• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/106

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

106 Cards in this Set

  • Front
  • Back

Anycast address

Replaces IPv4 broadcast address,contacts all machines with a service

IPsec

IPv6 encryption protocol


Address Truncation

Reducing IPv6 to the shortest possible address

Unique local address

Address assigned manually to make sure it stays on a private network

Link local address

Similar to APIPA in IPv4

Unicast address

Similar to IPv4, a single address on a single interface for direct line of communication

Global unicast address

A routable address used to set up a host to host link on the public internet

Multicast address

An address used to receive data that is intended for many destinations at once

Tunnelling

Sending an IPv6 datagram inside an IPv4 packet header

Verify TCP/IP settings

Ipconfig/all

Test connection with a remote machine

Ping

Discover the Mac address of a network device

Arp -a

Determine how a computer is choosing to send packets to local or remote destinations

Route print

Compare broadcast packets to unicast packets

Netstat -e

Attempt to acquire an automatic assigned IP address

Ipconfig /renew

Discover weather a connection to resolve a domain name to it's IP address has recently been attemped

Ipconfig/displaydns

Display a list of all active connections

Netstat -a

Display the path to a remote destination

Tracert


t


Display statistics for all protocols currently in use

Netstat -s

Query a DNS server from Linux or Unix host machine for o formation about host addresses and name servers

Dig

Displays Linux hosts interface configuration settings

Ifconfig

802.11a

Creates signals in the 5GHz range

802.15

Better for short distances and limited data for personal area networks

SSID

A name that is used to represent a wireless network to a set of common hosts

802.11b

Uses 11Mbps signals at 2.4GHz frequency

802.11n

Uses MIMO to take multiple simultaneous connections while increasing range

802.11i

WiFi Protect access version 2 (WPA2)

802.11g

Can deliver 54Mbps at 2.4 GHz

802.11e

Incorporates Quality of service to improve telephones service over wireless connection

ESS

Allows multiple access points to work together for extending wireless networks

AdHoc

Wireless network in which one device associates itself with another device without the help of a wireless access point

DHCPDiscover

The broadcast packet that is used to elicit DHCP from a server

7/8

The maximum amount of time that a client is forced to renew it's DHCP address from an existing DHCP server

Ipconfig /registerdns

Causes all local DHCP addresses to be refreshed and renewed with the DHCP server

DHCP Option

Additional information that can be used to leverage the maximum use of TCP/IP settings

Lease period

The period of time that a client can claim a DHCP address provided by DHCP

DHCP offer

Attempt from server to present a requesting client with an address from a pool or scope

DHCP pack

The last step in a successful DHCP assignment

DHCP Request

Client response to a DHCP offer

Internal Threat

A person or condition within an organization possessing potential for harm

Security policy

A organizational framework that defines assets to be protected and assigns authority for doing so

Hacker

a generic term for an individual engaged in attempts to circumvent security measures protecting data

Firewall

a hardware appliance running software used in logical security to scrutinize and manage data traffic

Network auditing

Process of monitoring and reporting on network related events involving accessing and using data

Data signature

A logical digital pattern that provides clues as to the type and purpose of worm virus or malware

DMZ

A physical topology that separates the internal network from the external network

Vulnerability

Points of network access where the exposure to threats can turn into unauthorized intrusion

White Hat

Ethical hacking authorized by an organization as a means of testing and hardening security defenses

Access control list

Security policy implementation such that a specific data asset is protected using an authentication and authorization process

Encryption

Use of mathmatical algorithms to hide data by scrambling its symbols or changing the symbols

Tunnel - Data

Use of data encapsulation to package data inside another header to hide the original header of the data

IDS

Intrusion detection server

Dynamic WEP

Changes RC4 encryption key periodically to enhance security

EAP

Message framework used by WPA-Enterprise for authentication

WPA2

Uses AES instead of old TKIP

Supplicant role

A client side request for authentication for the purpose of gaining access to the network

WPA

Uses TKIP to check for key tampering

Authenticator role

Verifies a client's credentials to access the network itself, previous to any other network resources

AES

Block based cypher encryption at either 128 Bits or 256 Bits

802.1x

Specifies port based access control for wired or wireless conections



TKIP

Modifies WEP by wrapping an RC4 encrypted packet in additional code

Static WEP

Keeps its encryption key as configured

Authentication server

Process that is programmed to check and enforce credentials required to access network resources

War driving

Driving around looking for networks

War Chalking

Marking open networks on the sidewalk

port: POP3

110

port: HTTP

80

port: SNMP

161

port: TFTP

69

port: DHCP

67

port: SSH

22

port: RIP

520

port: HTTPS

443

port: FTP

21

port: SMTP

25

port: DNS

53

port: Telnet

23

port: NTP

123

port: AMAP

143

port: RDP

3389

RDP

Provides a graphical user interface to a remote user

SIP

Used in voice over IP to initiate telephone service request

FTP

Provides connection oriented data file transfer

BOOTP

Predecessor to DHCP that provided IP addresses automatically

TFTP

Provides connection less data transfer

SNMP

Provides the ability to remotely monitor and manage network devices

IMAP4

Provides for retrieval of email using an always-connected session

SMTP

Provides for transfer of emails between servers

HTTPS

requires a login to secure access to a website

POP3

provides for an email client to access email remotely as prompted by the user

SSH

Provides secure connection to be able to manage remote devices

RTP

Provides for improved audio/video streaming over the internet

IGMP

Manages multicast groups

NTP

Provides for clock sync across a domain

Telnet

Older method of accessing remote devices

TLS

Authentication and encryption process for viewing web pages securely

HTTP

provides access to files through a web browser

ARP

Maps an IP address to a mac address

UDP

Provides a connectionless network service

ICMP

Network layer protocol used by programs such as ping to deliver connection messages

OSI Layer 1

Physical: Converts signals to bits

OSI layer 2

Data link: Defines the use of mac addresses

OSI layer 3

Network: This layer must contain a source IP address

OSI layer 4

Transport: This layer defines what segment number will be sent or acknowledged

OSI layer 5

Session: This layer initiates contact with the destination

OSI Layer 6

This layer is responsible for formatting data for use by a network aware program