NWIT 275 Final Flashcards (THE RIGHT SET)

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/326

flashcard set

Earn XP

Description and Tags

you got it! (=

Last updated 9:11 PM on 12/10/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

327 Terms

1
New cards

What is the most important file in Windows?

NTOSKRNL.exe, the kernel

2
New cards

Which file is considered the most important in Linux?

/boot (Kernel File)

3
New cards

What are distros?

Types of operating systems (OS).

4
New cards

Are applications themselves part of the OSI Model?

No, applications are not part of the OSI model. There are only protocols.

5
New cards

What protocols are part of the application layer?

HTTP, HTTPS, FTP, SSH, LDAP, SNMP, DNS, POP3, etc.

6
New cards

What does encapsulation refer to in networking?

The method of wrapping data with protocol information at each layer of the OSI or TCP/IP Models.

7
New cards

When does the OSI Reference Model (OSI RM) go into effect? Like when is it used?

It is used in any communication between two devices.

8
New cards

Which ports are commonly used by web browsers?

Ports 443 (HTTPS) and 80 (HTTP).

9
New cards

What does TCP/IP stand for?

Transmission Control Protocol/Internet Protocol.

10
New cards

What are the first two layers of the OSI model?

Physical and Data Link layers.

11
New cards

What is the Data Link layer responsible for?

MAC (physical) addresses

12
New cards

What does MAC stand for?

Media Access Control.

13
New cards

How many bits are in a MAC address?

48 bits.

14
New cards

What are the two parts of a MAC address?

OUI (Organizationally Unique Identifier) and SN (Serial Number).

15
New cards

What is name resolution?

Converting a MAC address number to its manufacturer's name, or converting an IP into a domain.

16
New cards

What layer are Access Points?

They are layer 1 (physical layer) technology.

17
New cards

What is the function of a Default Gateway?

It is typically a firewall right before your router on the packet journey.

18
New cards

What is the main function of routers in networking?

They look at IP addresses and determine the best route forward.

19
New cards

What does DHCP stand for?

Dynamic Host Configuration Protocol.

20
New cards

How do switches know how to route packets?

They look at MAC addresses at layer 2.

21
New cards

What is the main difference between TCP and UDP?

TCP is reliable and uses error checking; UDP does not ensure packet delivery.

22
New cards

What is the purpose of the Transport Layer?

To focus on issues related to the quality of data delivery, ensuring reliable and efficient transmission.

23
New cards

Which port is commonly associated with HTTPS?

443.

24
New cards

What does the Application layer consist of?

Only protocols, not end-user applications.

25
New cards

What does API stand for?

Application Programming Interface.

26
New cards

What is the purpose of TCP's three-way handshake?

To ensure reliable transmission.

27
New cards

What is the significance of Layer 7 in the OSI model?

Layer 7 (Application Layer) is where user applications and services interact with the network, handling protocols like HTTP, SMTP, and DNS that enable end-user communication and services.

28
New cards

What networking standard does 802.11 refer to?

Wireless local area networks (WLANs).

29
New cards

What does SSID stand for?

Service Set Identifier.

30
New cards

What are the two main types of Ethernet?

Shared Ethernet (hubbed) and Switched Ethernet.

31
New cards

What does NAT stand for?

Network Address Translation.

32
New cards

Which cable type is typically used for wired networks?

Category (CAT) cables, coax, twisted pair, and fiber optic.

33
New cards

What is the difference between unicast, multicast, and broadcast addresses?

Unicast is one device, multicast is a group, and broadcast is all devices.

34
New cards

What is CSMA/CA?

Carrier Sense Multiple Access with Collision Avoidance, a network protocol.

35
New cards

What does WEP stand for in wireless security?

Wired Equivalent Privacy, the original IEEE 802.11 standard for securing wireless networks.

36
New cards

What does it mean for a switch to operate in promiscuous mode?

It reads all packets, regardless of the MAC address.

37
New cards

What is the difference between active and passive recon in cybersecurity?

Active recon engages with the target, while passive recon does not.

38
New cards

What is an Evil Twin Attack?

An Evil Twin Attack occurs when a malicious actor convinces a device to connect to a fraudulent access point to intercept its traffic.

39
New cards

What tools can be used for packet capture analysis?

Wireshark and Ethereal.

40
New cards

What is the main purpose of encryption?

To verify confidentiality.

41
New cards

What does the term 'hashing' refer to in cybersecurity?

A process used to verify the integrity of data.

42
New cards

What do the two parts of an asymmetric encryption key pair consist of?

A public key and a private key.

43
New cards

What is the critical role of the DHCP server?

It assigns IP addresses to devices on the network.

44
New cards

What is the primary purpose of a firewall?

To filter traffic and protect networks.

45
New cards

In which layer of the OSI model does ARP operate?

Layer 2 - Data Link layer.

46
New cards

What is a Beacon Frame?

A Management Frame that advertises the presence of an Access Point and contains the WLAN’s SSID and channel.

47
New cards

What are the indicators of adjacent congestion in wireless networks?

Busy channels leading to interference.

48
New cards

Define rogue AP.

An access point set up by an employee without proper administration.

49
New cards

What is a man-in-the-middle attack?

