This class was created by Brainscape user Lars Veggeland. Visit their profile to learn more about the creator.

Decks in this class (21)

Session 1: Background and core concepts
What are the oldest forms of netw...,
What are considered the three gen...,
What is the osi reference model
6  cards
Session 1: Ethernet
What is ethernet,
Why was network sniffing such a s...,
How are ethernet frames structured
3  cards
Session 1: IEEE 802.11 (WIFI)
In what bandwidth does wifi operate,
What is the channel access problem,
How is the channel access problem...
10  cards
Session 1: Other layer 2 protocols
Why may wifi be an undesirable la...,
What are the zigbee and bluetooth...
2  cards
Session 1: IPv4
What are the different broadcast ...,
What is a netmask,
What is fragmentation of ip packe...
4  cards
Session 1: IPv6
Why did the change from ipv4 to i...,
Do applications need to be aware ...,
What happens when an ipv6 using c...
5  cards
Session 1: IP Supporting Protocols & Tunneling
What is the address resolution pr...,
Is arp a safe protocol,
How does icmp work
8  cards
Session 1: TCP
What are some of tcp s main features,
On which level in the protocol st...,
What does the tcp header look like
7  cards
Session 2: Identification and Authentication
What is the difference between id...,
What are roughly the 5 categories...,
How is authentication handled to ...
7  cards
Session 2: Open Systems Authentication
What are the advantages of using ...,
What are the three major platform...,
Which large web entities use open...
6  cards
Session 2: Network Access Control
What is network access control,
What is a potential weak point of...,
What is tnc trusted network connect
6  cards
Session 2: Firewalling
What is the simplest form of fire...,
Where should packet filtering be ...,
Name the two types of packet filt...
10  cards
Session 3: Routing Protocols Fundamentals
A router must determine where to ...,
What are some of the shortest pat...,
What are the characteristics of t...
3  cards
Session 3: Routing Protocol Security
What are possible consequences of...,
What are the possible authenticat...,
Mention attack vectors and defenc...
11  cards
Session 3: MPLS
0  cards
Session 3: Overlay routing in volatile environments
0  cards
Session 3: OSPF and IGRP
Is ospf an interior or exterior g...,
What is ospf,
What are the 4 possible outfalls ...
8  cards
Session 3: BGP
W,
Why is this protocol unique,
What type of protocol is the bgp
21  cards
Session 4: IPsec & Key management
What are the two modes ipsec may ...,
Which are the two protocols ipsec...,
How does the two protocols ensure...
5  cards
Session 4: DNS
What address resolution technique...,
What were the original design obj...,
What is dns hierarchical namespace
11  cards
Session 5: Securing VoIP
Mention three examples of communi...,
When and how did telephone commun...,
What is the ss7 protocol
13  cards

More about
IMT4125 Network Security

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Lars Veggeland's IMT4125 Network Security flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Network and Security - Foundations
  • 15 decks
  • 320 flashcards
  • 39 learners
Decks: Networks, Twisted Pair Cabling, Fiber Optics, And more!
network A+
  • 22 decks
  • 1900 flashcards
  • 66 learners
Decks: Chapter 1, Chapter 1 Sheet1, Chapter 2, And more!
Make Flashcards