Protocols CISSP

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

IPv6 address

128 bit address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets, a group sometimes also called a hextet). The groups are separated by colons (:). An example of an _________________ address is: 2001:0db8:85a3:0000:0000:8a2e:0370:7334.

Point-to-Point Protocol (PPP)

A Data link layer (layer 2) communications protocol between two routers directly without any host or any other networking in between. It can provide connection authentication, transmission encryption, and compression. Has mostly replaced SLIP

IEEE 802.5 Token Ring

A LAN technology. The token passing scheme is used in place of Carrier Sense Multiple Access with Collision Detection (CSMA/CD). It uses a special three-byte frame called a token that travels around a logical ring of workstations or servers. This token passing is a channel access method providing fair access for all stations, and eliminating the collisions of contention-based access methods. Token Ring was a successful technology, particularly in corporate environments, but was gradually eclipsed by the later versions of Ethernet. A token is circulated around a network. The computer that has possession of the token has the right to transmit packets for a certain period of time. If that computer has no packets to transmit then the token is passed to the next computer. Only one computer at a time can transmit packets so this helps to avoid collision problems. Layer 1

IPSec (Internet Protocol Security)

A Network Layer 3 protocol that defines encryption, authentication, and key management for TCP/IP transmissions. IPSec is an enhancement to IPv4 and is native to IPv6. IPSec is unique among authentication methods in that it adds security information to the header of all IP packets. IPsec is a layer 3 OSI model or internet layer end-to-end security scheme. Authenticates, and encrypts packets of data to provide secure communication between two computers often uses in VPN

Secure Sockets Layer (SSL)

A Protocol developed by Netscape for securely transmitting documents over the Internet that uses a private key to encrypt data. Is cryptographic protocols designed to provide communications security over a computer network The _____ protocol was deprecated and replaced by TSL. _____. This protocol is used in conjunction with other protocols such as HTTP on port 80 or HTTPS on Port 443

H.245

A Session layer 5 control protocol defined as part of ITU's H.323 multi-service network architecture. _________ is responsible for controlling a session between two nodes. For example, it ensures that the two nodes are communicating in the same format

X.25

A legacy packet switching network technology developed in the 1970s to move data across less than reliable public carriers. Works across Layer 1 & 2.

Open Shortest Path First (OSPF)

A link-state protocol that monitors the network for routers that have a change in their link state, meaning they were turned off, turned on, or restarted. This is perhaps the most commonly used interior gateway protocol in large networks.

Internet Group Management Protocol (IGMP)

A multicast protocol used between clients and routers to let routers know which of their interfaces has a multicast receiver attached. ________ operates on the network layer, just the same as other network management protocols like ICMP. Is implemented on a particular host and within a router.

Remote Procedure Call (RPC)

A protocol that enables a process on one computer to call a process on another computer. Layer 5 Session protocol

TLS (Transport Layer Security)

A security protocol that uses certificates and public key cryptography for mutual authentication and data encryption over a TCP/IP connection. If you look at the protocol details: SSL/TLS uses an underlying transport medium that provides a bidirectional stream of bytes. That would put it somewhere above layer 4. SSL/TLS organizes data as records, that may contain, in particular, handshake messages. Handshake messages look like layer 5. This would put SSL/TLS at layer 6 or 7. However, what SSL/TLS conveys is "application data", which is, in fact, a bidirectional stream of bytes. Applications that use SSL/TLS really use it as a transport protocol. They then use their own data representation and messages and semantics within that "application data". Therefore, SSL/TLS cannot be, in the OSI model, beyond layer 4. Thus, in the OSI model, SSL/TLS must be in layer 6 or 7, and, at the same time, in layer 4 or below.

IEEE 802.3 protocol

A standard specification for Ethernet. A method of packet-based physical communication in a local area network (LAN). Maintained by the Institute of Electrical and Electronics Engineers (IEEE). In general, _____ specifies the physical media and the working characteristics of Ethernet. Layer 1

Port Address Translation (PAT)

An extension of network address translation (NAT) that assigns a different TCP port number to each packet. Permits multiple devices on a LAN to be mapped to a public IP address thus conserving IP addresses

Small Computer System Interface (SCSI)

An interface standard developed by the American National Standards Institute (ANSI), it is used for both internal hard drives, external hard drives, optical drives, and peripheral devices such as printers, modems, scanners, etc.

