• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/89

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

89 Cards in this Set

  • Front
  • Back
Which items MUST be included in a data network?
NETWORK PROTOCOL
NETWORK ADAPTER HWARE & DRIVERS
NETWORK MEDIA
Which reference model exchanges data between any two points on a telecom. network?
OSI model
What are the layers of the OSI Model?
Please do not throw sausage pizza away
1.Physical
2.Data Link
3.Network
4.Transport
5.Session
6.Presentation
7.Application
Which model was developed in the late 60s from a project sponsored by DARPA to design the Internet's protocol?
TCP/IP Model
This TCP/IP model layer supports application-to-application info transfers using port number to ID the applications
HOST-TO-HOST
This TCP/IP model layer handles the physical networking reqs of generating frames on a cable, fiber, or wireless network.
Network access
This TCP/IP model layer creates logical networks using IP network addresses
Networking
This TCP/IP model layer begins process of sending info using application programs, then ends the process at the destination device or application.
Process
A multinational co. with offices all over the world needs to communicate. What type of network will this be?
WAN
What is the type of data network topology where all devices are connected to a central device that performs a traffic distribution function?
STAR
What is a type of network data topology where all devices are connected to all other devices?
MESH
Which TCP/IP protocol is a connection oriented protocol used in the TCP/IP model?
TCP
Data services are combinations of HW and SW dedicated to managing ________ and _____
functions and resources
Which remote access technology uses secure transport protocols like IPSEC to xfer info from a remote client over the Internet?
VPN
Which action is a capability of the PPTP remote access protocol?
Encapsulating PPP packets for remote delivery over the Internet to the target network
What happens in the OSI Presentation Layer
Conversion of data from one format to another
Encryption
What happens in the OSI Session Layer?
Creation, maintenance, & discontinuation of connections.
Manages Sequence #s
What happens in the Transport Layer
Connection oriented/ connectionless-Flow Control-
Segmentation-Error Detection
AKA reliable delivery-Multiplex
Contains Sequence #s
What happens in the Network Layer?
Logic addressing-hierarchical addressing structure
Routing (which path is best)
What happens in the Data Link Layer?
TWO SUBLAYERS:
LLC-Data formatting from one media to another
MAC hardware address
What is the Physical Layer responsible for?
Cable
How Fast
What are the layers of the OSI Model?
Physical, Data Link, Network, Transport, Session, Presentation, Application
What is used in the TCPIP model to resolve IP to MAC addresses?
ARP (Address Resolution Protocol)
What is a logical address that is used to move info between nodes?
IP
What is a connection-oriented protocol used in the TCPIP model?
TCP
What is a connectionless protocol that supports process ID using port numbers?
UDP
This is used to assign IP addresses on a network
DHCP
This protocol is used with IP multicasting to indicate when a device is joining a multicast enabled app data stream
IGMP
This data network type is often implemented within workgroups and usually implemented with copper wiring or wireless
LAN
This type of data network is used to connect buildings within a campus setting
CAN
A network is used within a metro area and is often implemented as a SONET ring
MAN
This data network physically connects networks over large geographical areas
WAN
This data network type forwards traffic between segments using a single type of network protocol
Switched Network
This network type connects similar or dissimilar physical networks based on OSI layer 3
Routed Network
In this data network type, all devices are connected to a central device
Star
In this network topology, all devices are connected to a single, linear comm path shared by all
Bus
In this data network type, all devices are connected to a single, circular comm path with a structure requiring each to connect directly to two others
Ring
This data network type has all devices connected directly to all others
Mesh
This TCPIP model layer supports app to app info xfer using port numbers to ID the apps
Host to Host
This TCPIP model layer handles the physical networking reqs of generating frames on a cable, fi her, or wireless network
Network Access
This TCPIP model layer creates logical networks using IP addresses
Networking
This TCPIP model layer begins the process of sending info using app programs, then ends the process at the destination
Process
What is a type of data network topology where all devices are connected to a device performing traffic distr.function
STAR
Network topology where all devices re connected to all other devices?
