IS3220 CHAPTER 5 Flashcards
A legacy protocol developed by Apple Inc. for use in networks hosting mainly Macintosh computers. Mostly replaced by TCP/IP and is called ___?
APPLETALK
Portions of a software system that unauthenicated users can run is called ___?
ATTACK SURFACE
A form of password or encryption key cracking attack that tries all possible valid combinations from a defined set of possibilities is called ___?
This will eventually generate a valid solution given enough time, assuming the hacker uses the correct set of possibilities. This is called ___?
BRUTE FORCE ATTACK
A network design based on a single backbone cable to which all host segments connect is called ___?
Ethernet is logically this type of technology, although it can operate in numerous other phial topologies.
BUS TOPOLOGY
A form of password or encryption key-cracking attack that uses a pre-contructed list of potential passwords or encryption keys is called ___?
DICTIONARY ATTACK
A protocol and a data exchange system commonly used over TCP/IP networks, including the Internet, but which is unencrypted and performs authentication and data transfer in plaintext is called ___?
FILE TRANSFER PROTOCOL (FTP)
A network design that establishes all possible connections between hosts is called ___?
This is the most fault-tolerating topology possible, but is also the least resistant to propagation of malware.
FULL MESH TOPOLOGY
A form of password or encryption key-cracking attack that combines dictionary attacks with brute force attacks is called ___?
A dictionary list provides seed values to a brute force attack tool that makes modifications to the seed value. A very effective attack against users who mistakenly believe that changing a few characters or adding a few characters to a base password is actually improving the password’s strength.
HYBRID ATTACK
The entity responsible for global coordination of IP addressing, DNS root, and other Internet protocol resources is called ___?
INTERNET ASSIGNED NUMBERS AUTHORITY (IANA)
The accumulation of delay each time a communication signal crosses a node or host is called ___?
Some amount of delay occurs between reception on one interface and transmission out another interface.
LATENCY
A network design in which hosts are connected end-to-end, each system being connected to no more than two others is called ___?
LINE TOPOLOGY
A description of the arrangement of network devices and how they communicate with each other and is a function of network protocols that may not reflect the actual physical topology of the network is called ___?
LOGICAL TOPOLOGY
The process of simulating and testing a new concept, design, programming, technique, and so forth before deployment into a production environment is called ___? It often occurs before piloting.
MODELING
A transport layer protocol used for file and printer sharing over TCP/IP is called ___?
Originally developed in 1983 as an application-programming interface (API) for software communications, the protocol was extended to encapsulate this information in TCP and UDP packets.
NETBIOS
An application-programming interface (API) developed by IBM in 1985 to emulate NetBIOS on a token ring network and still used by Microsoft to describe a transport layer protocol for file and print sharing over Ethernet is called ___? It makes extensive use of broadcast messages and thus introduces additional traffic to a network.
NETBIOS EXTENDED USER INTERFACE (NETBEUI)
The protocol used by the USENET message service. USENET is a persistent message service that allows anyone to post and read messages from over 100,000 named categorized, topical newsgroups is called ___?
NETWORK NEWS TRANSFER PROTOCOL (NNTP)
A mesh network design that establishes many but not all possible host-to-host links is called ___?
PARTIAL MESH TOPOLOGY
The actual cable structure connecting hosts and nodes together is called ___? This may be independent of logical topology.
PHYSICAL TOPOLOGY
Using a new service, device, configuration, software, and so on to a limited number of testing hosts before rolling out the new component to the entire production environment is called ___?
This often occurs after modeling. AKA beta testing.
PILOTING
An application layer protocol used by email clients to receive messages from an email server is called ___? The default TCP/IP port is 110, and it does not encrypt communications. The companion SMTP protocol sends messages to an email server.
POST OFFICE PROTOCOL (POP)
The feature of network design that ensures the existence of multiple pathways of communication is called ____? The purpose is to prevent or avoid single points of failure.
REDUNDANCY
The five regional organizations that oversee and monitor the allocation and registration of IP addresses (both IPv4 and IPv6) is called ___? It consists of American Registry for Internet Numbers (ARIN), RIPE Network Coordination Center (RIPE NCC), etc.
REGIONAL INTERNET REGISTRY (TIT)
A network design where host segments are attached to a central cable ring is called ___?
RING TOPOLOGY
A form of security based on hiding details of a system, or creating convolutions that are difficult to understand is called ___?
Such strategies do not usually resist a persistent attack, and are used when true security is poorly understood or the perceived threat is insufficient to overcome the obscure methodology.
SECURITY THROUGH OBSCURITY