Jeopardy - PowerPoint PPT Presentation

1 / 74
About This Presentation
Title:

Jeopardy

Description:

Miscellany 1. Firewalls. Network. Security. Connecting. from Home. Network. Miscellany 2 ... This type of wireless network has each computer communicate ... – PowerPoint PPT presentation

Number of Views:55
Avg rating:3.0/5.0
Slides: 75
Provided by: cecsC
Category:

less

Transcript and Presenter's Notes

Title: Jeopardy


1
This
IS
Jeopardy
2
(No Transcript)
3
(No Transcript)
4
Wireless Networks
5
Network Misc.
6
Firewalls
7
Network Security
8
Connecting from Home
9
Home Networks
10
Network Misc. II
11
Wireless Networks
Network Miscellany 1
Firewalls
Network Security
Connecting from Home
Network Miscellany 2
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
12
This type of wireless network has each computer
communicate directly with each other
13
ad hoc or peer to peer
14
An infrastructure wireless network requires this
device to attach to a wired network
15
Access Point Or Base Station
16
The two ways of implementing a wireless access
point.
17
Hardware And Software
18
When a single user moves from one access point to
another
19
Roaming
20
The initial, flawed, built-in security protocol
for IEEE 802.11 wireless LANs
21
WEP (Wired Equivalent Privacy)
22
This device modulates digital and demodulates
analog signals
23
modem
24
This is the MAC protocol used in IEEE 802.11
25
CSMA/CA
26
Two reasons that DHCP is used.
27
  • Conserve IP addresses
  • (2) Easy network set-up
  • (3) Host mobility
  • (others)

28
This device forwards each data packet out through
a port based on MAC Addresses
29
Switch
30
These protocols are used on the Internet to
provide web security.
31
HTTPS and SSL
32
A network firewall is similar to this type of
ancient building.
33
A castle.
34
The name for a bad guy/gal who wants to get
your credit card information
35
An Intruder
36
The method a firewall uses to keep out unwanted
packets.
37
Packet filtering.
38
These forward packets through firewalls after
authorization.
39
Proxy Servers or Applicaton-Level Gateways.
40
Creating a malicious message that looks like it
came from a trusted source.
41
IP Spoofing
42
Preventing others From listening
or Eavesdropping To information Being sent
43
Privacy
44
Preventing others From masquerading As someone
else (ensuring the author of a message is the
author)
45
Authentication
46
The name for a message after encryption.
47
CIphertext
48
The two primary concerns when using an
encryption/decryption algorithm.
49
  • Degree of security
  • (2) Speed of encryption/decryption

50
In this encryption/ decryption scheme, both the
sender and the receiver share the same secret key
51
Secret Key Encryption
52
This type of high-speed Internet connection runs
over your telephone line, but allows you to use
your telephone simultaneously
53
DSL or ADSL
54
This type of high-speed Internet connection uses
HFC (Hybrid Fiber Coax)
55
Cable Modem
56
This baseband Internet connection uses the
standard phone line
57
Dial-up Modem
58
This device forwards packets using information
stored in tables and IP addresses
59
Router
60
Daily Double!!
61
What the CD in IEEE 802.3 CSMA/CD protocol stands
for
62
Collision Detection
63
The algorithm used to recover after collisions in
Ethernet 802.3
64
Exponential Backoff
65
This type of wireless network runs on the same
frequency as wireless phones, and is capable
of 54 Mbps speed
66
802.11 g
67
This network interconnection device repeats all
signals onto all ports (including noise)
68
Hub
69
This protocol allows a computer to obtain its IP
address automatically
70
DHCP (Dynamic Host Configuration Protocol)
71
This protocol running on a router allows
computers to share one IP address.
72
NAT (Network Address Translation)
73
Final Jeopardy
The terms that correspond to the following
acronym CSMA/CA
74
Carrier Sense Multiple Access/ Collision Avoidance
Write a Comment
User Comments (0)
About PowerShow.com