Quick Tips 4 Flashcards
IPSec BLANK mode protects the payload and header information of a packet, while IPSec BLANK mode protects only the payload.
tunnel, transport
A BLANK lies between the perimeter router and the LAN, and a BLANK is a DMZ created by two physical firewalls.
screened-host firewall, screened subnet
BLANK is used when companies do not want systems to know internal hosts’ addresses, and it enables companies to use private, nonroutable IP addresses.
NAT
The BLANK standard outlines wireless personal area network (WPAN) technologies, and BLANK addresses wireless MAN technologies.
802.15, 802.16
Environments can be segmented into different WLANs by using different BLANK.
SSIDs
The BLANK standard works in the 2.4GHz range at 11 Mbps, and BLANK works in the 5GHz range at 54 Mbps.
802.11b, 802.11a
IPv4 uses BLANK bits for its addresses, whereas IPv6 uses BLANK bits; thus, IPv6 provides more possible addresses with which to work.
32, 128
BLANK allows large IP ranges to be divided into smaller, logical, and easier-to-maintain network segments.
Subnetting
BLANK is a signaling protocol widely used for VoIP communications sessions.
SIP (Session Initiation Protocol)
A new variant to the traditional e-mail spam has emerged on VoIP networks, commonly known as BLANK.
SPIT (Spam over Internet Telephony).
BLANK is an SMTP server that is configured in such a way that it can transmit e-mail messages from any source to any destination.
Open relay
IP fragmentation, teardrop, and overlapping fragments are BLANK.
fragment attacks
Smurf and the Ping of Death use ICMP as their attack vectors and are BLANK.
DoS attacks
BLANK is a type of phishing attack that takes place over telephone communication lines, and whaling is a phishing attack that zeros in on specific “big fish” targets.
Vishing
SNMP uses BLANK. BLANK collect and maintain device-oriented data, which are held in management information bases. BLANK poll the agents using community string values for authentication purposes.
agents and managers, Agents, Managers