AppleTalk Session Protocol ASP

AppleTalk Session Protocol ASP was an intermediate protocol, built on top of ATP, which in turn was the foundation of AFP. It provided basic services for requesting responses to arbitrary commands d performing out-of-band status queries. It also allowed the server to send asynchronous attention messages to the client.

Layer 2 Tunneling Protocol (L2TP)

Combines PPTP and L2F. ________ is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It uses encryption but only for its own control messages, using an optional pre-shared secret. It does not provide any encryption or confidentiality of content by itself. Rather, it provides a tunnel for Layer 2 (which may be encrypted), and the tunnel itself may be passed over a Layer 3 encryption protocol such as IPsec

ESP Payload

Contains the data described by the Next header field. This field is mandatory and is an integral number of bytes in length. If the algorithm used to encrypt the payload requires cryptographic synchronization data, e.g., an Initialization Vector (IV), then this data MAY be carried explicitly in the Payload data field. Any encryption algorithm that requires such explicit, per-packet synchronization data MUST indicate the length, any structure for such data, and the location of this data as part of an RFC specifying how the algorithm is used with ESP. If such synchronization data is implicit, the algorithm for deriving the data MUST be part of the RFC.

ESP Tunnel Mode

ESP ________________ encapsulation builds a new IP header containing the source and destination address of the security endpoints. When tunnel mode is used, the outer IP header reflects the source and destination of the security endpoints, which might or might not be the same as the original source and destination IP address of the data connection. The choice of transport or tunnel mode depends on the structure of the network and relies heavily on logical connections between the endpoints. Tunnel mode is required if one of the IKE peers is a security gateway that is applying IPSec on behalf of another host or hosts. A datagram that is encapsulated in tunnel mode is routed, or tunneled, through the security gateways, with the possibility that the secure IPSec packet will not flow through the same network path as the original datagram. To successfully encapsulate and send an outbound packet, the route table must contain a route that can be used to reach the security gateway, as well as a route that can be used to reach the data endpoint. If policy-based routing is being used on a TCP/IP stack where IP security is active, it is important to understand how the two functions interact

ESP Transport Mode

ESP ________________ encapsulation retains the original IP header. Therefore, when transport mode is used, the IP header reflects the original source and destination of the packet. Transport is most often used in a host-to-host scenario, where the data endpoints and the security endpoints are the same. A transport mode encapsulated datagram is routed, or transported, in the same manner as the original packet.

Asymmetric key algorithms

Examples of protocols using asymmetric key algorithms include: S/MIME GPG, an implementation of OpenPGP EMV, EMV Certificate Authority IPsec PGP ZRTP, a secure VoIP protocol Transport Layer Security standardized by IETF and its predecessor Secure Socket Layer SILC SSH Bitcoin Off-the-Record Messaging Layer 1

Secure Shell (SSH)

IS NOT SSL or a TELNET (Port 23) product! ___________ provides a secure channel over an unsecured network by using a client-server architecture, connecting an ________ client application with an ________ server. Port 22. Is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with _________

Internet Message Access Protocol (IMAP)

In computing, the _____________ is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. _________ is defined by RFC 3501. Application Layer 7

CSMA/CD (Carrier Sense Multiple Access with Collision Detection)

Is a media access control (MAC) method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting. This is used in combination with collision detection in which a transmitting station detects collisions by sensing transmissions from other stations while it is transmitting a frame. When this collision condition is detected, the station stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame. Used by any form of Ethernet operating in 1/2 duplex or full duplex. In terms of the OSI model, network repeaters are OSI physical layer devices.

IEEE 802.11

Is part of the IEEE 802 set of local area network (LAN) protocols, and specifies the set of media access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) Wi-Fi computer communication in various frequencies, including but not limited to 2.4 GHz, 5 GHz, 6 ...Layer 1

Shortest Path Bridging (SPB)

Layer 1 protocol is an IEEE 802.1aq standard for, computer networking technology. Intended to simplify the creation and configuration of networks, while enabling multi path routing. It is the replacement for the older spanning tree protocols.

