Title: Jeopardy
1This
IS
Jeopardy
2(No Transcript)
3(No Transcript)
4Wireless Networks
5Network Misc.
6Firewalls
7Network Security
8Connecting from Home
9Home Networks
10Network Misc. II
11Wireless Networks
Network Miscellany 1
Firewalls
Network Security
Connecting from Home
Network Miscellany 2
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
12This type of wireless network has each computer
communicate directly with each other
13ad hoc or peer to peer
14An infrastructure wireless network requires this
device to attach to a wired network
15Access Point Or Base Station
16The two ways of implementing a wireless access
point.
17Hardware And Software
18When a single user moves from one access point to
another
19Roaming
20The initial, flawed, built-in security protocol
for IEEE 802.11 wireless LANs
21WEP (Wired Equivalent Privacy)
22This device modulates digital and demodulates
analog signals
23modem
24This is the MAC protocol used in IEEE 802.11
25CSMA/CA
26Two reasons that DHCP is used.
27- Conserve IP addresses
- (2) Easy network set-up
- (3) Host mobility
- (others)
28This device forwards each data packet out through
a port based on MAC Addresses
29Switch
30These protocols are used on the Internet to
provide web security.
31HTTPS and SSL
32A network firewall is similar to this type of
ancient building.
33A castle.
34The name for a bad guy/gal who wants to get
your credit card information
35An Intruder
36The method a firewall uses to keep out unwanted
packets.
37Packet filtering.
38These forward packets through firewalls after
authorization.
39Proxy Servers or Applicaton-Level Gateways.
40Creating a malicious message that looks like it
came from a trusted source.
41IP Spoofing
42Preventing others From listening
or Eavesdropping To information Being sent
43Privacy
44Preventing others From masquerading As someone
else (ensuring the author of a message is the
author)
45Authentication
46The name for a message after encryption.
47CIphertext
48The two primary concerns when using an
encryption/decryption algorithm.
49- Degree of security
- (2) Speed of encryption/decryption
50In this encryption/ decryption scheme, both the
sender and the receiver share the same secret key
51Secret Key Encryption
52This type of high-speed Internet connection runs
over your telephone line, but allows you to use
your telephone simultaneously
53DSL or ADSL
54This type of high-speed Internet connection uses
HFC (Hybrid Fiber Coax)
55Cable Modem
56This baseband Internet connection uses the
standard phone line
57Dial-up Modem
58This device forwards packets using information
stored in tables and IP addresses
59Router
60Daily Double!!
61What the CD in IEEE 802.3 CSMA/CD protocol stands
for
62Collision Detection
63The algorithm used to recover after collisions in
Ethernet 802.3
64Exponential Backoff
65This type of wireless network runs on the same
frequency as wireless phones, and is capable
of 54 Mbps speed
66802.11 g
67This network interconnection device repeats all
signals onto all ports (including noise)
68Hub
69This protocol allows a computer to obtain its IP
address automatically
70DHCP (Dynamic Host Configuration Protocol)
71This protocol running on a router allows
computers to share one IP address.
72NAT (Network Address Translation)
73Final Jeopardy
The terms that correspond to the following
acronym CSMA/CA
74Carrier Sense Multiple Access/ Collision Avoidance