click below
click below
Normal Size Small Size show me how
CompTIA Security+
Security+
| Term | Definition |
|---|---|
| 3 basic steps to isolate network problem | Is the connection to the machine down? (layer 1); Is the network down? (layer 3); Is a service on a specific machine down? (layer 7) |
| 3 blocks for private IP addresses | 10.0.0.0 - 10.255.255.255; 172.16.0.0 - 172.31.255.255; 192.168.0.0 - 192.168.255.255 |
| 3 types of IPv6 address | unicast; multicast; anycast |
| 6to4 prefix | A technique that enables IPv6 hosts to communicate over the IPv4 Internet |
| 10Base2 | ThinNet 10Mbps over coax; up to 185 m |
| 10Base5 | ThickNet 10Mbps over coax; up to 500 m |
| 10BaseF | 10Mbps over multimode fiber-optic cable |
| 10BaseFL | 10Mbps over 850 nm multimode fiber-optic cable |
| 10BaseT | 10Mbps over twisted-pair |
| 10GBaseT | Another name for 10GE when over copper |
| 10GE | 10Gb Ethernet |
| 64 bytes | Minimum length of an Ethernet frame |
| 100BaseFX | 100Mbps over fiber |
| 100BaseT | Fast Ethernet. 100Mbps over twisted-pair |
| 802.11a | Wireless standard; 54Mbps; 75 ft; 5Ghz |
| 802.11ac | Latest wireless standard; single-station data transfer rates of 500Mbps; 5Ghz |
| 802.11b | Wireless standard; 11Mbps; 100-150 ft; 2.4GHz |
| 802.11g | Wireless standard; 54Mbps; 150 ft; 2.4GHz |
| 802.11i | WLANs standard providing improved data encryption for 802.11a - 802.11b - and 802.11g |
| 802.11n | Wireless standard; 4 x 802.11g speeds (200+Mbps); 2.4GHz or 5GHz |
| 802.11r | WLAN standard is designed to speed hand-offs between access points/cells & critical for VoIP |
| 1000BaseFX | 1000Mbps over fiber |
| 1000BaseT | Gigabit Ethernet - 1000Mbps over twisted-pair |
| 1518 bytes | Maximum length of an Ethernet frame |
| absorption | Light interaction with the atomic structure of the fiber material; also involves the conversion of optical power to heat |
| access lists (ACLs) | A basic form of firewall protection |
| access point | A transceiver used to interconnect a wireless and a wired LAN |
| ACR | Compares the signal level from a transmitter at the far end to the crosstalk measured at the near end |
| ad hoc | Another term used to describe an independent network |
| address resolution protocol (ARP) | The protocol used to map an IP address to its MAC address |
| aging time | The length of time a MAC address remains assigned to a port |
| Alien crosstalk (AXT) | Unwanted signal coupling from one permanent link to another |
| anycast address | IPv6 address obtained from a list of addresses but is only delivered to the nearest node |
| Application layer | Interacts with application programs that incorporate a communication component such as your Internet browser and email (HTTP FTP SMTP). 7th OSI layer |
| arp -a | Command to view ARP cache |
| ARP cache | Temporary storage of MAC addresses recently contacted |
| ARP table | Another name for the ARP cache |
| Association | Term describing when a wireless connection has been obtained with a network |
| Attenuation | The amount of loss in the signal strength as it propagates down a wire or fiber strand |
| attenuator | Used to reduce the received signal level (RSL) |
| Authentication Header (AH) | IPsec security protocol guaranteeing packet authenticity (via MD5 or SHA-1) |
| auto-negotiation | Protocol used by interconnected electronic devices to negotiate a link speed |
| Backbone cabling | Cabling that interconnects telecommunication closets; equipment rooms; and cabling entrances in the same building and between buildings |
| Backbone | Main fiber distribution |
| backscatter | Refers to the reflection of the radio waves striking the RFID tag and reflecting back to the transmitter source |
| Balanced mode | Neither wire in the wire pairs connects to ground |
| Basic Service Set (BSS) | Term used to describe an independent network; fundamental topology of WLAN |
| beacon | Used to verify the integrity of a wireless link; transmits SSID |
| Beamforming | A technique used to direct transmission of the radio signal to a specific device |
| bottlenecking | Another name for network congestion |
| bridge | A layer 2 networking device that uses the MAC address to forward data and segment/interconnect two LANs |
| Broadband gateway | Combines a modem and router in one unit. Also referred to as a broadband modem |
| broadcast domain | Any network broadcast sent over the network will be seen by all networking devices in this domain |
| broadcast storm | Excessive amounts of broadcasts; results in degraded network performance |