Media Access Control (MAC)

Layer 2 A unique hardware address assigned to a network interface, commonly burnt into a NIC at manufacture time. Can be spoofed. The part of a NIC that remembers the NIC's own MAC address and attaches that address to outgoing frames. Has 48 bits. Layer2

ATM (Asynchronous Transfer Mode)

Layer 2 Protocol: A cell-switching network technology designed for the high-speed transfer of voice, video, and data in LANs, WANs, and telephone networks.

Ethernet Protocol

Layer 2 The standard communications protocol used on most client/server networks. Today, the term ____________refers to a whole family of closely related protocols characterized by their raw data rates (10 Mbps, 100 Mbps, 1 Gbps or 10 Gbps) and the physical medium on which they operate. _____________ now runs on a wide variety of physical media. Among the most common are: coaxial cable (thick or thin), many types of copper cable called twisted pair, and several types of fiber-optic cables using a variety of signalling methods and light wavelengths.

Extensible Authentication Protocol (EAP-MS-CHAPv2)

Layer 2 protocol: A universal authentication framework that allows third-party vendors to develop custom authentication schemes including retinal scans, voice recognition, fingerprint identifications, smart cards, Kerberos (Port 88) , and digital certificates. It also provides a mutual authentication method that supports password-based user or computer authentication.

CHAP (Challenge Handshake Authentication Protocol)

Layer 2 protocol: Enhanced security compared with PAP. It uses a two-way encrypted authentication method. The remote router holds the usernames and passwords but they're not transmitted as they were with PAP. With __________, when a user dials in, the access server issues a challenge message to the remote user after the PPP link is established. The remote end responds with a one-way hash function. This hash is generally an MD5 entity. If the value of the hash accurately matches authentication is granted. If it doesn't match, the connection is ended. ___________ sends out a challenge every two minutes for the duration of the connection. If the authentication fails at any time, the connection is ended. Frequency of challenges is administered by the access server.

ARCnet (Attached Resource Computer Network)

Layer 2 protocol: __________________ is a type of LAN protocol that provides network services to 255 nodes at data rates of up to 2.5 Mbps. _________________ is similar to token ring and Ethernet network services.

Extensible Authentication Protocol (EAP)

Layer 2 protocol: an authentication protocol that can be expanded with increased authentication methods that can be installed separately. It activates a fluid authentication mechanism to approve a remote access connection.

Fiber Channel over Ethernet (FCoE)

Layer 2: A technology that encapsulates fiber channel traffic within Ethernet frames much like iSCSI encapsulates SCSI commands in IP packets.

VLANs

Layer 2: Logically separate your switch ports into subnets. Allows network administrators to use switches to create software-based LAN segments that can be defined based on factors other than physical location. This groups users together by function. Applies tags to the network.

ARP (Address Resolution Protocol)

Layer 2: The _______ feature performs a required function in IP routing. _________ finds the hardware address, aka Media Access Control (MAC) address, of a host from its known IP address. _________ maintains a cache (table) in which MAC addresses are mapped to IP addresses

Frame Relay

Layer 2: WAN technology that interconnects sites using virtual circuits. These virtual circuits are identified by locally significant data-link connection identifiers (DLCI). Supports multiple PVC Private Virtual Circuits and Packet Switching Telecommunications

Serial Line Internet Protocol (SLIP)

Layer 2: is an encapsulation of the Internet Protocol designed to work over serial ports and router connections. It is documented in RFC 1055. On personal computers, ________ has largely been replaced by the Point-to-Point Protocol (PPP), which is better engineered, has more features, and does not require its IP address configuration to be set before it is established.

Authentication Header (AH)

Layer 3 and 4. An IPSec component that provides connection-less integrity and the authentication of data. Provides protection for replay attack. Does NOT provide confidentiality. The header and data are transmitted as a hash for integrity verification. The End Points negotiation has the algorithm and establishes the security association.

