The flashcards below were created by user ralowery on FreezingBlue Flashcards.

    • author "me"
    • tags ""
    • folders ""
    • description ""
    • fileName "block5.4"
    • what is the definition of SSH
    • is a network protocol that allows data to be exchanged uning a secure channel between two networked devices
  1. what two protocols can SSH used to transfer files
    • SFTP
    • SCP
  2. what well known port does SSH utilize to contact servers
  3. what protocol is a secure alternative to FTP
  4. what protocol is tunneled through the secure shell (SSH) protocol to provide encryption and authentication
    • BSD
    • RCP
  5. what protocol could be used in a number of differnet application, such as TLS or VPN applications
  6. what does FISH stand for
    files transferred over shell protocol
  7. what are two cryptographic protocols that provide security for communications over networks such as the internet
    • TSC
    • SSC
  8. what two bit strength does TLS provide RSA security with
    • 1024
    • 2048
  9. what does DCCP stand for
    datagram congestion control protocol
  10. what does DTLS stand for
    datagram transport layer security
  11. what does SIP stand for
    session initiation protocol
  12. for TLS/SSL security, what are the hashing algorithms used when the pseudorandom function splits the input data in half and processes each one
    • MD5
    • SHA-1
  13. what are the two things ciphersuites consist of
    ciphers and hash functions
  14. what does LDAP stand for
    lightweight directory access protocol
  15. what protocol does LDAP deployments today tend to use
  16. what does DSA stand for
    directory system agent
  17. what well known TCP port does LDAP utilize
  18. what is the default port for LDAP over SSL
  19. what does RDN stand for
    relative distinguished name
  20. what does SNMP stand for
    simple network management protocol
  21. what are the five functions of network management
    • FCAPS
    • fault management
    • configuration management
    • accounting management
    • performance management
    • security management
  22. what is the definition of scalability
    it should allow scaled growth from, localized networks to large, geographically dispersed networks
  23. what is the RFC for SNMP version 3
    RFC 3410
  24. what are the three primary components that comprise the SNMP environment
    • network management station (NMS)
    • management node
    • management information base (MIB)
  25. what is an NMS
    executes management applications which monitor and control network elements reports it findings to the the network administrator
  26. what is used to uniquely identify each management object within the MIB
    • OID's
    • object identifiers
  27. what are the two default SNMP communities
    • public (read only)
    • private (read-write)
  28. what are the five operations used in SNMP version 1 between NMS and agents
    • get request
    • get next request
    • set request
    • get response
    • trap
  29. what are traps
    are unsolicited messages sent by the SNMP agent using port 162 in order to notify the NMS of certain error conditions
  30. what are the two new protocol operations defined in SNMPv2
    • get bulk
    • inform
  31. what was the primary addition that was added with SNMPv3
    • security
    • remote configuration enhancements
  32. what type of encryption is used with SNMPv3
    DES 56-bit encryption
  33. what is one benefit of using SNMPv3 over one of its predecessors
    data can be collected securely from SNMP devices without fear of the data being tampered with or corrupted
  34. what is the purpose of the arp command
    displays and modifies the IP-to-MAC address translation tablets used by address resolution protocol (ARP)
  35. what does the -a parameter provide when used with the arp command
    view the contents of the local ARP cache table
  36. what command line utility prints the name of the current computer
  37. what is the purpose of the ipconfig command
    this diagnostic command displays all current TCP/IP network configuration values
  38. what does the /all switch provide when used with the ipconfig command
    produces a fall configuration display
  39. what is the purpose of the nbtstat command
    displays protocol statistics and current TCP/IP connections using NBT (NetBIOS over TCP/IP)
  40. what is the complete command line used to display the contents of the routing table for a TCP/IP host
    netstat /r
  41. what does pind stand for
    packet internet grouper
  42. what is the purpose of the ping command
    verifies connections to a remote computer or device
  43. what is the purpose of the tracert command
    determines the route taken to a destination by sending internet control message protocol (ICMP) echo packets with varying time-to-live (TTL) values to the destination
  44. what does TTL stand for
  45. what does SSH stand for
    Secure Shell (SSH)
  46. waht are the multiple mechanisms for transferring files using the Secure Shell protocols.
    • secure copy (scp) , which evolved from RCP protocol over SSH
    • SSH File Transfer Protocol (SFTP), a secure alternative to FTP.
    • Files transferred over shell protocol (FISH), which evolved from Unix shell commands over SSH.
  47. what does SCP stand for
    Secure Copy (SCP)
  48. what does SFTP stand for
    SSH File Transfer Protocol (SFTP)
  49. what does IETF stand for
    Internet Engineering Task Force (IETF)
  50. what does TLS and SSL stand for
    • Transport Layer Security (TLS)
    • Secure Socket Layer (SSL)
  51. what does VoIP stand for
    voice-over-IP (VoIP).
  52. what does SRP stand for
    Secure Remote Password (SRP)
  53. what does TCP stand for
    Transmission Control Protocol (TCP).
  54. what does UDP stand for
    User Datagram Protocol (UDP)
  55. A prominent use of TLS is for securing World Wide Web traffic carried by HTTP to form HTTPS on what well-known port
    port 443
  56. what does SMTP stand for
    Simple Mail Transfer Protocol (SMTP)
  57. what does CA stand for
    certificate authority's (CA's)
  58. what does PbK stand for
    public key (PbK)
  59. what does RN stand for
    random number (RN)
  60. what does PvK stand for
    private key (PvK))
  61. what does ISO stand for
    International Organization for Standardization (ISO)
  62. what does SNMP stand for
    . Simple Network Management Protocol (SNMP)
  63. what does MIB stand for
    Management Information Base (MIB)
  64. what does NMS stand for
    Network Management Station (NMS)
  65. what does PDU stand for
    Protocol Data Unit (PDU).
  66. what does OID stand for
    Object Identifiers (OIDs)
  67. what is getbulk
    The GetBulk operation is used by the NMS to efficiently retrieve large blocks of data, such as multiple rows in a table.
  68. what is inform
    The Inform operation allows one NMS to send trap information to another NMS and to then receive a response.
  69. what is the seven traps
    • coldStart - cold start of the component.
    • warmStart - reset of the component.
    • linkDown - link (interface) not available.
    • linkUp - link (interface) available.
    • authenticationFailure - unauthorized / rejected MIB access.
    • egpNeighborLoss - no connection to neighbor gateway.
    • enterpriseSpecific - manufacturer defined messages.
Card Set
Show Answers