with verified answers
3DES (Triple DES) Ans✓✓✓-A symmetric encryption algorithm that uses either
two (key 1 and key 3 are the same) or three keys and improves upon the Data
Encryption Standard algorithm.
802.11 Ans✓✓✓-The IEEE standard for wireless networking.
802.11a Ans✓✓✓-54 Mbps / 5 GHz / 75 feet
802.11ac Ans✓✓✓-500mbps / 5ghz
802.11b Ans✓✓✓-11 Mbps / 2.4 GHz / 100 to 150 feet
802.11g Ans✓✓✓-54MBps / 2.4GHz / 150ft
802.11n Ans✓✓✓-Wireless networking standard that can operate in both the
2.4-GHz and 5-GHz bands and uses multiple in/multiple out (MIMO) to achieve a
theoretical maximum throughput of 100+ Mbps.
802.3 Ans✓✓✓-The IEEE standard for Ethernet networking.
Accounting (AAA) Ans✓✓✓-* Report on user's access
* Provides forensic trail after a security breach
,* Logs successful and unsuccessful connection attempts
Advanced Encryption Standard (AES) Ans✓✓✓-A block cipher created in the late
1990s that uses a 128-bit block size and a 128-, 192-, or 256-bit key size.
Practically uncrackable.
Application layer (OSI model) Ans✓✓✓-Layer 7 of the OSI Model responsible for
network applications (like HTTP or FTP) and their production of data to be
transferred over the network.
Application Layer (TCP/IP) Ans✓✓✓-TCP/IP model layer that is responsible for
the communication protocols between nodes. The protocols in this layer include.
- HTTP (Hyper Text Transfer Protocol)
- SSH (Secure Shell)
- FTTP
- Telnet
- NTP (Network Time Protocol)
- DHCP
- PING
In conjunction with Layers 5 SESSION, 6 PRESENTATION, AND 7 APPLICATION of
the OSI model.
, ARP (Address Resolution Protocol) Ans✓✓✓-* Displays the IP to physical (MAC)
address mappings for hosts that have been discovered
* Used to add, remove, or modify entries in the cache
* Discovers addresses by broadcasting to the network and noting the reply from
the owner
ARP cache poisoning Ans✓✓✓-An attack in which attackers use fake ARP replies
to alter ARP tables in a network.
asymmetric encryption Ans✓✓✓-used in public key encryption, it is scheme in
which the key to encrypt data is different from the key to decrypt.
Authentication (AAA) Ans✓✓✓-* Confirm user is who they claim to be
* Usernames and passwords
* Public key infrastructure (PKI) certificates
Authorization (AAA) Ans✓✓✓-* Define what the user can access
* Give permissions to a user
* Write and delete or read-only