Point-to-Point Tunneling Protocol (PPTP)

Layer 5 Session protocol: A tunneling protocol used to support VPNs. Generally includes security mechanisms, and no additional software or protocols need to be loaded. A VPN device or server must have inbound port 1723.

Password Authentication Protocol (PAP)

Layer 5 Session: A weak authentication protocol that has been replaced by the Extensible Authentication Protocol (EAP). A form of authentication in which clear text usernames and passwords are passed

IPv4 datagram

Network Layer 3. Has a fixed length header of size 40 bytes.

IEEE 802.11a

One of the first Wi-Fi standards to be launched - it provided the capability for raw data speeds of up to 54 Mbps at 5 GHz. Layer 1

Post Office Protocol (POP)

Port 110 (TCP) A protocol used to retrieve email from a mail server. ___3 is a later iteration of the ____ protocol, and can be used with or without SMTP. Application Layer 7

Network Time Protocol (NTP)

Port 123 UDP The ____________ is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. Application Layer 7

Simple Network Management Protocol (SNMP)

Port 161 and 162 (UPD) A protocol used to monitor and manage network devices, such as routers, switches, and servers.

Lightweight Directory Access Protocol (LDAP)

Port 636 (TCP/UDP) A protocol for a client application to access an X.500 directory. The Lightweight Directory Access Protocol is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. Directory services play an important role in developing intranet and Internet applications by allowing the sharing of information about users, systems, networks, services, and applications throughout the network. Application Layer 7

Hypertext Transfer Protocol (HTTP)

Port 80 The set of rules that controls the transfer of web pages. It is a protocol that allows web browsers to talk to web servers. Application Layer 7

Encapsulation Security Protocol (ESP)

Provides source authentication, data integrity and confidentiality more widely used than AH. _______________ is a transport layer security protocol designed to function with both the IPv4 and IPv6 protocols. It takes the form of a header inserted after the Internet Protocol or IP header, before an upper layer protocol like TCP, UDP, or ICMP, and before any other IPSec headers that have already been put in place.

IEEE 802.11x Wireless Protocols

Refers to a group of evolving wireless local area network (WLAN) standards that are under development as elements of the IEEE 802.11 family of specifications. Layer 1

Wired Application Protocol

Replaced WEP. Layer 2 protocol

SCTP vs TCP

SCTP is message-oriented whereas TCP is stream-oriented. SCTP can handle multiple simultaneous streams and multiplexed streams where TCP can handle only a single stream of data per connection. SCTP's stream-aware connection control is one of its most notable features.

Multi-Protocol Label Switching (MPLS)

Sometimes called a layer-2.5 technology because it inserts 4-byte header that contains its own information between the layer-2 frame and the layer-3 IP packet. A networking technology that directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table.

IEEE 802.11 Types

Standards 802.11a 802.11b 802.11g 802.11n 802.11ac 802.11ad WiGig 802.11af White-Fi 802.11ah Sub GHz Wi-Fi 802.11ax. Layer 1

IEEE 802.11g

Support the high data speeds using 2.4 GHz which had previously only attainable using 802.11a within the 5GHz ISM band. Can be used in Ad-Hoc mode Layer 1

Simple Mail Transfer Protocol (SMTP)

TCP Port 25 An Internet-standard protocol for sending email messages between servers on IP networks. Because _______ is generally used to send messages from a mail client to a mail server, you should specify both the POP or IMAP server and the ____________ server when configuring an email application.

Sequence Packet Exchange (SPX)

The Transport layer protocol of the IPX/SPX suite of protocols responsible for providing connection delivery services and control of flow.

CASE

The common application service element sublayer provides services for the application layer and request services from the session layer. It provides support for common application services, such as: ACSE (Association Control Service Element) ROSE (Remote Operation Service Element) CCR (Commitment Concurrency and Recovery) RTSE (Reliable Transfer Service Element)

IEEE 802.11ac

The latest Wi-Fi (most popular) Beamforming. 400 Mbps = 2.4 Ghz range 1 Gbps - 5 Ghz range Layer 1

ESP Header

The security package association sequence numbers. In IPv4 and IPv6, the _________ is designed to provide a range of security services. The ESP protocol may be applied in isolation, in combination with an Authentication Header (AH), or in a nested manner. Security services may be provided between a pair of communicating hosts, a pair of communicating security gateways, or between a host and a security gateway. In practice, the _________ is placed after the IP header and before the next layer protocol header when used in transport mode, or before an encapsulated IP header in tunnel mode. The ________ itself consists of two parts: a Security Parameters Index, and a sequence number.

