Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
106 Cards in this Set
- Front
- Back
Anycast address |
Replaces IPv4 broadcast address,contacts all machines with a service |
|
IPsec |
IPv6 encryption protocol |
|
Address Truncation |
Reducing IPv6 to the shortest possible address |
|
Unique local address |
Address assigned manually to make sure it stays on a private network |
|
Link local address |
Similar to APIPA in IPv4 |
|
Unicast address |
Similar to IPv4, a single address on a single interface for direct line of communication |
|
Global unicast address |
A routable address used to set up a host to host link on the public internet |
|
Multicast address |
An address used to receive data that is intended for many destinations at once |
|
Tunnelling |
Sending an IPv6 datagram inside an IPv4 packet header |
|
Verify TCP/IP settings |
Ipconfig/all |
|
Test connection with a remote machine |
Ping |
|
Discover the Mac address of a network device |
Arp -a |
|
Determine how a computer is choosing to send packets to local or remote destinations |
Route print |
|
Compare broadcast packets to unicast packets |
Netstat -e |
|
Attempt to acquire an automatic assigned IP address |
Ipconfig /renew |
|
Discover weather a connection to resolve a domain name to it's IP address has recently been attemped |
Ipconfig/displaydns |
|
Display a list of all active connections |
Netstat -a |
|
Display the path to a remote destination |
Tracert t |
|
Display statistics for all protocols currently in use |
Netstat -s |
|
Query a DNS server from Linux or Unix host machine for o formation about host addresses and name servers |
Dig |
|
Displays Linux hosts interface configuration settings |
Ifconfig |
|
802.11a |
Creates signals in the 5GHz range |
|
802.15 |
Better for short distances and limited data for personal area networks |
|
SSID |
A name that is used to represent a wireless network to a set of common hosts |
|
802.11b |
Uses 11Mbps signals at 2.4GHz frequency |
|
802.11n |
Uses MIMO to take multiple simultaneous connections while increasing range |
|
802.11i |
WiFi Protect access version 2 (WPA2) |
|
802.11g |
Can deliver 54Mbps at 2.4 GHz |
|
802.11e |
Incorporates Quality of service to improve telephones service over wireless connection |
|
ESS |
Allows multiple access points to work together for extending wireless networks |
|
AdHoc |
Wireless network in which one device associates itself with another device without the help of a wireless access point |
|
DHCPDiscover |
The broadcast packet that is used to elicit DHCP from a server |
|
7/8 |
The maximum amount of time that a client is forced to renew it's DHCP address from an existing DHCP server |
|
Ipconfig /registerdns |
Causes all local DHCP addresses to be refreshed and renewed with the DHCP server |
|
DHCP Option |
Additional information that can be used to leverage the maximum use of TCP/IP settings |
|
Lease period |
The period of time that a client can claim a DHCP address provided by DHCP |
|
DHCP offer |
Attempt from server to present a requesting client with an address from a pool or scope |
|
DHCP pack |
The last step in a successful DHCP assignment |
|
DHCP Request |
Client response to a DHCP offer |
|
Internal Threat |
A person or condition within an organization possessing potential for harm |
|
Security policy |
A organizational framework that defines assets to be protected and assigns authority for doing so |
|
Hacker |
a generic term for an individual engaged in attempts to circumvent security measures protecting data |
|
Firewall |
a hardware appliance running software used in logical security to scrutinize and manage data traffic |
|
Network auditing |
Process of monitoring and reporting on network related events involving accessing and using data |
|
Data signature |
A logical digital pattern that provides clues as to the type and purpose of worm virus or malware |
|
DMZ |
A physical topology that separates the internal network from the external network |
|
Vulnerability |
Points of network access where the exposure to threats can turn into unauthorized intrusion |
|
White Hat |
Ethical hacking authorized by an organization as a means of testing and hardening security defenses |
|
Access control list |
Security policy implementation such that a specific data asset is protected using an authentication and authorization process |
|
Encryption |
Use of mathmatical algorithms to hide data by scrambling its symbols or changing the symbols |
|
Tunnel - Data |
Use of data encapsulation to package data inside another header to hide the original header of the data |
|
IDS |
Intrusion detection server |
|
Dynamic WEP |
Changes RC4 encryption key periodically to enhance security |
|
EAP |
Message framework used by WPA-Enterprise for authentication |
|
WPA2 |
Uses AES instead of old TKIP |
|
Supplicant role |
A client side request for authentication for the purpose of gaining access to the network |
|
WPA |
Uses TKIP to check for key tampering |
|
Authenticator role |
Verifies a client's credentials to access the network itself, previous to any other network resources |
|
AES |
Block based cypher encryption at either 128 Bits or 256 Bits |
|
802.1x |
Specifies port based access control for wired or wireless conections |
|
TKIP |
Modifies WEP by wrapping an RC4 encrypted packet in additional code |
|
Static WEP |
Keeps its encryption key as configured |
|
Authentication server |
Process that is programmed to check and enforce credentials required to access network resources |
|
War driving |
Driving around looking for networks |
|
War Chalking |
Marking open networks on the sidewalk |
|
port: POP3 |
110 |
|
port: HTTP |
80 |
|
port: SNMP |
161 |
|
port: TFTP |
69 |
|
port: DHCP |
67 |
|
port: SSH |
22 |
|
port: RIP |
520 |
|
port: HTTPS |
443 |
|
port: FTP |
21 |
|
port: SMTP |
25 |
|
port: DNS |
53 |
|
port: Telnet |
23 |
|
port: NTP |
123 |
|
port: AMAP |
143 |
|
port: RDP |
3389 |
|
RDP |
Provides a graphical user interface to a remote user |
|
SIP |
Used in voice over IP to initiate telephone service request |
|
FTP |
Provides connection oriented data file transfer |
|
BOOTP |
Predecessor to DHCP that provided IP addresses automatically |
|
TFTP |
Provides connection less data transfer |
|
SNMP |
Provides the ability to remotely monitor and manage network devices |
|
IMAP4 |
Provides for retrieval of email using an always-connected session |
|
SMTP |
Provides for transfer of emails between servers |
|
HTTPS |
requires a login to secure access to a website |
|
POP3 |
provides for an email client to access email remotely as prompted by the user |
|
SSH |
Provides secure connection to be able to manage remote devices |
|
RTP |
Provides for improved audio/video streaming over the internet |
|
IGMP |
Manages multicast groups |
|
NTP |
Provides for clock sync across a domain |
|
Telnet |
Older method of accessing remote devices |
|
TLS |
Authentication and encryption process for viewing web pages securely |
|
HTTP |
provides access to files through a web browser |
|
ARP |
Maps an IP address to a mac address |
|
UDP |
Provides a connectionless network service |
|
ICMP |
Network layer protocol used by programs such as ping to deliver connection messages |
|
OSI Layer 1 |
Physical: Converts signals to bits |
|
OSI layer 2 |
Data link: Defines the use of mac addresses |
|
OSI layer 3 |
Network: This layer must contain a source IP address |
|
OSI layer 4 |
Transport: This layer defines what segment number will be sent or acknowledged |
|
OSI layer 5 |
Session: This layer initiates contact with the destination |
|
OSI Layer 6 |
This layer is responsible for formatting data for use by a network aware program |