CMPS 329 (Computer network/security) Flashcards

1
Q

What is the OSI Layer, and what does it accomplish?

A

Divides functions of hardware and software into 7 layers.

Creates a standard way to develop, implement, and isolate problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the layers in the OSI Model?

A
All People Seem To Need Data Processing
All Prostitutes Seem To Need Double Penetration
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data Link
1. Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Physical Layer

A

Defines the physical and electrical specification of data connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Layer

A

Communication medium, network adapter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Layer

A

Best-effort global packet delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Transport Layer

A

Responsible for delivering data to the appropriate application process on the host computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is NAT?

A

Network address translation

A way to map an entire network (or networks) to a single IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP

A

Transmission control protocol

Enables two hosts to establish a connection and exchange streams of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

UDP

A

User Datagram Protocol

A core member IP suite
Uses a simple connectionless transmission model with a minimum of protocol mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DoS attack

A

Denial of Service

An attempt to make a machine or network resource unavailable to its intended users.

Generally consists of efforts to temporarily or indefinitely interrupt or suspend services ofa host connected to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MitM

A

Man in the Middle

An attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicated with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PoD

A

Ping of Death

The sending of a malformed or malicious ping to a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authorization

A

Rules that determine who is allowed to do what?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authentication

A

The process of ascertaining that somebody is who they really are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly