Test Ch. 9-12 Flashcards

1
Q

Connection-oriented Communication

A

A protocol that does not establishes a connection between two hosts before transmitting data and verifies receipt before closing the connection between the hosts. TCP is an example of a connection-oriented protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Connectionless Communication

A

A protocol that does not establish and verify a connection between the hosts before sending data; it just sends the data and hopes for the best. This is faster than connection-oriented protocols. UDP is an example of a connectionless protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Session

A

Any single communication between a computer and a another computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP

A

Transmission Control Protocol - enables connection-oriented communication in networks that use the TCP/IP protocol suite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TCP Three-way handshake

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If the network is not visible on the Internet, the DNS naming convention does not require top-level domain names such as .com or .org

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

As the Internet grew, HOSTS replaced DNS

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which is the correct sequence according to the DNS naming convention?

A

Host.Domain.Root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric-key encryption is what we call any encryption that uses the same key for both encryption and decryption.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is a mathematical function that creates a checksum, and which is used by most forms of nonrepudiation.

A

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This protocol offers a method for querying the state of certain network devices

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hubs, switches and routers all work at layer 1 of the OSI seven-layer model.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Microsoft Exchange is an example of a dedicated e-mail client.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is one example of the many programs that use the BitTorrent file-sharing protocol in modern peer-to-peer implementations.

A

µTorrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

VPNs use encryption.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

UDP

A

User Datagram Protocol - Part of the TCP/IP protocol suite, a connectionless protocol that is an alternative to TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DHCP

A

Dynamic Host Configuration Protocol - uses UDP - DHCP clients uses port 67 for sending data, DHCP servers use port 68 for sending data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

NTP/SNTP

A

Network Time Protocol. Simple Network Time Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TFTP

A

Trivial File Transfer Protocol enables you to transfer from one machine to another. Doesn’t have any protection. Uses port 69.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ICMP

A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IGMP

A

Internet Group Managment Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Well-known Port Numbers

A

Port numbers between 0 and 1023

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Ephemeral Port Numbers

A

1024-5000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Dynamic or Private Port Numbers

A

49152-65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

IANA

A

Internet Assigned Numbers Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Registered Ports

A

1024-49151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Socket or Endpoint

A

Terms for the connection data stored on a single computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Netstat

A

Show me the endpoint command utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

FTP

A

File Transfer Protocol - used for large files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

SMTP

A

Simple Mail Transfer Protocol - port 25, used by clients to send messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

POP3

A

Post Office Protocol version 3 - receive e-mail from SMTP servers. POP3 uses TCP port 110.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

IMAP4

A

Internet Message Access Protocol version 4. Retrieves e-mail from an e-mail server. IMAP4 enables you to search through messages on the mail server to find specific keywords and select the messages you to download onto your machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Remote Login

A

rlogin - works over TCP port 513

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Remote Shell

A

RSH - runs over TCP port 514

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Remote Copy Protocol

A

RCP - TCP port 524

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Telnet

A

A program that enables users on the internet to log onto remote systems from their own host systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Secure Socket Layer

A

SSL - A protocol developed by Netscape for transmitting private documents over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What 3 things make a secure website?

A
  1. Authentication
  2. Encryption
  3. Nonrepudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

HTTPS

A

Hypertext Transfer Protocol over SSL - uses port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

DNS

A

Domain Name System - name resolution protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

WINS

A

Windows Internet Name Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

HOSTS File

A

The predecessor to DNS, a static text file that resides on a computer and is used to resolve DNS host names to IP addresses. The HOSTS file is checked before the machine sends a name resolution request to a DNS name server. The HOSTS file has no extension.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

TLD

A

Top-level Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

FQDN

A

Fully Qualified Domain Name - A complete DNS name, including the host name and all of its domains (in order).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Name Servers

A

A computer whose job is to know the name of every other computer.

  1. DNS server
  2. Zone
  3. Record
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

CNAME

A

Canonical name - Less common type of DNS record that acts as a computer’s alias.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

PKI

A

Public-key Infrastructure - The system for creating and distributing digital certificates using sites like Verisign, Thawte or GoDaddy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Authentication

A

A process that proves good data traffic truly came from where it says it originated by verifying the sending and receiving users and computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Authorization

A

A step in the AAA philosophy during which a client’s permissions are decided upon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Nonrepudiation

A

The process that guarantees the data is as originally sent and that it came from the source you think it should have come from.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Hash

A

A mathematical function that you run on a string of binary digits of any length that results in a value of some fixed length (often called a checksum or a digest.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

SHA

A

Secure Hash Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

MD5

A

Message-Digest Algorithm version 5, hashing function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Encryption

A

A method of securing messages by scrambling and encoding each packet as it is sent across an unsecured medium, such as the Internet. Each encryption level provides multiple standards and options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

DNS Server

A

A DNS server is a computer running DNS server software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Zone

A

A zone is a container for a single domain that gets filled with records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Record

A

A record is a line in the zone data that maps an FQDN to an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Authoritative DNS server

A

Also called Start of Authority or SOA, A DNS server that has a single zone that lists all the host names on the domain and their corresponding IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Cached lookups

A

The list kept by a DNS server of IP addresses it has already resolved, so it won’t have to re-resolve it an FQDN it has already checked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Forward lookup zones

A

The storage area in a DNS server to store the IP addresses and names of systems for a particular domain or domains.

