Study sets matching "network chapter 8"

Study sets
Classes
Users

Study sets matching "network chapter 8"

30 terms
Network+ Chapter 8
Posture assessment
Jamming
Buffer overflow
DRDoS (distributed reflector DoS) attack
Your organization has just approved a special budget for a ne…
What wireless attack might a potential hacker execute with a…
What kind of vulnerability is exploited by a ping of death?
Which type of DoS attack orchestrates an attack using uninfec…
Posture assessment
Your organization has just approved a special budget for a ne…
Jamming
What wireless attack might a potential hacker execute with a…
76 terms
Network Chapter 8
WAN- Wide Access Network
GAN- Golbal Area Network
WAN Devices
Modem
A netowrk that spans a large area, often across myltiple geog…
...
An able you to connect LANs together.
Enable digital data to be sent over an analog medium cinch as…
WAN- Wide Access Network
A netowrk that spans a large area, often across myltiple geog…
GAN- Golbal Area Network
...
94 terms
Network+ Chapter 8
1G
2.4-GHz band
2G
3G
The first generation of mobile phone services, popular in the…
The range of radio frequencies from 2.4 to 2.4835 GHz. The 2.…
Second-generation mobile phone service, popular in the 1990s.…
Third-generation mobile phone service, released in the early…
1G
The first generation of mobile phone services, popular in the…
2.4-GHz band
The range of radio frequencies from 2.4 to 2.4835 GHz. The 2.…
30 terms
Network+ Chapter 8
Posture assessment
Jamming
Buffer overflow
DRDoS (distributed reflector DoS) attack
Your organization has just approved a special budget for a ne…
What wireless attack might a potential hacker execute with a…
What kind of vulnerability is exploited by a ping of death?
Which type of DoS attack orchestrates an attack using uninfec…
Posture assessment
Your organization has just approved a special budget for a ne…
Jamming
What wireless attack might a potential hacker execute with a…
32 terms
Chapter 8 Network+
The concept of masking all of the priv…
What is an ISR?
What happens to the layer 2 frame on a…
Routers use ____ to determine where to…
Network Address Translation or NATWhat is an ISR?
An integrated services router offers more than just routing.…
The layer 2 frame is stripped away and the IP packet is dropp…
Routing tables
The concept of masking all of the priv…
Network Address Translation or NATWhat is an ISR?
What is an ISR?
An integrated services router offers more than just routing.…
78 terms
Network+ Chapter 8 Network Risk Managament
posture assessment
security audit
hacker
hacker
Every organization should assess its security risks by conduc…
A qualified consulting company can also assess the security o…
A __________, in the original sense of the word, is someone w…
Today, a __________ is used more generally to describe indivi…
posture assessment
Every organization should assess its security risks by conduc…
security audit
A qualified consulting company can also assess the security o…
41 terms
Wireless Network Security - Chapter 8
AES-CCMP
Bluejacking
Bluesnarfing
Bluetooth
The encryption protocol standard for WPA2.
An attack that sends unsolicited messages to Bluetooth-enable…
An attack that accesses unauthorized information from a wirel…
A wireless technology that uses short-range radio frequency (…
AES-CCMP
The encryption protocol standard for WPA2.
Bluejacking
An attack that sends unsolicited messages to Bluetooth-enable…
Network+ Chapter 8 Network Risk Management
Your organization has just approved a…
What wireless attack might a potential…
What kind of vulnerability is exploite…
Which type of DoS attack orchestrates…
D. Posture assessment
A. Jamming
B. Buffer overflow
C. DRDoS (distributed reflector DoS) attack
Your organization has just approved a…
D. Posture assessment
What wireless attack might a potential…
A. Jamming
Network + Chapter 8
Subnetting
Subnetting
Subnetworks
2^1
When you take one larger network and break it into a bunch of…
Advantages: reduced network traffic, optimized network perfor…
What you create when you take bits from host portion of the I…
2
Subnetting
When you take one larger network and break it into a bunch of…
Subnetting
Advantages: reduced network traffic, optimized network perfor…
Network+ Guide to Networks - Chapter 8
True
True
False
False
T/F: Wireless signals experience attenuation.
T/F: Spread spectrum is a popular way of making wireless tran…
T/F: Wireless networks are laid out using the same topologies…
T/F: If a station detects the presence of several access poin…
True
T/F: Wireless signals experience attenuation.
