• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/38

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

38 Cards in this Set

  • Front
  • Back

________ or _______ refers to the flexible provision of data storage, applications, or services to multiple clients over a network.

Cloud Computing or Web services

Cloud computing's distinguishing features include:

Self-service on demad


Elastic


Multi Platform


Resource pooling/consolidation


Metered service

This service offers customers a complete set of networking services by a service provider

NaaS (Network as a Service)

A service mode in which hardware services are provided virtually.

IaaS (Infrastructure as a Service)

Provided to developers this service includes the operating system, the runtime libraries or modules the OS provides to applications, and the hardware on which the OS runs

PaaS (Platform as a Service)

A service model in which applications are provided through an online user interface and are compatible with a multitude of devices and OS's is known as what?

SaaS (Software as a Service)

A service that has any combination of functions.

XaaS (Anything as a Service)

A virtual connection between a client and a remote network, two remote networks, or two remote hosts over the internet is known as what?

VPN (Virtual Private Network)

This type of server runs communications services that enable remote user's to log on to a network and grant privileges to the network's resources.

RAS (Remote Access Server)

The two types of remote access servers are:

Dedicated devices; software running on a server (direct access)

Legacy software that was used for dial-up connections made by client computers running Windows 95, 98, NT, and 2000 to connect to a remote network

Remote Access Service (RAS)

This Layer 2 protocol, which does not support encryption, that enabled a workstation to connect to a server using a serial connection such as dial-up or DSL.

SLIP (Serial Line Internet Protocol)

This Layer 2 protocol supported encryption that enabled a workstation to connect to a server using a serial connection such as dial-up or DSL.

PPP (Point to Point Protocol)

The two models that VPNs can be classified as are:

Site-to-site VPN




Client-to-site VPN

Virtualization software by Citrix.

Xen

VPN in which two computers create the VPN tunnel directly between them.

Host-to-host VPN

Specialized device that authenticates VPN clients, establishes tunnels for VPN connections, and manages encryption for VPN transmissions.

VPN concentrator

Two primary encryption techniques used by VPNs are:

IPsec


SSL

Encryption provides what assurances to protecting data?

CIA (confidentiality, integrity, and availability)

A set of rules that tells a computer how to accomplish a particular task is known as what?

Algorithm

Encryption can be separated into what two categories?

Private and Public

A random string of characters:

Key

Scrambled data block

Ciphertext

Attempt to discover a key by trying numerous possible characters combinations.




Done either by human or by a specially designed program.

Brute force attack

Same key used during both encryption and decryption.

Symmetric encryption AKA private key encryption

Data encrypted using two keys, anyone may request the key, asymmetric encryption (requires two different keys).

Public Key Encryption

An enhancement to IPv4 and native to IPv6. An encryption protocol that define the rules for encrypting, authentication, and key management for TCP/IP transmissions is known as what?




Works at the Network Layer and adds security information to the header of all IP packets.

IPsec (Internet Protocol Security)





Forging name server records is known as what?

DNS spoofing

The process of verifying a user's credentials.

Authentication

SHA-2 (Secure Hash Algorithm) has what two popular key lengths?

256 bit hash; 513 bit hash

_________ _________ allows both computers to verity the credentials of the other.

Mutual authentication

This protocol operates over PPP (Point to Point Protocol) and uses a two-step authentication process, is simple, and not secured as it sends client's credentials in clear text.

PAP (Password Authentication Protocol)

A combination of a public key and a private key is known as what?

Key pair

______ was designed by the IETF for providing authentication and encryption over the internet. It works at the network layer and secures all applications that operate in the layers above it.

IPsec (Internet Protocol Security)

Most VPN tunneling protocols operate at what layer of the OSI model?

Data Link (layer 2)

In a _______ VPN tunnels connect multiple site on a WAN.

site-to-site

In a ______ VPN remote clintes, servers, and other hosts establish tunnels with a private network using a VPN Gateway on the edge of the LAN.

client-to-site

A proprietary Microsoft protocol, first available with Windows Vista.

SSTP (Secure Socket Tunneling Protocol)