| broadcast | Transmission of data by a hub to all devices connected to its ports |
| brute force attack | Uses every possible combination of characters for the password to log in to an account |
| Building entrance | The point where the external cabling and wireless services interconnect with the internal building cabling. Also called the entrance facilities. |
| bus topology | The computers share the media (coaxial cable) for data transmission |
| campus area network (CAN) | Interconnected LANs within a limited geographic area (college campus; military base; group of commercial buildings) |
| CAT6 | Class E twisted-pair cables capable of up to 1000Mbps/1Gbps up to a length of 100 m |
| CAT6a | An improved version of CAT6 that supports 10GB Ethernet. Class Ea. |
| CAT7/7a and CAT6a | UTP cable category standards that support 10GB data rates for a length of 100 meters |
| Challenge Handshake Authentication Protocol (CHAP) | An encrypted authentication method that uses the MD5 hashing algorithm |
| CIDR block | The grouping of two or more class networks together; also called supernetting |
| cladding | Material surrounding the core; which must have a lower index of refraction to keep the light in the core |
| Class A networks | Governments - very large networks. Range from 0.0.0.0 to 126.255.255.255. Example: 44.x.x.x |
| Class B networks | Midsize companies. universities and so on. Range from 128.0.0.0 to 191.255.255.255. Example: 128.123.x.x |
| Class C networks | Small networks. Range from 192.0.0.0 to 223.255.255.255 Example: 192.168.1.x |
| Class D networks | Reserved for multicast groups. Range from 224.0.0.0 to 239.255.255.255. Example: 224.x.x.x |
| Class E networks | Experimental. Not used on the Internet. Range from 240.0.0.0 to 254.255.255.255 |
| classful network | Term for when the IP and subnet addresses are within the same network |
| color map | The specification of which wire color connects to which pin on the connector |
| connection-oriented protocol | Establishes a network connection. manages the delivery of data and terminates the connection (Ex: TCP) |
| connectionless protocol | Protocol that doesn't establish a connection or acknowledge packet arrival (Ex: UDP) |
| Content Addressable Memory (CAM) | A table of MAC addresses and port mapping used by the switch to identify connected devices |
| cross-connect | A space where you are going to take one or multiple cables and connect them to one or more cables or equipment |
| Crossover | Transmit and receive signal pairs are switched |
| Crosstalk | Signal coupling in a cable |
| CSMA/CA | Carrier sense multiple access/collision avoidance. Used in 802.11 |
| CSMA/CD | The Ethernet LAN media-access method. carrier sense multiple access with collision detection |
| cut-through | The data packet is forwarded to the destination as soon as the destination MAC address has been read |
| Data link layer | Handles error recovery. flow control (synchronization). and sequencing (MAC; Ethernet) - Second OSI layer |
| Delay skew | The difference in arrival time between the fastest and the slowest signal in a UTP wire pair |
| denial of service (DoS) | A service is being denied to a computer. network. or server |
| dense wavelength division multiplexing (DWDM) | Incorporates the propagation of several wavelengths in the 1550 nm range for a single fiber |
| deterministic network | Each station connected to the network is ensured access for transmission of its messages at regular or fixed time intervals |
| dictionary attack | Uses known passwords and many variations to try to log in to an account |
| Diffie-Hellman | A key exchange algorithm used to generate a shared session secret key to encrypt the key exchange |
| direct sequence spread spectrum (DSSS) | A technique used in 802.11 to spread transmitted data over a wide bandwidth |
| directed broadcast | The broadcast is sent to a specific subnet |
| dispersion | Broadening of a light pulse as it propagates through a fiber strand |
| DMZs | "Zone used to isolate the ""outside"" servers" |
| dynamic assignment | Name for when a switch assigns MAC addresses to a port at the time a host is connected |
| dynamic or private ports | Ports 49152-65535 |
| EAP | Protocol where the access point sends a message requesting the user's identity |
| EIA/TIA 568-B | The standard that defines the six subsytems of a structured cabling system. |
| EIA/TIA-568-B.1 | Commercial cabling standard; master document |
| EIA/TIA-568-B.2 | Standard for twisted-pair media |
| EIA/TIA-568-B.3 | Optical fiber cabling standard |