True
T/F: Spread spectrum is a popular way of making wireless tran…
30 terms
Network+ Chapter 8 - QFT
Posture assessment
Jamming
Buffer overflow
DRDoS (distributed reflector DoS) attack
Your organization has just approved a special budget for a ne…
What wireless attack might a potential hacker execute with a…
What kind of vulnerability is exploited by a ping of death?
Which type of DoS attack orchestrates an attack using uninfec…
Posture assessment
Your organization has just approved a special budget for a ne…
Jamming
What wireless attack might a potential hacker execute with a…
156 terms
Network+ Chapter 8 Wireless LANs
Ad Hoc
Hotspot
Association
Basic WLAN Topology with a Wireless Ro…
A WLAN in which a device with a built-in wireless card connec…
An AP that provides WiFi as a service.
The process through which a wireless client attaches with a w…
Ad Hoc
A WLAN in which a device with a built-in wireless card connec…
Hotspot
An AP that provides WiFi as a service.
Network Chapter 8
AUP
access list
ACL
agent
A portion of the security policy that explains to users what…
A list of statements used by a router to permit or deny the f…
A list of statements used by a router to permit or deny the f…
A software routine that collects data about a managed device'…
AUP
A portion of the security policy that explains to users what…
access list
A list of statements used by a router to permit or deny the f…
Network+ Guide to Networks - Chapter 8
True
True
False
False
T/F: Wireless signals experience attenuation.
T/F: Spread spectrum is a popular way of making wireless tran…
T/F: Wireless networks are laid out using the same topologies…
T/F: If a station detects the presence of several access poin…
True
T/F: Wireless signals experience attenuation.
True
T/F: Spread spectrum is a popular way of making wireless tran…
Network+ Chapter 8 The Wonderful World of Routing
Area ID
AS (Autonomous System)
BDR (Backup Designated Router)
Basic NAT
Address assigned to routers in an OSPF network to prevent flo…
One or more networks that are governed by a single protocol w…
A second router set to take over if the designated router fai…
A simple form of NAT that translates a computer's private or…
Area ID
Address assigned to routers in an OSPF network to prevent flo…
AS (Autonomous System)
One or more networks that are governed by a single protocol w…
Network Essentials [Chapter 8]
Subnetting will ____ traffic, _____ pe…
What is the Class A default subnet mask?
What is the Class B default subnet mas…
What is the Class C default subnet mask?
Reduce, improve, isolate
255.0.0.0
1111 1111.1111 1111.0000 0000.0000 0000
255.255.255.0
Subnetting will ____ traffic, _____ pe…
Reduce, improve, isolate
What is the Class A default subnet mask?
255.0.0.0
30 terms
Network+ Guide to Networks Chapter 8 - RQ
Posture assessment
Jamming
Buffer overflow
DRDoS (distributed reflector DoS) attack
Your organization has just approved a special budget for a ne…
What wireless attack might a potential hacker execute with a…
What kind of vulnerability is exploited by a ping of death?
Which type of DoS attack orchestrates an attack using uninfec…
Posture assessment
Your organization has just approved a special budget for a ne…
Jamming
What wireless attack might a potential hacker execute with a…
30 terms
Network+ chapter 8
____ is an 802.11n network feature all…
____ may use either the 2.4-GHz or 5-G…
A unique characteristic of the 802.11…
In ____ wireless systems, the transmit…
Frame aggregation
802.11n
Sequence Control
fixed
____ is an 802.11n network feature all…
Frame aggregation
____ may use either the 2.4-GHz or 5-G…
802.11n
34 terms
Network+ Chapter 8 continued
What TCP/IP command can be used to tro…
What is the Linux, Macintosh and UNIX…
Tracert is used on which operating sys…
traceroute is used on which operating…
nslookup
ifconfig
windows
mac, linux and unix
What TCP/IP command can be used to tro…
nslookup
What is the Linux, Macintosh and UNIX…
ifconfig
47 terms
Chapter 8 Computer Network
DoS
Smurf
Virus
Worm
An attack that impacts system ability by flooding it with tra…
A form of DRDoS attack that fakes the source address in ICMP…
A program that attempts to damage a computer system and repli…
A self replicating program that uses the network to replicate…
DoS
An attack that impacts system ability by flooding it with tra…
Smurf
A form of DRDoS attack that fakes the source address in ICMP…
31 terms
network chapter 8
which of the following prevents access…
based in the diagram, which type of pr…
which of the following network service…
What port number is used by SNMP?
