1/16
This set of flashcards covers the fundamental concepts and protocols associated with Information Systems, particularly focusing on networking protocols like TCP/IP, UDP, ICMP, ARP, and encryption methods.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is TCP/IP?
A suite of protocols including TCP, IP, UDP, ARP, and others.
What does the Transport layer protocol add at Layer 4 of TCP/IP?
A header that includes a port number to identify the receiving application.
What is the function of the Network layer in TCP/IP?
It adds its own header to the data and becomes a packet.
What is the characteristic of TCP that ensures connection establishment?
Connection-oriented, using a three-way handshake.
What is a three-way handshake in TCP?
Step 1: Request for connection (SYN); Step 2: Response to request (SYN/ACK); Step 3: Connection established (ACK).
What is UDP?
An unreliable, connectionless protocol that does not guarantee delivery of data.
What is one advantage of UDP over TCP?
UDP is more efficient, especially for real-time applications like audio or video.
What are the key roles of the Internet Protocol (IP)?
It identifies data's source and destination addresses and enables communication across multiple networks.
How does an ARP protocol work in an IPv4 network?
It discovers the MAC address of a host on the local network and maps IP addresses to MAC addresses.
What does a VPN do?
Creates a secure connection encrypted from end to end, often referred to as a tunnel.
What is the purpose of ICMP?
Reports on network health, indicating congestion, delivery failures, and transmission issues.
What does the CIA triad in information security stand for?
Confidentiality, Integrity, and Availability.
What is symmetric encryption?
Data encrypted using a single key known only by the sender and receiver.
What distinguishes asymmetric encryption?
It uses two keys: a private key known only to the user and a public key that anyone can request.
What is the role of a VPN concentrator?
Authenticates VPN clients, establishes tunnels, and manages encryption for VPN connections.
What does the 'netstat' command do?
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
What is the primary function of TLS/SSL?
To encrypt TCP/IP transmissions, including web pages and data entered into web forms.