protocol for devices to connect to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Wired equivalent privacy (WEP)

A

s a wireless security protocol designed to provide users with the same level of privacy on wireless network connections as they have on wired network connections.

WEP was developed in 1999 and is the oldest of the wireless security standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Difference between WEP and WPA

A

WPA encryption algorithm uses larger secret keys than WEPs

WPA includes a message integrity check that includes a message authentication tag with each transmission. If a malicious actor attempts to alter the transmission in any way or resend at another time, WPA’s message integrity check will identify the attack and reject the transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vulnerabilities of WPA

A

a key reinstallation attack (or KRACK attack) to decrypt transmissions using WPA.

Attackers can insert themselves in the WPA authentication handshake process and insert a new encryption key instead of the dynamic one assigned by WPA.

If they set the new key to all zeros, it is as if the transmission is not encrypted at all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Firewall

A

A security device that monitors traffic to and from your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port filter

A

A firewall blocking or allowing certain port numbers to limit unwanted communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hardware firewall

A

Inspects each data packet before allowing it to enter the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software Firewall

A

Same as hardware, but it’s a software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cloud-based firewalls

A

self-explanatory, duh

17
Q

Stateful

A

Firewall that proactively filters out threats by keeping track of every data packet

18
Q

Stateless

A

Lets things in based on rules, but doesn’t track everything

19
Q

Next Generation Firewalls

A

In addition to being stateful, they do deep packet inspection, intrusion protection, and tap into threat intelligence platforms

20
Q

VPN

A

Changes your virtual location and public IP address so your data doesn’t get stolen. Data gets wrapped in other data packets

21
Q

Security Zone

A

A segment of a network that protects the internal network from the internet

22
Q

Network Segmentation

A

The division of a network into segments to make it safer

23
Q

Uncontrolled Zone

A

Anything a network doesn’t/can’t control

24
Q

Controlled Zone

A

A subnet that protects the internal network from the uncontrolled zone

25
Q

Demilitarized Zone

A

Public Facing Services that can access the internet

(Web Servers, Proxy Servers, File Servers)

26
Q

Restricted Zone

A

Highly confidential information only for employees.

27
Q

Proxy server

A

Forwards client requests to another server

28
Q

Forward Proxy Server

A

Regulates and restricts a user’s access to the internet

29
Q
A
30
Q

Forward Proxy Server

A

regulates and restricts a person’s access to the internet. Hide a user’s IP address and approve a person’s outgoing traffic

31
Q

Reverse proxy server

A

regulates and restricts the external servers’ access to the network

32
Q
A