Networking Systems and Telecommunications Flashcards
3 Different types of Backup Methods
- Differential ? copy all cumulative changes since last full. (takes more space than incremental)
- Incremental ? copy data changes since the last full.
- full
3 Types of RAID
- Failure Resistant Disk System(FRDS)
- Failure Tolerant System.
- Disaster Tolerant System.
only FRDS is currently developed.
ARP
Address Resolution Protocol ? ARP matches ip address to an ethernet address.
Back?door
access through a preprogrammed, unknown access point using DUN or external network connection
Buffer Overflow
DoS attack ? receipt of an excessive amount of data.
Bus Data Network Topology
All transmissions of the network nodes travel the full length of the cable and are received by all stations. (Ethernet)
CHAP Remote Access Protocol
Challenge Handshake Protocol ? authentication using an encrypted key.
DSS Wireless Access Protocol
Direct Sequence Spread Spectrum ? Splits contents of message into smaller bits and decoded at receiver end.
Dual?homed firewall
2 NICS, one on internal side and one on external side
EAP?PEAP Remote Access Protocol
Protected EAP ? like EAP?TLS but easier to administer but less secure due to lack of client?side certificate.
EAP?TLS Remote Access Protocol
Extensible Authentication Protocol, Transport Layer Security ? both client and server authenticate over TLS. Digital certificates are used.Can be confident user is authorized.
EAP?TTLS Remote Access Protocol
Tunneled TLS
Eavesdropping
Interception of network communication either passive or active
FHSS Wireless Access Protocol
Frequency Hopping Spread Spectrum ? Provides no error recovery. Splits available signal bandwidth and segments it.
ICMP
Internet Control Message Protocol ? used for diagnostics and error correction.
Mesh Data Network Topology
Nodes are connected to every other node in the network. Backbone redundant.
Name and describe the OSI (Open System Interconnect)Model Layers?
- Physical ? electrical and mechanical level(x.21, HSSI,MAC address)
- Data Link ? prep for transfer of data(PPP, SLIP, ARP)
- Network ? handles data routing(IP,ICMP)
- Transport ? negotiates the data exchange(TCP,UDP,SPX)
- Session ? coordinates conversations between apps(NFS,SQL,RPC)
- Presentation ? o/s that associates types of files to programs(TIFF,JPEG,MPEG)
- Application ? not the app, but supports the end?user app process(HTTP,FTP,SMTP,TELNET)
Name the TCP/IP Model layers?
- Link(Network Access) ? x.25,ethernet,token ring, frame relay(layers 1 & 2 of OSI)
- Network(Internet) ? IP, ARP, ICMP, IPsec) (layer 3 of OSI)
- Transport(host?to?host) ? TCP, UDP (layer 4 of OSI)
- Application ? HTTP, FTP (layers 5?7 OSI)
3.
PAP Remote Access Protocol
Password Authentication Protocol ? not encrypted but typically easy to implement on any network
Piggybacking
Accessing the system with another user’s valid entery, via incorrect logoff or open session.
PPP Remote Access Protocol
Point?to?Point ? i.e. Dial?up Networking (DUN)
Ring Data Network Topology
network nodes are connected by unidirectional transmission links to form a closed loop.(token and FDDI)
Screened Host firewall
Uses a router to filter data before the data reaches the firewall.
Screened subnet firewall
Uses an external router to review data and bounce back as necessary before reaching the subnet.