An attack where the attacker secretly relays and possibly alters communication.

50
New cards

What is meant by network address translation (NAT)?

Changing the IP addresses of packets as they pass through a router.

51
New cards

What is significant about the WNIC in networks?

It holds the wireless network interface card, which connects wireless devices.

52
New cards

What is the minimum signal strength for a stable wireless connection?

-67 \text{ dBm}.

53
New cards

What does the shadow file in Linux contain?

Salted password hashes for user accounts.

54
New cards

What does the term 'digital signatures' refer to?

Hashes encrypted with a private key to verify authenticity.

55
New cards

What is the function of the Control frames in 802.11 protocols?

To manage the communication process (e.g., RTS, CTS).

56
New cards

What is the role of the acknowledgment (ACK) packet?

It signifies that a sent packet was received successfully.

57
New cards

What is the purpose of salts in password storage?

To protect against brute force attacks by adding randomness to stored hashes.

58
New cards

What does RAW data in packets represent?

The original byte structure of the packet being transmitted.

59
New cards

What does a management frame do in wireless networking?

It maintains connections between the access point and devices.

60
New cards

What is a common security protocol transitioning from SSL?

TLS (Transport Layer Security).

61
New cards

What is the relationship between a MAC address and a hardware device?

A MAC address is bound to the hardware (Network Interface Card).

62
New cards

What does the term 'flooding' refer to in networking attacks?

Sending excessive packets to overwhelm the target network.

63
New cards

What is the term for packets that confirm receipt?

ACK (Acknowledgement) packets.

64
New cards

What happens in a CSMA/CA environment when a collision is detected?

The station will wait before trying to send again.

65
New cards

What are the two types of cable material generally used?

Copper and Fiber Optic.

66
New cards

What is the main difference between hubs and switches?

Hubs send packets to all ports; switches send packets to specific MAC addresses.

67
New cards

What does patch management involve?

Updating software to fix vulnerabilities.

68
New cards

What does file encryption on Linux utilize?

gpg for command-line encryption.

69
New cards

What is a significant advantage of wireless networking?

Mobility of devices.

70
New cards

Which command shows the ARP cache in Windows?

arp -a.

71
New cards

Why is the network slow during peak hours like 8:00 AM?

High traffic due to many users accessing the network.

72
New cards

What is an Intrusion Detection System (IDS)?

A system that monitors network traffic for suspicious activity.

73
New cards

What is the importance of time-stamping in logs?

It helps in tracking events accurately during cybersecurity analysis.

74
New cards

What are the two main types of DoS attacks specifically for wireless networks?

Deauthentication and Beacon flooding.

75
New cards

What is the maximum length of a transmission segment in Ethernet?

100 meters for standard cabling.

76
New cards

What is layer 4 of the OSI model responsible for?

Layer 4, the transport layer, handles data segmentation.

77
New cards

What is the common port for FTP data transmission?

Port 20.

78
New cards

How can packet captures aid in troubleshooting?

They provide insights into data flow and potential issues.

79
New cards

What tools can be used to capture wireless traffic?

Wireshark and airodump-ng.

80
New cards

What acknowledgments do Layer 2 frames include? (fix me)

Data link layer acknowledgments for packet reception.

81
New cards

What does MAC address randomization do?

It replaces a Wi-Fi adapter's true MAC address with a random MAC address to enhance user privacy.

82
New cards

What does 'monitor mode' do in Wi-Fi devices?

Allows the capture of all packets in the air without connecting to an AP.

83
New cards

What role does Wireshark play in network analysis?

It captures and analyzes packet data across networks.

84
New cards

What cryptographic concept ensures data integrity?

Hashing.

85
New cards

What is the worst way to get a job according to the lecture notes?

Submitting a resume online.

86
New cards

What is considered the best way to get a job?

Meeting people.

87
New cards

The course primarily focuses on which type of networks?

LAN (Local Area Network).

88
New cards

What is NTOSKRNL.exe?

The Windows kernel name.

89
New cards

What does OSI stand for in networking?

Open Systems Interconnection.

90
New cards

What is the role of layering in the OSI model?

Aids in troubleshooting, accelerates technical evolution, and simplifies learning networking.

91
New cards

What are the first two layers of the OSI model focused on?

Physical (cables) and Data Link (chip).

92
New cards

What is the main purpose of the Network Layer in the OSI model?

Defines end-to-end delivery of data and logical addressing.

93
New cards

What is the significance of the Application layer in the OSI model?

End user applications are not part of the application layer; it provides an interface to the user.

94
New cards

What is the purpose of Promiscuous Mode in networking?

It allows network adapters to read all traffic on a network, even if it doesn't contain the adapter's MAC address.

95
New cards

What is the typical port for SSH?

Port 22.

96
New cards

What does TFTP stand for?

Trivial File Transfer Protocol.

97
New cards

What does the OSI model's layer 2 (Data Link) do?

Moves data on and off cabling in frame format.

98
New cards

What are some applications of promiscuous mode in networking?

Traffic analysis and network monitoring.

99
New cards

Which layer of the OSI model is focused on end user applications?

Layer seven (Application layer).

100
New cards

What security does HTTPS provide?

Transport Layer Security.

Explore top flashcards