• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/144

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

144 Cards in this Set

  • Front
  • Back

What are layer 1 endpoints for cables from wall jacks?

Patch panels

Which is more resistant to EMI, Coax or twisted pair?

Coax

UTP (Unshielded Twisted Pair) is more vulnerable to interference, crosstalk, and ______________.

Eavesdropping

What is the main TP (Twisted Pair) used today?

Cat 5e. (Next Gen is Cat 6a)

What are fire retardant cables called?

Plenum (cost 2x as much)

What is the Twisted Pair Cat 7 speed and how is it used?

10 Gbps, backbone cabling

What is the difference between broadband and baseband?

Baseband: Binary (single channel)


Broadband: Analog (multiple channels)

What is the effective communication distance for copper communication cables?

100m

What is a loss of signal strength over distance?

Attenuation

What causes corruption in binary signals?

Noise

What happens when a signal spills from one cable to a nearby cable?

Crosstalk

Regarding fiber, what light source is used for single and multi-mode?

single mode - Laser (kilometers)


multi-mode - LEDs (within buildings)

What is the difference between synchronous and asynchronous signals?

Synchronous: No start stop, continuous signal


Asynchronous: Bits sent sequentially

What topology is good for several servers being linked in a high availability (HA) need situation?

Mesh

What is the normal topology we use?

Star

What are the layers of the OSI model? Bottom to top.

1. Physical


2. Data Link


3. Network


4. Transport


5. Session


6. Presentation


7. Application


All People Seem To Need Data Processing

What is it called when data is packaged to travel through the OSI model (up or down) and communicates with same layers at the the other end.

Encapsulation

What is Layer 1 of the OSI model for?

Physical - media - patch panels, fiber cable

What is Layer 2 of the OSI model for?

Network: Ethernet, switches

What is Layer 3 of the OSI model for?

Networking: Routers, IPV4, IPV6, OSPF, BGP

What is Layer 4 of the OSI model for?

Transport: TCP, UDP, SSL, TLS (port #s/sockets)

What is Layer 5 of the OSI model for?

Session: NetBIOS, NFS, SQL, RPC

What is Layer 6 of the OSI model for?

Presentation: ASCII, TIFF, GIF, JPEG, etc.

What is Layer 7 of the OSI model for?

Application: FTP, SSH, API, MIME, TELNET, HTTP

At OSI Layer 1, how does communication happen? In the form of.....

Bits

Where does the MAC address get resolved in the OSI model?

Layer 2


Where does IP addressing happen in the OSI model?

Network Layer (3)

Where is UDP and TCP used in the OSI model?

Layer 4, Transport

At what layer does segment size and sequence numbering happen?

Layer 4, Transport

What is the difference between TCP and UDP?

TCP: Reliable (3 way handshake - connection oriented, sequential series of packets)


UDP: Fast (Connectionless - best effort - used for VoIP and Streaming)

What OSI Layer allows applications to organize and synchronize how they will transfer data?

Layer 5, Session

Which OSI Layer translates messages into standard presentations? (encryption and compression, as well as formatting - like jPEG)

Layer 6, Presentation

Which OSI Layer includes Application Programming Interfaces (API)


Popular protocols: SMTP, HTTP, FTP, Telnet, TFTP)

Application Layer, 7

At which layers are the following data frame types:


Data


Segment


Packet


Frame ( last frame element is Frame Check Sequence)

Data: Presentation


Segment: Transport


Packet: Network


Frame & FCS: Data Link / Physical

What are the TCP/IP Layers?

Application


Transport (host to host)


Internet


Network Interface




A TIN man

How does the TCP/IP map to OSI?

Application


Presentation Application


Session___________________________


Transport_______________Transport (host2host)


Network________________ Internet


Datalink


Physical Network Interface

What are the common network devices on layers 1, 2, and 3? What device is multi-layer?

