Telecommunications and Network Security Flashcards

1
Q

The ____ _____ layer is the lowest layer at which meaning is assigned to the
bits that are transmitted over the network.

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data-link protocols address things, such as?

A

Size of each packet of data to be sent, a means of addressing each packet so that it’s delivered to the
intended recipient, and a way to ensure that two or more nodes don’t try to
transmit data on the network at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the data link layer provide for the network layer?

A

The data
link layer provides transparent network services to the network layer so the
network layer can be ignorant about the underlying physical network topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What kind of devices operate of the Data Link layer?

A

Switches, bridges,

WAPs, and NICs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The ______ ______ layer is concerned with the local delivery of frames
between devices on the same LAN.

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two sublayers of the Data link layer?

A

Logical Link Control

and Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What services does the Data link Media access control sublayer provide?

A

Multiple access protocols (CSMA/CD for Ethernet bus and hub networks or
CSMA/CA for wireless networks), MAC Addressing, LAN switching (packet
switching), Data packet queuing, Quality of Service control, and VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What layer handles the task of routing network messages from one computer to
another?

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Logical Address?

A

Logical addresses are created and used by
Network Layer protocols, such as IP or IPX. The Network Layer protocol
translates logical addresses to MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the five steps of Data Encapsulation?

A

1) The application,
presentation, and session layer take user input and convert it into data
2)The transport layer adds a segment header converting the data into segments
3) The network layer adds a network header and converts the segments into
packets/datagrams
4) The data link layer adds a frame header converting the
packets/datagrams into frames 5) The MAC sublayer converts the frames into
bits, which the physical layer can put on the wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are two important functions of the Network layer?

A

Logical addressing

and routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of threats are there to layer 1?

A

Theft, Unauthorized access, Vandalism, Sniffing, Interference, Data Emanation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some ways to strengthen security at the Data Link Layer (Layer 2)?

A

Disable unused ports in order to prevent fraudulent connections which could
lead to eavesdropping, flooding attacks, or ARP spoofing. Using secure
protocols for communication (using WPA2 or WPA over WEP) and correctly
configuring VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the four general classes of Malware?

A

Virus, Worm, Trojan Horse,

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What framework handles multiple connections at the same time, provides
secure authentication and encryption, and works at the network layer and
provides security on top of IP?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does IPSec help protect against?

A

Network-based attacks from untrusted
computers, attacks that can result in the DOS of applications, services, or
the network, Data corruption, Data theft, User credential theft,
Administrative control of servers, other computers, and the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What service usually runs on port 25?

A

Simple Mail Transfer Protocol (SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What service usually runs on port 21?

A

File Transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What service usually runs on port 23?

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What service usually runs on port 53?

A

Domain Name Service (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the range of the Well Known Ports?

A

0 through 1023

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Ports from 1024 through 49151 are called?

A

Registered Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Ports from 49152 through 65535 are called?

A

Dynamic and/or Private Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is an example of a fast packet-switching network that can be used for
either data, voice or video, but packets are of a fixed size?

A
Asynchronous
Transfer Mode (ATM)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What was developed to support TCP/IP networking over low-speed serial
interfaces?

A

Serial Line IP (SLIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is Wireless Transport Layer Security?

A

A communication protocol
that allows wireless devices to send and receive encrypted information over
the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the Internet?

A

The Internet is a global network of public networks

and Internet Service Providers throughout the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

________ switching is a network switching technique in which data is routed
in its entirety from the source node to the destination node, one hop at a
time.

A

Message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is it called when messages are divided into packets before they are
sent and each packet can be transmitted individually and can follow
different routes to its destination?

A

Packet switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is circuit switching?

A

Circuit switching is a methodology of
implementing a telecom network in which two network nodes establish a
dedicated comm channel (circuit) through the network before they communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A _______ _______ protocol allows higher level protocols to avoid dealing
with the division of data into segments, packets, or frames

A

Virtual

Circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

IPSec provides confidentiality and integrity to information transferred over
IP networks through ________ layer encryption and authentication.

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a communication channel that is divided into an arbitrary number of
variable bit-rate digital channels or data streams?

A

Statistical

multiplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Information from each data channel is allocated bandwidth based on
pre-assigned time slots, regardless of whether there is data to transmit?

A

Time-division multiplexing (TDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

ATM uses ______ _______ ______ _______, and encodes data into small
fixed-sized packets called cells.

A

Asynchronous time-division

multiplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is a technique by which the total bandwidth available in a comm medium
is divided into a series of non-overlapping frequency sub-bands, each of
which is used to carry a separate signal?

A

Frequency Division

Multiplexing (FDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What was designed to support multiple network types over the same serial
link?

A

Point-to-Point Protocol (PPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What was designed to support multiple network types over the same LAN?

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

This is used when a dest IP address is not located on the current LAN
segment. It consist of a list of station and network addresses and a
corresponding gateway IP address.

A

IP Routing Table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Most modern Wide Area Network (WAN) protocols, including TCP/IP, X.25, and
Frame Relay, are based on what?

A

Packet switching technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is circuit switching best used for?

A

Real time data such as live

audio and video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is port knocking?

A

Port knocking is where the client will attempt to
connect to a predefined set of ports to identify him as an authorized
client. The port knocking sequence is used to identify the client as a
legitimate user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What’s a security benefit of using a full-duplex switch?

A

That is
ensures that most traffic is segregated between computer and switch and not
broadcast to all hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which OSI model layer manages communications in simplex, half-duplex, and
full-duplex modes?

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

______ ________ firewalls are able to grant a broader range of access for
authorized users and activities and actively watch for unauthorized users
and activities.

A

Stateful Inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is a TCP wrapper?

