Communications & Network Security Flashcards

1
Q

Serve as a gateway between a trusted & untrusted network that gives limited, authorized access to untrusted hosts.

A

Bastion Hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Interconnect devices within a relatively small area that is generally within a person’s reach.

A

Wireless Personal Area Networks (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A type of wireless network that connects several wireless LAN’s.

A

Wireless Metropolitan Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A wireless network made up of radio nodes organized in a mesh topology.

A

Wireless Mesh Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Links two or more devices over a short distance using a wireless distribution method, usually providing a connection through an access point for internet access.

A

Wireless Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A technology that allows you to make voice calls using a broadband internet connection instead of a regular (or analog) phone line.

A

Voice over Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An encrypted tunnel between two hosts that allows them to securely communicate over an untrusted network.

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Provides a lightweight service for connectionless data transfer without error detection & correction

A

User Datagram Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Provides connection-oriented data management & reliable data transfer

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A diagnostic tool that displays the path a packet traverses between a source & destination host

A

Traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layering model structured into four layers (link, network, transport, application)

A

TCP/IP Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A method commonly used to modulate information into manageable bits that are sent over the air wirelessly

A

Spread Spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sublayer that provides application specific services (protocols)

A

Specific Application Service Element

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The first line of protection between trusted & untrusted networks

A

Security Perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A program which can extract data from output on a display intended for a human

A

Screen Scraper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Represent the ability to allow for the executing of objects across hosts

A

Remote Procedure Calls (RPC)

17
Q

Authentication protocol used mainly in networked environments, such as ISPs, or for similar services requiring single sign-on for layer 3 network access, for scalable authentication combined with an acceptable degree of security.

A

Remote Authenication Dial-in User Services (RADIUS)

18
Q

Involves a pair of keys a public key & a private key-associated with an entity that needs to authenticate its identity electronically or to sign or encrypt data

A

Public Key Encryption

19
Q

A basic network mapping technique that helps narrow the scope of an attack

A

Ping Scanning

20
Q

Layering model structured into seven layers (physical, data link, network, transport, session, presentation, application)

A

OSI Model

21
Q

Allow users remote access to a network via analog phone lines

A

Modems

22
Q

A client/server-based directory query protocol loosely based upon X.500 commonly used for managing user information.

A

Lightweight Directory Access Protocol (LDAP)

23
Q

Provides a means to send error message for non-transient error conditions & provides a way to probe the network in order to determine general characteristics about the network

A

Internet Control Message Protocol (ICMP/Ping)

24
Q

Wireless technology that spreads its signal over rapidly changing frequencies

A

Frequency Hopping Spread Spectrum (FHSS)

25
Q

Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules

A

Firewalls

26
Q

Stateful protocol that requires two communication channels

A

File Transfer Protocol (FTP)

27
Q

A lightweight encapsulation protocol & lacks the reliable data transport of the TCP layer

A

Fiber Channel over Ethernet (FCoE)

28
Q

Process of transforming encrypted data back into its original form, so it can be understood.

A

Decryption

29
Q

Wireless technology that spreads a transmission over a much larger frequency band & with corresponding smaller amplitude

A

Direct Sequence Spread Spectrum (DSSS)

30
Q

Multiplex connected device into one signal to be transmitted on a network

A

Concentrators

31
Q

Layer 2 devices that filter traffic between segments based on Media Access Control (MAC) addresses.

A

Bridges