Attempt 2 Net +

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

IBSS

Ad hoc technology where wireless adapter allows connections to and from other wireless devices

ARP

Address Resolution Protocol. Resolves IP addresses to MAC addresses. ARP poisoning attacks can redirect traffic through an attacker's system by sending false MAC address updates. VLAN segregation helps prevent the scope of ARP poisoning attacks within a network.

Link State

Allows a router to store the complete network topology and assess the least-cost paths from topology database

iSCSI (Internet Small Computer System Interface)

IP tunneling protocol that enables the transfer of SCSI data over an IP-based network to create a SAN

Bus Topology

More than two nodes is shared access topology, meaning that all nodes share the bandwidth of the media

CSMA/CA

Nodes listen to the media before transmitting and transmit when the media is clear

Penetration Testing

Discovers exploitable weaknesses in security system, it is an active approach to assessing vulnerabilites

Star Topology

Each endpoint node is connected to a central forwarding node such as a hub, switch or router

Ring Topology

Each node is wired to its neighbor in a closed loop

Logical Topology

Flow of data through the network

NetFlow

a tool used to gather network traffic statistics

SIEM

Security control used to integrate vulnerability and threat assessment efforts through automated collection, aggregation and analysis of log data

Layer 5

- Session Layer - creates the session between clients. establishes session - uses a session ID to keep the data stream separate

mGRE (Multipoint Generic Routing Encapsulation)

This is widely used to connect branch offices to an on-premises datacenter located at the head office

Encapsulation Errors

Will prevent transmission and reception, physical link is up but line protocol is down

Layer 3

- Network Layer - Routing - Assignment IP address - Packet/ Datagram - Routers & Gateways

tcpdump

- A command-line protocol analyzer. Administrators use it to capture packets. - tcpdump -i eth0 (eth0 is interface to listen on can be subsituted)

Layer 2

- Data Link - Responsible for transferring data between nodes on the same logical segment (Sends traffic to one another using physical hardware addresses)

TCP

- Guarantee delivery of packets - Connection-oriented - Transport Layer

UDP

- Non guarantee communication - Connectionless - Transport Layer

Layer 1

- physical - responsible for the transmission and receipt of the signals that represent bits of data from one node to another node

Layer 7

-Application layer - protocol association HTTP, Telnet, FTP etc -Integrating of network functionality into the host OS -Enabling communication between network client and services

Layer 6

-Presentation layer - handles syntax, encryption and compression - specifies data format

5G

50mbs - 300 mbps

Vulnerability

A security weakness

SLA

Agreement setting out the detailed terms provided under an ongoing service

MoU

Agreement to express an intent to work together

Passive TAP

Box with ports for incoming and outgoing network cabling and an inductor or optical splitter that physically copes the signal from the cabling to a monitor port

Port Aggregation

Combines two or more separate links into a single channel, which increases speed & redudnancy

Mesh Topology

Common in WANS, requires each device has a point-to-point link with every other device on network

SDN Infrastructure Layer

Devices that handle the actual forwarding of traffic and imposition of ACL and other configs for security

RIP (Routing Information Protocol)

Distance vector routing, uses a hop count metric to determine the distance to the destination network

Security Policy

Ensures the confidentiality, integrity, and availability of any data assets or processing systems

SDN Management Plane

Implements monitoring of traffic conditions and network status

DHCP Snooping

Inspects DHCP traffic arriving on access ports to ensure a host isn't trying to spoof its MAC addres, also prevents rogue DHCP servers from operating

Neighbor Discovery Protocol (NDP)

Main function is redirection which enables router to inform a host of a better route to a destination

SDN Application Layer

Makes decision on how traffic should be prioritized and secured and where it should be switched (Segmentation, ACL, QoS, Policy/shaping)

4G (LTE)

Max 150 mbps

Exploit

Means of utilizing a vulnerability

Network ID

Number common to all hosts on the same IP network

Host ID

Number identifies a host within an IP network

Zero Trust

Perimeter security is unlikely to be completely robust, it uses authentication and conditional access to mitigate privilege escalation and account compromise

Physical Topology

Placement of nodes and how they are connected by the network media

SPAN (switched port analyzer)/mirror port

Sensor is attached to a specially configured port on the switch that receives copies of frames addressed to nominated access ports

SDWAN Software-Defined WAN

Software-defined mechanisms and routing policies to implement virtual tunnels and overlay networks over multiple types of transport network

OSPF

Suited for large organizations with multiple redundant paths between networks, has high convergence performance and weighted elements such as reliability, bandwidth, and load

Yagi antenna

Unidirectional antenne, this is common for outdoor use and can boost radio signals long distances

BGP

Used between routing domains and is used as the routing protocol on the internet primarily between ISPs

MPLS (Multiprotocol Label Switching)

Used by service providers to implement WAN access links and virtual private networks with (Congestion control), Class of Service, and Quality of Service

Hybrid Topology

Uses a mixture of point-to-point, star, mesh, ring, and bus topologies

Distance Vector

Uses number of hops to destination, the route with the fewest hops is the least-cost path and the network will select it for use

Active TAP

this is a powered device that performs signal regeneration (again, there are copper and fiber variants), which may be necessary in some circumstances. Gigabit signaling over copper wire is too complex for a passive tap to monitor and some types of fiber links may be adversely affected by optical splitting. Because it performs an active function, the TAP becomes a point of failure for the links in the event of power loss. When deploying an active TAP, it is important to use a model with internal batteries or connect it to a UPS.

Layer 4

transport layer -> TCP and UDP


Ensembles d'études connexes

ENH 121 Unit 3 Part 1: Constitutional Law

View Set

Converting decimals to fractions and vice versa

View Set

PHR Study Session #6: Risk Management

View Set

HESI community 2 (study my friend)

View Set

The Red Scare and the Palmer Raids

View Set