click below
click below
Normal Size Small Size show me how
Exam Def-Terms #3
Exam Prep Def-Terms #3
Term | Definition |
---|---|
Stack | Area of MEMORY which Stores temporary Data created by a function. |
MAC Table | PHYSICAL ADDRESS |
IP Address | Internet Protocol- LOGICAL ADDRESS - is the set of rules governing the format of data sent via the internet or local network. |
TCP | Transmission Control Protocol- Intended for use in a HIGHLY RELIABLE protocol or standard used to ensure data is successfully delivered from one application or device to another. |
UDP | User Datagram Protocol is a communication protocol used across the Internet for especially time-sensitive transmissions such as video playback. (HIGHLY UNRELIABLE) |
DNS | Domain Name Service- This protocol will Translate Domain Name into an IP Address & IP Address to Domain Name. |
DHCP | Dynamic Host Configuration Protocol- This is a client/server protocol that AUTOMATICALLY provides an Internet Protocol (IP) host with its IP |
Static IP Address | This type of IP address allow network devices to retain the SAME IP address all the time. (FIXED or UNCHANGED) |
Default Gateway | A Router/Device that connects YOUR host to remote network segments. |
Sniffing | This is a process of MONITORING and CAPTURING all data packets passing through given network. |
IP Spoofing | This is the MANIPULATING of Internet Protocol (IP) packets with a source IP address that has been modified to IMITATE another computer system, or to HIDE the identity of the sender, or both. (CHANGE or HIDE the IP Address) |
MAC Spoofing | The method for CHANGING or MASKING the Factory-Assigned MAC Address of a network interface on a device. (CHANGE or HIDE the MAC Address) |
MAC Flooding | This is a type of network attack where an attacker connected to a switch port floods the switch interface with very large number of Ethernet frames with different fake source MAC address. |
Ettercap | Man in the Middle Attack |
Ping Flood | DOS Attack- Also known as ICMP flood, is a common Denial of Service (DoS) attack in which an attacker takes down a victim's computer by overwhelming it with ICMP echo requests, also known as PINGS |
Smurf Attack | This is a form of a distributed denial of service (DDoS) attack that renders computer networks inoperable. (SMALL ICMP packet generated by the tool causes BIG trouble for a victim) |
PING | This is a computer network administration SOFTWARE UTILITY TOOL used to TEST the reachability of a host on an Internet Protocol (IP) network & measures the round-trip time for messages sent from the originating host to a destination computer that are ECHOED back to the source. |
CLASS "A" SUBNET MASK | 255.0.0.0 |
CLASS "B" SUBNET MASK | 255.255.0.0 |
CLASS "C" SUBNET MASK | 255.255.255.0 |
Port 80 | HTTP |
Port 443 | HTTPS |
Port 20 & 21 | FTP |
Port 53 | DNS |
Port 22 | SSH |
Port 25 | SMTP |
Port 110 | POP3 |
Port 143 | IMAP |
W | |
W | |
W | |
NetStat | This is a useful tool for CHECKING your Network STATISTICS, Configurations, Incoming and Outgoing Connections, Routing Tables, Port Listening & Other Connection Information (CHECKS FOR PORTS THAT ARE LISTENING) |
TraceRoute | This is a Computer Network Diagnostic Command for displaying possible ROUTES (Paths) and measuring transit delays of packets across an Internet Protocol (IP) network. |