content filter
reverse proxy server
SSH
161
which of the following prevents access…
content filter
based in the diagram, which type of pr…
reverse proxy server
25 terms
Networking Chapter 8 Network Infrastructures and Security
3-leg perimeter configuration
application-level gateway (ALG)
back-to-back configuration
caching proxy
A configuration whereby the DMZ is usually attached to a sepa…
A firewall technology that supports address and port translat…
A configuration that has a DMZ situated between two firewall…
A server or device that tries to serve client requests withou…
3-leg perimeter configuration
A configuration whereby the DMZ is usually attached to a sepa…
application-level gateway (ALG)
A firewall technology that supports address and port translat…
20 terms
Network Security Chapter 8
What is the best way to secure Telnet?
What is the best way to make sure data…
What is the best way to direct visitor…
____ is a simple method of transferrin…
Do not use Telnet at all.
Use the"secure"flag on all sensitive cookies.
Create a .htaccess file with the following entry: Redirect 30…
FTP
What is the best way to secure Telnet?
Do not use Telnet at all.
What is the best way to make sure data…
Use the"secure"flag on all sensitive cookies.
41 terms
Wireless Network Security - Chapter 8
AES-CCMP
Bluejacking
Bluesnarfing
Bluetooth
The encryption protocol standard for WPA2.
An attack that sends unsolicited messages to Bluetooth-enable…
An attack that accesses unauthorized information from a wirel…
A wireless technology that uses short-range radio frequency
AES-CCMP
The encryption protocol standard for WPA2.
Bluejacking
An attack that sends unsolicited messages to Bluetooth-enable…
77 terms
Chapter 8 - Network Risk Management
Data breach
Posture assessment
Security audit
Hacker
An unauthorized access or use of sensitive data
A thorough examination of each aspect of the network to deter…
A security assessment that happens to companies accredited by…
Someone who masters the inner workings of computer hardware a…
Data breach
An unauthorized access or use of sensitive data
Posture assessment
A thorough examination of each aspect of the network to deter…
24 terms
Network + - Chapter 8 Wireless LANs
Modulates data over an entire range of…
Allows the participants in a communica…
Uses a relatively slow modulation rate…
802.11 Frequency & Speed
Direct-sequence spread spectrum (DSSS)
Frequency-hopping spread spectrum (FHSS)
Orthogonal frequency division multiplexing (OFDM)
2.4 GHz 1 Mbps or 2 Mbps
Modulates data over an entire range of…
Direct-sequence spread spectrum (DSSS)
Allows the participants in a communica…
Frequency-hopping spread spectrum (FHSS)
25 terms
Chapter 8 Network Security
The most common protocol suite used to…
____ is used by devices to communicate…
SNMP agents are protected with a passw…
The ____ is a database, organized as a…
TCP/IP
ICMP
community string
DNS
The most common protocol suite used to…
TCP/IP
____ is used by devices to communicate…
ICMP
Chapter 8 Network + Guide to Networks
802.11a
802.11b
802.11g
802.11n
The IEEE standard for a wireless networking technique that us…
The IEEE standard for a wireless networking technique that us…
The IEEE standard for a wireless networking technique designe…
The IEEE standard for a wireless networking technique that ma…
802.11a
The IEEE standard for a wireless networking technique that us…
802.11b
The IEEE standard for a wireless networking technique that us…
Chapter 8 | Network Risk Management
MASTER ZOMBIE
LOGIC BOMB
SLAVE ZOMBIE
SIGNATURE SCANNING
An upper-layer host in a botnet.
A malicious program designed to start when certain conditions…
A lower-layer host in a botnet.
The comparison of a file's content with known malware signatu…
MASTER ZOMBIE
An upper-layer host in a botnet.
