Ch 3. Network Tech and Tools Flashcards

(50 cards)

1
Q

TCP

A

Transmission Control Protocol; uses a three way handshake to provide connection-oriented traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

UDP

A

User Datagram Protocol; non-guaranteed delivery, does not use three way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IP

A

Internet Protocol; identifies hosts in a TCP/IP network and delivers traffic from one host to another using IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ICMP

A

Internet Control Message Protocol; used for testing basic connectivity and includes tools such as ping, pathping, and tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ARP

A

Address Resolution Protocol; resolves IPv4 addresses to media access control (MAC) addresses (physical/hardware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NDP

A

Neighbor Discovery Protocol; performs several functions on IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RTP

A

Real-time Transport Protocol; delivers audio and video over IP networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SRTP

A

Secure Real-time Transport Protocol; provides encryption, message authentication, and integrity for RTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

FTP

A

File Transfer Protocol; uploads and downloads large files to and from an FTP server. By default data is transmitted in cleartext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TFTP

A

Trivial File Transfer Protocol; used to transfer smaller amounts of data, commonly disabled because it’s a non-essential protocol on most networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSH

A

Secure Shell; encrypts traffic in transit and be used to encrypt other protocols such as FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SSL

A

Secure Sockets Layer; primary method used to secure HTTP traffic as HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TLS

A

Transport Layer Security; the designated replacement for SSL (STARTTLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IPsec

A

encapsulates and encrypts IP packet payloads and uses Tunnel mode to protect VPN traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SFTP

A

Secure File Transfer Protocol; an extension of SSH that secures FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FTPS

A

File Transfer Protocol Secure; uses TLS to encrypt FTP traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SMTP

A

Simple Mail Transfer Protocol; transfers email between clients and SMTP servers. Uses TCP port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

POP3/Secure POP

A

Post Office Protocol; transfers emails from servers down to clients. Uses TCP port 110/995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IMAP4/Secure IMAP

A

Internet Message Access Protocol; used to store email on an email server. Uses TCP port 143/993

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

HTTP

A

Hypertext Transfer Protocol; transmits web traffic on the Internet and in intranets. Uses TCP port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

HTTPS

A

Hypertext Transfer Protocol Secure; encrypts web traffic to ensure it is secure while in transit. Uses TCP port 443

22
Q

RDP

A

Remote Desktop Protocol; used to connect to other systems from a remote location

23
Q

NTP

A

Network Time Protocol; most commonly used protocol for time synchronization

24
Q

DHCP

A

Dynamic Host Configuration Protocol; dynamically assigns IP addresses to hosts

25
DNS
Domain Name System; resolves host names to IP addresses, zone/client queries are TCP port 53/UDP port 53
26
DNS Poisoning
attackers modify the DNS cache with a bogus IP address
27
DNSSEC
Domain Name Security Extension; a suite of extensions to DNS that provides validation for DNS responses, and adds a digital signature to each record
28
nslookup/dig
used to troubleshoot problems related to DNS; dig is used for Linux
29
Unicast
one-to-one traffic; one host sends traffic to another host, using a destination IP address
30
Broadcast
one-to-all traffic; one host sends traffic to call other hosts on the subnet using a broadcast address. Every host that receives it will process it.
31
Switch
a network device used to connect devices. Layer 2 switches send traffic to ports based on their MAC addresses. Layer 3 sends traffic to ports based on IP addresses and support VLANs
32
Loop Prevention
a method of preventing switching loop or bridge loop problems through use of STP/RSTP
33
Flood Attack
an attacker send a large amount of traffic with spoofed MAC addresses to the same port on a switch; when the switch runs out of memory it enters a fail-open state and starts acting like a hub
34
Router
connects multiple network segments together into a single network and routes traffic between segments
35
ACL
Access Control List; rules implemented on a router/firewall to identify what traffic is allowed/denied.
36
Implicit Deny
all traffic that isn't explicitly allowed is implicitly denied
37
Spoofing
to impersonate or masquerade as someone or something else, such as by replacing an IP address
38
Bridge
connects multiple networks together and can be used instead of a router in some situations; directs traffic based on destination MAC addressses
39
Aggregate Switch
connects multiple switches together in a network
40
Firewall
filters incoming and outgoing traffic for a single host or between networks using an ACL
41
Stateless Firewall Rules
Uses an ACL to statically inspect packets, does not keep track of the state of network connections
42
Stateful Firewall
blocks traffic based n the state of the packet within a session
43
DMZ
demilitarized zone; a buffered zone between a private network and the Internet
44
NAT
Network Address Translation; a protocol that translates public IP addresses to private IP addresses back to public
45
Airgap
a metaphor for physical isolation, indicating that there is a gap of air between an isolated system and other systems
46
VLAN
virtual local area network; uses a switch to group several different computers into a virtual network
47
proxy
a server used to forward requests for services such as HTTP/HTTPS
48
Load Balancer
hardware or software that balances the load between two or more servers. Scheduling methods include source address IP affinity and round-robin
49
UTM
Unified Threat Management; combines multiple security controls into a single appliance. They can inspect data streams and often include URL filtering, malware inspection, and contention inspection components.
50
Mail Gateway
a server that examines all incoming and outgoing email and attempts to reduce risks associated with email