Secure Access Service Edge (SASE)

The specific application service element sublayer provides application specific services (protocols), such as FTAM (File Transfer, Access and Manager) VT (Virtual Terminal) MOTIS (Message Oriented Text Interchange Standard) CMIP (Common Management Information Protocol) JTM (Job Transfer and Manipulation) a former OSI standard MMS (Manufacturing Messaging Service) RDA (Remote Database Access) DTP (Distributed Transaction Processing)

IEEE 802.11n Wi-Fi standard

This 802 standard uses technologies including: Orthogonal frequency-division multiplexing (OFDM). Is the first 802.11 standard to introduce multiple-input and multiple-output (MIMO), It to provide high speed data at 600 Mbps peak for wireless LANs & wireless communications. Layer 1.

Network Address Translation (NAT)

Translates the private IP address to a public address for routing over the Internet

Fiber Channel Protocol (FCP)

Transport protocol that transports Small Computer System Interface (SCSI) commands over Fiber Channel Network. Defines a high speed data transfer to connect work stations, mainframes, supercomputers and storage devices. But what OSI layer does it use? As a Layer 2 switching technology, hardware handles the entire protocol in Fibre Channel fabrics. By contrast, internet SCSI (iSCSI) is a Layer 3 switching technology that runs over Ethernet. Here, software, hardware or both software and hardware can control the protocol.

TCP Flags

URG Indicates that the Urgent pointer field is significant ACK Indicates that the Acknowledgment field is significant. All packets after the initial SYN packet sent by the client should have this flag set PSH Push function. Asks to push the buffered data to the receiving application RST Reset the connection SYN Synchronize sequence numbers. Only the first packet sent from each end should have this flag set FIN Last package from the sender

IEEE 802.11b

Using 2.4 GHz the technology was much easier and cheaper to develop than the 802.11a which used the higher frequency 5 GHz band. Layer 1

IEEE 802.15

Wireless personal area network (PAN) Layer 1

802.1.ag

______ Is an IEEE Standard for Local and Metropolitan Area Networks Virtual Bridged Local Area Networks (Connectivity Fault Management) is a standard defined by IEEE. It defines protocols and practices for OAM (Operations, Administration, and Maintenance) for paths through 802.1 bridges and local area networks (LANs). BGP DHCP. DNS FTP Port 20 and 21 (TCP) . HTTP Port 80. HTTPS Port 443. IMAP. LDAP.

Protected Extensible Authentication Protocol (PEAP)

________ is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections. ________ is designed to provide more secure authentication for 802.11 WLANs (wireless local area networks) that support 802.1X port access control. _________ authenticates the server with a public key certificate and carries the authentication in a secure Transport Layer Security (TLS) session, over which the WLAN user, WLAN stations and the authentication server can authenticate themselves. When used in conjunction with Temporal Key Integrity Protocol (TKIP), each key has a finite lifetime. Although _______ and SSL operate on different layers of the OSI model (layer 2 vs. layer 5), they both use a server-side digital certificate to facilitate a secure key exchange to start a secure encryption session even if the entire session was being monitored by hostile eyes. Displaces LEAP

Network Basic Input/Output System (NetBIOS)

_________ is a program that allows applications on different computers to communicate within a local area network (LAN). It was created by IBM for its early PC Network, was adopted by Microsoft, and has since become a de facto industry standard. Session Layer 5 protocol. _______________TCP traditionally uses the following ports: 137/UDP. 137/TCP. 138/UDP

Transmission Control Protocol (TCP) Header

_________ is the first 24 bytes of a TCP segment that contains the parameters and state of an end-to-end TCP socket. The TCP header is used to track the state of communication between two TCP endpoints.

