Chapter 3: Network Technologies and Tools Aconyms and Defintions Flashcards

(89 cards)

1
Q

MAC

A

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IP

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TCP

A

Transmission Control Protocol

Connection-oriented protocol that provides guarenteed delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

UDP

A

User Datagram Protocol

Connectionless protocol that provides “best effort” delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FTP

A

File Transfer Protocol

Uploads and downloads files to and from an FTP server.
Transmits data in clear text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TFTP

A

Trivial File Transfer Protocol

Used to transfer a smaller amounts of data, such as when communicating with network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SSL

A

Secure Sockets Layer

Primarily used to secure HTTP traffic as HTTPS
Has been compromised and is not recommended for use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TLS

A

Transport Layer Security

Replacement for SSL
Secure HTTP traffic as HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPsec

A

Internet Protocol Security

Used to encrypt IP traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSH

A

Secure Shell

Encrypts data traffic it transittransit and can be used to encrypt other protocols such as FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SCP

A

Secure Copy

Based on SSH and used to copy and encrypted files over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SFTP

A

Secure File Transfer Protocol

Secure implementation of FTP
And extinction of secure shell using SSH to transmit the files in an encrypted format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FTPS

A

File Transfer Protocol Secure

Another secure implementation of FTP.
It uses TLC to encrypt FTP traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SMTP

A

Simple Mail Transfer Protocol

Transfers, mail between clients and SMTP servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SMTPS

A

Simple Mail Transfer Protocol Secure

Adds TLS encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

POP3

A

Post Office Protocol

Transfers emails from servers to end users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IMAP

A

Internet Message Access Protocol

Used to store email on a mail server and it allows you to organize and manage email and folders on the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

HTTP

A

Hyper Text Transfer Protocol

Transmits web traffic between web service and browsers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

HTTPS

A

Hyper Text Transfer Protocol Secure

Adds TLS encryption to protect the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SPF

A

Sender Policy Framework

Uses DNS records to define which IP addresses are authorized to send emails on behalf of a domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DKIM

A

DomainKeys Identified Mail

Uses public key photography to sign in verify an emails domain and content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DMARC

A

Domain-based Message Authentication, Reporting, and Conformance

Builds on top of SPF and DKIM by allowing domain owners to set policies for how to handle emails that fail authentication checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

AD DS

A

Microsoft Active Directory Domain Services

Database of objects that provides a central access point to manage users, computers, and other directory objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

