Network Security Focused Improvement Flashcards
A ……..? is a device necessary for sending and receiving data. ……? allow computers to transport digital information over analog lines, such as phone or cable lines. Types of …..? include; cable …..?, DSL ……?, and satellite …..?.
(Just one word)
Modems
A ……? is a point of connection between two or more networks that forwards data packets between networks. To have internet in your home, you need an internet …..? that connects the networks on the internet to the network of your home.
You can access the internet’s network either through a wired Ethernet port of via Wi-Fi.
(One word)
Router
A ….? is used to connect devices in a specific network and allows them to communicate efficiently within the network. A ….? is a more complex version of a hub, in that ….? have the capability to add security measures and function far more intelligently, sending traffic directly from the sender to the receiver without the other devices being aware of the communication.
Switch
A ….? is similar to a router in that it connects two or more networks. The difference is that the router analyzes data packets to determine where to send the packet next, whereas a …..? simply forwards the data to the next network without analysis.
(One word)
bridge
A ….? is a device that strengthens, replicates, regenerates signals that are weakened during transmission (for example because of distance)
Repeater
A range extender is a from of ….? that takes a distroted wifi signal and transmits it to the formally Dead Zone.
Dead Zone = Area without wifi/internet
(One word)
Repeater
A …? connects the router to the network, takes the data packets from the router, and sends them to all the devices in the network. Example is a USB …?
Hub
Also, the network cable in a ….? topology is a shared communications medium, meaning that all computers attached to the network will receive any and all traffic sent on the network.
What kind of Topology?
Bus topology
Which topology is known as the Hub-and-Spoke topology?
Star topology.
The topology may be either a …..?, where every node has access to all other nodes, or a ….? network, where each node is only able to connect to a subset of the other nodes.
(Two terms)
Full mesh
Partial mesh
Unlike other topologies such as bus, ring, or star, ….? topologies are not necessarily constructed using physical network cables. The nodes may connect using Wi-Fi or radio signals or by virtual links such as virtual private networks (VPNs).
Mesh
Network Commands
Internet control message protocol ICMP, it typically related to what network command?
ping
Network Commands
….? is one of the most basic tools for testing connectivity to other hosts. It sends an internet control message protocol (ICMP) echo request to a host and listens for the reply. If a reply is received, it will display the time it took and the time to live (TTL) left.
ping
Network Commands
……? & …..? allow a user to manage accounts and devices remotely. The main difference between the two is that ….? is encrypted, and thus all data is secure from eavesdropping, while … is unencrypted.
telnet & SSH (secure shell)
SSH secure shell is encrypted
Telnet is unencrypted
……? displays TCP/IP packets and other network packets that are being transmitted over the network system. It is a form of protocol analyzer (sometimes called a sniffer)
tcpdump
Network Commands
It is commonly used to determine what is deployed on a network for vulnerability analysis, security scans, and related activities.
What command is this?
nmap
Network Commands
……..? scans networks to see what it can find in terms of hosts and open ports (including well-known ones for many applications).
nmap
…..? displays information about a user or users on a remote system, including things such as last log-in time and username. It is primarily used in Linux.
Finger
Network Commands
…..? transfers a file from either a client to a server or from a server to a client using UDP (user datagram protocol) instead of TCP, and so it is usually used on reliable (local) networks.
TFTP (trivial file transfer protocol)
Network Commands
………? are used to trace the route an IP packet takes to a destination.
Traceroute and tracert
Network Commands
It can be useful in determining where a ping fails, troubleshooting performance issues, and other aspects regarding connectivity.
Which network command is this?
Traceroute and tracert
Network Commands
……….? is similar to traceroute or tracert in that it displays the path taken by a packet from its source to its destination.…….? is useful because it can be used by any user instead of needing superuser privileges. It is primarily used in Linux.
(One word)
Tracepath
Network Commands
…..? provides the user with the IP, subnet mask, and default gateway for each network adapter by default with the /all option information, such as MAC address, DHCP status, and lease information.
Which network command is this?
Ipconfig (internet protocol configuration)
Network Commands
Similar to ipconfig, ……? is used to configure the kernel network interfaces. It is implemented at the time of booting to configure the necessary interfaces.
ifconfig
Network Commands
Once the interfaces are configured, it is used for debugging or tuning the system. It is primarily used in Linux.
ifconfig
……? displays the IP to physical (MAC) address mappings for hosts that have been discovered in the …. cache.
ARP (Address Resolution Protocol)
Network Commands
……? displays information about active ports and their state and can be useful in troubleshooting and capacity
Netstat (network statistics)
…..? displays information for displaying DNS information and troubleshooting DNS problems. It is useful in displaying names to IP address mappings.
Nslookup (name server lookup)