LOGIC BOMB
A malicious program designed to start when certain conditions…
10 terms
Chapter 8: Network Effects
Network Effects (Metcalfe's Law)
Value of Network effects come from 3 s…
Switching costs
Complementary Benefits
When the value of a product or service increases as its numbe…
1) Exchange... 2) Staying Power... 3) Complementary Benefits
THe cost of a consumer incurs when moving from one product to…
Products or services that add additional value to the primary…
Network Effects (Metcalfe's Law)
When the value of a product or service increases as its numbe…
Value of Network effects come from 3 s…
1) Exchange... 2) Staying Power... 3) Complementary Benefits
24 terms
Chapter 8 Network Security
Cryptography
Transposition cipher
One-time pads
Quantum cryptography
the study of secret writing. Conceal the context of some mess…
encrypt plaintext by moving small pieces of the message around
a one-time pad is a system in which a private key generated r…
uses our current knowledge of physics to develop a cryptosyst…
Cryptography
the study of secret writing. Conceal the context of some mess…
Transposition cipher
encrypt plaintext by moving small pieces of the message around
55 terms
Comptia Network + Chapter 8
802.11a
802.11ac multiple input
802.11b
802.11g
Ratified in 1999, this standard supports speeds as high as 54…
An IEEE wireless networking standard operating in the 5GHz ra…
Ratified in 1999, this standard supports speeds as high as 11…
Ratified in 2003, this standard supports speeds as high as 54…
802.11a
Ratified in 1999, this standard supports speeds as high as 54…
802.11ac multiple input
An IEEE wireless networking standard operating in the 5GHz ra…
Chapter 8: Network Effects
Understanding Network Effects
What is the service that provides ulti…
Congestion Effects
The Network Effect and the 3rd World
- NOT present in all industries, but a powerful force when it…
Telephone.... - The more people who own telephones, the more val…
When increasing numbers of users lower the value of a product…
- Cellular networks... - Technology Leapfrogging... - Positive Ext…
Understanding Network Effects
- NOT present in all industries, but a powerful force when it…
What is the service that provides ulti…
Telephone.... - The more people who own telephones, the more val…
Network+ Chapter 8
1G
2.4-GHz band
2G
3G
The first generation of mobile phone services, popular in the…
The range of radio frequencies from 2.4 to 2.4835 GHz. This b…
Second-generation mobile phone service, popular in the 1990s.…
Third-generation mobile phone service, released in the early…
1G
The first generation of mobile phone services, popular in the…
2.4-GHz band
The range of radio frequencies from 2.4 to 2.4835 GHz. This b…
Network + Chapter 8 Review Questions
/21
/29
6 host
30
You have a Class B network and need 29 subnets. What is your…
What mask provides 6 hosts per subnet and has a 255.255.255.2…
How many hosts per subnet does a /29 mask provide?
What is the maximum number of IP addresses that can be assign…
/21
You have a Class B network and need 29 subnets. What is your…
/29
What mask provides 6 hosts per subnet and has a 255.255.255.2…
41 terms
Chapter 8 - Wireless Network Security
AES-CCMP
Bluejacking
Bluesnarfing
Bluetooth
The encryption protocol standard for WPA2.
An attack that sends unsolicited messages to Bluetooth-enable…
An attack that accesses unauthorized information from a wirel…
A wireless technology that uses short-range radio frequency (…
AES-CCMP
The encryption protocol standard for WPA2.
Bluejacking
An attack that sends unsolicited messages to Bluetooth-enable…
30 terms
Network Security - Chapter 8 - Wireless Network Security
Bluetooth falls under the category of…
A Bluetooth network that contains one…
___ is the unauthorized access of info…
The IEEE ___ standard specifies a maxi…
personal area network (PAN)
piconet
Bluesnarfing
802.11a
Bluetooth falls under the category of…
personal area network (PAN)
A Bluetooth network that contains one…
piconet
21 terms
Wireless Network Security - Chapter 8
AES-CCMP
Bluejacking
Bluesnarfing
Bluetooth
The encryption protocol standard for WPA2.
An attack that sends unsolicited messages to Bluetooth-enable…
An attack that accesses unauthorized information from a wirel…
A wireless technology that uses short-range radio frequency (…
AES-CCMP
The encryption protocol standard for WPA2.
Bluejacking
An attack that sends unsolicited messages to Bluetooth-enable…
Chapter 8 - Communications and Networks
802.11
802.16
ATM
Bluetooth
Series of network standards developed by IEEE that specifies…
Worldwide Interoperability for Microwave Access. Newer networ…
Asynchronous Transfer Mode; service that carries voice, data,…
Network standard, specifically a protocol, that defines how t…
802.11
Series of network standards developed by IEEE that specifies…
802.16
Worldwide Interoperability for Microwave Access. Newer networ…
Network Pro Ch 8
Which of the following prevents access…
You manage a server that runs your com…
Based on the diagram, which type of pr…
Which of the following network service…
Content filter
Proxy server
Reverse Proxy Server
SSH
Which of the following prevents access…
Content filter
You manage a server that runs your com…
Proxy server
30 terms
Network Security - Chapter 8 - Wireless Network Security
Bluetooth falls under the category of…
A Bluetooth network that contains one…
___ is the unauthorized access of info…
The IEEE ___ standard specifies a maxi…
personal area network (PAN)
piconet
Bluesnarfing
802.11a
Bluetooth falls under the category of…
personal area network (PAN)
A Bluetooth network that contains one…
piconet
30 terms
Network+ Chapter 8 - Characteristics of Wireless Transmission
frequency
single
diffraction
Interference
In wireless communication, to exchange information, two anten…
A directional antenna issues wireless signals along a(n)
In ____, a wireless signal splits into secondary waves when i…
____ is a significant problem for wireless communications bec…
frequency
In wireless communication, to exchange information, two anten…
single
A directional antenna issues wireless signals along a(n)
Chapter 8 network essentials
Basics of switch operations.
