Test Ch. 9-12 Flashcards

1
Q

Connection-oriented Communication

A

A protocol that does not establishes a connection between two hosts before transmitting data and verifies receipt before closing the connection between the hosts. TCP is an example of a connection-oriented protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Connectionless Communication

A

A protocol that does not establish and verify a connection between the hosts before sending data; it just sends the data and hopes for the best. This is faster than connection-oriented protocols. UDP is an example of a connectionless protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Session

A

Any single communication between a computer and a another computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP

A

Transmission Control Protocol - enables connection-oriented communication in networks that use the TCP/IP protocol suite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TCP Three-way handshake

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If the network is not visible on the Internet, the DNS naming convention does not require top-level domain names such as .com or .org

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

As the Internet grew, HOSTS replaced DNS

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which is the correct sequence according to the DNS naming convention?

A

Host.Domain.Root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric-key encryption is what we call any encryption that uses the same key for both encryption and decryption.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is a mathematical function that creates a checksum, and which is used by most forms of nonrepudiation.

A

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This protocol offers a method for querying the state of certain network devices

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hubs, switches and routers all work at layer 1 of the OSI seven-layer model.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Microsoft Exchange is an example of a dedicated e-mail client.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is one example of the many programs that use the BitTorrent file-sharing protocol in modern peer-to-peer implementations.

A

µTorrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

VPNs use encryption.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

UDP

A

User Datagram Protocol - Part of the TCP/IP protocol suite, a connectionless protocol that is an alternative to TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DHCP

A

Dynamic Host Configuration Protocol - uses UDP - DHCP clients uses port 67 for sending data, DHCP servers use port 68 for sending data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

NTP/SNTP

A

Network Time Protocol. Simple Network Time Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TFTP

A

Trivial File Transfer Protocol enables you to transfer from one machine to another. Doesn’t have any protection. Uses port 69.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ICMP

A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IGMP

A

Internet Group Managment Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Well-known Port Numbers

A

Port numbers between 0 and 1023

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Ephemeral Port Numbers

A

1024-5000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Dynamic or Private Port Numbers

