01 - Flash Cards
(122 cards)
1
Q
OSI Model
A
- The Open Systems Interconnection (OSI) model is a suggested standard for communication.
2
Q
Seven OSI Layers
A
- Layer 7: The application layer
- Layer 6: The presentation layer
- Layer 5: The session layer
- Layer 4: The transport layer
- Layer 3: The network layer
- Layer 2: The data-link layer
- Layer 1: The physical layer
“All people seem to need data processing.”

3
Q
Encapsulation
A
- Adding header and footer to data as it goes through one OSI layer to the next. Therefore, data is encapsulated at each layer as it moves from application to physical layer.
4
Q
Deencapsulation
A
- This is a process in OSI when an incoming transmission received by the destination computer is unpacked as it moves up the protocol stack from physical layer to application.
5
Q
Physical Layer (Layer 1)
A
- Layer that conveys the bits across the network over a physical connection medium, either by electricity or by mechanical or radio waves.
6
Q
Data Link Layer (Layer 2)
A
- This layer formats packets from the physical layer into physical frames for transmission.
7
Q
Network Layer (Layer 3)
A
- This layer is in charge of assigning address information to the data as well as routing.
8
Q
Transport Layer (Layer 4)
A
- This layer manages integrity of a connection. It essentially controls packetization of data and delivery of the packets, including checking for errors in the data.
9
Q
Session Layer (Layer 5)
A
- This layer establishes, maintains and ends communication sessions among two computers.
10
Q
Simplex
A
- One way communication
11
Q
Half-Duplex
A
- Two way communication (only one direction can be sending information at a given time)
12
Q
Full Duplex
A
- Two way communication (information can be sent in both ways at the same time)
13
Q
Presentation Layer (Layer 6)
A
- This layer converts incoming and outgoing information from one format to another – for example, from clear text to encrypted text and vice versa.
14
Q
Application Layer (Layer 7)
A
- This layer is the layer at which user application, networks services and operating systems are combined with the protocol stack so that applications can communicate with the protocol stack.
15
Q
List Two Categories of Routing Protocol
A
- Distance vector routing
- Link state routing
16
Q
TCP/IP Model
A
- It is communications protocols used in computer networks. It is founded on Transmission Control Protocol and the
17
Q
Internet Protocol - TCP/IP Layers
A
- Application
- Transport
- Internet
- Link
18
Q
TCP/IP Protocol
A
- Consists of a great number of individual protocols rather than a sole protocol.
19
Q
Transport Layer Protocols
A
- Transmission Control Protocol (TCP)
- User Data Protocol (UDP)
20
Q
Transmission Control Protocol (TCP)
A
- Full duplex protocol
- User Data Protocol (UDP)
- Simplex
21
Q
IANA Port Number Recommendations
A
- Ports 49152 to 655535 to be used as dynamic/private ports.
22
Q
IP Classes
A
First binary digit Decimal range
Class A 0 1-126
Class B 10 128-191
Class C 110 192-223
Class D 1110 224-239
Class E 1111 240-255
23
Q
What is a Loopback Address?
A
- Class A network 127
24
Q
ICMP
A
- Internet Control Measure Protocol Used for establishing health of a link or a network.
25
Common ICMP Type Field Values
* 0 Echo reply
* 3 Destination unreachable
* 5 Redirect
* 8 Echo request
* 9 Router advertisement
* 10 Router solicitation
* 11 Time exceeded
26
IGMP
* Internet Group Management Protocol allows systems to achieve dynamic multicasting.
27
ARP
* Address Resolution Protocol
28
TCP/IP Vulnerabilities
* Buffer overflows, DoS attacks, fragment attack, hijack attacks and passive attacks via monitoring or sniffing.
29
Domain Name System
* It is hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet.
30
DNS Poisoning
* It is an attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from real servers and towards fake ones.
31
Domain Hijacking
* Malicious action of changing a registration of a domain registration without authorization.
32
Converged Protocols
* Protocols combining specialty or proprietary protocols with standard protocols.
33
Fibre Channel
* High-speed networking technology primarily used for transmitting data among data centers, computer servers, switches and storage at data rates of up to 128 Gbps.
34
MPLS
* Multiprotocol Label Switching (MPLS) is a routing technique in telecommunications networks that directs data from one node to the next based on short path labels thus reducing complexity of the process and increasing speed of traffic.
35
Small Computer System Interface
* Networking storage standard based on IP.
36
Voice Over IP
* It is technology that allows for to making of voice calls using a broadband Internet connection instead of a regular phone line.
37
Software Define Networking
* It is approach to cloud computing that aims to make networks flexible and improve network configuration in order to ameliorate performance and network monitoring.
38
Content Distribution Networks
* Group of network resources access the internet that improve availability and lower the latency of the hosted content.
