Network Design Flashcards

1
Q

Used to explain network communications between a host and remote
device over a LAN or WAN

A

OSI Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Represents the actual network cables and radio waves used to carry data
over a network

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describes how a connection is established, maintained, and transferred
over the physical layer and uses physical addressing (MAC addresses)
§ Frames

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Uses logical address to route or switch information between hosts, the
network, and the internetworks
§ Packets

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Manages and ensures transmission of the packets occurs from a host to a
destination using either TCP or UDP
§ Segments (TCP) or Datagrams (UDP)

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Manages the establishment, termination, and synchronization of a
session over the network

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Translates the information into a format that the sender and receiver
both understand

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layer from which the message is created, formed, and originated
§ Consists of high-level protocols like HTTP, SMTP, and FTP

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attempt to overwhelm the limited switch memory set aside to store the
MAC addresses for each port

A

MAC Flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Occurs when an attacker masks their own MAC address to pretend they
have the MAC address of another device

A

MAC Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

occurs when an attacker attempts to gain physical
access

A

Physical Tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used to connect two or more networks to form an internetwork

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An ordered set of rules that a router uses to decide whether to permit or
deny traffic based upon given characteristics

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Focused on providing controlled access to publicly available servers that
are hosted within your organizational network

A

De-Militarized Zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Specialized type of DMZ that is created for your partner organizations to
access over a wide area network

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

§ Any host that accepts inbound connections from the internet

A

Internet facing host

17
Q

Hosts or servers in the DMZ which are not configured with any services
that run on the local network

A

Bastion Hosts

18
Q

§ A hardened server that provides access to other hosts within the DMZ

A

Jumpbox

19
Q

Security technique in which devices are scanned to determine its current
state prior to being allowed access onto a given network

A

Network Access Control (NAC)

20
Q

A piece of software that is installed on the device requesting access to
the network

A

Persistent Agents

21
Q

Uses a piece of software that scans the device remotely or is installed and
subsequently removed after the scan

A

Non-persistent Agents

22
Q

Attacker configures their device to pretend it is a switch and uses it to
negotiate a trunk link to break out of a VLAN

A

Switch Spoofing

23
Q

Attacker adds an additional VLAN tag to create an outer and inner tag

A

Double Tagging

24
Q

Act of creating subnetworks logically through the manipulation of IP
addresses

A

Subnetting

25
Q

§ Process of changing an IP address while it transits across a router

A

Network Address Translation(NAT)

26
Q

Router keeps track of requests from internal hosts by assigning them
random high number ports for each request

A

Port Address Translation(PAT)

27
Q

10.0.0.0 to 10.255.255.255

A

Class A IP Addresses

28
Q

§ 172.16.0.0 to 172.31.255.255

A

Class B IP Addresses

29
Q

192.168.0.0 to 192.168.255.255

A

Class C IP Addresses

30
Q

§ Term used to describe devices that provide voice communication to users

A

Telephony

31
Q

§ Term used to describe devices that provide voice communication to users

A

Modem

32
Q

§ Protect dial-up resources by using the callback feature

A

War Dialing

33
Q

§ Internal phone system used in large organizations

A

Public Branch Exchange

34
Q

Digital phone service provided by software or hardware devices over a
data network

A

Voice over Internet Protocol(VoIP)