Network+ Fundamentals Flashcards
(202 cards)
GSM
Global System for Mobile Communications was a standard that used multiplexing for 2G
CDMA
Code Division Multiple Access used a code instead of multiplexing for 2G
Latency
PING. A delay between the request and the response (waiting time)
Jitter
measures the variability of the delay, it’s the time between frames
SNMP
Simple Network Management Protocol is used to remotely monitor and manage network devices connected over an IP. SNMP v3 is currently the standard
MIB
Management Information Base or a database of data
OIDs
Object Identifiers are addresses used to uniquely identify managed devices and their statuses
MTTR / MTBF
They are both KPI key performance indicators usd to assess the reliability and maintenance effciency of systems and componets.
Mean time to restore or repair and the Mean time between failures
bonus (SLA) Service level agreement
SIEM
Security Information and Event Management collects log and event data for organizations or auditing and security purposes.
NMAP
A network mapper that finds and learns more about network devices, notably through port scanning. Example. It can identify what OS a device may be using without logging in or authenticating. It also provides additional scripts.
Vulnerability Scanner
unlike penetration testing, this is minimally invasive. Good at finding unknown devices on a network. Test from outside and inside. Identify the lack of security controls like firewall or anti-virus.
Protocol analyzers
solve complex application issues frame by frame. It can capture data from your ethernet connection or a wireless network. View unknown traffic patterns.
FTPS
(Port 21, 990) File Transfer Protocol over SSL (FTP-SSL)
SFTP
FTP using SSH which provides file system functionality
SSH
(Port 22) Secure Shell which is more focused on secure remote access and command execution
SSL
(Port 443) Secure Socket Layer makes sure that all data is encrypted from servers to web browsers. Similar to TLS
TFTP
Trivial File Transfer Protocol which is used for configuring VoIP phones.
WPA
Wifi Protected Access it replaced WEP (Wired Equivalent Privacy)
TKIP
Temporal Key Integrity Protocol is an encryption algorithm to secure a wireless network. 64 bit integrity check and prevents replay attacks.
RC4
stream cipher used with WPA
A stream cipher is a method of encryption where plaintext digits are combined with a pseudorandom cipher digit stream
WPA2
uses AES (Advanced Encryption Standard which replaced RC4 and uses CCMP which replaced TKIP
CCMP
It’s an encryption protocol used in wireless networking for security. It encrypts and authenticates.
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol uses AES for data confidentiality. Uses a 128-bit key and a 128-bit block size. Offers also authentication and access control
EAP
Extensible Authentication Protocol which is an authentication framework. Many different ways to authenticate based on RFC standards. WPA and WPA2 use five EAP types as authentication mechanisms
EAP-TLS
Extensible Authentication Protocol Transport Layer Security. TLS was originally used for web servers but is now being used for wireless authentication. It’s purpose is to authenticate network access.