| Encapsulating Security Payload (ESP) | IPsec security protocol providing confidentiality via encryption (DES; 3DES; AES) |
| Entrance facilities (EF) | Another name for the building entrance |
| Equipment room (ER) | A room set aside for complex electronic equipment such as the network servers and telephone equipment |
| Ethernet | LAN protocol created in 1972 and standardized in 1980 using CSMA/CD. |
| Extended Service Set (ESS) | The use of multiple access points to extend user mobility |
| Extensible Authentication Protocol (EAP) | Collects the user authentication data and validates it against an auth server like a RADIUS server |
| F/UTP | Foil over twisted pair |
| Fiber cross-connect | Optical patch panel used to interconnect fiber cables |
| firewall | Device/software that protects the network; prevent unauthorized access |
| flooding | The term describing what happens when a switch doesn't have the destination MAC address stored in CAM |
| Frame header | Consists of the preamble; start frame delimiter destination and source addresses; and length/type field |
| Frame | Contains the header; data; and trailer (the padding and 4-byte CRC frame check sequence) |
| frequency hopping spread spectrum (FHSS) | A technique used in 802.11 where the transmit signal frequency changes based on a pseudorandom sequence |
| Full channel | Consists of all the link elements from the wall plate to the hub or switch |
| full duplex | Transmit and receive at the same time |
| full IPv6 address | All 32 hexadecimal positions contain a value other than 0 |
| gateway | The networking device that enables hosts in a LAN to connect to networks/hosts outside the LAN |
| graded-index fiber | Fiber type where the index of refraction is gradually varied with a parabolic profile. Provides longer lengths and higher bandwidths |
| hand-off | When the user's computer establishes an association with another access point with a stronger signal |
| hopping sequence | The name for the specific order of frequency changes used in FHSS |
| Horizontal cabling | Cabling that extends out from the telecommunications closet into the LAN work area |
| Horizontal cross-connect | The connection between the building distributors and the horizontal cabling to the work area/outlet. Also called the floor distributors (FD). |
| Host address | Another name for the host number |
| Host number | The portion of the IP address that defines the location of the networking device connected to the network; also called the host address |
| hotspots | A limited geographic area that provides wireless access for the public |
| hub | A multiport repeater device used at the center of a star topology |
| Hybrid echo cancelation unit | Removes the transmitted signal from the receive signal |
| IANA | The agency that assigns IP addresses to computer networks |
| IEEE 802.3an-2006 10GBASE-T | The standard to 10Gb Ethernet; 500 MHz bandwidth and up to 100 m |
| infrared light | Light extending from 680 nm up to the wavelengths of the microwaves |
| inquiry procedure | Identifies and allows discovery of Bluetooth devices |
| Insertion loss | Another name for attenuation |
| Intermediate cross-connect | The building's connection point to the campus backbone. Also called the building distributor (BD). |
| Internet Control Message Protocol (ICMP) | Protocol used to control the flow of data. report errors. and perform diagnostics |
| Internet Control Message Protocol | What ICMP stands for. verifies that messages are being delivered |
| Internet Group Message Protocol (IGMP) | Protocol used when one host needs to send data to many destination hosts (i.e. to multicast) |
| Internet Protocol (IP) | Protocol that defines the addressing used to identify the source and destination addresses of data packets |
| Intranet | An internal network that provides file and resource sharing but is not accessed from the Internet |
| intrusion prevention system (IPS) | Monitors and analyzes the network traffic in real time to identify misuse and anomalies |
| IP address | Unique 32-bit address that identifies on which network the computer is located as well as differentiates the computer from all other devices on the same network |
| IP internetwork | A network that uses IP addressing for identifying devices connected to the network |
| IP tunnel | An IP packet encapsulated in another IP packet. secure VPN connection between 2 endpoints |
| ipconfig /all | Enables the MAC address information to be displayed from the command prompt |
| ipconfig | Command used to display the computer's address |
