ICTN Exam 4

studied byStudied by 8 people
5.0(1)
Get a hint
Hint

Personal area network (PAN) -

1 / 98

flashcard set

Earn XP

Description and Tags

lol

99 Terms

1

Personal area network (PAN) -

network that connects devices within the range of an individual person - commonly through Bluetooth

New cards
2

Local area network (LAN)

network that connects devices using wire cables in a small geographic area. Typically owned by an individual or wholly managed by an IT department

New cards
3

Virtual LANs (VLAN)

allow an administrator to segment the ports on a single switch as if it were multiple switches; allow end devices to be grouped together for administrative purposes

New cards
4

Wireless LAN

Wirelessly connects users and devices in a small geographical area using radio waves

New cards
5

Wireless mesh network (WMN)

Uses multiple access points to extend the WLAN

New cards
6

Metropolitan area network (MAN)

Network that spans across a large campus or city; various buildings connected through wireless or fiber optic media

New cards
7

Wide area network (WAN)

connects multiple networks that are in geographically separated locations. Users contract for WAN access from a service provider

New cards
8

Virtual private network (VPN)

used to securely connect to another network over an insecure network, such as the internet

New cards
9

Which type of network applies Bluetooth technology?

PAN

New cards
10

Where do you find internet in the different types of network?

WAN

New cards
11

IPV4 uses…

32-bit binary

New cards
12

IPV6 uses…

128-bit hexadecimal

New cards
13

Network interface card (NIC)

provides the physical connection to the network at the PC or other end device

New cards
14

Repeaters

Regenerates weak signals to extend the distance a signal can travel

New cards
15

Hubs

Receive data on one port and send it out to all other ports to extend the reach of a network - legacy devices

New cards
16

Bridge

Keep a record of all the devices on each segment; filter traffic between LAN segments to reduce the amount of traffic

New cards
17

Switches

Microsegments a LAN; filters and segment network traffic by ending data only to the device to which it is sent - legacy device

New cards
18

Wireless access points (APs)

Provide network access to wireless devices, such as laptops and tablets

New cards
19

Routers

Connect networks; use IP addresses to forward traffic to other networks

New cards
20

What layer of the OSI are network devices on?

The third layer - Network layer

New cards
21

Frame

Unit of data on a network

New cards
22

Switches look at…

MAC addresses and frames

New cards
23

Routers look at…

IP addresses and packets

New cards
24

Fiber optic cables

Uses light to transmit signals

New cards
25

Single-mode fiber (SMF)

Consists of a very small core and uses laser technology to send a single ray o flight

New cards
26

Multimode fiber (MWF)

Consists of a larger core and uses LED emitters to send light pulses

New cards
27

Does single-mode or multimode have a longer transmission distance?

SMF

New cards
28

The first part of an IPV4 address…

Identifies the network

New cards
29

The second part of an IPV4 address…

Identifies the device on the network

New cards
30

The subnet mask is used by the device to…

Determine the network

New cards
31

Default gateway

Address of the router

New cards
32

TCP/IP Model

Consists of layers that perform functions necessary to prepare data for transmission over a network - consists of TCP and IP

New cards
33

Transmission Control Protocol (TCP)

Tracks all the network connections between a user’s device and multiple destinations

New cards
34

Internet Protocol (IP)

Responsible for adding addressing so that data can be routed to the intended destination

New cards
35

What are the two protocols that operate at the transport layer?

TCP and UDP

New cards
36

Virus

Require human action to propagate and infect other computers; executes and infects the computer

New cards
37

Trojan horse

A program that looks useful but also comes with malicious code; often provided with free online programs such as computer games

New cards
38

Adware

displays unsolicited advertising through op-up web browser windows

New cards
39

Ransomware

Denies a user access to their files by encrypting the files and then displaying a message demanding a ransom for the decryption key

New cards
40

Rootkit

used to gain administrator-account level access to computer

New cards
41

Spyware

Used to gather information about the user and send to cybercriminals

New cards
42

Worm

Self-replicating program that propagates automatically without user actions by exploiting vulnerabilities in legitimate software

New cards
43

Social engineering

an access attack that attempts to manipulate individuals into performing actions or divulging confidential information; single most serious threat to a secure network

New cards
44

Phishing

attacker sends fraudulent email disguised as being from a legitimate, trusted source to trick the recipient

New cards
45

Dumpster diving

In-person type of attack; attacker rummages through trash bins to discover confidential documents

New cards
46

Shoulder surfing

In person attack; attacker inconspicuously looks over someone’s shoulder

New cards
47

Data wiping

Also known as secure erase; software tools specifically designed to overwrite existing data multiple times, rendering the data unreadable

New cards
48

Data degaussing

Using a magnet to disrupt or eliminate the magnetic field on a hard drive; can be done with a wand or electromagnetic device

New cards
49

Are data wiping and degaussing techniques reversible?

No

New cards
50

What is the minimum recommended amount of characters for a password?

