ICTN Exam 4

5.0(1)
studied byStudied by 8 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/98

flashcard set

Earn XP

Description and Tags

lol

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

99 Terms

1
New cards
Personal area network (PAN) -
network that connects devices within the range of an individual person - commonly through Bluetooth
2
New cards
Local area network (LAN)
network that connects devices using wire cables in a small geographic area. Typically owned by an individual or wholly managed by an IT department
3
New cards
Virtual LANs (VLAN)
allow an administrator to segment the ports on a single switch as if it were multiple switches; allow end devices to be grouped together for administrative purposes
4
New cards
Wireless LAN
Wirelessly connects users and devices in a small geographical area using radio waves
5
New cards
Wireless mesh network (WMN)
Uses multiple access points to extend the WLAN
6
New cards
Metropolitan area network (MAN)
Network that spans across a large campus or city; various buildings connected through wireless or fiber optic media
7
New cards
Wide area network (WAN)
connects multiple networks that are in geographically separated locations. Users contract for WAN access from a service provider
8
New cards
Virtual private network (VPN)
used to securely connect to another network over an insecure network, such as the internet
9
New cards
Which type of network applies Bluetooth technology?
PAN
10
New cards
Where do you find internet in the different types of network?
WAN
11
New cards
IPV4 uses…
32-bit binary
12
New cards
IPV6 uses…
128-bit hexadecimal
13
New cards
Network interface card (NIC)
provides the physical connection to the network at the PC or other end device
14
New cards
Repeaters
Regenerates weak signals to extend the distance a signal can travel
15
New cards
Hubs
Receive data on one port and send it out to all other ports to extend the reach of a network - legacy devices
16
New cards
Bridge
Keep a record of all the devices on each segment; filter traffic between LAN segments to reduce the amount of traffic
17
New cards
Switches
Microsegments a LAN; filters and segment network traffic by ending data only to the device to which it is sent - legacy device
18
New cards
Wireless access points (APs)
Provide network access to wireless devices, such as laptops and tablets
19
New cards
Routers
Connect networks; use IP addresses to forward traffic to other networks
20
New cards
What layer of the OSI are network devices on?
The third layer - Network layer
21
New cards
Frame
Unit of data on a network
22
New cards
Switches look at…
MAC addresses and frames
23
New cards
Routers look at…
IP addresses and packets
24
New cards
Fiber optic cables
Uses light to transmit signals
25
New cards
Single-mode fiber (SMF)
Consists of a very small core and uses laser technology to send a single ray o flight
26
New cards
Multimode fiber (MWF)
Consists of a larger core and uses LED emitters to send light pulses
27
New cards
Does single-mode or multimode have a longer transmission distance?
SMF
28
New cards
The first part of an IPV4 address…
Identifies the network
29
New cards
The second part of an IPV4 address…
Identifies the device on the network
30
New cards
The subnet mask is used by the device to…
Determine the network
31
New cards
Default gateway
Address of the router
32
New cards
TCP/IP Model
Consists of layers that perform functions necessary to prepare data for transmission over a network - consists of TCP and IP
33
New cards
Transmission Control Protocol (TCP)
Tracks all the network connections between a user’s device and multiple destinations
34
New cards
Internet Protocol (IP)
Responsible for adding addressing so that data can be routed to the intended destination
35
New cards
What are the two protocols that operate at the transport layer?
TCP and UDP
36
New cards
Virus
Require human action to propagate and infect other computers; executes and infects the computer
37
New cards
Trojan horse
A program that looks useful but also comes with malicious code; often provided with free online programs such as computer games
38
New cards
Adware
displays unsolicited advertising through op-up web browser windows
39
New cards
Ransomware
Denies a user access to their files by encrypting the files and then displaying a message demanding a ransom for the decryption key
40
New cards
Rootkit
used to gain administrator-account level access to computer
41
New cards
Spyware
Used to gather information about the user and send to cybercriminals
42
New cards
Worm
Self-replicating program that propagates automatically without user actions by exploiting vulnerabilities in legitimate software
43
New cards
Social engineering
an access attack that attempts to manipulate individuals into performing actions or divulging confidential information; single most serious threat to a secure network
44
New cards
Phishing
attacker sends fraudulent email disguised as being from a legitimate, trusted source to trick the recipient
45
New cards
Dumpster diving
In-person type of attack; attacker rummages through trash bins to discover confidential documents
46
New cards
Shoulder surfing
In person attack; attacker inconspicuously looks over someone’s shoulder
47
New cards
Data wiping
Also known as secure erase; software tools specifically designed to overwrite existing data multiple times, rendering the data unreadable
48
New cards
Data degaussing
Using a magnet to disrupt or eliminate the magnetic field on a hard drive; can be done with a wand or electromagnetic device
49
