Connect and Protect: Networks and Network Security Flashcards

(21 cards)

1
Q

switch

A

forwards packets between devices directly connected to it. They analyze the destination address of each data packet and send it to the intended device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

hub

A

a device that provides a common point of connection for all devices directly connected to it. Hubs additionally repeat all information out to all ports.

A network security device that monitors traffic to or from your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software as a service (SaaS)

A

refers to software suites operated by the CSP that a company can use remotely without hosting the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Infrastructure as a service (IaaS)

A

efers to the use of virtual computer components offered by the CSP. These include virtual containers and storage that are configured remotely through the CSP’s API or web console. Cloud-compute and storage services can be used to operate existing applications and other technology workloads without significant modifications. Existing applications can be modified to take advantage of the availability, performance, and security features that are unique to cloud provider services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Platform as a service (PaaS)

A

refers to tools that application developers can use to design custom applications for their company. Custom applications are designed and accessed in the cloud and used for a company’s specific business needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Transmission Control Protocol (TCP)

A

an internet communication protocol that allows two devices to form a connection and stream data. It ensures that data is reliably transmitted to the destination service. TCP contains the port number of the intended destination service, which resides in the TCP header of a TCP/IP packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

User Datagram Protocol (UDP)

A

a connectionless protocol that does not establish a connection between devices before transmissions. It is used by applications that are not concerned with the reliability of the transmission. Data sent over UDP is not tracked as extensively as data sent using TCP. Because UDP does not establish network connections, it is used mostly for performance sensitive applications that operate in real time, such as video streaming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Version (VER):

A

This 4 bit component tells receiving devices what protocol the packet is using. The packet used in the illustration above is an IPv4 packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IP Header Length (HLEN or IHL):

A

HLEN is the packet’s header length. This value indicates where the packet header ends and the data segment begins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Type of Service (ToS):

A

Routers prioritize packets for delivery to maintain quality of service on the network. The ToS field provides the router with this information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Time to Live (TTL)

A

TTL prevents data packets from being forwarded by routers indefinitely. It contains a counter that is set by the source. The counter is decremented by one as it passes through each router along its path. When the TTL counter reaches zero, the router currently holding the packet will discard the packet and return an ICMP Time Exceeded error message to the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly