Unit 3 - Module 2 Flashcards

1
Q

What protocol allows two or more devices to form a connection and stream data?

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Hypertext Transfer Protocol Secure (HTTPS)

A

A network protocol providing secure method of communication between clients and website servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a network protocol?

A

A set of rules used by two or more devices on a network, describing the order of delivery and structure of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Transmission Control Protocol? (TCP)

A

An internet communications protocol that allows two devices to form a connection and stream data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What network protocol is used to determine the MAC address of the next router or device on the path?

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What network protocol translates internet domain names into IP addresses?

A

Domain Name System (DNS)

( Turns website names into IP addresses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

1) What is a User Datagram Protocol (UDP)

A

A connectionless protocol that does not establish a connection between devices before a transmission. This is less safe but allows transmission to get to their destination quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which protocol does gaming usually use? Why?

A

User Datagram Protocol (UDP)
UDP is a fast way to get transmissions to their destination quickly, but less safe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Protocol is less safe than Transmission Control Protocol (TCP)? Why is it less safe?

A

User Datagram Protocol (UDP)
It’s less safe because it doesn’t need to make a connection between devices before a transmission, while a TCP must make a connection before.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are management protocols used for?

A

Monitoring and managing activity on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a Simple Network Management Protocol (SNMP) used for?

A

Monitoring and managing devices on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Internet Control Message Management Protocol (ICMP)

What is it commonly used to address?

A

A internet protocol used by devices to tell each other about data transmission errors across the network.

Commonly used to address ping issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 3 Protocols?

A

Communication, Management, and Security protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Private IP Addresses

Assigned by who?
Unique only within what?
How much does it cost? $$$

A

1) Assigned ny network admins
2) Unique only within private network
3) Free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Public IP Addresses

Assigned by who?
Is the adress unique?
Ho wmuch does it cost? $$$

A

1) Assigned by ISP and IANA
2) Unique adress in global internet
3) Cost to lease a public IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does IANA stand for? What do they do?

A

The Internet Assigned Numbers Authority is a standards organization that oversees global IP address allocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What do DHCP stand for? What does it do?

A

**Dynamic Host Control Protocol **
An application layer protocol used on a network to configure devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Are MAC addresses permanent?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the ARP’s purpose?

A

Translate IP addresses that are found in data packets into MAC adresses.

20
Q

What is an application layer protocol?

A

Defines how application processes (clients and servers), running on different systems, pass messages to each other.

21
Q

What is Telnet?

A

An application layer protocol that allows a device to communicate with another device or server. Telnet send all information in clear text.

22
Q

What is Secure Shell’s purpose?

A

Create a secure connection with a remote system

23
Q

What is Post office protocol? (POP)

A

Protocol used to manage and retrieve email from a mail server

24
Q

What is Internet Message Access Protocol (IMAP) purpose?

A

Used for incoming email, it downloads the headers of emails, not the context.

25
What's is **Simple *Mail Transfer* Protocol** function? (SMTP)
Used to transmit and route email from the sender to the recipient's address.
26
What is a **port number**'s function?
Used by network devices to determin what should be done with the information contained in the data packet once they reach their destination.
27
What is IEEE 802.11?
WIFI | Wireless LANs
28
What is WPA?
Wifi Protected Access (WPA) | A wireless security protocol for devices to connect to the internet
29
What is the oldest wireless security (WI-Fi) protocol?
Wireless equivalent pricavy (WEP) | It's largely out of use to this day. It's from 1999.
30
What's the key differences between WPA2 and WPA3? | 3 Things
1) WPA3 addresses the authentication handshake vulnerability to KRACK attacks, which is present in WPA2 2) WPA3 uses Simultaneous Authentication of Equals (SAE), a password-authenticated, cipher-key-sharing agreement. 3) WPA3 has increased encryption to make passwords more secure by using 128-bit encryption, with WPA3-Enterprise mode offering optional 192-bit encryption.
31
Which security protocol is used to keep information safe?
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) provide a secure protocol by which two networked peers may perform encrypted communications.
32
What is **Port Filerting**?
A firewall function that blocks or allows certain port numbers to limit unwanted communication.
33
What do you call a software firewall that is hosted by a *cloud* service provider?
Cloud-based Firewalls
34
What do you call a firewall that keeps track of information passing through it and proactivvely filters out threats.
A Stateful Firewall
35
What's a Stateless firewall?
Firewall that operates based on predefined rules and does not keep track of information from data packets.
36
What is a NGFW and 3 benefits of it
Next Generation Firewall 1) Deep Packet inspection 2) Intrusion protection 3) Threat Intelligence
37
What 3 Things Do ***Virtual Private Networks*** (VPN) do?
1) Changes public IP address 2) Hides your virtual location 3) Encrypts your data online
38
What is the process performed by a VPN serice that protects your data by wrapping sensitive data in other data packets?
Encapsulation
39
What do you call a segment of a network that protects the internal network from the internet?
Security Zone
40
What do you call dividing the network into segments?
Network Segmentation
41
What is an Uncontrolled Zone?
Any network outside of the organization's control
42
What is a subnet that protects the internal network from the uncontrolled zone?
Controlled Zone
43
What are 3 areas in the controlled zone?
1) Demilitarized Zone (DMZ) 2) Interneal Network 3) Restricted Zone
44
What do you call dividing networks up while under the same router?
Subnetting
45
What kind of **proxy** server regulates and restrict a *person's* access to the internet?
Forward Proxy Server
46
What kind of **proxy** server regulates and restricts the* internet's* accsess to an internal server?
Reverse Proxy Server