| IPsec | Where each packet is encrypted prior to transmission across the network link. used in VPNs |
| isolating the collision domains | Term for breaking a network into segments where a segment is a portion of the network where data traffic from one part of the network is isolated from the other networking devices |
| isolator | An inline passive device that allows optical power to flow only in one direction |
| jamming | Attack where the wireless network is overwhelmed with wireless traffic. preventing use/access |
| Layer 2 Forwarding Protocol (L2F) | Cisco tunneling protocol on UDP port 1701. requires special hardware. passes PPP auth to corporate server |
| layer 2 switch | An improved network technology that provides a direct data connection for network devices in a LAN |
| Layer 2 Tunneling Protocol (L2TP) | IETF tunneling protocol on UDP port 1701. no special hardware initiated directly from the client |
| LEAP | An 802.1x authentication system used by Cisco requiring a password to access the network |
| Link integrity test | Protocol that verifies a communication link between two Ethernet devices has been established |
| Link light | Indicates that the transmit and receive pairs are properly aligned |
| Link pulses | Sent by connected devices via twisted-pair when data is not being transmitted to indicate that the link is still up |
| link-local address | Address designed to be used for and limited to communications on the local link |
| Link | Point from one cable termination to another |
| MAC address | A unique 6-byte/48-bit address assigned by the vendor of the network interface card displayed in 12 hex digits |
| macrobending | Loss due to light breaking up and escaping into the cladding |
| Main cross-connect | Typically the central telecommunications connection point for a campus or building. Also called the main distribution frame (MDF). main equipment room. or campus distributor (CD). |
| managed switch | Allows the network administrator to monitor. configure. and manage select network features |
| mechanical splice | Two fibers joined together with an air gap. requires an index-matching gel to provide a good splice |
| media converter | Used to adapt a layer 1 (physical layer) technology to another layer 1 technology (Think AUI to Ethernet) |
| mesh topology | All networking devices are directly connected to each other. allows for full redundancy |
| microbending | Loss caused by very small mechanical deflections and stress on the fiber |
| MIMO | A space-division multiplexing technique where the data stream is split into multiple parts called spatial streams |
| multicast address | IPv6 addresses that start with FF00::/8 |
| multicast addresses | The reserved addresses used to send a multicast data packet |
| multicast | Messages are sent to a specific group of hosts on the network |
| multilayer switch | Device that operates at layer 2 but functions at the higher layers |
| Multilevel encoding | Technique used to reduce the bandwidth required to transport data |
| multimode fiber | A fiber that supports many optical waveguide modes |
| multiport bridge | Another name for a layer 2 switch |
| multiport repeater | The data it receives is broadcast and seen by all devices connected to its ports. A hub. |
| Multiuser MIMO (MUMIMO) | Use of MIMO technology with eight spatial streams |
| near-end crosstalk (NEXT) | A measure of the level of crosstalk or signal coupling in a cable. A high (dB) value is desirable |
| netstat -a | Windows command to display currently open ports and who is connected |
| netstat -b | Windows command to display what app is connected/listening to a port |
| network congestion | A slowdown on network data traffic movement |
| Network layer | Accepts outgoing messages and combines messages or segments into packets; adding a header that includes routing information (IP; IPX). 3rd OSI layer |
| Network number | The portion of the IP address that defines which network the IP packet is originating from or being delivered to |
| nmap | A Linux port scanner |
| non-Internet routable IP addresses | IP addresses not routed on the Internet. Private address ranges; blocked by ISPs. |
| Normal velocity of propagation | Some percentage of the velocity of light that measures the speed of a signal in a cable |
| numerical aperture | A measure of a fiber's ability to accept light |
| Numerics | A numerical representation (used to describe the data rates for the twisted-pair/coaxial media) |
| open authentication | A null authentication that can enable any client to authenticate to an AP as long as they know the SSID |
