CMSC 426 Lecture 5

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 43

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

44 Terms

1
What is a computer network?
A group of interconnected devices that communicate and share resources.
New cards
2
What is the TCP/IP 5 Layer Model?
A framework that organizes network protocols into five layers: Physical, Data Link, Network, Transport, and Application.
New cards
3
What is the Internet Protocol Suite (TCP/IP)?
A set of standards and protocols that dictate how data is formatted, transmitted, routed, and received over the Internet and other networks.
New cards
4
What does the Physical Layer encompass?
Responsible for transmitting raw bits over a physical medium, such as Ethernet cables or wireless signals.
New cards
5
What is the role of the Data Link Layer?
Manages how data is formatted for transmission and ensures reliable delivery and error detection/correction.
New cards
6
How do Ethernet switches function at the Data Link Layer?
Connect devices on a LAN using MAC addresses to forward traffic only to the intended destination.
New cards
7
What is the primary function of the Network Layer?
Routes packets between different networks and handles addressing but does not guarantee reliable delivery.
New cards
8
What is a router?
A device that forwards packets between networks, determining the best path for data and acting as a default gateway.
New cards
9
What defines an IPv4 address?
A unique 32-bit numerical label for a host on a network, typically written as four decimal numbers separated by dots.
New cards
10
How is a subnet mask used in networking?
Distinguishes the network portion from the host portion of an IP address, helping to identify the network address.
New cards
11
What is CIDR notation?
A shorthand way to represent an IP address and its subnet mask, written as an IP address followed by a slash and the number of network bits.
New cards
12
How do IPv6 addresses differ from IPv4 addresses?
IPv6 addresses are 128 bits long and expressed in hexadecimal separated by colons, offering a larger address space.
New cards
13
What is the purpose of the Transport Layer?
Ensures end-to-end communication by segmenting data and managing reliability.
New cards
14
What is TCP?
Transmission Control Protocol that establishes reliable, ordered connections and guarantees data delivery.
New cards
15
What are the steps of the TCP three-way handshake?
A client sends a SYN packet, the server replies with SYN/ACK, and the client responds with an ACK.
New cards
16
How does UDP differ from TCP?
UDP is connectionless, providing fast delivery without reliability guarantees, suitable for streaming.
New cards
17
What is the Application Layer responsible for?
Interfaces directly with end-user applications, providing protocols for services and data exchange.
New cards
18
What is the role of DHCP in the Application Layer?
Automatically assigns IP addresses and configuration settings to devices on a network.
New cards
19
What does DNS do?
Translates domain names into IP addresses, allowing access to websites by names rather than numbers.
New cards
20
What is HTTP?
Hypertext Transfer Protocol used to transfer web pages and resources over the Internet.
New cards
21
What distinguishes HTTPS from HTTP?
HTTPS is HTTP secured with SSL/TLS encryption for data confidentiality and integrity.
New cards
22
What is FTP used for?
File Transfer Protocol used to transfer files between computers over a network.
New cards
23
What role does SMTP play in networking?
Standard protocol for sending emails across networks.
New cards
24
How does the OSI model compare to the TCP/IP model?
OSI is a 7-layer framework for network communication; TCP/IP is a practical 5-layer framework for the Internet.
New cards
25
What is a firewall?
A device or software that filters network traffic to block unauthorized access.
New cards
26
What types of filtering capabilities can firewalls use?
Filtering based on IP addresses, protocols, port numbers, application data, and user identity.
New cards
27
What are the main types of firewalls?
Network-based, host-based, packet filtering, stateful inspection, and application-level gateway firewalls.
New cards
28
What is a packet filtering firewall?
Inspects individual packets based on header information to allow or block traffic.
New cards
29
How does a stateful inspection firewall enhance security?
Monitors the state of connections, making filtering decisions based on session context.
New cards
30
What is an application-level gateway firewall?
A proxy firewall that relays traffic for specific applications and enforces security policies.
New cards
31
What characterizes a 'next-generation' firewall?
Integrates packet filtering with features like deep packet inspection and intrusion prevention.
New cards
32
What is a Virtual Private Network (VPN)?
Creates a secure, encrypted tunnel over the Internet for remote users or networks.
New cards
33
What is a remote access VPN?
Connects a single remote device securely to a network.
New cards
34
What is a site-to-site VPN?
Links entire networks together securely over the Internet.
New cards
35
What is IPSec and why is it used?
A suite of protocols for encrypting and authenticating IP packets to secure communication.
New cards
36
What does the Authentication Header (AH) protocol do in IPSec?
Provides integrity and authentication for IP packets but does not encrypt data.
New cards
37
What is the function of the Encapsulating Security Payload (ESP) protocol?
Encrypts the payload of IP packets for confidentiality and can provide authentication.
New cards
38
What is the difference between IPSec Transport Mode and Tunnel Mode?
Transport Mode encrypts only the payload; Tunnel Mode encrypts the entire IP packet.
New cards
39
What are VPN services?
Allow users to connect securely to a VPN provider's network, encrypting their internet traffic.
New cards
40
What is virtualization in computing?
Creation of virtual instances of computing resources on a single physical machine.
New cards
41
What are the two main types of hypervisors?
Type 1 hypervisors run on hardware; Type 2 hypervisors run on top of an existing OS.
New cards
42
What benefits does virtualization provide?
Enables resource consolidation, isolation, flexible network segmentation, and efficient backup.
New cards
43
What are some security benefits of virtualization?
Enhances security through isolation, improved incident response, and streamlined patch management.
New cards
44
What are common risks associated with virtualization?
Includes hypervisor vulnerabilities, virtual machine escape, and insider threats.
New cards
robot