Create
Learn
Share

Domain 4 Communication and Network Security

rename
klct555's version from 2017-06-05 12:47

Domain 4 Communication and Network Security

Question Answer
Bastion hostsServe as a gateway between a trusted and untrusted network that gives limited, authorized access to untrusted hosts.
BridgesLayer 2 devices that filter traffic between segments based on Media Access Control (MAC) addresses.
Common application service elements (CASE)Sublayer that provides for the application layer and request services from the session layer.
ConcentratorsMultiple connected devices into one signal to be transmitted on a network.
Direct-Sequence Spread SpectrumA wireless technology that spreads a transmission over a much larger frequency band, and with corresponding smaller amplitude.
DecryptionThe process of transforming encrypted information so that it is intelligible again.
EncryptionThe process of transforming information so it is unintelligible to anyone but the intended recipient.
Fibre Channel over Ethernet (FCoE)A lightweight encapsulation protocol and lacks the reliable date transport of the TCP layer.
File Transfer Protocol (FTP)A stateful protocol that requires two communication channels.
FirewallDevices that enforce administrative security policies by filtering incoming traffic based on set of rules.
Frequency-Hopping Spread Spectrum (FHSS)The wireless technology spreads its signal over rapidly changing frequencies.
Internet Control Message Protocol (ICMP)Provides a means to send error messages for non-transient error conditions and provided a way to probe the network in order to determine general characteristics.
Layer 1Physical Layer
Layer 2Data-Link Layer
Layer 3Network Layer
Layer 4Transport Layer
Layer 5Session Layer
Layer 6Presentation Layer
Layer 7Application Layer
Lightweight Directory Access Protocol (LDAP)A client/server-based directory query protocol loosely based upon X.500, commonly used for managing user information.
ModemsAllow users remote access to a network via analog phone lines.
OSI reference modelLayering model structured into seven layers ( physical layer, data-link layer, network layer, transport layer, session layer, presentation layer, application layer).
Ping ScanningA basic network mapping technique that helps narrow the scope of an attack.
Public-key encryptionInvolves a pair of keys-a public key and a private key-associated with an entity that needs to authenticate its identity electronically or to sign or encrypt data.
Remote Authentication Dial-in User Service (RADIUS)An authentication protocol used mainly in networked environments, such as ISPs, or for similar services requiring single sign-on for layer 3 network access, for scalable authentication combined with an acceptable degree of security.
Remote Procedure Calls (RPC)Represent the ability at allow for the executing of objects across hosts.
Screen ScraperA program which can extract data from output on a display intended for a human.
Security PerimeterThe first line of protection between trusted and untrusted networks.
Specific Application Service Element (SASE)Sublayer that provides application specific service (protocols).
Spread SpectrumA method commonly used to modulate information into manageable bits that are sent over the air wirelessly.
TCP/IP or Department of Defence (DoD) modelLayering model structure into four layer (link layer, network layer, transport layer, application layer).
TracerouteA diagnostic tool that displays the path a packet traverses between a source and destination host.
Transport Control Protocol (TCP)Provides connection-oriented data management and reliable data transfer.
User Datagram Protocol (UDP)Provides a lightweight service for connectionless data transfer without error detection and correction.
Virtual Private Network (VPN)An encrypted tunnel between two host that allows them to security communicate over an untrusted network.
Voice over Internet Protocol (VoIP)A technology that allow you to make voice calls using a broadband internet connection instead of a regular (or analog) phone line.
Wireless local area network (WLAN)Links two ro more devices over a short distance using wireless distribution method, usually providing a connection through an access point for Internet access.
Wireless mesh networkA wireless network made up of radio nodes organized in a mesh topology.
Wireless metropolitan area networkA type of wireless network that connects several wireless LANs.
Wireless personal area network (WPANs)Interconnected devices within a relatively small area that is generally within a person’s reach.
memorize

Recent badges