A

A TCP wrapper is an application that can serve as a basic firewall by
restricting access based on user IDs or system IDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What can be described as a logical circuit that always exists and is waiting
for the customer to send data?

A

Permanent Virtual Circuit (PVC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is an amendment to the 802.11 standard that defines a new
authentication and encryption technique that is similar to IPSec and no
real-world attack has compromised this wireless network?

A

802.11i(WPA-2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

802.1q defines what?

A

VLAN tagging, it is used by switches and bridges to manage traffic within
and between VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is a form of wireless authentication protection that requires all
wireless clients to pass a gauntlet of RADIUS or TACACS services before
network access is granted?

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is 1000Base-T commonly called? 100Base-TX?

A

Giga-bit Ethernet, Fast Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

10Base2 is also called? 10Base5? 10Base-T?

A

Thinnet, Thicknet, Twisted-pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A peer-to-peer wireless network connection between two(or more) individual
systems without the need for a wireless base station?

A

Ad-hoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A subprotocol of the TCP/IP protocol suite that operates at the Data Link
Layer, normally used to discover the MAC address of systems by polling using
its IP address?

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Suite of protocols developed by Apple for networking of Macintosh Systems?

A

AppleTalk(No longer in use by Apple since 2009)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is a type of firewall that filters traffic based on the internet
service used to transmit or receive the data(Also known as second gen
firewalls)?

A

Application-level gateway firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What kind of WAN tech is this? Uses cell-switching rather than
packet-switching and uses virtual circuits but guarantee’s throughput due to
the fixed size frames or cells, is also excellent for voice and
videoconferencing.

A

Asynchronous transfer mode(ATM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Attenuation is what?

A

The loss of signal strength and integrity on a cable because of the length
of the cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is the IP address range used by Automatic Private IP addressing
(APIPA)?

A

169.254.0.0 - 169.254.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is a feature/benefit provided by service providers that allows clients
to consume more bandwidth when needed and if the carrier network has the
capacity(such consumption is often charged at a higher rate)?

A

Bandwidth on demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is baseband?

A

A communication medium that supports only a single communication signal at a
time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is Base Rate Interface (BRI)?

A

An ISDN service type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What is a beacon frame?

A

A type of wireless network packet that broadcasts the presence of the
wireless network by announcing the network’s SSID or network name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is a device used to simulate 2600 Hz tones to interact directly with
telephone network trunk systems aka backbones?

A

Blue box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is an attack that grants hackers remote control over the features and
functions of a Bluetooth device?

A

Bluebugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Hijacking a Bluetooth connection to eavesdrop or extract information from
devices

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What is an attack that allows hackers to connect with your Bluetooth devices
without your knowledge and extract information from them?

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What is a wireless standard commonly used to pair accessories to mobile
phones or computers?

A

Bluetooth (802.15)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is a bridge?

A

A network device used to connect networks with different speeds, cable
types, or topologies that still use the same protocol(This is considered a
layer 2 device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

A form of wireless access point deployment that is used to link two wired
networks together over a wireless bridged connection?

A

Bridge mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is broadband?

A

A communication medium that supports multiple communication signals
simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What is a communications transmission to multiple but unidentified
recipients?

A

Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What is a Broadcast address?

A

The address that all devices within a given network grouping or container
receive data on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

A group of networked systems in which all other members receive a broadcast
signal when one of the members of the group transmits it?

A

Broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

A communication system based on or dependent on broadcasts rather than
unicast signaling?

A

Broadcast technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is a brouter?

A

A network device that first attempts to route and then defaults to bridging
if routing fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What is a network that spans a college, university, or multi building office
complex?

A

Campus area network (CAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What is a captive portal?

A

An authentication technique that redirects a newly connected wireless web
client to a portal access control page, the page may require the user to
input payment information, provide logon creds, or input an access code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What is the designed replacement for WEP and TKIP/WPA(Implements AES with a 128 bit key as a stream cipher)?

A

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
(CCMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What is an authentication protocol used over PPP links and it encrypts
usernames and passwords?

A

Challenge Handshake Authentication Protocol (CHAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What is a channel service unit/data service unit (CSU/DSU)?

A

A border connection device that converts LAN signals into the format used by
the WAN carrier network, and vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What is a firewall used to manage communications sessions between trusted
partners and operates at the Session layer?

A

Circuit-level gateway firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What is fairly EMI resistant, low cost, easy to install cable?

A

Coaxial Cable or coax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

What is a minimum guaranteed bandwidth allocation for a virtual circuit?

A

Committed information rate (CIR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

What is common mode noise?

A

EMI noise generated by the difference in power between the hot and ground
wires of a power source or operating electrical equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What is a content-distribution network(CDN) or content delivery network?

A

A collection of resource services deployed in numerous data centers across
the Internet in order to provide low latency, high performance, high
availability of the hosted content. CDNs provide the desired multimedia
performance quality demanded by customers through the concept of distributed
data hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What are converged protocols?

A

The merging of specialty or proprietary protocols with standard protocols,
such as those from the TCP/IP suite. Some common examples of converged
protocols include FCoE, MPLS, iSCSI, and VoIP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

What is the deployment of FDDI using twisted-pair(copper) wires(susceptible
to interference)?

A

Copper Distributed Data Interface (CDDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Similar to a hash total, a value that indicates whether a message has been
altered or damaged in transit?

A

Cyclic Redundancy Check (CRC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What is a Data Circuit-Terminating equipment (DCE)?

A

A networking device that performs the actual transmission of data over the
Frame Relay as well as establishing and maintaining the virtual circuit for
the customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

What is the combination of Transport Layer UDP header and payload?

A

Datagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What is a data stream?

A

Data from an application sent into a protocol stack. The data stream
becomes the initial payload of the top layer protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

What is a networking device that acts like a router or a switch and provides
the customers network access to the frame relay network?

