1/46
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
802.11a/Wireless-A
wireless 5GHz - 54Mbps - 75ft
802.11b/Wireless-B
wireless 2.4GHz - 11Mbps - 100-150ft
802.11g/Wireless-G
2.4GHz - 54Mbps - 150ft
802.11ac/Wireless-AC
5GHz - 1.3Gbps
802.11n/Wireless-N
2.4GHz - 200+Mbps
2.4GHz
Frequency ranges of 802.11G/802.11B
5GHz
Frequency ranges of 802.11AC/802.11A
Application Layer
Layer 7 in the OSI model. Support for applications. Examples: HTTP, FTP, SMTP
Presentation Layer
Layer 6 in the OSI model. Protocol conversion, data translation. Examples: ASCII, JPEG
Session Layer
Layer 5 in the OSI model. Establishes, manages, and terminates sessions. Examples: NFS, SQL
Transport Layer
Layer 4 in the OSI model. Ensures error-free packets. Examples: TCP, UDP
Network Layer
Layer 3 in the OSI model. Provides routing decisions. Examples: IP, IPX
Data Link Layer
Layer 2 in the OSI model. Provides for the flow of data. Examples: MAC addresses.
Physical Layer
Layer 1 in the OSI model. Signals and media. Examples: NICs, twisted-pair cable, fiber.
OSI model
Application, Presentation, Session, Transport, Network, Data Link, Physical. (Please Do not Through Sasuage Pizza Away)
Application Layer (TCP/IP)
Defines the applications used to process requests and which ports and sockets are used
Transport Layer (TCP/IP)
Defines the type of connection established between hosts and how acknowledgements are sent
Internet Layer (TCP/IP)
Defines the protocols used for addressing and routing the data packets
Network interface Layer (TCP/IP)
Defines how the host connects to the network
The well-known ports
TCP/IP Ports 1-1023
Registered ports
TCP/IP Ports 1024-49,151
Private ports
TCP/IP Ports 49,152-65,535
Social Engineering
A process by which an intruder obtains enough information from people to gain access to the network
Password Cracking
An attack in which the attacker tries to guess the user's password
Dictionary Attack
An attack that uses known passwords and many variations (upper- and lowercase and combinations) to try to log in to an account
Brute-Force Attack
An attack in which the attacker uses every possible combination of characters to guess the password
Packet Sniffing
A technique in which the contents of data packets are watched
Man-in-the-Middle Attack/MITM
An attack in which an attacker can seamlessly place itself in the middle of a conversation between others in order to become the recipient of all information sent by victim computers
ARP Cache Poisoning
ARP Cache Poisoning Attack
An attack in which an attacker changes the MAC addresses of the ARP cache, or "poisons the ARP cache" of victims to the MAC address of the attacker so that conversations get redirected to the attacker
Evil Twin Attack
A situation in which a rogue wireless access point poses as a legitimate one by broadcasting a legitimate SSID and eavesdrops on the wireless network
Session Hijacking
Exploiting web session control by stealing a session cookie and using it to establish a session with a remote server that still thinks the session is valid
Buffer Overflow
A situation that occurs when a program tries to put more data into a buffer than it was configured to hold
Zero-Day Attack
An attack that exploits a software vulnerability that is unknown to the developer
Denial of Service Attack/DoS
An attack in which service is denied to a computer, network, or server
Permanent DOS Attack/PDoS
A malicious attack that aims to sabotage hardware and render it useless
14
Amount of channels implemented with 802.11 DSSS
3
Non overlapping 802.11 DSSS channels in america
10.X, 172.16.X-172.32.X, 192.168.X
Private Addresses Range
SAN
Block level storage
NAS
File level storage
HSM/Hardware Security Module
A hardware security module is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing
Wiretapping
This exploit actually breaches the physical medium or uses devices to monitor signals from outside the physical medium itself.
CAT 5e
Supports 1000Mbps transmission speeds at 100-meter segments. Bandwidth: 100MHz
CAT 5
Supports 100Mbps transmission speeds at 100-meter segments. Bandwidth: 100MHz
CAT 6
Supports 1000Mbps transmission speeds at 100-meter segments. Bandwidth: 250+MHz
CAT 6a
Supports 10Gbps transmission speeds at 100-meter segments. Bandwidth: 500+MHz
Proxy Server
This firewall feature can be used to authenticate users on behalf of another secure system