Term
|
Definition
Auto Private IP Addressing, or auto IP, used to communciated on same segment? |
|
|
Term
|
Definition
|
|
Term
Define IMAP and give it's port |
|
Definition
Internet Message Access Protocol (IMAP), alternative to POP, used on port 143 |
|
|
Term
|
Definition
Main Distribution Frame, like a huge patch panel, used to terminate WAN |
|
|
Term
|
Definition
|
|
Term
|
Definition
Terminal Access Controller Access-Controller system Plus, which is an access control network protocol for routers, network access servers. It uses TCP. |
|
|
Term
|
Definition
Remote Authentication Dial In User Service, which is a networking protocol that provides centralized Authentication, Authorization, & Accounting |
|
|
Term
|
Definition
A computer network authentication protocol that uses a 'shared secret' which is a password |
|
|
Term
|
Definition
Routing and Remote Access Service, an API that makes it possible to create apps that will adminster routing and remote access services of the OS. |
|
|
Term
|
Definition
command line tool, converts domain name to ip address |
|
|
Term
|
Definition
Converts NetBIOS to IP Address |
|
|
Term
|
Definition
command line tool for looking up DNS records |
|
|
Term
|
Definition
(Blank) is used on a network switch to send a copy of network packets from one port (or an entire VLAN) to a network monitoring connection on another switch port. |
|
|
Term
|
Definition
a method of providing additional layer security against external attacks |
|
|
Term
|
Definition
|
|
Term
|
Definition
providing network access to many clients by sharing a set of lines or freq's |
|
|
Term
|
Definition
Address Resolution Protocol, converts IP to MAC address |
|
|
Term
|
Definition
command line tool, displays network connections |
|
|
Term
|
Definition
Network -based intrusion prevention system, monitors entire network for suspicious traffice by analying protocol actvitiy. |
|
|
Term
|
Definition
Host-based Intrusion Detection Software |
|
|
Term
|
Definition
A type of denial-of-service attack by using pings |
|
|
Term
|
Definition
A type of active eavesdropping, in which attacker intercepts and re-transmits connections between 2 victims |
|
|
Term
|
Definition
Internet Control Message Protocol, part of the IP suite, used to OS's of networked computers to send error messages. |
|
|
Term
|
Definition
Public-key Infastructure, combinining public keys with private keys |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
ports 1645, 1646, 1812, 1813 are for |
|
Definition
|
|
Term
Data is encapuslated into (BLANK) at the Physical layer |
|
Definition
|
|
Term
Data is encapuslated into (BLANK) at the Data Link layer |
|
Definition
|
|
Term
Data is encapuslated into (BLANK) at the Network layer |
|
Definition
|
|
Term
Data is encapuslated into (BLANK) at the Transport layer |
|
Definition
|
|
Term
Data Link layer addresses are (BLANK) or (BLANK) |
|
Definition
|
|
Term
Network layer addresses are (BLANK) |
|
Definition
|
|
Term
Globally Unique MAC addresses start with… |
|
Definition
|
|
Term
Locally Adminsitered MAC addresses start with… |
|
Definition
|
|
Term
Multicast MAC addresses start with |
|
Definition
|
|
Term
A broadcast address looks like |
|
Definition
|
|
Term
|
Definition
Routing Information Protocol, uses hop count for distance vector |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
pings and multicasts causing lots of traffic |
|
|
Term
Statistical anomaly-based detection |
|
Definition
comparing current network activity to a baseline, looking for abnormal traffic volume |
|
|
Term
|
Definition
|
|
Term
|
Definition
Data Over Cable Service Interface Specification, DOCSIS |
|
|
Term
|
Definition
High-Level Data Link Control |
|
|