A

Data terminal equipment (DTE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

What is a dead zone?

A

A network segment using an alternative Network layer protocol instead of IP,
such as IPX or AppleTalk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

What is deencapsulation?

A

The process of stripping a layer’s header and footer from a PDU as it
travels up the OSI model layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What is a wireless tech that employs all of the available frequencies
simultaneously in parallel?

A

Direct Sequence Spread Spectrum (DSSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What is distance vector routing protocol?

A

A routing protocol that maintains a list of destination networks along with
metrics of direction and distance as measured in hops(in other words, the
number of routers to cross to reach the destination)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

What is a client/server model of networking where client may be local or
connected over WAN links, including VPNs and the Internet?

A

Distributed architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

What is Dynamic Host Configuration Protocol(DHCP)?

A

A protocol used to assign TCP/IP configuration settings to systems upon
bootup. DHCP uses UDP port 67 for server point-to-point response and port
68 for client request broadcast. DHCP supports centralized control and
management of network addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

What is a dynamic packet-filtering firewall?

A

A firewall that enables real-time modification of the filtering rules based
on traffic content. Dynamic packet-filtering firewalls are known as fourth
generation firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

What is a type of electrical noise that can do more than just cause problems
with how equipment functions; it can also interfere with the quality of
communications, transmissions, and playback?

A

Electromagnetic Interference (EMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

What is Encapsulating Security Payload (ESP)?

A

An element of IPSec that provides encryption to protect the confidentiality
of transmitted data but can also perform limited authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

What is encapsulation?

A

The process of adding a header and footer to a PDU as it travels down the
OSI model layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

What is the use of multiple wireless access points to support a single
wireless network over a larger geographic area than could be supported by a
single wireless access point?

A

Enterprise extended mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

What is Ethernet?

A

A common shared media LAN tech

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

What is a extranet?

A

A cross between the internet and an intranet. An extranet is a section of
an organization’s network that has been sectioned off so that it acts as an
intranet for the private network but also serves information to a limited
number of specific outsiders. Often access into an extranet from the
internet requires a VPN connection. Extranets are often used in B2B
applications, between customers and suppliers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

What is Fibre Channel over Ethernet (FCoE)?

A

A converged protocol used to encapsulate Fibre Channel communications over
Ethernet networks. It typically requires 10 Gbps Either in order to
support the Fibre Channel protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

What is a high speed token passing tech that employs two rings with traffic
flowing in opposite directions, offers transmission rates of 100 Mbps, and
is often used as a backbone to large enterprise networks?

A

Fiber Distributed Data Interface (FDDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

What is fiber optic cabling?

A

A cabling form that transmits light instead of electrical signals. Fiber
optic cable supports throughputs up to 2 Gbps and lengths of up to 2 km

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

What is a set of rules or restrictions commonly found on security devices,
such as firewalls and proxies(also known as rules and ACLs)?

A

Filter(s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

What is a firewall?

A

A network device used to filter traffic. A firewall is typically deployed
between a private network and a link to the internet, but it can be deployed
between departments within an organization. Firewalls filter traffic based
on a defined set of rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

What is a footer?

A

Information added by a protocol to the end of a payload received from a
higher layer protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

What is a fragment?

A

When a network receives a packet larger than its maximum allowable packet
size, it breaks it up into two or more fragments. These fragments are each
assigned a size(corresponding to the length fo the fragment) and an offset
(corresponding to the starting location of the fragment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

What is the combination of data Link layer header, payload, and footer?

A

Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

What is a frame relay?

A

A shared connection medium that uses packet-switching tech to establish
virtual circuits for customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

What is a measurement of the number of wave oscillations within a specific
time identified using the unit hertz (Hz), or oscillations per second?

A

Frequency

117
Q

What is Frequency Hopping Spread Spectrum (FHSS)?

A

An early implementation of the spread spectrum concept. This wireless
access tech transmits data in a series while constantly changing the
frequency in use.

118
Q

What is a gateway?

A

A networking device that connect networks that are using different network
protocols

119
Q

What is it when mobile devices with GPS support enable the embedding of
geographical location in the form of latitude and longitude as well as
date/time information on photos taken with these devices?

A

Geo-tagging

120
Q

What is a handshake?

A

A three way process utilized by the TCP/IP protocol stack to set up
connections between two hosts

121
Q

What is a header?

A

Information added by a protocol to the front of a payload received from a
higher layer protocol

122
Q

What is High Level Data Link Control (HDLC)?

A

A layer 2 protocol used to transmit data over synchronous communication
lines. HDLC is an ISO standard based on IBM’s SDLC. HDLC supports full
duplex communications, support both point to point and multipoint
connections, offers flow control, and includes error detection and
correction.

123
Q

What is a layer 1 protocol used to connect routers and multiplexers to ATM
or Frame Relay connection devices?

A

High Speed Serial Interface (HSSI)

124
Q

What is a network device used to connect multiple systems together in a star
topology and that repeats inbound traffic over all outbound ports?

A

Hub

125
Q

What is the Hypertext Transfer Protocol?

A

The protocol used to transmit web page elements from a web server to web
browsers(over the well known service TCP/UDP port address 80)

126
Q

What is Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)?

A

A standard that uses port 443 to negotiate encrypted communications sessions
between web servers and browser clients

127
Q

What is a wireless network configuration that uses a wireless base station
to connect all wireless devices to the network and potentially to each
other?

A

Infrastructure mode

128
Q

What is a Integrated Services Digital Network (ISDN)?

A

A digital end to end communications mechanism. ISDN was developed by
telephone companies to support high speed digital communications over the
same equipment and infrastructure that is used to carry voice communications

129
Q

What is a protocol used to transfer email messages from an email server to
an email client(Works at the application layer)?