| Open system interconnect | What OSI stands for |
| optical spectrum | Light frequencies from the infrared on up |
| Organizationally unique identifier (OUI) | The first 3 bytes of the MAC address that identifies the manufacturer of the network hardware |
| orthogonal frequency division multiplexing (OFDM) | Technique used in 802.11 that divides the signal bandwidth into smaller subchannels over which data is transmitted in parallel |
| OSI model | The seven layers describing network functions |
| Overloading | Technique where NAT translates the home network's private IP addresses to a single public IP address |
| packet filtering | Firewall technique that limits the information that can enter the network or move between segments |
| packet sniffing | A technique in which the contents of data packets are watched |
| paging procedure | Used to establish and synchronize a connection between two Bluetooth devices |
| Passkey | Used in Bluetooth Security to limit outsider access to the pairing |
| Password Authentication Protocol (PAP) | A simple; clear-text (unencrypted) authentication method; superseded by CHAP |
| password cracking | The attacker tries to guess the user's password |
| Patch cable | A short cable used to make the physical connection between networking equipment |
| penetration testing | A way to evaluate the security of the user's network by trying to exploit vulnerabilities |
| perimeter firewall | A firewall physically placed between the public Internet and its internal networks |
| Physical layer | Provides the electrical and mechanical connection to the network (cabling; NICs) - First OSI Layer |
| Piconet | An ad hoc network of up to eight Bluetooth devices |
| Ping | ICMP command used to test that a device on the network is reachable |
| Port Address Translation (PAT) | A port number is tracked with the client computer's private address when translating to a public address |
| PPP | The de facto protocol of the dial-up networking |
| PPTP | Uses a modified GRE tunnel to carry its encapsulated packet for IP transmission |
| Presentation layer | Accepts and structures the messages for the application (ASCII; JPEG). 6th OSI layer |
| Private addresses | IP addresses set aside for use in private intranets |
| Propagation delay | The amount of time it takes for a signal to propagate from one end of the cable to the other |
| protocol | The set of rules established for users to exchange information |
| proxy server | Server clients go through to communicate with secure systems |
| pulse dispersion | Stretching of received pulse width because of multiple paths taken by the light. Limits distance and rate of data transmission |
| RADIUS | Authentication service that prevent unauthorized users from connecting and keeps authorized users from connecting to rogue access points |
| range extender | Device that relays the wireless signals from an access point or wireless router into areas with a weak signal/no signal |
| refractive index | Ratio of the speed of light in free space to its speed in a given material |
| registered ports | Ports 1024-49151 on file with ICANN |
| remote access VPN | VPN type used to let remote users log in to network. The client usually initiates the connection |
| Return loss | The ratio of power transmitted into a cable to the amount of power returned or reflected |
| RJ-45 | The 8-pin modular connector used with CAT6/5e/5 cable |
| Roaming | Term describing the ability to maintain network connectivity while moving |
| router interface | The physical connection where the router connects to the network; the ports |
| routing table | Keeps track of the routes to use for forwarding data to its destination |
| scattering | Caused by refractive index fluctuations; accounts for 96 percent of attenuation loss |
| secure address | Name for when a switch port will automatically disable itself if a device with a different MAC address connects to the port |
| segment | A section of a network separated by bridges; switches; and routers |
| sequence number | Used to keep track of packets transferred between 2 hosts |
| Service Set Identifier (SSID) | Wireless network name |
| Services provided by WLAN adapter | Delivery of the data;Authentication; Privacy |
| Session layer | Provides the control functions necessary to establish; manage; and terminate the connections (NSF; SQL). 5th OSI layer |
| shared key authentication | Authentication method where both the client and the access point share a key called a pre-shared key (PSK) |