61
Q

NS Records

A

Records that list the DNS servers for a Web site.

62
Q

A Records

A

A list of the IP addresses and names of all the systems on a DNS server domain.

63
Q

MX Records

A

Mail Exchange

64
Q

Reverse Lookup Zones

A

A DNS setting that resolves IP addresses to FQDNs. In other words, it does exactly the reverse of what DNS normally accomplishes using forward lookup zones.

65
Q

PTR

A

Pointer Record - points to canonical names.

66
Q

NetBIOS/NetBEUI

A

NetBIOS-A protocol that operates at the Session layer of the OSI model. Creates and manages connections based on the names of the computers involved.
NetBEUI-Microsoft’s first networking protocol, designed to work with NetBIOS. Did not support routing.

67
Q

CIFS

A

Common Internet System

68
Q

Windows Domain

A

A group of computers controlled by a computer running Windows Server, which is configured as a domain controller.

69
Q

Workgroup

A

A convenient method of organizing computers under Network/My Network Places in Windows operating systems.

70
Q

Active Directory

A

An organization of related computers that shares one or more Windows domains.

71
Q

DDNS

A

Dynamic DNS - updates of IP addresses

72
Q

DNSSEC

A

DNS Security Extensions - a set of authentication and authorization specifications designed to prevent bad guys from impersonating legitimate DNS servers.

73
Q

EDNS

A

Extension Mechanisms for DNS - A specification that expands several parameter sizes, but maintains backward compatibility with DNS servers that don’t use it.

74
Q

nslookup

A

name server lookup - command enables DNS server queries.

75
Q

Dig

A

Domain information groper -

76
Q

LMHOSTS

A

A static text file that resides on a computer and is used to resolve NetBIOS names to IP addresses. The LMHOSTS file is checked before the machine sends a name resolution request to a WINS name server. The LMHOSTS file has no extension.

77
Q

WINS Proxy Agent

A

A WINS relay agent that forwards WINS broadcasts to a WINS server on the other side of a router to keep older systems from broadcasting in place of registering with the server.

78
Q

nbstat

A

A command-line utility used to check the current NetBios name cache on a particular machine. The utility compares NetBIos names to their corresponding IP addresses.

79
Q

Plaintext

A

Data is in an easily read or viewed idustry-wide standard format. Cleartext.

80
Q

Cipher

A

A series of complex and hard-to-reverse mathematics-called an algorithm-you run on a string of ones and zeroes to make a new set of seemingly meaningless ones and zeroes.

81
Q

Complete Algorithm

A

Is both the cipher and the implementation of that cipher.

82
Q

Ciphertext

A

The output when cleartext is run through a cipher algorithm using a key.

83
Q

Symmetric-Key Algorithm

A

Any encryption that uses the same key for both encryption and decryption.

84
Q

Asymmetric-Key Algorithm

A

Any encryption that uses different keys for encryption and decryption.

85
Q

Block Ciphers

A

They encrypt data in single chunks of a certain length at a time.

86
Q

Stream Cipher

A

Takes a single bit at a time and encrypts on-the-fly.

87
Q

DES

A

Data Encryption Standard - Granddaddy of TCP/IP symmetric-key algorithm. Used a 64-bit block and 56-bit key.

88
Q

Rivest Cipher 4

A

Stream Cipher

89
Q

AES

A

Advanced Encryption Standard - a block cipher, uses 128-bit block size and 128-, 192-, or 256- bit key size.

90
Q

Public Key Cryptography

A

A method for exchanging digital keys securely.

91
Q

RSA

A

Rivest Shamir Adelman - Enabled secure digital signatures

92
Q

SHA

A

Secure Hash Algorithm

93
Q

Digital Signature

A

A string of ones and zeroes that can only be generated by the sender.

94
Q

Certificate

A

A standardized type of digital signature that includes the digital signature of a third party, a person or a company that guarantees that who is passing out this certificate is truly who they say they are.

95
Q

ACL

A

Access Control List - A clearly defined list of permissions that specify what an authenticated user may perform on a shared resource.

96
Q

MAC

A

Mandatory Access Control - Every resource is assigned a label that defines its security level.

97
Q

DAC

A

Discretionary Access Control - The idea that a resource has an owner who may at his discretion assign access to that resource. More flexible.

98
Q

RBAC

A

Role-based Access Control - Defines a user’s access to a resource based on the roles the user plays in the network environment.