A

49152-65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
IANA
Internet Assigned Numbers Authority
26
Registered Ports
1024-49151
27
Socket or Endpoint
Terms for the connection data stored on a single computer
28
Netstat
Show me the endpoint command utility
29
FTP
File Transfer Protocol - used for large files.
30
SMTP
Simple Mail Transfer Protocol - port 25, used by clients to send messages.
31
POP3
Post Office Protocol version 3 - receive e-mail from SMTP servers. POP3 uses TCP port 110.
32
IMAP4
Internet Message Access Protocol version 4. Retrieves e-mail from an e-mail server. IMAP4 enables you to search through messages on the mail server to find specific keywords and select the messages you to download onto your machine.
33
Remote Login
rlogin - works over TCP port 513
34
Remote Shell
RSH - runs over TCP port 514
35
Remote Copy Protocol
RCP - TCP port 524
36
Telnet
A program that enables users on the internet to log onto remote systems from their own host systems.
37
Secure Socket Layer
SSL - A protocol developed by Netscape for transmitting private documents over the Internet
38
What 3 things make a secure website?
1. Authentication 2. Encryption 3. Nonrepudiation
39
HTTPS
Hypertext Transfer Protocol over SSL - uses port 443.
40
DNS
Domain Name System - name resolution protocol
41
WINS
Windows Internet Name Service
42
HOSTS File
The predecessor to DNS, a static text file that resides on a computer and is used to resolve DNS host names to IP addresses. The HOSTS file is checked before the machine sends a name resolution request to a DNS name server. The HOSTS file has no extension.
43
TLD
Top-level Domain
44
FQDN
Fully Qualified Domain Name - A complete DNS name, including the host name and all of its domains (in order).
45
Name Servers
A computer whose job is to know the name of every other computer. 1. DNS server 2. Zone 3. Record
46
CNAME
Canonical name - Less common type of DNS record that acts as a computer's alias.
47
PKI
Public-key Infrastructure - The system for creating and distributing digital certificates using sites like Verisign, Thawte or GoDaddy.
48
Authentication
A process that proves good data traffic truly came from where it says it originated by verifying the sending and receiving users and computers.
49
Authorization
A step in the AAA philosophy during which a client's permissions are decided upon.
50
Nonrepudiation
The process that guarantees the data is as originally sent and that it came from the source you think it should have come from.
51
Hash
A mathematical function that you run on a string of binary digits of any length that results in a value of some fixed length (often called a checksum or a digest.)
52
SHA
Secure Hash Algorithm
53
MD5
Message-Digest Algorithm version 5, hashing function.
54
Encryption
A method of securing messages by scrambling and encoding each packet as it is sent across an unsecured medium, such as the Internet. Each encryption level provides multiple standards and options.
55
DNS Server
A DNS server is a computer running DNS server software.
56
Zone
A zone is a container for a single domain that gets filled with records.
57
Record
A record is a line in the zone data that maps an FQDN to an IP address.
58
Authoritative DNS server
Also called Start of Authority or SOA, A DNS server that has a single zone that lists all the host names on the domain and their corresponding IP addresses.
59
Cached lookups
The list kept by a DNS server of IP addresses it has already resolved, so it won't have to re-resolve it an FQDN it has already checked.
60
Forward lookup zones
The storage area in a DNS server to store the IP addresses and names of systems for a particular domain or domains.
61
NS Records
Records that list the DNS servers for a Web site.
62
A Records
A list of the IP addresses and names of all the systems on a DNS server domain.
63
MX Records
Mail Exchange
64
Reverse Lookup Zones
A DNS setting that resolves IP addresses to FQDNs. In other words, it does exactly the reverse of what DNS normally accomplishes using forward lookup zones.
65
PTR
Pointer Record - points to canonical names.
66
NetBIOS/NetBEUI
NetBIOS-A protocol that operates at the Session layer of the OSI model. Creates and manages connections based on the names of the computers involved. NetBEUI-Microsoft's first networking protocol, designed to work with NetBIOS. Did not support routing.
67
CIFS
Common Internet System
68
Windows Domain
A group of computers controlled by a computer running Windows Server, which is configured as a domain controller.
69
Workgroup
A convenient method of organizing computers under Network/My Network Places in Windows operating systems.
70
Active Directory
An organization of related computers that shares one or more Windows domains.
71
DDNS
Dynamic DNS - updates of IP addresses
72
DNSSEC
DNS Security Extensions - a set of authentication and authorization specifications designed to prevent bad guys from impersonating legitimate DNS servers.
73
EDNS
Extension Mechanisms for DNS - A specification that expands several parameter sizes, but maintains backward compatibility with DNS servers that don't use it.
74
nslookup
name server lookup - command enables DNS server queries.
75
Dig
Domain information groper -
76
LMHOSTS
A static text file that resides on a computer and is used to resolve NetBIOS names to IP addresses. The LMHOSTS file is checked before the machine sends a name resolution request to a WINS name server. The LMHOSTS file has no extension.
77
WINS Proxy Agent
A WINS relay agent that forwards WINS broadcasts to a WINS server on the other side of a router to keep older systems from broadcasting in place of registering with the server.
78
nbstat
A command-line utility used to check the current NetBios name cache on a particular machine. The utility compares NetBIos names to their corresponding IP addresses.
79
Plaintext
Data is in an easily read or viewed idustry-wide standard format. Cleartext.
80
Cipher
A series of complex and hard-to-reverse mathematics-called an algorithm-you run on a string of ones and zeroes to make a new set of seemingly meaningless ones and zeroes.
81
Complete Algorithm