A

Internet Message Access Protocol (IMAP)

130
Q

What is the collection of devices that can communicate over the internet
with each other or with a control console in order to affect and monitor the
real world

A

Internet of Things

131
Q

What is a Internet Key Exchange (IKE)?

A

A protocol that provides for the secure exchange of cryptographic keys
between IPSec participants

132
Q

What is Internet Security Association and Key Management Protocol (ISAKMP)?

A

A protocol that provides background security support services for IPSec.

133
Q

What is Internet Small Computer System Interface (iSCSI)?

A

A networking storage standard based on IP. This tech can be used to enable
location independent file storage, transmission, and retrieval over LAN,
WAN, or public internet connections. iSCSI is often viewed as a low cost
alternative to fibre channel

134
Q

With IPX/SPX which one worked at the network layer?

A

IPX

135
Q

What is an intranet?

A

A private network that is designed to host the same information services
found on the internet.

136
Q

What is a IP header protocol field value?

A

An element in an IP packet header that identifies the protocol used in the
IP packet payload (usually this will be 6 for TCP, 17 for UDP, or 1 for
ICMP, or any of a number of other valid routing protocol numbers).

137
Q

What is a IP Payload Compression (IPComp) protocol?

A

A protocol that allows IPSec users to achieve enhanced performance by
compression packets prior to the encryption operation

138
Q

What is a standards based mechanism for providing encryption for point to
point TCP/IP traffic?

A

IP security (IPSec)

139
Q

What is a Kernel Proxy Firewall?

A

A firewall that is integrated into an operating system’s core to provide
multiple levels of session and packet evaluation. Kernel proxy firewalls
are known as fifth generation firewalls.

140
Q

What kind of Fiber optics is used for short distances?

A

Multi-mode

141
Q

What kind of Fiber optics is used for long distances?

A

Single mode

142
Q

What are some Media Access Technologies?

A

Token Passing, CSMA/CD, CSMA/CA

143
Q

What is a security impact of collision domains?

A

Sniffing and DoS

144
Q

What is the most common form of LAN networking?

A

Ethernet

145
Q

What are some characteristics of Ethernet?

A

Shares media, Broadcast and collision domains, CSMA/CD, supports full duplex with a switch, defined by IEEE 802.3

146
Q

What are some characteristics of switches?

A

Can be called a ‘multi-port bridge’, usually have 24 or more ports, computers can send data AND receive data at the same time(full duplex), each port is it’s own collision domain, switches do not alter broadcast domains

147
Q

What does Layer 4 provide?

A

Transport Layer provides end-to-end data transport services and establishes a logical connection between 2 computers systems

148
Q

What are the protocols used at Layer 4?

A

SSL/TLS, TCP, UDP, SPX

149
Q

What are the advantages and disadvantages of TCP?

A

Advantages: Easier to program with, truly implements a session, adds security
Disadvantages: More overhead/slower, SYN floods

150
Q

What is this protocol?

A

Connectionless, Unreliable, No handshaking, useful for when real time transfer is essential

151
Q

What is the session layer responsible for?

A

Establishing a connection between two applications(either on the same computer or two different computers)

152
Q

What are some characteristics of layer 6?

A

The presentation layer does NOT have any protocol, and is concerned with encryption, compression, and formatting.

153
Q

This layer defines a protocol(way of sending data) that two different programs or applications understand?

A

Layer 7, Application

154
Q

What are some examples of protocols that work at the Application layer?

A

Protocol: HTTP, HTTPS, FTP, TFTP, SMTP, SNMP, SSH, IMAP, POP3, EDI, S-RPC, SET, NNTP, LPD
Application proxies,
Non-repudiation, certificates, integration with directory services, time awareness

155
Q

In the TCP/IP model what does the Application layer map to in the OSI model?

A

Application, Presentation, Session

156
Q

In the TCP/IP model what does the Host to host or transport layer map to in the OSI model?

A

Transport

157
Q

In the TCP/IP model what does the Internetwork layer map to in the OSI model?

A

Network

158
Q

In the TCP/IP model what does the Network Access/Interface layer map to in the OSI model?

A

Data link and Physical

159
Q

What are some examples of protocols that work at the Session layer?

A

NFS, SQL, RPC

160
Q

What are some examples of protocols that work at the Network layer?

A

ICMP, RIP, OSPF, BGP, IGMP, IP, IPsec, IPX, NAT, SKIP

161
Q

What are some examples of protocols that work at the Data link layer?

A

SLIP, PPP, ARP, RARP, L2F, L2TP, PPTP, FDDI, ISDN

162
Q

What are some examples of protocols that work at the Physical layer?

A

EIA/TIA-232, EIA/TIA-449, X.21, HSSI, SONET, V.24, V.35

163
Q

What is a LAN extender?

A

A remote access, multilayer switch used to connect distant networks over
WAN links. This is a strange beast of a device in that it creates WANs, but marketers of
this device steer clear of the term WAN and use only the terms LAN and extended LAN.
The idea behind this device was to make the terminology easier to understand and thus
make the device easier to sell than a more conventional WAN device grounded in complex
concepts and terms.

164
Q

Layer 2 Forwarding (L2F)

A

A protocol developed by Cisco as a mutual authentication

tunneling mechanism. L2F does not offer encryption.

165
Q

Layer 2 Tunneling Protocol (L2TP)

A

A point‐to‐point tunnel protocol developed by
combining elements from PPTP and L2F. L2TP lacks a built‐in encryption scheme but
typically relies on IPSec as its security mechanism.

166
Q

An encryption technique that protects entire communications circuits
by creating a secure tunnel between two points. This is done by using either a hardware or
software solution that encrypts all traffic entering one end of the tunnel and decrypts all
traffic exiting the other end of the tunnel.