New cards
Are data wiping and degaussing techniques reversible?
No
50
New cards
What is the minimum recommended amount of characters for a password?
8 characters
51
New cards
When an employee leaves an organization…
Immediately disable the account or change the login credentials to the account
52
New cards
Hashing
uses a mathematical function to create a numeric value, called a message digest that is unique to the data
53
New cards
Symmetric Encryption
If a encrypted message is intercepted, it can only be decrypted using the passwork/key that it was encrypted with
54
New cards
Asymmetric encryption
Requires a private key and a public key
55
New cards
RSA is a type of
Asymmetric encryption
56
New cards
WPA2
Uses a wireless encryption system to encode the information being sent to prevent unwanted capture and use of the data
57
New cards
WPA (Wi-Fi Protected Access)
Uses WEP but secures the data with much stronger Temporal Key Integrity Protocol (TKIP) encryption algorithm
58
New cards
The preferred choice when securing a wireless network is..
The strongest WPA2 security mode possible
59
New cards
WPS (Wi-Fi Protected Setup)
Both the router and wireless device will have a button that when both are pressed, automatically configures Wi-Fi security between the devices; is vulnerable and should be turned off
60
New cards
Port Forwarding
Rule-based method of directing traffic between devices on separate networks
61
New cards
Port triggering
Allows the router to temporarily forward data through inbound ports to a specific device
62
New cards
MAC (Media Access Control)
Hard-coded onto the Ethernet or wireless network interface card by the manufacturer; stays the same
63
New cards
How large is a MAC address?
48 bits
64
New cards
IP Address
Assigned by network administrators based on the location within the network; when device moves from one network to another, it will likely change
65
New cards
802\.11 is the standard for…
Wireless networks
66
New cards
802\.3 is the standard for…
Ethernet networks
67
New cards
Coaxial cables
Use electrical signals over copper/aluminum to transport data
68
New cards
Twisted-pair cables
Copper cabling that is twisted to privde protection against crosstalk
69
New cards
What are some examples of anti-malware programs?
McAfee, Symantec (Norton), Kaspersky, Trend Micro, Bitdefender, etc
70
New cards
Service licensing agreement
Contract that outlines the legal use, or redistribution, of that software. Important because they ensure that the software owner’s copyright is maintained
71
New cards
What type of cable is not affected by EMI or radio frequency interference?
Fiber optic cable
72
New cards
Computer forensics
Collection and analysis of data for criminal investigation
73
New cards
Cyber law
Term to describe the international, regional, country, and state laws that affect computer security professionals
74
New cards
First response
Official procedures employed by those people who are qualified to collect investigation.
75
New cards
Why is first response important?
If the forensic profess is improperly performed, evidence might not be admissible in court
76
New cards
Level one technicians
Primary responsibility is gaining important information from the customer or solve very simple problems
77
New cards
Level two technicians
Receive the work order with the description of the problem, is the one resolving the problem
78
New cards
Do level one or level two technicians have more experience?
Level two technicians
79
New cards
Demilitarized zone (DMZ)
Network that provides services to an untrusted network
80
New cards
Best practices for configuring wireless access points
Basic security settings that are compatible with the existing network security, change the default username of the admin account, assign IP addresses instead of using DHCP
81
New cards
An IPV6 device must always be configured with a…
Link-local IPv6 address
82
New cards
Link-local address
Used by a device to communicate with other computers connected to the same network with the same IP address range
83
New cards
DHCP Server
Service used to automatically assign IP addressing information to hosts
84
New cards
DNS server
Method that computers use to translate domain names into IP addresses
85
New cards
Web server
Provides web resources
86
New cards
Proxy server
Have the authority to act as another computer
87
New cards
Syslog Server
Allows networking devices to send their system messages across the network to syslog servers
88
New cards
Network Address Translation (NAT)
Converts private IPV4 addresses to Internet-routable IPv4 addresses
89
New cards
First step in compressing IPV6 address
Omit leading 0s
90
New cards
Second step in compressing IPV6 address
Omit all 0 segments
91
New cards
Bandwidth
How much data can be received every second
92
New cards
Half-duplex
Sends or receives data one at a time
93
New cards
Full-duplex
Sends and receives data at the same time
94
New cards
What is the OSI layer model?
Physical, Data-Link, Network, Transport, Session, Presentation, Application

\
(Please do not throw sausage pizza away)
95
New cards
UDP
Simple transport layer protocol, considered unreliable because there is no acknowledgement that the data is received at the destination
96
New cards
WPA2
Industry standard for securing WLANs
97
New cards
Layers in TCP/IP
Application, Transport, Internet, Network Access

\
(Armadillos take in new ants)
98
New cards
What layer of the OSI are bridges on?
Layer 2 - Data-link
99
New cards
What layer of the OSI are repeaters and hubs on?
Layer 1 - Physical