ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Rate it:
48%
Flag icon
Ethernet (IEEE 802.3)
48%
Flag icon
Token Ring (IEEE 802.5)
48%
Flag icon
Fiber Distributed Data Interface (FDDI)
48%
Flag icon
Copper DDI (CDDI).
48%
Flag icon
Point-to-Point Protocol (PPP)
48%
Flag icon
Address Resolution Protocol (ARP)
48%
Flag icon
Point-to-Point Tunneling Protocol (PPTP)
48%
Flag icon
Integrated Services Digital Network (ISDN)
48%
Flag icon
Media Access Control (MAC) address, which is a 6-byte (48-bit) binary address written in hexadecimal notation (for example, 00-13-02-1F-58-F5). The first 3 bytes (24 bits) of the address denote the vendor or manufacturer of the physical network interface. This is known as the Organizationally Unique Identifier (OUI). OUIs are registered with the Institute of Electrical and Electronics Engineers (IEEE), which controls their issuance.
48%
Flag icon
Address Resolution Protocol (ARP)
48%
Flag icon
Traffic on a network segment is directed from its source system to its destination system using MAC addresses.
48%
Flag icon
ARP is also not truly a full layer 2 protocol
48%
Flag icon
Data Link layer contains two sublayers: the Logical Link Control (LLC) sublayer and the MAC sublayer.
48%
Flag icon
Network hardware devices that function at layer 2, the Data Link layer, are switches and bridges.
48%
Flag icon
Internet Control Message Protocol (ICMP) Routing Information Protocol (RIP) Open Shortest Path First (OSPF) Border Gateway Protocol (BGP) Internet Group Management Protocol (IGMP)
48%
Flag icon
Internet Protocol (IP) Internet Protocol Security (IPSec)
48%
Flag icon
Internetwork Packet Exch...
This highlight has been truncated due to consecutive passage length restrictions.
48%
Flag icon
Network Address Transla...
This highlight has been truncated due to consecutive passage length restrictions.
48%
Flag icon
Simple Key Management for Internet Pr...
This highlight has been truncated due to consecutive passage length restrictions.
48%
Flag icon
The Network layer also manages error detection and node data traffic (in other words, traffic control).
48%
Flag icon
(a dead zone is a network segment using an alternative
48%
Flag icon
Network layer protocol instead of IP).
48%
Flag icon
Server Message Block (SMB)
48%
Flag icon
Routers and bridge routers (brouters) are among the network hardware devices that function at layer 3.
48%
Flag icon
Routing Information Protocol (RIP) and Interior Gateway Routing Protocol (IGRP), while common examples of link state routing protocols are Open Shortest Path First (OSPF) and OSI’s Intermediate System - Intermediate System (IS-IS).
48%
Flag icon
The Transport layer (layer 4) is responsible for managing the integrity of a connection and controlling the session.
49%
Flag icon
The Transport layer establishes a logical connection between two devices and provides end-to-end transport services to ensure data delivery.
49%
Flag icon
segmentation, sequencing, error checking, controlling the flow of data, error correction, multiplexing, and network service optimization.
49%
Flag icon
Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Sequenced Packet Exchange (SPX) Secure Sockets Layer (SSL)
49%
Flag icon
Transport Layer Security (TLS)
49%
Flag icon
The Session layer (layer 5) is responsible for establishing, maintaining, and terminating communication sessions between two computers.
49%
Flag icon
It manages dialogue discipline or dialogue control (simplex, half-duplex, full-duplex), establishes checkpoints for grouping and recovery, and retransmits PDUs that have failed or been lost since the last verified checkpoint.
49%
Flag icon
Network File System (NFS) Structured Query Language (SQL) Remote Procedure Call (RPC)
49%
Flag icon
Simplex One-way communication Half-Duplex Two-way communication, but only one direction can send data at a time Full-Duplex Two-way communication, in which data can be sent in both directions simultaneously
49%
Flag icon
The Presentation layer (layer 6) is responsible for transforming data received from the Application layer into a format that any system following the OSI model can understand. It imposes common or standardized structure and formatting rules onto the data.
49%
Flag icon
The Presentation layer is also responsible for encryption and compression.
49%
Flag icon
American Standard Code for Information Interchange (ASCII) Extended Binary-Coded Decimal Interchange Mode (EBCDICM) Tagged Image File Format (TIFF) Joint Photographic Experts Group (JPEG) Moving Picture Experts Group (MPEG)
49%
Flag icon
Musical Instrument Digital Interface (MIDI)
49%
Flag icon
Hypertext Transfer Protocol (HTTP) File Transfer Protocol (FTP) Line Print Daemon (LPD) Simple Mail Transfer Protocol (SMTP) Telnet Trivial File Transfer Protocol (TFTP) Electronic Data Interchange (EDI) Post Office Protocol version 3 (POP3) Internet Message Access Protocol (IMAP) Simple Network Management Protocol (SNMP) Network News Transport Protocol (NNTP)
49%
Flag icon
Secure Remote Procedure Call (S-RPC) Secure Electronic Transaction (SET)
49%
Flag icon
TCP/IP Model The TCP/IP model (also called the DARPA or the DOD model) consists of only four layers, as opposed to the OSI Reference Model’s seven.
49%
Flag icon
49%
Flag icon
it was designed for ease of use rather than for security.
49%
Flag icon
49%
Flag icon
TCP/IP can be secured using virtual private network (VPN) links between systems. VPN links are encrypted to add privacy, confidentiality, and authentication and to maintain data integrity. Protocols used to establish VPNs are Point-to-Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), Secure Shell (SSH), OpenVPN (SSL/TLS VPNs), and Internet Protocol Security (IPSec). Another method to provide protocol-level security is to employ TCP wrappers. A TCP wrapper is an application that can serve as a basic firewall by restricting access to ports and resources based on user IDs or ...more
49%
Flag icon
TCP and UDP each have 65,536 ports.
49%
Flag icon
ports is 2^16,
49%
Flag icon
or 65,536, numbered from 0 thr...
This highlight has been truncated due to consecutive passage length restrictions.
49%
Flag icon
The combination of an IP address and a port number is known as a socket.
49%
Flag icon
The first 1,024 of these ports (0–1,023) are called the well-known ports or the service ports.
« Prev 1