A

link encryption

167
Q

link state routing protocol

A

A routing protocol that maintains a topography map of all

connected networks and uses this map to determine the shortest path to the destination.

168
Q

A network that is geographically limited, such as within a

single office, building, or city block.

A

local area network (LAN)

169
Q

The logical operation of a network. It defines the arrangement and
organization of devices as well as the means used to communicate to and with each other.
Also known as signal topology.

A

logical topology

170
Q

loopback address

A

The IP address used to create a software interface that connects to
itself via TCP/IP. The loopback address is handled by software alone. It permits testing of
the TCP/IP protocol stack even if network interfaces or their device drivers are missing or
damaged.

171
Q

A 6‐byte address written in hexadecimal. The
first 3 bytes of the address indicate the vendor or manufacturer of the physical network
interface. The last 3 bytes make up a unique number assigned to that interface by the
manufacturer. No two devices on the same network can have the same of this?

A

Media Access Control (MAC) address

172
Q

modem

A

A traditional land‐line modem (modulator‐demodulator) is a communications
device that covers or modulates between an analog carrier signal and digital information in order to support computer communications of PSTN (public switched telephone network)
lines.

173
Q

A protocol suite or collection that operates across multiple layers of
the OSI model, typically using encapsulation. A common example is TCP/IP.

A

multilayer protocols

174
Q

A high‐throughput, high‐performance network
technology that directs data across a network based on short path labels rather than longer
network addresses.

A

multiprotocol label switching (MPLS)

175
Q

NetBEUI

A
NetBEUI (NetBIOS Extended User Interface, aka NetBIOS Frame protocol
or NBF) is most widely known as a Microsoft protocol developed in 1985 to support file and printer sharing. Microsoft has enabled support of NetBEUI on modern networks by
devising NBT (NetBIOS over TCP/IP). This in turn supports the Windows sharing protocol
of SMB (Server Message Block), which is also known as CIFS (Common Internet File
System). NetBEUI is no longer supported as a lower‐layer protocol; only its SMB and CIFS
variants are still in use.
176
Q

A mechanism for converting the internal private
IP addresses found in packet headers into public IP addresses for transmission over the
Internet.

A

Network Address Translation (NAT)

177
Q

network topology (aka physical topology)

A

The physical layout and organization of

computers and networking devices.

178
Q

non‐IP protocols

A

Non‐IP protocols are protocols that serve as an alternative to IP at the
OSI Network layer (3). In the past, non‐IP protocols were widely used. However, with the
dominance and success of TCP/IP, non‐IP protocols have become the purview of special purpose
networks. The three most recognized non‐IP protocols are IPX, AppleTalk, and
NetBEUI.

179
Q

OAuth

A

An open SSO standard designed to work with HTTP and it allows users to log on
with one account across multiple sites/locations.

180
Q

An open SSO standard maintained by the OpenID Foundation that can be used
in conjunction with OAuth or on its own.

A

OpenID

181
Q

open relay agent

A

An SMTP server that is configured to accept email messages from any
source and will forward them on to their destination. Open relay agents are commonly
hijacked by spammers.

182
Q

open system authentication (OSA)

A

A connection scheme for wireless networks where
no real authentication is required; as long as a radio signal can be transmitted between the
client and WAP, communications are allowed.

183
Q

A standard model developed to establish a

common communication structure or standard for all computer systems.

A

Open Systems Interconnection (OSI) model

184
Q

Orthogonal Frequency‐Division Multiplexing (OFDM)

A

A wireless technology that
employs a digital multicarrier modulation scheme that allows for a more tightly compacted
transmission.

185
Q

A portion of a message that contains data and the destination address; also called
a datagram. Typically located at the Network layer.

A

packet

186
Q

Password Authentication Protocol (PAP)

A

A standardized authentication protocol
for PPP. PAP transmits usernames and passwords in the clear. PAP offers no form of
encryption; it simply provides a means to transport the logon credentials from the client to
the authentication server.

187
Q

Networking and distributed application solutions that share tasks and
workloads among peers.

A

peer to peer (P2P)

188
Q

peer‐to‐peer network

A

A network structure between individual devices without the need
or use of a primary controlling entity or device.

189
Q

A predefined virtual circuit that is always available for a

Frame Relay customer.

A

permanent virtual circuit (PVC)

190
Q

A full‐duplex protocol used for the transmission of TCP/
IP packets over various non‐LAN connections, such as modems, ISDN, VPNs, Frame
Relay, and so on.

A

Point‐to‐Point Protocol (PPP) PPP is widely supported and is the transport protocol of choice for dial‐up
Internet connections.

191
Q

Point‐to‐Point Tunneling Protocol (PPTP)

A

An enhancement of PPP that creates encrypted
tunnels between communication endpoints. PPTP is used on VPNs but is often replaced by
L2TP.

192
Q

A connection address within a protocol.

A

port

193
Q

Port Address Translation (PAT)

A

A mechanism for converting the internal private
IP addresses found in packet headers into public IP addresses and port numbers for
transmission over the Internet. PAT supports a many‐to‐one mapping of internal to external
IP addresses by using ports.

194
Q

port isolation or private ports

A

Private VLANs that are configured to use a dedicated
or reserved uplink port. The members of a private VLAN or a port isolated VLAN can
interact only with each other and over the predetermined exit port or uplink port. A
common implementation of port isolation occurs in hotels.

195
Q

Post Office Protocol (POP)

A

A protocol used to transfer email messages from an email

server to an email client.

196
Q

An ISDN service type that provides up to 23 B channels and
one D channel. Thus, a full PRI ISDN connection offers 1.544 Mbps throughput, the same
as a T1 line.

