The flashcards below were created by user
ralowery
on FreezingBlue Flashcards.
-
- author "me"
- tags ""
- folders ""
- description ""
- fileName "block5.4"
- what is the definition of SSH
- is a network protocol that allows data to be exchanged uning a secure channel between two networked devices
-
what two protocols can SSH used to transfer files
-
what well known port does SSH utilize to contact servers
22
-
what protocol is a secure alternative to FTP
SFTP
-
what protocol is tunneled through the secure shell (SSH) protocol to provide encryption and authentication
-
what protocol could be used in a number of differnet application, such as TLS or VPN applications
SFTP
-
what does FISH stand for
files transferred over shell protocol
-
what are two cryptographic protocols that provide security for communications over networks such as the internet
-
what two bit strength does TLS provide RSA security with
-
what does DCCP stand for
datagram congestion control protocol
-
what does DTLS stand for
datagram transport layer security
-
what does SIP stand for
session initiation protocol
-
for TLS/SSL security, what are the hashing algorithms used when the pseudorandom function splits the input data in half and processes each one
-
what are the two things ciphersuites consist of
ciphers and hash functions
-
what does LDAP stand for
lightweight directory access protocol
-
what protocol does LDAP deployments today tend to use
DNS
-
what does DSA stand for
directory system agent
-
what well known TCP port does LDAP utilize
389
-
what is the default port for LDAP over SSL
636
-
what does RDN stand for
relative distinguished name
-
what does SNMP stand for
simple network management protocol
-
what are the five functions of network management
- FCAPS
- fault management
- configuration management
- accounting management
- performance management
- security management
-
what is the definition of scalability
it should allow scaled growth from, localized networks to large, geographically dispersed networks
-
what is the RFC for SNMP version 3
RFC 3410
-
what are the three primary components that comprise the SNMP environment
- network management station (NMS)
- management node
- management information base (MIB)
-
what is an NMS
executes management applications which monitor and control network elements reports it findings to the the network administrator
-
what is used to uniquely identify each management object within the MIB
-
what are the two default SNMP communities
- public (read only)
- private (read-write)
-
what are the five operations used in SNMP version 1 between NMS and agents
- get request
- get next request
- set request
- get response
- trap
-
what are traps
are unsolicited messages sent by the SNMP agent using port 162 in order to notify the NMS of certain error conditions
-
what are the two new protocol operations defined in SNMPv2
-
what was the primary addition that was added with SNMPv3
- security
- remote configuration enhancements
-
what type of encryption is used with SNMPv3
DES 56-bit encryption
-
what is one benefit of using SNMPv3 over one of its predecessors
data can be collected securely from SNMP devices without fear of the data being tampered with or corrupted
-
what is the purpose of the arp command
displays and modifies the IP-to-MAC address translation tablets used by address resolution protocol (ARP)
-
what does the -a parameter provide when used with the arp command
view the contents of the local ARP cache table
-
what command line utility prints the name of the current computer
hostname
-
what is the purpose of the ipconfig command
this diagnostic command displays all current TCP/IP network configuration values
-
what does the /all switch provide when used with the ipconfig command
produces a fall configuration display
-
what is the purpose of the nbtstat command
displays protocol statistics and current TCP/IP connections using NBT (NetBIOS over TCP/IP)
-
what is the complete command line used to display the contents of the routing table for a TCP/IP host
netstat /r
-
what does pind stand for
packet internet grouper
-
what is the purpose of the ping command
verifies connections to a remote computer or device
-
what is the purpose of the tracert command
determines the route taken to a destination by sending internet control message protocol (ICMP) echo packets with varying time-to-live (TTL) values to the destination
-
what does TTL stand for
time-to-live
-
what does SSH stand for
Secure Shell (SSH)
-
waht are the multiple mechanisms for transferring files using the Secure Shell protocols.
- secure copy (scp) , which evolved from RCP protocol over SSH
- SSH File Transfer Protocol (SFTP), a secure alternative to FTP.
- Files transferred over shell protocol (FISH), which evolved from Unix shell commands over SSH.
-
what does SCP stand for
Secure Copy (SCP)
-
what does SFTP stand for
SSH File Transfer Protocol (SFTP)
-
what does IETF stand for
Internet Engineering Task Force (IETF)
-
what does TLS and SSL stand for
- Transport Layer Security (TLS)
- Secure Socket Layer (SSL)
-
what does VoIP stand for
voice-over-IP (VoIP).
-
what does SRP stand for
Secure Remote Password (SRP)
-
what does TCP stand for
Transmission Control Protocol (TCP).
-
what does UDP stand for
User Datagram Protocol (UDP)
-
A prominent use of TLS is for securing World Wide Web traffic carried by HTTP to form HTTPS on what well-known port
port 443
-
what does SMTP stand for
Simple Mail Transfer Protocol (SMTP)
-
what does CA stand for
certificate authority's (CA's)
-
what does PbK stand for
public key (PbK)
-
what does RN stand for
random number (RN)
-
what does PvK stand for
private key (PvK))
-
what does ISO stand for
International Organization for Standardization (ISO)
-
what does SNMP stand for
. Simple Network Management Protocol (SNMP)
-
what does MIB stand for
Management Information Base (MIB)
-
what does NMS stand for
Network Management Station (NMS)
-
what does PDU stand for
Protocol Data Unit (PDU).
-
what does OID stand for
Object Identifiers (OIDs)
-
what is getbulk
The GetBulk operation is used by the NMS to efficiently retrieve large blocks of data, such as multiple rows in a table.
-
what is inform
The Inform operation allows one NMS to send trap information to another NMS and to then receive a response.
-
what is the seven traps
- coldStart - cold start of the component.
- warmStart - reset of the component.
- linkDown - link (interface) not available.
- linkUp - link (interface) available.
- authenticationFailure - unauthorized / rejected MIB access.
- egpNeighborLoss - no connection to neighbor gateway.
- enterpriseSpecific - manufacturer defined messages.
|
|