Communications & Network Security Flashcards Preview

Game Changer > Communications & Network Security > Flashcards

Flashcards in Communications & Network Security Deck (31):
1

Serve as a gateway between a trusted & untrusted network that gives limited, authorized access to untrusted hosts.

Bastion Hosts

2

Interconnect devices within a relatively small area that is generally within a person's reach.

Wireless Personal Area Networks (WPA)

3

A type of wireless network that connects several wireless LAN's.

Wireless Metropolitan Area Network

4

A wireless network made up of radio nodes organized in a mesh topology.

Wireless Mesh Network

5

Links two or more devices over a short distance using a wireless distribution method, usually providing a connection through an access point for internet access.

Wireless Local Area Network

6

A technology that allows you to make voice calls using a broadband internet connection instead of a regular (or analog) phone line.

Voice over Internet Protocol

7

An encrypted tunnel between two hosts that allows them to securely communicate over an untrusted network.

Virtual Private Network (VPN)

8

Provides a lightweight service for connectionless data transfer without error detection & correction

User Datagram Protocol (UDP)

9

Provides connection-oriented data management & reliable data transfer

Transmission Control Protocol (TCP)

10

A diagnostic tool that displays the path a packet traverses between a source & destination host

Traceroute

11

Layering model structured into four layers (link, network, transport, application)

TCP/IP Model

12

A method commonly used to modulate information into manageable bits that are sent over the air wirelessly

Spread Spectrum

13

Sublayer that provides application specific services (protocols)

Specific Application Service Element

14

The first line of protection between trusted & untrusted networks

Security Perimeter

15

A program which can extract data from output on a display intended for a human

Screen Scraper

16

Represent the ability to allow for the executing of objects across hosts

Remote Procedure Calls (RPC)

17

Authentication protocol used mainly in networked environments, such as ISPs, or for similar services requiring single sign-on for layer 3 network access, for scalable authentication combined with an acceptable degree of security.

Remote Authenication Dial-in User Services (RADIUS)

18

Involves a pair of keys a public key & a private key-associated with an entity that needs to authenticate its identity electronically or to sign or encrypt data

Public Key Encryption

19

A basic network mapping technique that helps narrow the scope of an attack

Ping Scanning

20

Layering model structured into seven layers (physical, data link, network, transport, session, presentation, application)

OSI Model

21

Allow users remote access to a network via analog phone lines

Modems

22

A client/server-based directory query protocol loosely based upon X.500 commonly used for managing user information.

Lightweight Directory Access Protocol (LDAP)

23

Provides a means to send error message for non-transient error conditions & provides a way to probe the network in order to determine general characteristics about the network

Internet Control Message Protocol (ICMP/Ping)

24

Wireless technology that spreads its signal over rapidly changing frequencies

Frequency Hopping Spread Spectrum (FHSS)

25

Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules

Firewalls

26

Stateful protocol that requires two communication channels

File Transfer Protocol (FTP)

27

A lightweight encapsulation protocol & lacks the reliable data transport of the TCP layer

Fiber Channel over Ethernet (FCoE)

28

Process of transforming encrypted data back into its original form, so it can be understood.

Decryption

29

Wireless technology that spreads a transmission over a much larger frequency band & with corresponding smaller amplitude

Direct Sequence Spread Spectrum (DSSS)

30

Multiplex connected device into one signal to be transmitted on a network

Concentrators

31

Layer 2 devices that filter traffic between segments based on Media Access Control (MAC) addresses.

Bridges