1 - Hub


2 - Switch


3 - Router


Multi-layer: Gateway



What is 802.3?

Standard for Ethernet (3 is like a backwards E)

Switches work at Layer _____ using a standard called _______.

2, Ethernet

What device is subject to MAC flooding and Spoofing attacks?

Layer 2 switch (Data Link)

Where is a NIC used?

Layer 2 - with switches

What routing protocol simply used hops to decide routes?

RIP (Routing Information Protocol) - 15 hop limit (TTL - Time to Live)

What routing protocol keeps a topology map and determines shortest path/

OSPF (Open Shortest Path First)

What is the exterior routing protocol and is used by ISPs?

BGP (Border Gateway Protocol)

What acts as a translator (between media or protocols) and works at several layers of the OSI model?

Gateway

What is the primary protocol suite used on the Internet today?

TCP/IP


(TCP - Layer 4, IP - Layer 3)

What are the ports for FTP, SMTP, SNMP, HTTP, Telnet, and SSH?

FTP - 20, 21


SMTP - 25


SNMP - 161


HTTP - 80


Telnet - 23


SSH - 22 (Secure Telnet Replacement)

Source port numbers are dynamic, or __________ and used to track communications sessions.

Ephemeral

What defines the network and host portions of an IP address?

Subnet Mask

In 192.168.0.1:23, what does the 23 represent?

The port number

In 192.168.0.1/24, what does the 24 represent?

Subnet Mask

What are the ranges for IP addresses for Classes A - E?

A - 0-127 (First byte defines network)


- Note: 127 is reserved for loopback testing


B - 128-192 (First 2 bytes define network)


C - 193-224 (First 3 bytes define network)


D - 225-240 (multicast)


E - Invalid Experimental

What is an IPv6 address?

Unique 128 bit address scheme -


8 blocks of four hexadecimal units



How is an IPv6 unicast network and host split up?

equal 64 bits of each

How can you shorten the IPv6 address?

By eliminating leading zeros and adjacent blocks of zeros with ::


e.g. ...2f29:0:0:0:3d... becomes: 2f29::3d...

For global addressing of IPv6, what is the global routing prefix and subnet ID?

Global routing = first 48 bits


Subnet ID = next 16 bits

In IPv6, what does Link Local Addressing always begin with?

fe80:: (understood as fe80:0:0:0

T/F IPv6 Tunnels may be misused by attackers.

True

What protocol does DHCP use?

UDP

What defines the DHCP sequence of actions?


DORA

DORA:


- Discover message


- Offer message


- Request proper network info


- Acknowledge

What is a major man in the middle attack threat that redirects IP addressing?

Rogue DHCP Server

What is a High Availability (HA) practice for DHCP and DNS to ensure redundancy?

Split DNS or Split DHCP (shares the load)

Routers can be a _______________ for DHCP services, rebroadcasting across subnets.

Relay Agent

Split DNS (or split-Brain DNS) is a best practice, allowing....?

One Internal DNS server (locates domain resources)


One Exernal DNS server (locates Internet resources)

T/F - DNSSEC encrypts.

False, it uses digital signatures for authentication

What is the directory service database (standard for storing details about the network) and in what standard does it store?

Lightweight Directory Access Protocol (LDAP), X.500

Difference between x.500 and x.509?

x.509 = Public Key (digital certificates)


x.500 = LDAP naming standards (Leafs)

In LDAP, what is a subject called?

A leaf

What is the protocol that resolves MAC addresses from a known IP address?

Address Resolution Protocol (ARP)

What is it called when someone puts bad information into an ARP table to misdirect users?

ARP Poisoning (man in the middle)

ICMP can be misused through which utility?

Ping (Packet Internet Network Grope)

Which version of SNMP is most secure?

v3 (SNMP v4 works with IPv6)

ATM works at which layer of the OSI model?

Multiple layers

ATM has which 2 circuit methods?