Zone Information Protocol (ZIP)

_________ provides applications and processes with access to zone names. A zone is a logical grouping of nodes in an AppleTalk internet, and each zone is identified by a name. Session Layer 5 protocol.

Ethernet Packet

__________ are sometimes called network frames because they add both a header and a trailer to the packets, thus framing the network data being transmitted. The older Ethernet standards and the newer 802.3 standards are largely the same. Both types begin with a 6-byte destination (MAC) address followed by a 6-byte source (MAC) address, and both add a 4-byte frame check sequence (FCS) to the end of the packet to help detect any errors introduced during packet transmission.

ICMP (Internet Control Message Protocol)

__________ is a protocol that network devices (e.g. routers) use to generate error messages when network issues are preventing IP packets from getting through.

SOCKS

___________ is an Internet protocol that exchanges network packets between a client and server through a proxy server. Optionally provides authentication so only authorized users may access a server. Practically, a _______ server proxies TCP connections to an arbitrary IP address, and provides a means for UDP packets to be forwarded. Layer 5, TCP port 1080

Structured Stream Transport

___________ is an experimental transport protocol that provides an ordered, reliable byte stream abstraction similar to TCP's, but enhances and optimizes stream management to permit applications to use streams in a much more fine-grained fashion than is feasible with TCP

Micro Transport Protocol

___________ or μTP is an open UDP-based variant of the BitTorrent a peer-to-peer file sharing protocol. Intended to mitigate poor latency and other congestion control problems found in conventional BitTorrent over TCP, while providing reliable, ordered delivery.

ESP Authentication Trailer

____________ contains the Authentication Data field, which holds the Integrity Check Value (ICV), and a message authentication code for verifying both the sender's identity and the message's integrity. The ________ comes after the data payload, and consists of three fields: padding, padding length, and the next header.

Session Control Protocol

_____________ is a method of creating multiple light-duty connections from a single TCP (Transmission Control Protocol) connection. Several such lightweight connections can be active simultaneously. Session layer 5.

Reliable Datagram Protocol

______________ is a transport layer protocol designed at Bell Labs. It aims to provide a solution where UDP is too primitive because guaranteed-order packet delivery is desirable, but TCP adds too much complexity/overhead.

Transmission Control Protocol (TCP)

______________ provides connection-oriented data management and reliable data transfer a connection between client and server is established before data can be sent. Major internet applications such as the World Wide Web, email, remote administration, and file transfer rely on ______, which is part of the Transport Layer of the TCP/IP suite. TLS/SSL often runs on top of _______ .

User Datagram Protocol (UDP)

_______________ When speed is important, is a communications protocol that is primarily used for establishing low-latency and loss-tolerating connections between applications on the internet. It speeds up transmissions by enabling the transfer of data before an agreement is provided by the receiving party.

Access Control List (ACL)

_______________ contains rules that grant or deny access to certain digital environments. ... Networking _____________ tell routers and switches which type of traffic can access the network, and which activity is allowed. As a Layer 3 device, a packet-filtering router uses rules to determine whether to permit or deny traffic based on source and destination IP addresses, source port and destination port, and the protocol of the packet.

Datagram Congestion Control Protocol (DCCP)

________________ is a message-oriented transport layer protocol. DCCP implements reliable connection setup, tear down, Explicit Congestion Notification (ECN), congestion control, and feature negotiation. Transport Layer 4

Internet Protocol Multicast

________________ is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission. It is the IP-specific form of multicast and is used for streaming media and other network applications. It uses specially reserved multicast address blocks in IPv4 and IPv6.

IEEE 802.16 (WiMAX)

________________ technology is a wireless broadband providing high speed data over a wide area. A technology for point to multi-point wireless networking. Layer 1

X.500 Directory Service

_________________ is a standard way to develop an electronic directory of people in an organization so that it can be part of a global directory available to anyone in the world with Internet access. Such a directory is sometimes called a global White Pages directory.