39
Securing Wireless Access Points
* For each wireless access point it is essential to ensure its security. i802.11 is the IEEE standard for wireless network communications.
40
Wireless Channels
* WiFi channel is the medium of a certain frequency through which our wireless networks can send and receive data.
41
What Does SSID Stand For?
* It is the 32 alphanumeric character service set identifier (SSID) that is a case sensitive.
42
Beacon Frame
* It is a management frame in IEEE 802.11 based WLANs that contains all the information about the network and it is transmitted periodically.
43
Site Survey
* Site Survey softwares use signal strength data gathered by your computer's wireless card to map the signal strength of every access point.
44
WEP
* Wired Equivalent Privacy is a security algorithm for IEEE 802.11 wireless networks designed to provide data confidentiality.
45
WPA
* Wi-Fi Protected Access (WPA) is a security standard for users of computing devices equipped with wireless internet connections.
46
WPA2
* Type of encryption used to secure the vast majority of Wi-Fi networks by providing unique encryption keys for each wireless client.
47
802.1X/EAP
* Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections
48
PEAP
* Protected Extensible Authentication Protocol is an authentication protocol used in wireless networks and Point-to-Point connections.
* It is designed to provide more secure authentication for 802.11 WLANs
49
LEAP
* Lightweight Extensible Authentication Protocol is a proprietary wireless LAN authentication method developed by Cisco Systems in order to address deficiencies in TKIP before 802.11i/WPA2 was ratified.
50
MAC Filter
* Security access control method whereby the MAC address assigned to each network card is used to determine access to the network.
51
TKIP
* Temporal Key Integrity Protocol is a security protocol used in the IEEE 802.11 wireless networking standard and designed as replacement for WEP.
52
CCMP
* Counter-Mode/CBC-Mac Protocol (IEEE 802.11I encryption algorithm) created to replace WEP and TKIP. Uses AES with 128-bit key.
53
WPS
* Wi-Fi Protected Setup is a network security standard to create a secure wireless home network.
54
Antenna Types
* Omnidirectional antennas and directional antennas
55
Captive Portal
* Web page that is displayed to newly connected users before they are granted broader access to network resources.
56
Wireless Attacks
* A malicious action against wireless system information or wireless networks.
57
War Driving
* Act of searching for wireless networks by a person usually in a moving vehicle, using a laptop or smartphone.
58
Warchalking
* Term that refers drawing of symbols in public places to advertise an open Wi-Fi network.
59
Replay Attack
* An attack in which a valid data transmission is fraudulently repeated in order to gain access to a system.
60
IV
* Term that stands for initialization vector, another term for a random number. In security context IV is used to reduce predictability and augment security.
61
Rogue Access Points
* It is a wireless access point installed on a wired enterprise network without authorization from the network administrator.
62
Evil Twin Attack
* It is an attack that sets a fraudulent internet access point that seems legitimate but is set up to eavesdrop on wireless communications.
63
Intranet
* Intranet is a private network accessible only to an organization's staff.
64
Extranet
* It is private network that in addition to organization's staff allows access to authorized partners or authorized customers.
65
Network Segmentation
* Networks are divided into smaller units.
* This feature leads to boosting performance, reducing communication problems, providing security.
66
Network Access Control
* Control of access by strictly following the security policy.
67
Define NAC Goals
* Prevent/reduce attack
* Implement security policy
* Used identities for access control
68
Firewalls
* Network device that filters the traffic.
69
Static Packet Filtering Firewalls
* Traffic filtering based on a message header.
70
Application Level Gateway Firewalls
* Also known as proxy firewall where packets are filtered based on the service for which they are intended.
* For additional security this firewall changes source and destination addresses.
71
Circuit Level Gateway Firewalls
* Traffic filtering based on a circuit and not content of traffic.
72
Stateful Inspection Firewalls
* Firewalls that examine each packet but they keep track of whether or not that packet is part of an established TCP session.
73
Deep Packet Inspection Firewalls
* Traffic filtering based on a payload content rather than just the message heather.
74
Next Gen Firewalls
* It combines packet inspection with stateful inspection and deep pocket inspection.
75
Multi-homed Firewalls
* Traffic filtering based on a more than one interface.
76
Bastion Computer
* It is computer on a network specifically designed and configured to withstand attacks.
* It hosts a single application and all other services are removed or limited to reduce the threat to the computer.
77
Firewall Deployment Architectures
* Single tier
* Two tier
* Three tier
78
Security Endpoint
* Each individual device is to maintain local security regardless of network security.
79
Collision Domain
* It is a network segment connected by a shared medium or through repeaters where simultaneous data transmissions collide with one another.
80
Broadcast Domain
* It is a group of network systems where each member of the group receives broadcast signal once it is emitted from one of the members.