A

Primary Rate Interface (PRI)

197
Q

A sophisticated telephone system often used by
organizations to provide inbound call support, extension‐to‐extension calling, conference
calling, and voicemail. This can be implemented as a stand‐alone phone system network or
integrated with the IT infrastructure.

A

private branch exchange (PBX)

198
Q

protocol

A

A set of rules and restrictions that define how data is transmitted over a network
medium (for example, twisted‐pair cable, wireless transmission, and so on). Protocols make
computer‐to‐computer communications possible.

199
Q

A device or software that can translate between protocols. Typically
able to move payloads between IP and IPX. Also known as a gateway.

A

protocol translator

200
Q

proxy

A

A mechanism that copies packets from one network into another. The copy process
also changes the source and destination address to protect the identity of the internal or
private network.

201
Q

A type of noise that is generated by a wide number of
common electrical appliances, including fluorescent lights, electrical cables, electric space
heaters, computers, elevators, motors, electric magnets, and so on. RFI can affect many of
the same systems EMI affects.

A

radio frequency interference (RFI)

202
Q

Devices used to simulate tones of coins being deposited into a pay phone.

A

red boxes

203
Q

A service used to centralize the

authentication of remote dial‐up connections.

A

Remote Authentication Dial‐In User Service (RADIUS)

204
Q

A sub protocol of the TCP/IP protocol
suite that operates at the Data Link layer (layer 2). Used to discover the IP address
of a system by polling using its MAC address.

A

Reverse Address Resolution Protocol (RARP)

205
Q

RFC 1918

A

The public standard that defines public and private IP addresses.

206
Q

A network device used to control traffic flow on networks. These are often used
to connect similar networks together and control traffic flow between them. They can
function using statically defined routing tables or employ a dynamic routing system.

A

router

207
Q

screen scraper or screen scraping

A

1) Remote control, remote access, or remote desktop–
like services. 2) A technology that can allow an automated tool to interact with a human
interface in order to parse the results to extract just the relevant information.

208
Q

secure communication protocol

A

A protocol that uses encryption to provide security for

the data transmitted by it.

209
Q

Secure Electronic Transaction (SET)

A

A security protocol for the transmission of
transactions over the Internet. SET is based on RSA encryption and DES. SET had the
support of major credit card companies, such as Visa and MasterCard. However, it has
mostly been abandoned in light of newer and more secure alternatives.

210
Q

The second major protocol used to provide security on the World
Wide Web.

A

Secure HTTP (S‐HTTP)

211
Q

A protocol used to secure the

transmission of email and attachments.

A

Secure Multipurpose Internet Mail Extensions (S/MIME)

212
Q

Secure Remote Procedure Call (S‐RPC)

A

An authentication service. S‐RPC is simply a

means to prevent unauthorized execution of code on remote systems.

213
Q

Secure Shell (SSH)

A

An end‐to‐end encryption technique. This suite of programs provides
encrypted alternatives to common Internet applications such as FTP, Telnet, and rlogin.
There are two versions of SSH. SSH1 supports the DES, 3DES, IDEA, and Blowfish
algorithms. SSH2 drops support for DES and IDEA but adds support for several other
algorithms.

214
Q

Secure Sockets Layer (SSL)

A

An encryption protocol developed by Netscape to protect

the communications between a web server and a web browser.

215
Q

Security Assertion Markup Language (SAML)

A

An XML‐based convention for
communication authentication and authorization details between security domains, often
over web protocols. SAML is often used to provide a web‐based SSO solution.

216
Q

In an IPSec session, the representation of the communication
session and process of recording any configuration and status information about the
connection.

A

security association (SA)

217
Q

security boundary

A

The line of intersection between any two areas, subnets, or

environments that have different security requirements or needs.

218
Q

The combination of Transport layer TCP header and payload.

A

segment

219
Q

segmentation

A

The act of subdividing a network into numerous smaller units. These
smaller units, groupings, segments, or subnetworks (i.e., subnets) can be used to improve
various aspects of the network. Segmentation can boost performance, reduce congestion,
compartmentalize communication problems (such as broadcast storms), and provide
security improvements through traffic isolation. Segments can be created by using switchbased
VLANs, routers, or firewalls (as well as combinations of all of these).

220
Q

The Transport layer protocol of the IPX/SPX

protocol suite from Novell.

A

Sequenced Packet Exchange (SPX)

221
Q

Serial Line Internet Protocol (SLIP)

A

An older technology developed to support TCP/IP

communications over asynchronous serial connections, such as serial cables or modem dialup.

222
Q

Service Provisioning Markup Language (SPML)

A

A markup language used with federated
identity management systems to exchange user information for federated identity single
sign‐on purposes. It is derived from the Standard Generalized Markup Language (SGML),
the Extensible Markup Language (XML), and the Generalized Markup Language (GML).

223
Q

A ticket‐based authentication mechanism similar to Kerberos.

A

SESAME

224
Q

A connection scheme for wireless networks that
requires that some form of authentication must take place before network communications
can occur.

A

shared key authentication (SKA) The 802.11 standard defines one optional technique for SKA known as
WEP.

225
Q

shielded twisted‐pair (STP)

A

A twisted‐pair wire that includes a metal foil wrapper inside
the outer sheath to provide additional protection from EMI.

226
Q

Simple Key Management for IP (SKIP)

A

An encryption tool used to protect sessionless

datagram protocols.

227
Q

Simple Mail Transfer Protocol (SMTP)

A

The primary protocol used to move email

messages from clients to servers and from server to server.

228
Q

single sign‐on (SSO)

A

A mechanism that allows subjects to authenticate themselves only
once to a system. With SSO, once subjects are authenticated, they can freely roam the
network and access resources and services without being rechallenged for authentication.

