Chapters 7-8 Flashcards

(38 cards)

1
Q

Host, endpoint

A

A computing device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Client

A

Intermittent connection, requests services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Server

A

Stable connection, waits for service requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Core

A

Routers and switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Middle boxes

A

Firewalls, NATs, VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protocol

A

Set of rules/standards that govern an interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP

A

Reliable, has ordered delivery, congestion and flow control. Sets up a connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

UDP

A

Unreliable, unordered delivery, connectionless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DHCP

A

Dynamically assigns IP addresses when a host enters a subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Parity bit

A

A bit which serves to detect and sometimes correct bit errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reason why signal gets exponentially weaker the further away from the source

A

Inverse Square Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Infrastructure mode

A

All devices connect to a central access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ad-hoc mode

A

Devices communicate directly with each other. There is no central access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mesh Network

A

A combination of both Infrastructure and Ad-hoc, devices self-organize to relay messages, with each device serving as a router and/or switch for the other devices that it can hear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CSMA-CA

A

Listens before transmitting, requests to transmit, receives permission, transmits, receives ACK from access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Passive scanning

A

listens for beacon frames from access points, beacon frame includes the SSID of the access point

17
Q

Active scanning

A

Device sends a request for points to identify themselves

18
Q

Association Process

A

Device sends association request frame to specific AP, selected AP sends association response frame, the DHCP usually happens

19
Q

4G and 5G

20
Q

CIA triad

A

Confidentiality, Integrity, Availiability

21
Q

Confidentiality

A

Only authorized persons should be able to access system

22
Q

Integrity

A

Only authorized persons should be able to modify data

23
Q

Availability

A

System needs to be accessible when needed

24
Q

Substitution cipher

A

Uses confusion

25
Transposition cipher
Uses diffusion
26
Stream cipher
Operates on one bit at a time, can only use confusion
27
Block cipher
Operates on blocks of bits, normally described based on the size of the block on which it operates
28
Symmetric key cipher
The same key is used for encryption and decryption
29
Asymmetric key cipher
Two related keys, one for encryption and the related key for decryption
30
Brute-Force Attack
Systematically trying every possible key until you find the correct one
31
Break
Any attack that is more efficient than a brute-force attack
32
Checksums
Produce fixed-size output no matter the input size, used to detect transmission errors
33
SSL
Broken security protocol, do not use
34
TLS
Transport layer security, provides confidentiality, integrity, and authentication
35
IPSEC
Network layer, provides confidentiality, integrity, and authentication. Used in VPNs
36
WEP
Broken wifi security protocol, do not use
37
WPA 2 and 3
WiFi security Protocols which are good
38