ADSP

_________________ protocol manages the flow of data between two established socket connections.

distance-vector routing protocol

__________________ defined in RFC 1075, is a routing protocol used to share information between routers to facilitate the transportation of IP multicast packets among networks. It formed the basis of the Internet's historic multicast backbone,

Lightweight Extensible Authentication Protocol (LEAP)

__________________ is a proprietary wireless LAN authentication method developed by Cisco Systems. Important features of LEAP are dynamic WEP keys and mutual authentication (between a wireless client and a RADIUS server). _________ allows for clients to re-authenticate frequently; upon each successful authentication, the clients acquire a new WEP key (with the hope that the WEP keys don't live long enough to be cracked).

IPv6 Datagram

_____________________ has a much simpler packet header compared with IPv4, by including only the information needed for forwarding the IP datagram. Fixed length ______ header allows the routers to process the _______________ packets more efficiently. In contrast IPv4 datagram is a connection-less protocol for a packet- switching network that uses the datagram approach. A side note, a datagram is a variable-length packet consisting of two parts: header and data. The header is 20 to 60 bytes in length and contains information essential to routing. Network Layer 3.

Multipurpose Internet Mail Extensions (MIME)

______________________ is an Internet standard that extends the format of email messages to support text in character sets other than ASCII, as well as attachments of audio, video, images, and application programs. Message bodies may consist of multiple parts, and header information may be specified in non-ASCII character sets. Email messages with _________ formatting are typically transmitted with standard protocols, such as the Simple Mail Transfer Protocol (SMTP), the Post Office Protocol (POP), and the Internet Message Access Protocol (IMAP).

UDP-Lite

_________________is a connection-less protocol that allows a potentially damaged data payload to be delivered to an application rather than being discarded by the receiving station.

Stream Control Transmission Protocol (SCTP)

_________________is a transport-layer protocol that can be used on top of IP networks for end-to-end communications. the protocol provides the message-oriented feature of the User Datagram Protocol (UDP), while ensuring reliable, in-sequence transport of messages with congestion control like the Transmission Control Protocol (TCP). Unlike UDP and TCP, the protocol provides multi-homing and redundant paths to increase resilience and reliability. __________ is standardized by the Internet Engineering Task Force (IETF) in RFC 4960.

Real-Time Transport Protocol (RTP)

_______________defines a standard packet format for delivering audio and video over the Internet. It is defined in RFC 1889. ... _____________is one of the foundations of VoIP and it is used in conjunction with SIP which assists in setting up the connections across the network. ___________falls into both the Session Layer (Layer 5) and the Presentation Layer (Layer 6) of the OSI model.

Short Message Peer-to-Peer

_______________protocol is an open, industry standard protocol designed to provide a flexible data communications interface for the transfer of short message data between External Short Message Entities (ESME), Routing Entities (RE) and Message Centres (MC). It is a means by which applications can send SMS messages to mobile devices and receive SMS from mobile devices. This is done using an _________ connection with a Short Message Service Center (SMSC), SMS gateway (UK), ________gateway or hub. Many conflicts as to what OSI layer this belongs to!

Distributed Data Protocol (DDP)

_____________is a client-server protocol for querying and updating a server-side database and for synchronizing such updates among clients. It uses the publish-subscribe messaging pattern.

Private Internet Protocol (PIP) / Private IP

_____refers to connectivity into a private extranet network which by its design emulates the functioning of the Internet. ... Whereas the Internet is a public offering, MPLS ______ networks are private.

IPv4 address

a 32-bit number that uniquely identifies a network interface on a machine. Written in decimal digits, formatted as four 8-bit fields that are separated by periods. Each 8-bit field represents a byte.

Data loss prevention (DLP)

is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users. ... also provides reporting to meet compliance and auditing requirements and identify areas of weakness and anomalies for forensics and incident response.

Blowfish

is a symmetric-key block cipher, designed in 1993 by Bruce Schneier and included in many cipher suites and encryption products. ... Schneier designed as a general-purpose algorithm, intended as an alternative to the aging DES and free of the problems and constraints associated with other algorithms


Set pelajaran terkait

Investment Planning - Efficient Market Theory (EMT)

View Set

chem exam 3 - ch 7 Copied from somone els

View Set

Ch. 2 Unit 1 exam Federal Government

View Set

Chapter 9 Quiz - Emerging Adulthood

View Set

Exam 4 Chapter 19: Environmental Health

View Set