229
Q

The ability of TCP to dynamically alter its transmission window size
based on link reliability.

A

sliding windows

230
Q

socket

A

Another name for a port.

231
Q

software‐defined networks (SDN)

A

A unique approach to network operation,
design, and management. The concept is based on the theory that the complexities of a
traditional network with on‐device configuration (i.e., routers and switches) often force
an organization to stick with a single device vendor, such as Cisco, and limit the flexibility
of the network to changing physical and business conditions. SDN aims at separating the
infrastructure layer (i.e., hardware and hardware‐based settings) from the control layer (i.e.,
network services of data transmission management).

232
Q

software IP encryption (swiPe)

A

A layer 3 security protocol for IP. It provides

authentication, integrity, and confidentiality using an encapsulation protocol.

233
Q

spread spectrum

A

A means or method of communication that occurs over multiple

frequencies at the same time.

234
Q

A wireless network that uses a wireless access point to connect
wireless clients together, but does not offer any access to a wired network.

A

stand‐alone mode

235
Q

stateful inspection firewall

A

A firewall that evaluates the state or the context of network
traffic. By examining source and destination address, application usage, source of origin,
and relationship between current packets with the previous packets of the same session,
stateful inspection firewalls are able to grant a broader range of access for authorized users
and activities and actively watch for and block unauthorized users and activities. Stateful
inspection firewalls are known as third‐generation firewalls.

236
Q

stateful NAT

A

The ability or means by which NAT maintains information about
the communication sessions between clients and external systems. NAT operates by
maintaining a mapping between requests made by internal clients, a client’s internal IP
address, and the IP address of the Internet service contacted.

237
Q

static packet‐filtering firewall

A

A firewall that filters traffic by examining data from
a message header. Usually the rules are concerned with source, destination, and port
addresses. Static packet‐filtering firewalls as known as first‐generation firewalls.

238
Q

The name of a wireless network that each wireless client

must know in order to communicate with the host access point.

A

station set identifier (SSID)

239
Q

A networking device that uses a memory buffer to store

packets until they can be forwarded onto a slower network segment.

A

store‐and‐forward device

240
Q

streaming audio

A

An audio transmission that is being presented to the end user as it is
received based on an ongoing transmission from the provider/server. Streaming media is
commonly served over the Internet either in real time (i.e., live) or on demand.

241
Q

streaming video

A

A video transmission that is being presented to the end user as it is
received based on an ongoing transmission from the provider/server. Streaming media is
commonly served over the Internet either in real time (i.e., live) or on demand.

242
Q

supervisory control and data acquisition (SCADA)

A

An ICS unit that can operate as a
stand‐alone device, be networked together with other SCADA systems, or be networked
with traditional IT systems. Most SCADA systems are designed with minimal human
interfaces. Often, they use mechanical buttons and knobs or simple LCD screen interfaces
(similar to what you might have on a business printer or a GPS navigation device). However,
networked SCADA devices may have more complex remote‐control software interfaces.

243
Q

switch

A

A network device that is an intelligent hub because it knows the addresses of the
systems connected on each outbound port. Instead of repeating traffic on every outbound
port, a switch repeats only traffic out of the port on which the destination is known to
exist. Switches offer greater efficiency for traffic delivery, create separate broadcast and
collision domains, and improve the overall throughput of data.

244
Q

Switched Multimegabit Data Service (SMDS)

A

A connectionless network communication
service. SMDS provides bandwidth on demand. SMDS is a preferred connection mechanism
for linking remote LANs that communicate infrequently.

245
Q

switched virtual circuit (SVC)

A

A virtual circuit that must be rebuilt each time it is used;

similar to a dial‐up connection.

246
Q

Synchronous Data Link Control (SDLC)

A

A layer 2 protocol employed by networks with
dedicated or leased lines. SDLC was developed by IBM for remote communications with
SNA systems. SDLC is a bit‐oriented synchronous protocol.

247
Q

TCP model

A

A network protocol conceptual model that was derived from TCP/IP. Also
known as the DARPA model and the DoD model. The TCP model has four layers as
opposed to the OSI model’s seven. Those four layers from the bottom up are Link, Internet,
Host‐to‐Host, and Process.

248
Q

TCP wrapper

A

An application that can serve as a basic firewall by restricting access based
on user IDs or system IDs.

249
Q

telephony

A

The collection of methods by which telephone services are provided to an
organization or the mechanisms by which an organization uses telephone services for
either voice and/or data communications. Traditionally, telephony included POTS or PSTN
services combined with modems. However, this has expanded to include PBX, VoIP, and
VPN.

250
Q

TEMPEST

A

The study and control of electronic signals produced by various types of
electronic hardware, such as computers, televisions, phones, and so on. Its primary goal is
to prevent EM and RF radiation from leaving a strictly defined area so as to eliminate the
possibility of external radiation monitoring, eavesdropping, and signal sniffing.

251
Q

Terminal Access Controller Access Control System (TACACS)

A

An alternative to
RADIUS. TACACS is available in three versions: original TACACS, XTACACS (extended
TACACS), and TACACS+. TACACS integrates the authentication and authorization
processes. XTACACS keeps the authentication, authorization, and accounting processes
separate. TACACS+ improves XTACACS by adding two‐factor authentication.

252
Q

throughput rate

A

The rate at which a biometric device can scan and authenticate subjects.
A rate of about six seconds or faster is required for general acceptance of a specific
biometric control.

253
Q

An electronic authentication factor used by the Kerberos authentication system.

A

ticket

254
Q

ticket‐granting service (TGS)

A

An element of the Kerberos authentication system. The
TGS manages the assignment and expiration of tickets. Tickets are used by subjects to gain
access to objects.

255
Q

A token‐passing LAN technology.