MESH
Connection oriented protocol used in the TCPIP model
TCP
Which remote access tech.uses secure transport protocols like IPSEC to xfer info from a remote client over the net?
VPN
What action is a capability of PPTP?
Encapsulating PPP packets for remote delivery over the net to the target network
This type of attack can be used to target the availability of the network or its services
DOS
This type of attack is when an attacker interposes a device between two legit hosts to gain access to their data transmissions
Man in the Middle
While this may not usually cause a failure, it does cause network over utilization by filling nets with unwanted email
SPAM
Malicious program that attaches itself to another program
Virus
Malware program that does not require support of a target program like a virus.Can duplicate itself to other devices
Worm
This is unauthorized software masquerading as authorized software.
Trojan horse
This type of attack is where attackers inserts some type of malicious software, or malware into the user's system disabling OS
Malicious Code attack
This security protocol is an upgraded version of SSL
TLS
This network security mechanism detects unwanted network attacks and alerts admin to the event.
IDS (Intrusion detection system)
This remote access security mechanism verifies the ID of auth users and performs authentication
RADIUS
This remote access sec is a radius like system with improvements.
TACACS, TACACS+, XTACACS
This is an authentication protocol improving on RADIUS by strengthening its weaknesses.Works in roaming.
DIAMETER
This list on a router can protect traffic with a rule to permit/deny traffic through the router
ACL
This can help network security. It's placed inline, does not monitor traffic, but reacts if intrusions are Id'd & blocks event
IPS
This backup method backs up all selected files
Full Backup
This backup method clears the archive bit and reduces backup time and media & copies files and dbs modified since last bu
Incremental backup
This backup method copies all modifications since last full bu to the bu media.Does not turn off archive bit
Differential backup
Here, realtime copies of db transactions are stored in journals at remote locals
Remote journaling
This bu method copies modified files to offsite local
Electronic vaulting
Names 3 single points of failure
DISKS, SERVERS, CIRCUITS
Single drive fails but recovery not forced due to distributing parity info on all striped drives. Which RAID levrel?
Level 5
Here, data striping occurs over all drives and parity held on one drive
RAID 3
Here, data striped over several drives and no redundancy or parity is involved.
RAID 0
Here, data is written in disk sector units to all drives and parity is written to all drives.
RAID 5
Here, there is mirroring of all drives. Data is written to 2 drives at once. If 1 fails the other has the same data.
RAID 1
What provides the ability to reconstruct contents of a failed disk onto a replacement?
Failure Resistant Disk System
What is the least user accepted biometric device?
Retina scan
The 3 things that must be considered for planning and implementation of access control mechanisms are:
Threats to the system
System's vuln to these threats
Risk that threat may materialize
What is a clipping level of three?
This means that three of fewer logo attempts by an individ at a workstation will not be reported as a violation
What is the most important error type for a biometric access control system?
Type II error AKA False acceptance rate.
This is obtaining info of a higher sensitivity by combining info from lower levels of sensitivity
Aggregation
Circumstance where collection of info items is required to be classified at a higher sec level than any of the individual items that comprise it
Aggregation
A cryptographic protocol and infrastructure developed to send encrypted credit card numbers over the Internet
SET
Secure Electronic Transaction
Monitors network traffic/host audit logs in order to determine if any violations of an organization's security policy have taken place
IDS
This layer deals with MAC addresses
Data Link Layer
In which layer of the OSI Model are connection-oriented protocols in the TCP/IP suite implemented?
Transport Layer
A table of subjects and objects indicating what actions individual subjects can take upon individual objects
Access Control Matrix
Knowledge-based Intrusion Detection Systems (IDS) are more common than:
Behavior based IDS
A token-passing scheme like token ring that has second ring that remains dormant until an error condition is detected on the primary ring?
Fiber Distributed Data Interface
FDDI
Which security model is based on the military classification of data and people with clearances?
Bell LaPadula Model
A one-way hash provides
Integrity
Which model does NOT include data integrity or conflict of interest?
Bell LaPadula Model