• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
Define netstat.
A TCP/IP troubleshooting utility that displays statistics and the stare of current TCP connections. It also displays ports, which can signal whether services are using the correct ports.
Define NAT.
Network Address Translation. A technique in which IP addresses used on a private network are assigned a public IP address by a gateway when accessing a public network.
Define PAT.
Port Address Translation. A form of address translation
What is a routers Access Control List?
It instructs the router to permit or deny traffic according to one or more variables.
Define IDS.
A dedicated device or software running on a host that monitors and flags (ans sometimes logs) any unauthorized attempt to access an organization's secured resources on a network or host.
Define port mirroring.
One port is configured to send a copy of all of its to a second port on the switch. The second port issues the copied traffic to a monitoring program.
Define DMZ.
Demilitarized zone. It is the a networks protective perimeter.
Define IPS.
A dedicated device or software running on a host that automatically reacts to any unauthorized attempt to access an organization's secured resources on a network or host. IPS i soften combines with IDS.
Define proxy service.
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic and providing one address to the outside world, instead of revealing the addresses of internal LAN Devices.
Define proxy server.
A network host that runs a proxy service. Can also be called gateways.
Define encryption.
Use of an algorithm to scramble data into a format that can be read only by reversing the algorithm - that is decrypting the data.
Define brute force attack.
An attempt to discover an encryption key or password by trying numerous possible character combinations.

Usually a brute force is performed rapidly by a program design for that purpose.
Define private key.
Data is encrypted using a single key that only the sender and receiver know.

AKA symmetric encryption

The same key is used during both the encryption and decryption of the data.
Define ACL.
A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Define AAA
The name of a category of protocols that establish a client's identity. Check the clients identity and, based on those , allow or deny access to a system or network. They also track a client's system or network usage.
Define brute force attack.
An attempt to discover an encryption key or password by trying numerous possible character combinations. Usually this is performed by a program for that purpose.
Define content filtering firewall.
A firewall that can block certain types of traffic from entering a protected network.
Define denial of service attacl.
A security attack caused by a deluge of traffic that disables a system.
Define IPSec.
A layer 3 protocol that defines encryption, authentication, and key management for TCP/IP transmissions. It is unique in that it adds security information to the header of all packets.
Define man in the middle attack.
A security threat that relies on intercepted transmissions. It can take several forms. In all cases a person redirects or captures secure data traffic while in transit.