Chap 7-9 networks
Terms in this set (41)
botnet, zombie army
"What two terms describe a network of compromised computers that are then used to perform coordinated DDoS attacks without their owners' knowledge or consent?
"What kind of firewall blocks traffic based on application data contained within the packets?
"What two log files are used by older versions of Unix and newer version of Linux to store log information?
"What utility in Linux provides standards for generating, storing, and processing messages about events on a system?
"TCP is preferred over UDP for real time services.
"On circuit switched portions of a PSTN, what set of standards established by the ITU is used to handle call signaling?
"What two options below are AAA services?
"The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
KDC (Key Distribution Center)
"In Kerberos terminology, the server that issues keys to clients during initial client authentication.
PPP (Point to Point Protocol)
"A Layer 2 communications protocol that enables a workstation to connect to a server using a serial connection such as dial-up or DSL. It can support multiple Network layer protocols and can encrypt transmissions.
TKIP (Temporal Key Integrity Protocol)
"An encryption key generation and management scheme used by 802.11i.
IaaS (Infrastructure as a Service)
"A service model in which hardware services are provided virtually, including network infrastructure devices such as virtual servers.
SaaS (Software as a Service)
"A service model in which applications are provided through an online user interface and are compatible with a multitude of devices and operating systems.
ESP (Encapsulating Security Payload)
"In the context of IPsec, a type of encryption that provides authentication of the IP packet's data payload through public key techniques. In addition, it also encrypts the entire IP packet for added security.
IKE (Internet Key Exchange)
"One of two services in the key management phase of creating a secure IPsec connection. It negotiates the exchange of keys, including authentication of the keys. It uses UDP and usually runs on port 500.
CHAP (Challenge Handshake Authentication Protocol)
An authentication protocol that operates over PPP and also encrypts usernames and passwords for transmission
PaaS (Platform as a Service)
"A service model in which various platforms are provided virtually, enabling developers to build and test applications within virtual, online environments tailored to the specific needs of a project.
"RTP and RTCP operate at which layer of the OSI model?
AH (Authentication Header)
"In the context of IPsec, a type of encryption that provides authentication of the IP packet's data payload through public key techniques.
"________________ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire.
"Wireshark or any other monitoring software running on a single computer connected to a switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.
"The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.
What kind of vulnerability is exploited by a ping of death?
"Which virus below combines polymorphism and stealth techniques to create a very destructive virus?
"A firewall typically involves a combination of hardware and software.
Platform as a Service (PaaS)
"The _________________ cloud service model provides virtual environments online that can be tailored to the needs of developers.
"A _________________ is a service that is shared between multiple organizations, but not available publicly.
"After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.
Tunneled Transport Layer Security (TTLS)
"A variant of TLS is ___________________, which provides authentication like SSL/TLS, but does not require a certificate for each user.
In ACL statements, the any keyword is equivalent to using which wildcard mask?
"Which two viruses below are examples of boot sector viruses?
"At what layer of the OSI model do firewalls operate?
The ________________ utility is a Windows console that is used to control what users do and how the system can be used.
packet sniffer, network tap
What two terms below describe a network device with three ports, two of which send and receive all traffic, and the third port mirrors the traffic?
digital PBX, IP PBX
"What two terms below are used to describe an analog-to-digital voice conversion device that accepts and interprets both analog and digital voice signals?
persistent agent, dissolvable agent
"What two types of agents are used to check compliance with network security policies?
"The simplest type of firewall is a content filtering firewall.
Internet Security Association and Key Management Protocol (ISAKMP), Internet Key Exchange (IKE)
"The key management phase of IPSec is reliant on which two services below?
"An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
"Which of the following is NOT an encryption algorithm used by SSH?
At what layer of the OSI model does the IPsec encryption protocol operate?
YOU MIGHT ALSO LIKE...
Test Preparation TOEIC, SAT, TOEFL
Network+ ch 7 - Cloud Computing and Remote Access
Networking Fundamentals: Chapter 2
OTHER SETS BY THIS CREATOR
ITSE1345 -Exam1 prep alphabetized
ITSE1345 -Exam1 prep
Fundamentals of networks - Chapter 7-9 b
Fundamentals of networks - Chapter 7-9
THIS SET IS OFTEN IN FOLDERS WITH...
Open Systems Interconnection Model (OSI)
N+ Exam A
CompTIA Network+ Transcender Sample Questions