A

token ring

256
Q

topology

A

The physical layout of network devices and connective cabling. The common
network topologies are ring, bus, star, and mesh.

257
Q

A form of monitoring in which the flow of packets rather than the actual
content of packets is examined. Also referred to as trend analysis.

A

traffic analysis

258
Q

A short duration of line noise disturbance.

A

transient

259
Q

Transmission Control Protocol (TCP)

A

A connection‐oriented protocol located at layer 4

of the OSI model.

260
Q

A capability built into connection‐ or session‐oriented
protocols and services. If it is determined that a message, in whole or in part, was corrupted,
altered, or lost, a request can be made for the source to resend all or part of the message.

A

transmission error correction

261
Q

A form of auditing focused on communications. Transmission
logging records the details about source, destination, time stamps, identification codes,
transmission status, number of packets, size of message, and so on.

A

transmission logging

262
Q

transmission window

A

The number of packets transmitted before an acknowledge packet
is sent.

263
Q

Transport Layer Security (TLS)

A

Based on SSL technology, TLS incorporated many
security enhancements and was eventually adopted as a replacement for SSL in most
applications. Early versions of TLS supported downgrading communications to SSL v3.0
when both parties did not support TLS. However, in 2011 TLS v1.2 dropped this backward
compatibility. As with SSL, TLS uses TCP port 443.

264
Q

transport mode

A

A mode of IPSec when used in a VPN. In transport mode, the IP packet
data is encrypted but the header of the packet is not.

265
Q

traverse mode noise

A

EMI noise generated by the difference in power between the hot and
neutral wires of a power source or operating electrical equipment.

266
Q

tunnel mode

A

A mode of IPSec when used in a VPN. In tunnel mode, the entire IP packet is
encrypted and a new header is added to the packet to govern transmission through the tunnel.

267
Q

tunneling

A

A network communications process that protects the contents of protocol
packets by encapsulating them in packets of another protocol.

268
Q

unicast

A

A communications transmission to a single identified recipient.

269
Q

unified threat management (UTM)

A

A security device that includes traditional functions
of a firewall such as packet filtering and stateful inspection. It is able to perform packet
inspection techniques, allowing it to identify and block malicious traffic. It can filter
malware using definition files and/or whitelists and blacklists. It also includes intrusion detection
and/or intrusion‐prevention capabilities. Aka next‐generation firewall.

270
Q

unshielded twisted‐pair (UTP)

A

A twisted‐pair wire that does not include additional EMI

protection. Most twisted‐pair wiring is UTP.

271
Q

User Datagram Protocol (UDP)

A

A connectionless protocol located at layer 4 of the OSI

model.

272
Q

virtual private network (VPN)

A

A network connection established between two systems
over an existing private or public network. A VPN provides confidentiality and integrity for
network traffic through the use of encryption.

273
Q

virtual private network (VPN) protocol

A

The protocols, such as PPTP, L2TP, and IPSec,

that are used to create VPNs.

274
Q

VLAN

A

A logical network segmentation implemented on switches and bridges to manage
traffic. Multiple VLANs can be hosted on the same switch but are isolated as if they are
separate physical networks. Only through a routing function, often provided by a multilayer
switch, can cross‐VLAN communications occur. VLANs function like physical network
segments.

275
Q

VLAN hopping

A

The ability to make network traffic jump between VLANs through an
abuse of IEEE 802.1Q VLAN tagging known as double encapsulation.

276
Q

Voice over IP (VoIP)

A

A network service that provides voice communication services by
transporting the voice traffic as network packets over an IP network.

277
Q

web application firewall

A

An Application layer firewall configured specifically to protect
against web‐based attacks and exploitations.

278
Q

webcasting

A

A form of media distribution occurring over the Internet (in contrast to more
traditional means such as over‐the‐air or cable TV broadcasts and radio stations). Can
also include and is related to video casting, audio casting, podcasting, net casting, Internet
television, and IP TV.

279
Q

well‐known ports

A

The first 1,024 ports of TCP and UDP. They are usually assigned to
commonly used services and applications.

280
Q

white box

A

Device used to control the phone system. A white box is a dual‐tone
multifrequency (DTMF) generator (that is, a keypad).

281
Q

wide area network (WAN)

A

A network or a network of LANs that is geographically diverse.
Often dedicated leased lines are used to establish connections between distant components.

282
Q

Wi‐Fi Protected Access (WPA)

A

An early alternative to WEP based on a secret passphrase
and employing the LEAP and TKIP crypto systems. It is attackable through passphrase
guessing.

283
Q

A wireless standard that defines citywide wireless access technologies.
This standard has yet to be widely deployed.

A

WiMax (802.16)

284
Q

Wired Equivalent Privacy (WEP)

A

A form of encrypted authentication that employs
RC4. WEP supports only one‐way authentication from client to WAP. WEP is considered
insufficient for security because of several deficiencies in its design and implementation.

285
Q

wired extension mode

A

A wireless network configuration where the wireless access point
acts as a connection point to link the wireless clients to the wired network.

286
Q

Wireless Application Protocol (WAP)

A

A functioning industry‐driven protocol stack that
allows users through their WAP‐capable devices, such as mobile phones, to communicate
over a carrier’s network with the Internet.

287
Q

wireless networking (802.11)

A

A form of networking that uses radio waves as the

connection medium following the 802.11 standard. Often called Wi‐Fi.

288
Q

wiring closet

A

The room where the networking cables for a whole building or just a
floor are connected to other essential equipment, such as patch panels, switches, routers,
LAN extenders, backbone channels, and so on. A more technical name for wiring closet is
premises wire distribution room.

289
Q

An older WAN protocol that uses carrier switching to provide end‐to‐end
connections over a shared network medium.

A

X.25