D481 - SECURITY FOUNDATIONS ESSENTIAL TERMINOLOGY EXAM QUESTIONS WITH VERIFIED ANSWERS UPDATED
Network interface controller (NIC)
A hardware device that connects a computer or other device to network media.
Address resolution
The process of finding an IP address for a host name
Broadcast a...
Network interface controller (NIC)
A hardware device that connects a computer or other device to network media.
Address resolution
The process of finding an IP address for a host name
Broadcast address
Address used to transmit to all nodes on the network; the last address in a network. Ex:
255.255.255.255
Classful network
The original addressing architecture used for the Internet
Classless Inter-Domain Routing (CIDR)
A strategy that allows IANA to segment any IPv4 address space to define larger or
smaller networks as needed.
Connection-oriented protocol
A communication protocol that sets up a connection with the remote node before
exchanging messages with it. Both participants in the conversation use the same
connection for the duration of the conversation
Connectionless protocol
A communication protocol that doesn't require a predefined connection and treats each
packet as a separate entity.
Datagram
Layer 3 protocol units of data sent to a destination node; also called network packets
Domain Name System (DNS)
A hierarchical naming system that allows organizations to associate host names with IP
address name spaces.
,Dot notation
Standard notation for IPv4 Addresses
Dual IP stack
A network software implementation in which the operating system supports both IPv4
and IPv6 using two separate network stacks for the Internet Protocol
Dynamic Host Configuration Protocol (DHCP)
An automatic configuration protocol used to assign device attributes to devices on IP
networks.
Encapsulation
The process of adding the IP header data to a network packet.
Fragmentation
Process in which IP software chops packets into smaller packets, allowing computers to
send large packets across a network that can only handle smaller packets.
Internet Assigned Numbers Authority (IANA)
The organization responsible for coordinating IP addresses and resources around the
world.
Internet Engineering Task Force (IETF)
A global volunteer organization that develops and promotes Internet standards.
Loopback address
Address on computer that refers to itself. Requests sent to the loopback address will
always be "looped back" to the computer on which they originated, allowing the
computer to behave as both a local and remote device without being attached to a
network. Common use cases include performing tests of a computer's communications
infrastructure, and making use of a client/server architecture (such as a web application)
in which the host is both the client and the server.
Example is 127.0.0.1 for IPv4 and ::1 for IPv6
Neighbor Discovery Portal (NDP)
Protocol use by IPv6 networks to provide a similar service as ARP.
Network Address Translation (NAT)
The process of replacing a private IP address with a public IP address, or vice versa
, Port Address Translation (PAT)
An extension of network address translation (NAT), this is the process of mapping
multiple hosts on a local area network (LAN) to a single public IP address. Unlike NAT,
which maps one private IP address to one public IP address, PAT specifies a port
number for each privately addressed host, thereby enabling multiple hosts to be
mapped to the same public IP address.
Protocol
A set of rules that define a particular aspect of communication
Reserved address
A non-routable IP address within the private address spaces defined in RFC1918 (IPv4)
and RFC4193 (IPv6). For use only on private (internal) networks.
Subnet mask
A binary number that contains all 1s in the leftmost prefix length positions, and all other
bits are 0s.
Unicast address
IPv6 addresses that specify a unique device.
Variable Length Subnet Masking (VLSM)
A strategy to allow IPv4 networks to be fragmented into any size subnetwork.
3-tier
Application architecture composed of separate client, application services, and data
services layers.
ARPANET
Predecessor of the Internet, this DoD-sponsored network was the first to implement a
decentralized, fault-tolerant, large-scale network that used the TCP/IP network protocol
suite.
ASCII (American Standard Code for Information Interchange)
Character coding standard for electronic communication
Botnet
Workstations that have been infected with remote-controlled malware and are part of a
collection of other remotely controlled infected workstations.
Blockchain
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller AcademicSuperScores. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.49. You're not tied to anything after your purchase.