Switched Virtual Circuit (SVC) - created on demand


Permanent Virtual Circuit (PVC) - programmed in advance

What is an L2/L3 (or just L3) Switch?

It is a layer 3 switch (VLAN capable) that performs routing functions. (multilayer device)

A proxy server does NAT (Network Address Translation) and deep packet inspection at ______layers?

Multi-layers

What is it called when two separate standards come together to do something better, such as with protocols?

convergence or converged protocols

Evolving from specialized Fibre channel storage, this convergence allowed Ethernet to communicate with Fibre SANs?

FCoE (Fibre Channel over Ethernet)

What was the convergence of SCSI and IP?

iSCSI

What is MPLS?

Multiprotocol Label Switching - used by ISPs to create private WANs across their backbone (forwards with labels instead of IP addresses)


- Isolates traffic, as in a VLAN


- More secure than normal IP routing


- Good for VoIP (meaning good for QoS)

What device hides internal addresses by centralizing them on one router and forwarding only the source address of that router?

Network Address Translation (NAT)

VoIP requires _________ to provide lag-free communication

Quality of Service, or Traffic Shaping

What is the initiation protocol that is used to setup and tear down VoIP sessions?



What protocol carries the actual media payload?

SIP (Session Initiation Protocol)


RTP (Real-time Transfer Protocol)

What IEEE standard defines Wi-Fi standards for security?

802.11i

What WPA function keeps you from eavesdropping?

TKIP (Temporal Key Integrity Protocol)

WPA also replaced CRC error checking in WEP with better ____________________ (MIC)

Message Integrity Check

WPA2 enhances security. Replaces RC4 with ____________ (AES.....?)

AES-CCMP

TKIP (Temporal Key Integrity Protocol) is a ___________ encryption key. It is a single use session key. Also uses strong/long keys.

Symmetric

What is a network protocol that provides client/server authentication and authorization, and audits remote users. It also provides enterprise authentication?

RADIUS (Remote Authentication Dial-In User Service)

What is the difference between bluejacking and bluesnarfing?


How can you eliminate the threat?

Bluejacking: Send anonymous spam


Bluesnarfing: stealing info from bluetooth device


- Eliminate by disabling discovery

What is the best protection for "bring your own device" mobile devices?

MDM (mobile device management) infrastructure

What are some good MDM choices to implement?

Sophos and Airwatch

What is "footprinting"?

Discovery - gathering data about a target (security profile) before attacking.

Firewalls have moved from static postures to...

Dynamic Stateful firewalls. Keeps track of "state" or dialog process of a communication stream between internal and external hosts

What is an application layer firewall that inspects 100% of the packet (deep packet inspection) called?

Application firewall

Proxy Firewalls are better than hardware firewalls at ___________ information.

logging

What is a proxy that hides the real sender's info?

Anonymizer proxy

TOR (TOR Onion Networks) is free software that does what?

enables anonymous communication over the Internet.


Open ________________ are used to mask SPAM senders

mail relays

What is a Bastion Host?

Extremely hardened system. Locked down due to being Internet accessible.

What two methods hide and extend your IP address scheme for your internal network?

NAT and PAT (Port Address Translation)

What is our IT "network burglar alarm" system?

IDS

Does an IDS block intrusion?

No!

What does block an intrusion?

Network Intrusion Prevention System (NIPS)

When alerted by an IDS/IPS, what is the responding administrator called?

First responder

What advantage does an application-based proxy firewall have over packet-filtering firewalls?

Better Security

What are the two intrusion detection techniques:


Anomaly Detection and Signature Based?

Anomaly Detection: comparing current systems to baseline activities.


Signature Based: comparing LAN traffic to a variety of attack signatures

Host HIDS/HIPS can examine encrypted traffic after it is decrypted. T/F?

True

PPTP, L2TP/IPsec, SSL/TLS, and SSTP are modern _________ Protocols

VPN Tunneling

What is CHAP

Challenge Handshake Authentication Protocol, authentication protocol that validates user through handshake instead of sending password.

