04. Protocols Terms Flashcards

(54 cards)

1
Q

In the context of IPsec, a type of encryption that provides authentication of the IP packet’s data payload through public key techniques.

A

AH (authentication header)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A core protocol in the TCP/IP suite that functions in the data link layer of the OSI model. ARP works in conjunction with IPv4 to discover the MAC address of a node on the local network and to maintain a database that maps local IP addresses to MAC addresses.

A

ARP (Address Resolution Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A database of records that maps MAC addresses to IP addresses. The ARP table is stored on a computer’s hard disk where it is used by the ARP utility to supply the MAC addresses of network nodes, given their IP addresses.

A

ARP table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A type of encryption (such as public key encryption) that uses a different key for encoding data than is used for decoding the cipher text.

A

asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process of ensuring that an entity (such as a user, device, or application) is who they say they are.

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An entity that issues and maintains digital certificates as part of the PKI (publickey infrastructure).

A

CA (certificate authority)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A Cisco proprietary standard used by networking devices, such as routers and switches, to discover neighboring networking devices along with information about those devices, such as configurations or capabilities.

A

CDP (Cisco Discovery Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A method of error checking that determines if the contents of an arriving data unit match the contents of the data unit sent by the source.

A

checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A three-tenet, standard security model describing the primary ways that encryption protects data. Confidentiality ensures that data can only be viewed by its intended recipient or at its intended destination. Integrity ensures that data was not modified after the sender transmitted it and before the receiver picked it up. Availability ensures that data is available to and accessible by the intended recipient when needed.

A

CIA (confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A VPN accessed by the client system through a limited, web-based connection using a browser and secured by SSL/TLS.

A

clientless VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of VPN in which clients, servers, and other hosts establish tunnels with a private network using a VPN gateway at the edge of the private network.

A

client-to-site VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A small file containing verified identification information about an entity and the entity’s public key.

A

digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A standard that uses the SSL/TLS-secured HTTPS protocol to secure DNS resolution requests using the default HTTPS port 443.

A

DoH (DNS over HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A standard that uses SSL/TLS to secure DNS resolution requests with a default port of 853.

A

DoT (DNS over TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A record in an ARP table that is created when a client makes an ARP request that cannot be satisfied by data already in the ARP table.

A

dynamic ARP table entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The use of an algorithm called a cipher to scramble data into a format that can be read only by reversing the cipher—that is, by deciphering or decrypting the data—to keep the information private.

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In the context of IPsec, a type of encryption that provides authentication of the IP packet’s data payload through public key techniques and encrypts the entire IP packet for added security.

A

ESP (Encapsulating Security Payload)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The most common Ethernet standard today. Ethernet II is distinguished from other Ethernet frame types in that it contains a 2-byte type field to identify the upper-layer protocol contained in the frame.

A

Ethernet II

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A type of VPN that captures all network traffic, whether destined for the Internet or for the remote network.

A

full tunnel VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A tunneling protocol developed by Cisco that is used to transmit IP and other kinds of messages through a tunnel.

A

GRE (Generic Routing Encapsulation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The trip a unit of data takes from one connectivity device to another. Typically, hop is used in the context of router-to-router communications.

A

hop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A switch management option, such as Telnet, that uses the existing network and its protocols to interface with a switch.

A

in-band management

23
Q

A layer 3 protocol that defines encryption, authentication, and key management for TCP/IP transmissions. IPsec is an enhancement to IPv4 and is native to IPv6.

A

IPsec (Internet Protocol Security)

24
Q

A setting on Ethernet network devices that allows the creation and transmission of extra-large frames, which can be as large as just over 9,000 bytes.

25
A series of characters that is combined with a block of data during that data’s encryption or decryption.
key
26
The process of enforcing standards for all phases of a key’s life cycle.
key management
27
The name for a MAC address on an IPv6 network.
link-layer address
28
A vendor-neutral standard used by networking devices, such as routers and switches, to discover neighboring networking devices along with information about those devices, such as configurations or capabilities.
LLDP (Link Layer Discovery Protocol)
29
The largest IP packet size in bytes that routers in a message’s path will allow without fragmentation and excluding the frame.
MTU (maximum transmission unit)
30
A data link layer protocol that works with ICMPv6 to detect neighboring devices on an IPv6 network, helps manage the SLAAC (stateless address autoconfiguration) process, and oversees router and network prefix discovery.
NDP (Neighbor Discovery Protocol)
31
A TCP/IP troubleshooting utility that displays statistics and details about TCP/IP components and connections on a host. It also lists ports, which can signal whether services are using the correct ports.
netstat
32
A dedicated connection (either wired or wireless) from the network administrator’s computer used to manage each critical network device, such as routers, firewalls, servers, power supplies, applications, and security cameras.
OOBM (out-of-band management)
33
A software package or hardware-based tool that can capture data on a network.
packet sniffer
34
The use of certificate authorities to associate public keys with certain entities.
PKI (public-key infrastructure)
35
A type of key encryption in which the sender and receiver use a key to which only they have access. Also known as symmetric encryption.
private key encryption
36
A repeated trial message transmitted by the tracert and traceroute utilities to trigger routers along a route to return specific information about the route.
probe
37
A software package or hardware-based tool that can capture and analyze data on a network.
protocol analyzer
38
A form of key encryption in which data is encrypted using two keys: One is a key known only to a user (that is, a private key), and the other is a key associated with the user and that can be obtained from a public source, such as a public key server. Public key encryption is also known as asymmetric encryption.
public key encryption
39
A method for connecting and logging on to a server, LAN, or WAN from a workstation that is in a different geographical location.
remote access
40
Graphical-based access to a remote computer’s desktop.
remote desktop connection
41
A certificate signed by the entity that creates it rather than by a trusted, third-party CA (certificate authority).
self-signed certificate
42
A type of VPN (virtual private network) in which VPN gateways at multiple sites encrypt and encapsulate data to exchange over tunnels with other VPN gateways. Meanwhile, clients, servers, and other hosts on a site-to-site VPN communicate with the VPN gateway.
site-to-site VPN
43
A type of VPN that captures only the traffic destined for the remote network. The client can communicate with local network resources directly and with Internet resources through a local Internet connection.
split tunnel VPN
44
The act of impersonating fields of data in a transmission, such as when a source IP address is impersonated in a DRDoS (distributed reflection denial of service) attack.
spoofing
45
A record in an ARP table that someone has manually entered using the ARP utility.
static ARP table entry
46
A method of encryption that requires the same key to encode the data as is used to decode the cipher text.
symmetric encryption
47
A free, command-line packet sniffer utility that runs on Linux and other UNIX operating systems.
tcpdump
48
Software that allows a user on one computer, called the client, to control another computer, called the host or server, across a network connection.
terminal emulator
49
A file server used to remotely boot devices that don’t have their own hard drives, to collect log files from devices, or to back up and update network device configuration files.
TFTP server
50
A three-step process in which transport layer protocols establish a connection between nodes.
three-way handshake
51
A TCP/IP troubleshooting utility available in Linux, UNIX, and macOS systems that sends UDP messages to a random port on the destination node to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
traceroute
52
A Windows utility that uses ICMP (Internet Control Message Protocol) echo requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
tracert
53
A virtual connection between a client and a remote network, two remote networks, or two remote hosts over the Internet or other types of networks, to remotely provide network resources.
VPN (virtual private network)
54
A VPN gateway that manages multiple tunnels from individual VPN clients.
VPN headend