8 characters

New cards
51

When an employee leaves an organization…

Immediately disable the account or change the login credentials to the account

New cards
52

Hashing

uses a mathematical function to create a numeric value, called a message digest that is unique to the data

New cards
53

Symmetric Encryption

If a encrypted message is intercepted, it can only be decrypted using the passwork/key that it was encrypted with

New cards
54

Asymmetric encryption

Requires a private key and a public key

New cards
55

RSA is a type of

Asymmetric encryption

New cards
56

WPA2

Uses a wireless encryption system to encode the information being sent to prevent unwanted capture and use of the data

New cards
57

WPA (Wi-Fi Protected Access)

Uses WEP but secures the data with much stronger Temporal Key Integrity Protocol (TKIP) encryption algorithm

New cards
58

The preferred choice when securing a wireless network is..

The strongest WPA2 security mode possible

New cards
59

WPS (Wi-Fi Protected Setup)

Both the router and wireless device will have a button that when both are pressed, automatically configures Wi-Fi security between the devices; is vulnerable and should be turned off

New cards
60

Port Forwarding

Rule-based method of directing traffic between devices on separate networks

New cards
61

Port triggering

Allows the router to temporarily forward data through inbound ports to a specific device

New cards
62

MAC (Media Access Control)

Hard-coded onto the Ethernet or wireless network interface card by the manufacturer; stays the same

New cards
63

How large is a MAC address?

48 bits

New cards
64

IP Address

Assigned by network administrators based on the location within the network; when device moves from one network to another, it will likely change

New cards
65

802.11 is the standard for…

Wireless networks

New cards
66

802.3 is the standard for…

Ethernet networks

New cards
67

Coaxial cables

Use electrical signals over copper/aluminum to transport data

New cards
68

Twisted-pair cables

Copper cabling that is twisted to privde protection against crosstalk

New cards
69

What are some examples of anti-malware programs?

McAfee, Symantec (Norton), Kaspersky, Trend Micro, Bitdefender, etc

New cards
70

Service licensing agreement

Contract that outlines the legal use, or redistribution, of that software. Important because they ensure that the software owner’s copyright is maintained

New cards
71

What type of cable is not affected by EMI or radio frequency interference?

Fiber optic cable

New cards
72

Computer forensics

Collection and analysis of data for criminal investigation

New cards
73

Cyber law

Term to describe the international, regional, country, and state laws that affect computer security professionals

New cards
74

First response

Official procedures employed by those people who are qualified to collect investigation.

New cards
75

Why is first response important?

If the forensic profess is improperly performed, evidence might not be admissible in court

New cards
76

Level one technicians

Primary responsibility is gaining important information from the customer or solve very simple problems

New cards
77

Level two technicians

Receive the work order with the description of the problem, is the one resolving the problem

New cards
78

Do level one or level two technicians have more experience?

Level two technicians

New cards
79

Demilitarized zone (DMZ)

Network that provides services to an untrusted network

New cards
80

Best practices for configuring wireless access points

Basic security settings that are compatible with the existing network security, change the default username of the admin account, assign IP addresses instead of using DHCP

New cards
81

An IPV6 device must always be configured with a…

Link-local IPv6 address

New cards
82

Link-local address

Used by a device to communicate with other computers connected to the same network with the same IP address range

New cards
83

DHCP Server

Service used to automatically assign IP addressing information to hosts

New cards
84

DNS server

Method that computers use to translate domain names into IP addresses

New cards
85

Web server

Provides web resources

New cards
86

Proxy server

Have the authority to act as another computer

New cards
87

Syslog Server

Allows networking devices to send their system messages across the network to syslog servers

New cards
88

Network Address Translation (NAT)

Converts private IPV4 addresses to Internet-routable IPv4 addresses

New cards
89

First step in compressing IPV6 address

Omit leading 0s

New cards
90

Second step in compressing IPV6 address

Omit all 0 segments

New cards
91

Bandwidth

How much data can be received every second

New cards
92

Half-duplex

Sends or receives data one at a time

New cards
93

Full-duplex

Sends and receives data at the same time

New cards
94

What is the OSI layer model?

Physical, Data-Link, Network, Transport, Session, Presentation, Application

(Please do not throw sausage pizza away)

New cards
95

UDP

Simple transport layer protocol, considered unreliable because there is no acknowledgement that the data is received at the destination

New cards
96

WPA2

Industry standard for securing WLANs

New cards
97

Layers in TCP/IP

Application, Transport, Internet, Network Access

(Armadillos take in new ants)

New cards
98

What layer of the OSI are bridges on?

Layer 2 - Data-link

New cards
99

What layer of the OSI are repeaters and hubs on?

Layer 1 - Physical

New cards

Explore top notes

note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 562 people
Updated ... ago
4.5 Stars(4)
note Note
studied byStudied by 35 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 30 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 19 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 25 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard23 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard80 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard49 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard77 terms
studied byStudied by 197 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard52 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard97 terms
studied byStudied by 66 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard62 terms
studied byStudied by 64 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard21 terms
studied byStudied by 22 people
Updated ... ago
5.0 Stars(1)