Auto-negotiate mode
auto-MDEX
Mac Address
1. Switches work at the Data link layer(Layer 2) of the OSI m…
Most inexpensive switches. the switch exchanges information w…
switch port detects the type port device and cable it's conne…
tells the switch where to forward a frame.
Basics of switch operations.
1. Switches work at the Data link layer(Layer 2) of the OSI m…
Auto-negotiate mode
Most inexpensive switches. the switch exchanges information w…
103 terms
Network Basics and Setup & Chapter 8
The concept related to using computer…
A high-frequency transmission cable th…
A short-range radio communication stan…
The speed with which a modem transmits…
Connectivity
Coaxial
Bluetooth
Transfer Rate
The concept related to using computer…
Connectivity
A high-frequency transmission cable th…
Coaxial
Chapter 8: Cellular and Network Properties
Why are glial cells important for neur…
How is the strength of the initial dep…
How do graded potentials lose strength…
How is neural signaling hindered to ca…
Glial cells provide neurons with structural stability. This i…
By how much charge enters that cell
Current leak-open leak channels allow positive charge to leak…
The loss of myelin from vertebrate neurons slows the conducti…
Why are glial cells important for neur…
Glial cells provide neurons with structural stability. This i…
How is the strength of the initial dep…
By how much charge enters that cell
Security+ Network Security Fundamentals Chapter 8
False
False
True
False
TCP is responsible for addressing packets and sending them on…
TCP/IP uses its own five-layer architecture that includes Net…
IEEE 802.1x is commonly used on wireless networks.
IP telephony and Voice over IP (VoIP) are identical.
False
TCP is responsible for addressing packets and sending them on…
False
TCP/IP uses its own five-layer architecture that includes Net…
21 terms
Network Architecture Chapter 8 IP Routing
Routing Basics
Router Learns about
routing table
Packet Header Info
Information needed for... routing:... • Destination address... • Neigh…
remote networks from... neighboring routers or... from an administr…
a map of the... internetwork, and it... describes how to find... remot…
This figure shows a LAN connected to RouterA that's connected…
Routing Basics
Information needed for... routing:... • Destination address... • Neigh…
Router Learns about
remote networks from... neighboring routers or... from an administr…
94 terms
Network+ Guide to Networks - Sixth Edition - Chapter 8 Key Terms
1G
2.4-GHz band
2G
3G
The first generation of mobile phone services, popular in the…
The range of radio frequencies from 2.4 to 2.4835 GHz. The 2.…
Second-generation mobile phone service, popular in the 1990s.…
Third-generation mobile phone service, released in the early…
1G
The first generation of mobile phone services, popular in the…
2.4-GHz band
The range of radio frequencies from 2.4 to 2.4835 GHz. The 2.…
Wireless Network Security - Chapter 8
Bluetooth falls under the category of…
A Bluetooth network that contains one…
____________ is the unauthorized acces…
The IEEE ___________ standard specifie…
D. personal area network (PAN)
D. piconet
D. bluesnarfing
B. 802.11a
Bluetooth falls under the category of…
D. personal area network (PAN)
A Bluetooth network that contains one…
D. piconet
Chapter 8-Network Effects
Complementary Benefits
Network Effects
TCO, total cost of ownership
Congestion Effects
Products or services that add additional value to the primary…
Also known as Metcalfe's Law, or network externalities. When…
direct costs plus indirect costs e.g training support
When increasing numbers of users lower the value of a product…
Complementary Benefits
Products or services that add additional value to the primary…
Network Effects
Also known as Metcalfe's Law, or network externalities. When…
1 of 10