ISDN has two connection types. What are they and what are their speeds?

- BRI (Basic Rate Interface) 2 b channels and 1 d channel


- PRI (Primary Rate Interface) 23 b channels and 1 d channel




b channels: 64 KBps (data)


d channels: 64 KBps (control)

What are the Internet, X.25, and Frame Relay examples of?

Packet switching?

What is an early fast WAN packet-switched technology that uses PVCs and SVCs?

Frame Relay (Early WAN)

What connection-oriented technology uses 53-byte packets in the form of fixed cells?

ATM

What is an encryption protocol that is a hybrid of Cisco L2F and PPTP?

L2TP (Layer 2 Tunneling Protocol) and IPSec.

In L2TP, what does the encryption at Layer 3?

ESP in IPSec.

The IPSec protocol that performs only integrity checking (doesn't encrypt) is __________

AH (Authentication Header) Protocol

The IPSec protocol that performs encryption (most used) is ____________

ESP (Encapsulating Security Payload) in tunneling mode with encapsulation

With the ESP protocol, what is the difference between transport and tunnel mode?

Transport mode: Only data is secured


Tunnel mode: Entire packet encapsulated

Browser based VPN solutions (utilizing SSL and TLS) are harder to implement. T/F

False. They are easier to implement.

What is an IP address combined with a Port Number called?

A Socket

Regarding VLANs, what is 802.1q?

The header in the frame has an extra piece of information (VLAN Tag) that will allow it to forward or reject traffic.

In the TCP/IP model, where does the PPP protocol reside?

Network access

What is a Loki attack?

A backdoor ICMP attack

What does CDN (Content Distribution Network) provide?

Improves the delivery or performance of streaming or large file application. Stores data closer to where user needs it.

In virtualization, it doesn't require an overarching OS. What runs the functions (multiple instances of OS) instead?

Hypervisor

What is a Virtual Desktop Infrastructure (VDI)?

A client/server solution that utilizes virtualization and centralized servers to run a desktop operating system across a LAN or WAN connection to a host system (thin client)

What are the three primary categories of cloud computing?


(Hint: Hosted - I, P, S)

- Hosted Infrastructure (Iaas): virtualized servers and disk storage


- Hosted Platforms (PaaS): Rent virtual servers with the OS installed


- Hosted (applications) Software (Saas): Leasing the use of a service providers configured software (Netflix)




aaS = as a Service



What are these cloud models:


Public, Private, Community, Hybrid

Public: Internet Public Clouds


Private: provisioned or single organization


Community: specific community of organizations, like federal gov.


Hybrid: Any combination of the above

What was a solution that incorporated the physical separation (decoupling) of the network control plane of packets from the data plane (hardware)? (single large virtualization that removes hardware from the equation)

Software Defined Networking

What are two multi-layer protocols?

ATM and DNP3

What is providing conversion at the perimeter of most networks?

Router (normally Cisco)

Can a router be a firewall?

Yes

In WiFi what does the key exchange?

TKIP

SSL VPN uses what for access?

web browser

What two primary concerns with VoIP technology?

Lag - QoS (Quality of Service)


Sniffing

What is a screenscraper?

Data mining....???

What is a guest operating system?

An operating system running under a hypervisor

What is port isolation?

A management VLAN. E.g. Only one port can be used to program a router or switch.

What does a stateful firewall look at that a normal one doesn't?

Ephemeral port. (session states)

How is a proxy firewall different from a normal one?

Deep packet inspection.



What is an anonymizer proxy used for?

Hides the sender's information. (e.g. TOR)

What device:


- Does MPLS translation


- uses BGP


- Stateful Firewall


- ATM mode


- VPN concentrator for IPSec

Edge Router

WiFi encrypts what portion of the communication?

Antenna to Antenna (radiated signal)