81
What Do Repeaters, Concentrators, and Amplifiers Do?
* They strengthen communication signal over a cable segment and connect network segments using the same protocol.
82
Modem
* Hardware device that converts data between transmission media so that it can be transmitted from computer to computer.
83
Hubs
* Multiport repeaters that connect network systems that use the same protocol
84
Bridges
* Connects two networks together.
85
Switches
* Also known as intelligent hub as it repeats traffic only at a port on which destination is known to exist.
86
Routers
* Networking devices that forwards data packets between computer networks.
87
Brouters
* Combination devices consisting of of a bridge and a router.
88
Gateways
* Connects networks using different protocols.
89
Proxies
* Gateway that does not translate across protocols. They serve as mediators and filters for a network.
90
Lan Extenders
* It is a multilayer device used to extend r network segment beyond its inherent distance limitation.
91
Transmission Media
* It is pathway that carries the information from sender to receiver.
92
Coaxial Cable
* Coax, is a type of electrical cable that has an inner conductor surrounded by a tubular insulating layer, surrounded by a tubular conducting shield.
93
Baseband and Broadband Cables
* Baseband cables transmit single signal at one time while broadband cables transmit multiple tables simultaneously.
94
Twisted-pair Cabling
* Type of wiring in which two conductors of a single circuit are twisted together for the purposes of improving electromagnetic compatibility
95
5-4-3 Rule
* Guideline used in the design of shared ethernet networks which promotes optimal traffic flow.
* It defines number of repeater used in a network design.
96
Network Topology
* Physical layout of computers and networking devices.
97
Network Topology Types
* Ring Topology
* Bus Topology
* Star Topology
* Mesh Topology
98
Ring Topology
* Network topology in which each node connects to exactly two other nodes, forming a single continuous circuit for signals through each node - a ring.
99
Bus Topology
* Local Area Network (LAN) in which all the nodes are connected to a single cable -- common linear half-duplex link called a bus.
100
Star Topology
* Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch.
101
Mesh Topology
* Local Area Network (LAN) in which the infrastructure nodes connect directly and non-hierarchically to as many other nodes as possible.
102
Frequency Hopping Spread Spectrum
* Method of transmitting signals by rapidly switching a carrier among many frequency channels.
103
Direct Sequence Spread Spectrum
* It is modulation technique used to reduce overall signal interference by employing all the available frequencies simultaneously in parallel.
104
Orthogonal Frequency Division Multiplexing
* It is a method of encoding digital data on multiple carrier frequencies.
105
Bluetooth
* It is a wireless technology standard for exchanging data over short distances using short-wavelength.
106
RFID
* Radio-frequency identification uses electromagnetic fields to automatically identify and track tags attached to objects.
107
NFC
* Set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other.
108
List Frequency Ranges for Cordless Phones
* 900 MHz
* 2.4 GHz
* 5 GHz
109
List LAN Technologies
* Ethernet
* Token Ring
* Fiber Distributed Data Interface (FDDI)
110
Ethernet
* Shared media technology used for connecting wired local area networks (LANs), enabling devices to communicate with each other by using a protocol.
111
Token RIng
* Local area network (LAN) in which all computers are connected in a ring or star topology and pass one or more logical tokens from host to host.
112
Fiber Distributed Data Interface
* High speed token-passing technology employing two rings with traffic flowing in opposite direction.
113
Analog Communications
* Data transmitting technique in a format that utilizes continuous signals to transmit data. In analog communication information is translated into electric pulses of varying amplitude.
114
Digital Communications
* Data transmitting technique in a format where information is encoded digitally as discrete signals and then is electronically transferred to the recipients.
115
Synchronous Communications
* Transmission of data relying on a timing based on an independent clock or a timestamp embedded in data.
116
Asynchronous Communications
* Transmission of data without the use of an external clock signal, where data can be transmitted intermittently rather than in a steady stream.
117
Baseband Technology
* Baseband transmissions use digital signaling over a single wire and the transmissions themselves take the form of either electrical pulses or light.
118
Broadband Technology
* Baseband communication is bidirectional, allowing computers to both send and receive data using a single cable -- the sending and receiving cannot occur on the same wire at the same time.
119
Define Broadcast, Multicast,Unicast
* Broadcast -communication to all possible recipients
* Multicast - communication to multiple specific recipients
* Unicast - communication to a specific recipient
120
LAN Media Access Technologies
* Carrier Sense Multiple Access
* Carrier Sense Multiple Access with Collision Avoidance
* Carrier Sense Multiple Access with Collision Detection
* Token Passing
* Polling
121
List Protocol Services Used to Connect to LAN and WLAN
* Frame Relay
* SDMS
* ATM
* HSSI
* HDLC
* ISDN
122