| single-mode fiber | Fiber cables with core diameters of about 7-10 µm; light follows a single path |
| site survey | Performed to determine the best location(s) for placing the access point(s) to provide maximum RF coverage |
| site-to-site VPN | VPN used to create a virtual link from one site to another. Network hardware makes the connection |
| Slotted Aloha | A wireless network communications protocol/technique used in RFID similar to the ethernet protocol |
| social engineering | A way for an intruder to obtain enough information from people to gain access to the network |
| star topology | Twisted-pair cables connect the devices to a central hub or switch |
| stateful firewall | A firewall that keeps track of the data packet flow |
| Stateful Packet Inspection (SPI) | Firewall technique that inspects incoming data packets to make sure they correspond to an outgoing request |
| Stateless address autoconfiguration (SLAAC) | Allows a server-less basic network configuration of the IPv6 computers |
| static addressing | Name for when a switch manually assigns a MAC address to a port |
| store-and-forward | The entire frame of data is received before any decision is made regarding forwarding the data packet to its destination |
| Straight-through | Transmit and receive signal pairs are aligned end-to-end |
| subnetting | A technique used to break down (or partition) networks into subnetworks |
| supernets | The grouping of two or more class networks together - also called CIDR blocks. |
| supernetting | Technique allowing multiple networks to be specified by one subnet mask |
| switch latency | The length of time a data packet takes from the time it enters a switch until it exits |
| switch | Device used at the center of a star topology that forwards a frame it receives directly out the port associated with its destination address |
| T568A | Color map that begins with green |
| T568B | Color map that begins with orange |
| Telecommunications closet | The location of the cabling termination points that includes the mechanical terminations and the distribution frames. Also called telecommunications room (TR) or telecommunications enclosure (TE). |
| Telecommunications outlet (TCO) | The wall plate where the fiber or twisted-pair cable terminates in the room. Can include non-computer network comms |
| Terminated | Where the cable connects to a jack in a wall plate; a patch panel; or an RJ-45 modular plug |
| ThinNet | The coaxial cable used in a bus network. |
| TIA/EIA 568-A | The first major standard describing a structured cabling system for computer networks in 1995 |
| topology | The network architecture used to interconnect the networking equipment |
| transceiver | A transmit/receive unit |
| translation bridge | Used to interconnect two LANs that use two different networking protocols |
| transparent bridge | Interconnects two LANs running the same type of protocol |
| transport layer protocols | Protocols that define the type of connection established between hosts & how acknowledgements are sent |
| Transport layer | Concerned with message integrity between source and destination (TCP; UDP) - Fourth OSI layer. |
| Uplink port | Allows the connection of a switch to another switch without having to use a crossover cable |
| Virtual Private Network (VPN) | Establishes a secure network connection; a way to protect your LAN's data from being observed by outsiders |
| virus | A piece of malicious computer code that can damage your hardware; software or other files |
| well-known ports | Ports 1-1023; reserved by ICANN |
| Wi-fi Protected Setup (WPS) | Simplifies Wi-Fi configuration but vulnerable to brute force attacks |
| Wi-Fi | Wi-Fi Alliance—an organization that tests and certifies wireless equipment for compliance with the 802.11x standards |
| WiMAX | A broadband wireless system based on the IEEE 802.16e standard |
| window size | The number of data packets can be transferred without an acknowledgement |
| Wired network | Uses cables and connectors to establish the network connection |
| Wireless network | Uses radio signals to establish the network connection |
| wireless router | Device used to interconnect wireless networking devices and to give access to wired devices and establish the broadband Internet connection to the ISP |
| work area outlet (WO) | Used to connect devices to the cable plant. Also called the TCO. |
| Work area | The location of the computers and printers patch cables; jacks; computer adapter cables; and fiber jumpers |
| worm | A type of virus - typically proliferates by itself; and can deny service to networks |