Is both the cipher and the implementation of that cipher.
82
Ciphertext
The output when cleartext is run through a cipher algorithm using a key.
83
Symmetric-Key Algorithm
Any encryption that uses the same key for both encryption and decryption.
84
Asymmetric-Key Algorithm
Any encryption that uses different keys for encryption and decryption.
85
Block Ciphers
They encrypt data in single chunks of a certain length at a time.
86
Stream Cipher
Takes a single bit at a time and encrypts on-the-fly.
87
DES
Data Encryption Standard - Granddaddy of TCP/IP symmetric-key algorithm. Used a 64-bit block and 56-bit key.
88
Rivest Cipher 4
Stream Cipher
89
AES
Advanced Encryption Standard - a block cipher, uses 128-bit block size and 128-, 192-, or 256- bit key size.
90
Public Key Cryptography
A method for exchanging digital keys securely.
91
RSA
Rivest Shamir Adelman - Enabled secure digital signatures
92
SHA
Secure Hash Algorithm
93
Digital Signature
A string of ones and zeroes that can only be generated by the sender.
94
Certificate
A standardized type of digital signature that includes the digital signature of a third party, a person or a company that guarantees that who is passing out this certificate is truly who they say they are.
95
ACL
Access Control List - A clearly defined list of permissions that specify what an authenticated user may perform on a shared resource.
96
MAC
Mandatory Access Control - Every resource is assigned a label that defines its security level.
97
DAC
Discretionary Access Control - The idea that a resource has an owner who may at his discretion assign access to that resource. More flexible.
98
RBAC
Role-based Access Control - Defines a user's access to a resource based on the roles the user plays in the network environment.
99
PPP
Point-to-point - enables two point-to-point devices to connect, authenticate with a user name and password, and negotiate the network protocol the two devices will use.
100
Link Dead
There isn't a link yet. This phase is when all PPP conversations begin. The main player at this is the Link Control Protocol (LCP). The LCP's job is to get the connection going.
101
Link Establishment
The LCP communicates with the LCP on the other side of the PPP link, determining a good link.
102
Termination
When done nicely, the two ends of the PPP connection send each other a few termination packets and the link is closed.
103
PAP
Password Authentication Protocol - Transmits the user name and password over the connection in plaintext.
104
CHAP
Challenge Handshake Authentication Protocol - Relies on hashes based on a shared secret.
105
AAA
Authentication, Authorization, and Accounting - designed for the idea of port authentication -the concept of allowing remote users authentication to a particular point-of-entry (a port) to another network.
106
RADIUS
Remote Authentication Dial-In User Service - AAA Standard,
107
NASs
Network Access Servers - control the modems, and a group of systems that dial into the network.
108
IAS
Internet Authentication Service - Microsoft
109
FreeRadius
UNIX/Linux
110
TACACS+
Terminal Access Controller Access Control Sustem Plus - A proprietary protocol developed by Cisco to support AAA in a network with many routers and switches. Similar to RADIUS but uses TCP port 49.
111
Kerberos
An authentication protocol that has no connection to PPP. Authentication protocol for TCP/IP networks with many clients all connected to a single authenticating server.
112
KDC
Key Distribution Center - has two processes, AS and TGS.
113
AS
Authentication Server
114
TGS
Ticket-Granting Service
115
TGT
Ticket-Granting Ticket or token or access token
116
EAP
Extensible Authentication Protocol - used in wireless networks
117
EAP-PSK
Personal shared key
118
EAP-TLS
Transport Layer Security
119
EAP-TTLS
Tunneled TLS
120
EAP-MS-CHAPv2 or PEAP
Protected Extensible Authentication Protocol - password function based on MS-CHAPv2 with the addition on an encrypted TLS tunnel.
121
EAP-MD5
Uses MD5 hases for transfer of authentication credentials. Weak.
122
LEAP
Lightweight Extensible Authentication Protocol -
123
802.1
Port-authentication network access control mechanism for networks.
124
SSH
Secure Shell
125
Tunnel
An encrypted link between two programs on two separate computers.
126
SSL
Secure Socket Layer - requires a server with a certificate. Limited to HTML, FTP, SMTP,
127
TLS
Transport Layer Security - Designed as an upgrade to SSL. No restrictions.
128
IPsec
Internet Protocol Security - Authentication and encryption protocol suite that works at the Internet/Network layer. Transport mode and Tunnel mode.
129
AH
Authentication Header - for authentication
130
ESP
Encapsulating Security Payload - for implementing authentication and encryption.
131
ISAKMP
Internet Security Association and key Management Protocol - for establishing security associations (SAs) that define things like the protocol used for exchanging keys.
132
IKE and IKEv2
Internet Key Exchange and Kerberized Internet Negotiation of Keys (KINK), two widely used key exchanging protocols.
133
SCP
Secure Copy Protocol
134
SFTP
Secure FTP
135
OpenSSH
A series of secure programs developed by the OpenBSD organization to fix SSH's limitation of only being able to handle one session per tunnel.
136
SNMP
Simple Network Management Protocol - method for querying the state of SNMP-capable devices.
137
MIB
Management Information Base
138
LDAP
Lightweight Directory Access Protocol - tool that programs use to query and change a database used by the network.
139
NTP
Network Time Protocol - uses port 123
140
P2P
Peer-to-peer - any system can act as a server, client, or both.
141
VPN
Virtual Private Network
142
PPTP
Point-to-point tunneling protocol
143
RRAS
Routing and Remote Access Service
144
L2TP
Layer 2 Tunneling Protocol
145
VPN Concentrator
A VPN-capable router
146
SSL VPNs
Work at the application layer.
147
Trunking
The process of transferring VLAN between two or more switches.
148
Trunk Port
A port on a switch configured to carry all traffic, regardless of VLAN number, between all switches in a LAN.
149
VLAN
Virtual Local Area Network - A single physical broadcast domain and chop it up into multiple virtual broadcast domains.