Unit 3 - Module 2 Flashcards

1
Q

What protocol allows two or more devices to form a connection and stream data?

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Hypertext Transfer Protocol Secure (HTTPS)

A

A network protocol providing secure method of communication between clients and website servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a network protocol?

A

A set of rules used by two or more devices on a network, describing the order of delivery and structure of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Transmission Control Protocol? (TCP)

A

An internet communications protocol that allows two devices to form a connection and stream data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What network protocol is used to determine the MAC address of the next router or device on the path?

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What network protocol translates internet domain names into IP addresses?

A

Domain Name System (DNS)

( Turns website names into IP addresses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

1) What is a User Datagram Protocol (UDP)

A

A connectionless protocol that does not establish a connection between devices before a transmission. This is less safe but allows transmission to get to their destination quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which protocol does gaming usually use? Why?

A

User Datagram Protocol (UDP)
UDP is a fast way to get transmissions to their destination quickly, but less safe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Protocol is less safe than Transmission Control Protocol (TCP)? Why is it less safe?

A

User Datagram Protocol (UDP)
It’s less safe because it doesn’t need to make a connection between devices before a transmission, while a TCP must make a connection before.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are management protocols used for?

A

Monitoring and managing activity on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a Simple Network Management Protocol (SNMP) used for?

A

Monitoring and managing devices on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Internet Control Message Management Protocol (ICMP)

What is it commonly used to address?

A

A internet protocol used by devices to tell each other about data transmission errors across the network.

Commonly used to address ping issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 3 Protocols?

A

Communication, Management, and Security protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Private IP Addresses

Assigned by who?
Unique only within what?
How much does it cost? $$$

A

1) Assigned ny network admins
2) Unique only within private network
3) Free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Public IP Addresses

Assigned by who?
Is the adress unique?
Ho wmuch does it cost? $$$

A

1) Assigned by ISP and IANA
2) Unique adress in global internet
3) Cost to lease a public IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does IANA stand for? What do they do?

A

The Internet Assigned Numbers Authority is a standards organization that oversees global IP address allocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What do DHCP stand for? What does it do?

A

**Dynamic Host Control Protocol **
An application layer protocol used on a network to configure devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Are MAC addresses permanent?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the ARP’s purpose?

A

Translate IP addresses that are found in data packets into MAC adresses.

20
Q

What is an application layer protocol?

A

Defines how application processes (clients and servers), running on different systems, pass messages to each other.

21
Q

What is Telnet?

A

An application layer protocol that allows a device to communicate with another device or server. Telnet send all information in clear text.

22
Q

What is Secure Shell’s purpose?

A

Create a secure connection with a remote system

23
Q

What is Post office protocol? (POP)

A

Protocol used to manage and retrieve email from a mail server

24
Q

What is Internet Message Access Protocol (IMAP) purpose?

A

Used for incoming email, it downloads the headers of emails, not the context.

25
Q

What’s is Simple Mail Transfer Protocol function? (SMTP)

A

Used to transmit and route email from the sender to the recipient’s address.

26
Q

What is a port number’s function?

A

Used by network devices to determin what should be done with the information contained in the data packet once they reach their destination.

27
Q

What is IEEE 802.11?

A

WIFI

Wireless LANs

28
Q

What is WPA?

A

Wifi Protected Access (WPA)

A wireless security protocol for devices to connect to the internet

29
Q

What is the oldest wireless security (WI-Fi) protocol?

A

Wireless equivalent pricavy (WEP)

It’s largely out of use to this day. It’s from 1999.

30
Q

What’s the key differences between WPA2 and WPA3?

3 Things

A

1) WPA3 addresses the authentication handshake vulnerability to KRACK attacks, which is present in WPA2
2) WPA3 uses Simultaneous Authentication of Equals (SAE), a password-authenticated, cipher-key-sharing agreement.
3) WPA3 has increased encryption to make passwords more secure by using 128-bit encryption, with WPA3-Enterprise mode offering optional 192-bit encryption.

31
Q

Which security protocol is used to keep information safe?

A

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) provide a secure protocol by which two networked peers may perform encrypted communications.

32
Q

What is Port Filerting?

A

A firewall function that blocks or allows certain port numbers to limit unwanted communication.

33
Q

What do you call a software firewall that is hosted by a cloud service provider?

A

Cloud-based Firewalls

34
Q

What do you call a firewall that keeps track of information passing through it and proactivvely filters out threats.

A

A Stateful Firewall

35
Q

What’s a Stateless firewall?

A

Firewall that operates based on predefined rules and does not keep track of information from data packets.

36
Q

What is a NGFW and 3 benefits of it

A

Next Generation Firewall
1) Deep Packet inspection
2) Intrusion protection
3) Threat Intelligence

37
Q

What 3 Things Do Virtual Private Networks (VPN) do?

A

1) Changes public IP address
2) Hides your virtual location
3) Encrypts your data online

38
Q

What is the process performed by a VPN serice that protects your data by wrapping sensitive data in other data packets?

A

Encapsulation

39
Q

What do you call a segment of a network that protects the internal network from the internet?

A

Security Zone

40
Q

What do you call dividing the network into segments?

A

Network Segmentation

41
Q

What is an Uncontrolled Zone?

A

Any network outside of the organization’s control

42
Q

What is a subnet that protects the internal network from the uncontrolled zone?

A

Controlled Zone

43
Q

What are 3 areas in the controlled zone?

A

1) Demilitarized Zone (DMZ)
2) Interneal Network
3) Restricted Zone

44
Q

What do you call dividing networks up while under the same router?

A

Subnetting

45
Q

What kind of proxy server regulates and restrict a person’s access to the internet?

A

Forward Proxy Server

46
Q

What kind of proxy server regulates and restricts the* internet’s* accsess to an internal server?

A

Reverse Proxy Server