• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/19

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

19 Cards in this Set

  • Front
  • Back
Anti-X
The term used by Cisco to refer to a variety of security tools that help prevent various attacks, including antivirus, anti-phishing, and anti-spam.
connection establishment
The process by which a connection-oriented protocol creates a connection. W/ TCP, a connection is established by a 3-way transmission of TCP segments.
denial of service (DoS)
A type of attack whose goal is to cause problems by preventing legitimate users from being able to access services, thereby preventing the normal operation of computers & networks.
error detection
The process of discovering whether or not a data-link level frame was changed during transmission. This process typically uses a Frame Check Sequence (FCS) field in the data-link trailer.
error recovery
The process of noticing when some transmitted data was not successfully received & resending the data until it is successfully received.
firewall
A device that forwards packets between the less secure & more secure parts of the network, applying rules that determine which packets are allowed to pass, and which are not.
flow control
The process of regulating the amount of data sent by a sending computer toward a receiving computer. Several flow control mechanisms exist, including TCP flow control, which uses windowing.
forward acknowledgment
A process used by protocols that do error recovery in which the # that acknowledges data lists the next data that should be sent, not the last data that was successfully received.
HTTP
Hypertext Transfer Protocol. The protocol used b web browsers & web servers to transfer files, such as text & graphic files.
intrusion detection system (IDS)
A security function that examines more complex traffic patterns against a list of both known attack signatures & general characteristics of how attacks may be carried out, rating each perceived threat & reacting to prevent the more significant threats.
intrusion prevention system (IPS)
A security function that examines more complex traffic patterns against a list of both known attack signatures & general characteristics of how attacks may be carried out, rating each perceived threat & reacting to prevent the more significant threats.
order data transfer
A networking function, included in TCP, in which the protocol defines how the sending host should number the data transmitted, defines how the receiving device should attempt to reorder the data if it arrives out of order, & specifies to discard the data if it cannot be delivered in order.
port
In TCP & UDP, a # that is used to uniquely identify the application process that either sent (source port) or should receive (destination port) data. In LAN switching, another term for switch int.
positive acknowledgment & retransmission (PAR)
A generic reference to how the error recovery feature works in many protocols, including TCP, in which the receiver must send an acknowledgment that either implies that the data was (positively) received, or send an acknowledgment that implies that some data was lost, so the sender can then resend the lost data.
segment
In TCP, a term used to describe a TCP header & its encapsulated data (also called an L4PDU). Also in TCP, the process of accepting a large chunk of data from the app layer & breaking it into smaller pieces that fit into TCP segments. In Ethernet, a segment is either a single Eth cable or a single collision domain (no matter how man cables are uses).
sliding windows
for protocols such as TCP that allow the receiving device to dictate the amt. of data the sender can send before receiving an ack--a concept called a window -- a reference to the fact that the mechanism to grant future windows is typically just a # that grows upwards slowly after each ack, sliding upward.
URL
Universal Resource Locator. A standard for how to refer to any piece of info retrievable via a TCP/IP network, most notably used to identify web pages. For ex., http://www.cisco.com/univercd is a URL that identifies the protocol (HTTP), hostname (www.cisco.com), and web page (/univercd).
virtual private network (VPN)
The process of securing communication between 2 devices whose packets pass over some public & unsecured network, typically the Internet. VPNs encrypt packets so that the communication is private & authenticate the identity of the endpoints.
VoIP
Voice over IP. the transport of voice traffic inside IP packets over an IP network.