Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
31 Cards in this Set
- Front
- Back
Packet Switching |
Packets are sent individually and best paths are selected. Packets can be sent in any direction and reassembled at the destination. |
|
Circuit Switching |
Dedicated circuits that are established for point to point connections.
|
|
Switches layer2 |
Port blocking MAC filtering |
|
Bluetooth (Wireless PAN) |
Covered by 802.15 |
|
Wireless MAN |
IEEE 802.16 (aka. WiMax) |
|
War Dialing |
Phone modem attack |
|
War Driving |
Driving wireless attack
|
|
War Flying |
Attacking wireless via drones |
|
MAC Flooding Attack |
Wireless attack |
|
ARP Attacks |
Wireless attack |
|
Double-encapsulated 802.1Q/Nested VLAM Attack |
Wireless attack |
|
Network Layer |
Packet filtering - Datalink layer and ties to network layer using logical addressing that is determined when hosts are configured. |
|
RFC 1918 |
Class A Class B Class C |
|
Class A - Private address |
10.0.0.0 (10.255.255.255.) |
|
Class B - Private Address |
172.16.0.0 (172.31.255.255) |
|
Class C - Private Address |
192.168.0.0 (192.168.255.255) |
|
802.16 |
WiMAX |
|
802.15 |
Bluetooth |
|
Split and Shadow are referring to? |
DNS - Internal and external management |
|
Layer 3 Devices |
Read destination address information in received packets. Use routing tables to forward to the next device. |
|
Multi Protocol Label Switching (MPLS) |
Used in modern networks to defend against DOS attacks. |
|
Internet |
Outside untrusted network |
|
Intranet |
Internal network |
|
Extranet |
Outside semi-trusted network |
|
IP Based Attacks |
Teardrop fragments Overlapping Fragments Ip Spoofing Source Routing Smurf Fraggle |
|
Layer 4 |
End to End transport between peer hosts. TCP - Transport Control Protocol UDP - User Datagram Protocol |
|
SSH Port |
|
|
SMTP port |
|
|
HTTPS port |
|
|
SSL port |
|
|
ICMP |
Port |