• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/42

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

42 Cards in this Set

  • Front
  • Back

TCP and UDP

Transmission Control Protocol and User Datagram Protocol- the 2 primary protocols used to Transport data across a network

TCP

Starts data transmission with an established session using a 3-way handshake process

UDP

Transmits data using a best-effort method with no session

TCP 3-way handshake process

1. SYN 2. SYN/ACK 3. ACK (session now established, data is transmitted)

TCP sliding window

The number of segments that can be sent at a time

Cyclical redundancy check (CRC)

An error-checking process used to verify that the data in each segment is intact

NACK

Negative acknowledge packet, sent when a segment or part of a segment is corrupt or missing; causes the sending computer to retransmit the segments in the sliding window

Address Resolution Protocol (ARP)

Uses broadcast transmissions to identify the MAC address of computers

To access ARP

Cmd prompt -> arp -a

Hypertext Transfer Protocol (HTTP)

Defines how files on the WWW are formatted, transmitted, and rendered in web browsers

Hypertext Transfer Protocol over SSL (HTTPS)

HTTP that uses Secure Socket Layers to encrypt data transmissions over the WWW

Hypertext Markup Language (HTML)

The Internet standard for formatting and displaying documents on the Internet

Encryption protocols

Scramble plain text into cipher text

File Transfer Protocol (FTP)

Used to upload/download files to and from computers on the Internet (uses TCP)

Trivial File Transfer Protocol (TFTP)

A scaled-down version of FTP that uses UDP instead of TCP

Telnet

A command-line interface that allows bidrectional communication within a network

Secure Shell (SSH)

An encryption protocol that creates a secure encrypted session that can be used by other protocols; has replaced Telnet in many applications

Remote Desktop Services (RDS)

Used on Microsoft Windows servers to host applications or entire desktops that are accessible to users on a network

Secure Sockets Layer (SSL)

An encryption protocol used to provide confidentiality, integrity, and authentication with digital certificates

Confidentiality

Protecting secret data from unauthorized disclosure (often through encryption)

Integrity

Protects data from being modified by unauthorized users (often by checking the data at different points)

Authentication

Protects data by granting or denying access after a user/computer's identity has been verified

Transport Layer Security (TLS)

An encryption protocol that provides security through confidentiality, integrity, and authentication; designed to replace SSL

Digital certificate

A file stored on a computer that helps verify the entity's identity, and helps with encryption and integrity

Public Key Infrastructure (PKI)

Has several elements that support digital certificates

Certificate Authority (CA)

An organization or service that issues, manages, and validates digital certificates

Internet Protocol Security (IPSec)

An encryption protocol used by both IPv4 and IPv6 that uses an authentication header (AH), encapsulating security protocol (ESP), and ensures data integrity

Tunnel Mode (IPSec)

Encrypts the entire packet (data and headers); used by VPNs

Transport Mode (IPSec)

Encrypts only the data (not the headers); used within internal networks

Simple Mail Transfer Protocol (SMTP)

The primary protocol used to deliver email over the Internet (b/w SMTP servers) and within internal networks

Post Office Protocol v3 (POP3)

A common protocol used to retrieve email from an email server (POP3); typically removes the email once received

Internet Message Access Protocol (IMAP4)

A common protocol used to retrieve email from an email server (IMAP4), commonly used on internal networks since it retains email messages

Lightweight Directory Access Protocol (LDAP)

The protocol used to query directories such as Microsoft's Active Directory Domain Services; uses plain text by default

Domain directory

A database of objects such as users, computers, and groups

Disk drive folders

Directories found only on disk drives (nothing to do with LDAP)

Secure Lightweight Directory Access Protocol (SLDAP)

LDAP that uses SSL or TLS and digital certificates to protect data from sniffers

Kerberos

The primary authentication protocol used within a Microsoft domain (part of Active Directory); developed by MIT; issues time-stamped tickets encrypted with symmetric cryptography

Point-to-Point Tunneling Protocol (PPTP)

A VPN protocol that provides a secure connection over a public network (such as the Internet)

Simple Network Management Protocol (SNMP)

A management protocol used to manage network devices such as routers and switches

Internet Group Multicast Protocol

A protocol used for multicast transmissions for IPv4 that uses Class D multicast addresses

Multicast Class D IPv4 addresses

224.0.0.0-239.255.255.255

Internet Control Message Protocol (ICMP)

A core protocol used to send error messages and to communicate the availability or unavailability of services