99
Q

PPP

A

Point-to-point - enables two point-to-point devices to connect, authenticate with a user name and password, and negotiate the network protocol the two devices will use.

100
Q

Link Dead

A

There isn’t a link yet. This phase is when all PPP conversations begin. The main player at this is the Link Control Protocol (LCP). The LCP’s job is to get the connection going.

101
Q

Link Establishment

A

The LCP communicates with the LCP on the other side of the PPP link, determining a good link.

102
Q

Termination

A

When done nicely, the two ends of the PPP connection send each other a few termination packets and the link is closed.

103
Q

PAP

A

Password Authentication Protocol - Transmits the user name and password over the connection in plaintext.

104
Q

CHAP

A

Challenge Handshake Authentication Protocol - Relies on hashes based on a shared secret.

105
Q

AAA

A

Authentication, Authorization, and Accounting - designed for the idea of port authentication -the concept of allowing remote users authentication to a particular point-of-entry (a port) to another network.

106
Q

RADIUS

A

Remote Authentication Dial-In User Service - AAA Standard,

107
Q

NASs

A

Network Access Servers - control the modems, and a group of systems that dial into the network.

108
Q

IAS

A

Internet Authentication Service - Microsoft

109
Q

FreeRadius

A

UNIX/Linux

110
Q

TACACS+

A

Terminal Access Controller Access Control Sustem Plus - A proprietary protocol developed by Cisco to support AAA in a network with many routers and switches. Similar to RADIUS but uses TCP port 49.

111
Q

Kerberos

A

An authentication protocol that has no connection to PPP. Authentication protocol for TCP/IP networks with many clients all connected to a single authenticating server.

112
Q

KDC

A

Key Distribution Center - has two processes, AS and TGS.

113
Q

AS

A

Authentication Server

114
Q

TGS

A

Ticket-Granting Service

115
Q

TGT

A

Ticket-Granting Ticket or token or access token

116
Q

EAP

A

Extensible Authentication Protocol - used in wireless networks

117
Q

EAP-PSK

A

Personal shared key

118
Q

EAP-TLS

A

Transport Layer Security

119
Q

EAP-TTLS

A

Tunneled TLS

120
Q

EAP-MS-CHAPv2 or PEAP

A

Protected Extensible Authentication Protocol - password function based on MS-CHAPv2 with the addition on an encrypted TLS tunnel.

121
Q

EAP-MD5

A

Uses MD5 hases for transfer of authentication credentials. Weak.

122
Q

LEAP

A

Lightweight Extensible Authentication Protocol -

123
Q

802.1

A

Port-authentication network access control mechanism for networks.

124
Q

SSH

A

Secure Shell

125
Q

Tunnel

A

An encrypted link between two programs on two separate computers.

126
Q

SSL

A

Secure Socket Layer - requires a server with a certificate. Limited to HTML, FTP, SMTP,

127
Q

TLS

A

Transport Layer Security - Designed as an upgrade to SSL. No restrictions.

128
Q

IPsec

A

Internet Protocol Security - Authentication and encryption protocol suite that works at the Internet/Network layer. Transport mode and Tunnel mode.

129
Q

AH

A

Authentication Header - for authentication

130
Q

ESP

A

Encapsulating Security Payload - for implementing authentication and encryption.

131
Q

ISAKMP

A

Internet Security Association and key Management Protocol - for establishing security associations (SAs) that define things like the protocol used for exchanging keys.

132
Q

IKE and IKEv2

A

Internet Key Exchange and Kerberized Internet Negotiation of Keys (KINK), two widely used key exchanging protocols.

133
Q

SCP

A

Secure Copy Protocol

134
Q

SFTP

A

Secure FTP

135
Q

OpenSSH

A

A series of secure programs developed by the OpenBSD organization to fix SSH’s limitation of only being able to handle one session per tunnel.

136
Q

SNMP

A

Simple Network Management Protocol - method for querying the state of SNMP-capable devices.

137
Q

MIB

A

Management Information Base

138
Q

LDAP

A

Lightweight Directory Access Protocol - tool that programs use to query and change a database used by the network.

139
Q

NTP

A

Network Time Protocol - uses port 123

140
Q

P2P

A

Peer-to-peer - any system can act as a server, client, or both.

141
Q

VPN

A

Virtual Private Network

142
Q

PPTP

A

Point-to-point tunneling protocol

143
Q

RRAS

A

Routing and Remote Access Service

144
Q

L2TP

A

Layer 2 Tunneling Protocol

145
Q

VPN Concentrator

A

A VPN-capable router

146
Q

SSL VPNs

A

Work at the application layer.

147
Q

Trunking

A

The process of transferring VLAN between two or more switches.

148
Q

Trunk Port

A

A port on a switch configured to carry all traffic, regardless of VLAN number, between all switches in a LAN.

149
Q

VLAN

A

Virtual Local Area Network - A single physical broadcast domain and chop it up into multiple virtual broadcast domains.