LDAP

A

Lightweight Directory Access Protocol

Specifies the formats and methods used to query directories, such as Microsoft AD DS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
LDAPS
Lightweight Directory Access Protocol Secure To protect LDAP it encrypts data with TLS
26
RTP
Real-time Transport Protocol Delivers audio and video of IP networks
27
VoIP
Voice over Internet Protocol Communications, streaming media, video teleconferencing applications, and devices using web-based push to talk features
28
SRTP
Secure Real-time Transport Protocol Provides encryption, message authentication, and integrity for RTP
29
SIP
Session Initiation Protocol Used to initiate, maintain, and terminate voice, video, and messaging sessions. Uses request and response messages (text) when establishing a session
30
GPO
Group Policy Object
31
RDP
Remote Desktop Protocol Used to connect to others systems from remote locations.
32
NTP
Network Time Protocol Most commonly used protocol for time synchronization, allowing their systems to synchronize their time to within tens of milliseconds.
33
DHCP
Dynamic Host Configuration Protocol Dynamically assigned IP addresses to host Also assigns other TCP and IP information such as subnet mask, default gateways, DNS server addresses and much more.
34
ISPs
Internet Service Provider Companies who provide Internet service
35
IANA
Internet Assigned Numbers Authority
36
IETF
Internet Engineering Task Force
37
DNS
Domain Name System For domain resolution, resolves hostnames to IP address
38
A
Host Record A record that holds the host name and IPv4 address and is the most used record in a DNS server
39
AAAA
Record that holds the host name for IPv6 address.
40
MX
Mail Exchange A record that identifies a mail server used for mail.
41
CNAME
Canonical Name or Alias Allows a single system to have multiple names associated with a single IP address.
42
SOA
Start of Authority Records include information about a domain or zone and some of its settings
43
TTL
Time to Live A setting used to determine how long to cache DNS results TTL times are in seconds, and lower times cause clients to renew the records more often.
44
DNSSEC
Domain Name System Security Extensions Used to prevent DNS cache poisoning A suite of extensions to DNS that provides validation for DNS responses.
45
RRSIG
Resource Record Signature Referred to as a digital signature and provides data, integrity and authentication for DNS replies
46
RSTP
Rapid Spanning Tree Protocol Provides both broadcast storm prevention and loop prevention for switches
47
BPDU
Bridge Protocol Data Unit Messages that STP sends to detect loops
48
Edge Port
A switch port connected to a device, such as computer, server, or printer.
49
BPDU Guard
Bridge Protocol Data Unit Guard Monitors the ports for unwanted BPDU messages
50
ACLs
Access Control Lists Rules implemented on routers and on firewalls to identify what traffic is allowed and what traffic is denied.
51
Implicit Deny
Dictates that all traffic that isn’t explicitly allowed is explicitly denied
52
Route Command
A command used to display or modify systems, routing table on both Windows and Linux systems.
53
SNMP
Simple Network Management Protocol Monitors and manages network devices such as routers or switches SNMPv3 Encrypts credentials before sending them over the wire.
54
Firewall
Filters, incoming and outgoing traffic for a single host or between networks
55
Host-based Firewall
Monitors traffic going in and out of a single host, such as a server or workstation —monitors traffic passing through the NIC
56
Network-Based Firewall
Protects an entire network, and usually a network appliance meaning sold as a hardware unit that already contains all of the software necessary to run as a firewall.
57
Stateless Firewalls
Uses rules implemented in access control lists to identify allowed and blocked traffic Treats each network packet that they see as a new event and don’t track any information
58
Stateful Firewall
Inspect traffic and makes decisions based on the traffic context or state keeping track of established sessions inspects traffic based on a state within a session and it blocks traffic that isn’t a part of an established session.
59
WAF
Web Application Firewall A firewall specifically designed to protect a web application, usually placed between the web server and the web server clients.
60
NGFW
Next-Generation Firewall An advanced firewall that performs deep packing inspection, adding application level inspection as a core feature.
61
62
Fail-open
The system allows everything to pass through the system when it fails
63
Fail-closed
A system allows nothing to pass through the system when it fails
64
Intranet
An Internet is an internal network Used by people to communicate and share content with each other
65
Extranet
Part of a network that can be accessed by authorized entities from outside of the network
66
DMZ
Demilitarized Zone Know as screened subnet, a security zone between a private network in the Internet. Providing a layer of protection for these Internet facing servers while allowing clients to connect to them.
67
CA
Certificate Authority
68
NAT
Network Address Translation A protocol that translates public IP addresses to private IP addresses and private IP addresses back to public
69
PAT
Port Address Translation A commonly used form of NAT.
70
Static NAT
Static Network Address Translation Uses a single public IP address in a one-to-one mapping
71
Dynamic NAT
Dynamic Network Address Translation Uses multiple public IP addresses in a one-to-many mapping and decides which public IP address to use based on load.
72
SCADA
Supervisory Contoel and Data Acquisition
73
Air Gap
A gap of air between an isolated system and other systems.
74
VLAN
Virtual Local Area Network Used by switches to segment traffic between logical groups of users or computers
75
Proxy Server
Used to forward request for services for clients also can improve performance by caching content and some proxy servers can restrict users access to inappropriate websites by filtering content.
76
Content Filtering
Allows organizations to create block rules that restrict web use.
77
Reverse Proxy
Accepts requests from the Internet, typically for a single web server. It appears to clients as a web server, but is forwarding the requests to the web server and serving the pages returned by the web server.
78
UTM
Unified Threat Management A single solution that combines multiple security controls Goal is to provide better security while also simplifying management requirements
79
Jump Server
Aka Jump Box A hard server used to access and managed devices in a different securities zone
80
ZTNA
Zero Trust Network Access A philosophy that’s end goal is to achieve threat scope reduction, decreasing the risk to the organization.
81
PEP
Policy Enforcement Point A system used zero-trust environment when a user or system wants to access a resource.
82
Control Plane
A network where communications are used to control and configure the network.
83
Data Plane
Communications used by end users and software to communicate with each other take place here.
84
PE
Policy Engine Decides whether to grant access to a resource for a given subject
85
PA
Policy Administrator Responsible for communicating the decisions made by the PE to the tools on the network
86
PDP
Policy Decision Point PE and PA together
87
3 Data Plane Components
Subject System Enterprise Resource
88
SASE
Secure Access Service Edge Builds on Zero Trust •Firewall services •Secure web gateway •Anti-malware •Intrusion Prevention Services •Cloud access service broker (CASB) •Data Loss Prevention (DLP)
89
OSI MODEL
Physical, Data Link, Network, Transport, Session, Presentation, Application. (Please Do Not Throw Sausage Pizza Away)