Shared Flashcard Set

Details

Security+ 3ed - Chapter 4 Key Terms
Mark Ciampa's Security+ text 3rd edition - Chapter 4 Key Terms
51
Computer Networking
Undergraduate 1
09/23/2010

Additional Computer Networking Flashcards

 


 

Cards

Term
access point (AP)
Definition
A wireless device that contains an antenna, a radio transmitter/receiver to send and receive wireless signals, and a port that allows it to connect to a wired network.
Term
Address Resolution Protocol (ARP)
Definition
The protocol used so that a device can determine the media access control address of another device based on its Internet Protocol address
Term
ARP poisoning
Definition
An attack in which the media accesscontrol address in the ARP cache isa corrupted so that the corresponding Internet Protocol address points to a different device.
Term
back door
Definition
An account that is secretly setup without the administrator's knowledge or permission, that cannot be detected, and that allows for remote access to the device.
Term
beaconing
Definition
The process of the access point sending out at regular intervals information to announce its presence and to provide the necessary information for devices to join the wireless network.
Term
Berkeley Internet Name Domain (BIND)
Definition
An Internet naming system that performs name resolution.
Term
blue jacking
Definition
The act of sending unsolicited messages between Bluetooth to Bluetooth-enabled devices.
Term
bluesnarfing
Definition
The unauthorized access of information from a wireless device through a Bluetooth connection.
Term
Bluetooth
Definition
A wireless technology that uses short—range radio frequency transmissions.
Term
carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Definition
The IEEE 802.11 standard protocol for WLANs that attempts to prevent multiple wireless devices from transmitting at the same time.
Term
default account
Definition
A user account that is created automatically instead of by the administrator.
Term
denial of service (DoS)
Definition
An attack that attempts to consume network resources so that the network or its devices cannot respond to legitimate requests.
Term
dipole antenna
Definition
An antenna that detects signals from all directions equally (also called omnidirectional attenna).
Term
disassociation frames
Definition
A frame sent to a device to force it to temporarily disconnect from the wireless network.
Term
distributed denial of service (DDoS)
Definition
An attack that uses hundreds or thousands of zombie computers in a botnet to flood a device with requests.
Term
DNS poisoning
Definition
An attack that substitutes a Fraudulent address in a Domain Name System server.
Term
DNS spoofing
Definition
See DNS poisoning.
Term
DNS transfer
Definition
A request to a Domain Name System server that asks for a zone transfer.
Term
Domain Name Kiting
Definition
Fraud that takes advantage of a grace period to delete Internet Domain Names.
Term
Domain Name System Security Extensions (DNSSEC)
Definition
A new secure version of the Domain Name System server that uses advanced measures to determine the authenticity of of data.
Term
Domain Name System (DNS)
Definition
A hierarchical name system for matching computer names and numbers.
Term
global positioning system (GPS)
Definition
A navigation system that uses satellite communications to identify the precise location of a GPS receiver.
Term
host table
Definition
A list stored on a local computer that contains the mappings of names to computer numbers.
Term
host table name system
Definition
A system in which host tables are stored on the local computer.
Term
IP forwarding
Definition
A technique that enables a computer to forward any network traffic it receives from another device.
Term
man-in-the-middle
Definition
An attack that intercepts legitimate comniunication and forges a fictitious response to the sender.
Term
master
Definition
The device in a Bluetooth network that controls all wireless traffic.
Term
name system
Definition
A system that allows computers on a network to be assigned both numeric addresses and human—readable names.
Term
network tap (test access point)
Definition
A separate device that can be installed between two network devices, such as a switch, router, or firewall, to monitor traffic.
Term
null sessions
Definition
Unauthenticated connections to a Microsoft Windows 2000 or Windows NT computer that do not require a username or a password.
Term
omnidirectional antenna
Definition
An antenna that detects signals from all directions equally. Also known as dipole antenna.
Term
packet generator
Definition
A program that creates fake packets to flood the wireless network.
Term
password
Definition
A secret combination of letters and numbers that serve to authenticate (validate) a user by what he knows.
Term
piconet
Definition
A network of Bluetooth devices.
Term
port mirroring
Definition
A technology that allows a network administrator to configure the switch to redirect the traffic that occurs on some or all ports to a designated monitoring port on the switch.
Term
protocol analyzer
Definition
A monitoring device or a computer with monitoring software that captures each packet to decode and analyze its contents. Also called a sniffer.
Term
replay
Definition
An attack that makes a copy of an intecepted transmission before sending it to the recipient.
Term
rogue access point
Definition
An unauthorized point that by-passes all of the network security and opens the network and users to direct attacks.
Term
scanning
Definition
The process of a wireless device looking for beacon frames.
Term
scatternet
Definition
A group of piconets in which connections exist between different piconets.
Term
Simple Network Management Protocol (SNMP)
Definition
A popular protocol used to manage network equipment.
Term
slave
Definition
The device in a Bluetooth network that takes commands from the master device.
Term
slot time
Definition
The amount of time that a wireless device must wait after the medium is clear.
Term
sniffer
Definition
A monitoring device or a computer with monitoring software that captures each packet to decode and analyze its contents. Also called a protocol analyzer.
Term
spoofing
Definition
Pretending to be someone or something else by presenting false information.
Term
symbolic name
Definition
A human-readable computer name composed of letters, numbers, and special symbols.
Term
Tcp/Ip hijacking
Definition
An attack that creates fictitious Transimssion Control Protocol packets to take advantage of a weakness in the protocol.
Term
war driving
Definition
The process of passive wireless discovery, or of finding a WLAN signal and recording information about it.
Term
weak passwords
Definition
Passwords that compromise security.
Term
wireless location mapping
Definition
The process of passive wireless discovery, or of finding a WLAN signal and recording information about it.
Term
zone transfers
Definition
The exchange of information between Domain Name System servers.
Supporting users have an ad free experience!