Domain 4 - Networking Security Flashcards

1
Q

What is a simplex communication?

A

A one way communication. The direction cannot be changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a half-duplex connection?

A

it can only send or receive at a one time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a full-duplex connection?

A

It can send and receive simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a baseband connection?

A

It can only send one signal at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an Extranet?

A

A connection between private intranets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the downside of a circuit switching network?

A

Cost.. It always guarantees full bandwidth though.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a packet switching network?

A

Data is sent in packets but take multiple paths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the UDP protocol best used for?

A

Close to real-time communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Does UDP care if the packets made it?

A

No. It is connectionless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a personal area network?

A

It is a network for devices that are close to the person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a metropolitan area network?

A

It spans a large area like a city or campus?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a wide area network?

A

A network that covers large geographic areas like a city, country, or intercontinental distances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a global area network?

A

A network that supports users across multiple wireless lans. Think cell phone network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is layer one of the OSI Model?

A

The physical layer.

Ethernet, Fibers, cables, radio waves, hubs, etc…

Networking topologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the least secure cable type?

A

Copper twisted pair. It is prone to eavesdropping and interference. Cheap though.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is fiber optic cable prone to eavesdropping?

A

No. It is secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the threats at the physical layer?

A

Theft, eavesdropping, sniffing, interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is layer two of the OSI model?

A

The data link layer.

Transports data between 2 nodes connected to the same network.

This is where MAC addresses live.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the threats at the data link layer?

A

Mac spoofing and flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How large are MAC addresses

A

48 or 64bit hexadecimal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is layer three of the OSI model?

A

The network layer. It expands to many different nodes.

Protocols like IPSEC, IP, IGMP, IKE, etc..

All protocols start with an “I” except IMAP which is layer 7.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the threats at the network level?

A

Ping of death, smurf, ip modifications, dhcp hacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is layer four of the OSI model?

A

The transport layer. TCP and UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the threats at the transport layer?

A

Fraggle attacks. Syn floods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What does a three way TCP handshake look like?

A

SYN&raquo_space; SYN&raquo_space; ACK&raquo_space; ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is layer five of the OSI model?

A

The session layer. A connection between two applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is layer six of the OSI model?

A

The presentation layer. No protocols.. Formatting, compressing, encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is layer seven of the OSI model?

A

The application layer. THis is where HTTP, FTP, IMAP, POP, etc.. kive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the threats to layers five through seven?

A

Viruses, Worms, Trojans, etc…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the protocol data units (PDU) for layer 1?

A

Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the protocol data units (PDU) for layer 2?

A

Frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are the protocol data units (PDU) for layer 3?

A

Packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the protocol data units (PDU) for layer 4?

A

Segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are the protocol data units (PDU) for layer 5?

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Where are network topologies stored in the OSI model?

A

The physical later, layer one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What layer in the OSI model does encryption happen?

A

The presentation layer, layer six.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

How many total layers are in the TCP / IP model and the names?

A

Four total layers.

Link and Physical ( OSI 1 and 2)

Internetwork layer (OSI 3)

Transport (OSI 4)

Application Layer (OSI 5,6,7)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Does IPv6 require 64 bit MAC addresses?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are the first 24 bits of the MAC address

A

The manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Is IPv4 a connectionless protocol?

A

Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the well known port range?

A

0 - 1023

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the registered port range?

A

1024 - 4951

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is port 23 used for?

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is port 110 for?

A

POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is port 143 for?

A

IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Is IPSEC built into IPv6

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What does the ARP protocol do?

A

It translates IP addresses to MAC addresses.

48
Q

What does multicast mean?

A

Everyone on the network gets the request.

49
Q

How do systems respond to a multicast message?

A

Using unicast.

50
Q

When should you hardcode ARP?

A

For critical devices

51
Q

What is the DHCP?

A

Dynamic host configuration protocol. It assigns IP addresses to devices.

52
Q

What is crosstalk in the context of networking cables?

A

It is the signal crossing from one cable to another and it can be a confidentiality issue.

53
Q

What is attenuation in the context of networking cables?

A

When the signal gets weaker the further it travels.

54
Q

Does fiber have attenuation problems?

A

No

55
Q

What is an RJ 11 connector?

A

Your phone.. Smaller than RJ45

56
Q

What speeds can fiber optic cables obtain?

A

Petabytes per second.

57
Q

What is single mode fiber?

A

A single strand of fiber carries a single mode of light used for long distance cables?

58
Q

What is multi-mode fiber

A

multiple strands of fiber carrying multiple data streams at the same time. This uses wavelength division multiplexing.

59
Q

What is a BUS LAN topology?

A

A line of nodes. If one breaks, the traffic cannot go past it. Think of it like christmas lights.

60
Q

What is a tree LAN topology?

A

The base of the tree controls traffic. Also a single point of failure.

61
Q

What is a ring LAN topology?

A

All nodes are connected in a ring. Always has a path to the requested node.

62
Q

What is the star LAN topology?

A

All nodes are connected to a central device.

63
Q

What is a Mesh LAN topology?

A

Nodes are connected in partial or full mesh. Full means all nodes are connected to all other nodes.

64
Q

What attacks target wi-fi?

A

Jamming, Interference, Rogue endpoints

65
Q

What is a wi-fi evil twin?

A

It uses the same name as the corporate network, but it is not real.

66
Q

What is the max range of Bluetooth?

A

Class 1 can go 100 meters. Class 3 under 10 meters.

67
Q

What are the bluetooth attacks?

A

Bluejacking - Sending unsoliciated messages

BlueSnarfing - unauthorized access of information from a bluetooth device

Bluebugging - Attacker gains full control of your device.

68
Q

What is Li-fi?

A

It uses light to transmit data between devices.

69
Q

What is Zigbee?

A

low power mesh wireless network. Needs close proximity.

70
Q

What is a typical latency for satellite internet?

A

500ms

71
Q

What is the benefit of 3G cell service?

A

larger coverage area

72
Q

What is the benefit of 5g cell service?

A

faster speed, but less coverage area.

73
Q

Where is a VLAN located in the OSI model?

A

Layer 2

74
Q

What is a VLAN trunk?

A

A port connecting two switches to span VLANs across them.

75
Q

`What is a VXLAN?

A

What cloud computing providers use.

76
Q

Where is VXLAN in the OSI model?

A

Layer 3, the network layer

77
Q

What is an example of a dynamic route?

A

BGP

78
Q

What is a metric?

A

Used to determine the best path to a destination.

79
Q

What layer in the OSI model are routers

A

Layer 3, the networking layer

80
Q

What is SDx?

A

This means software-defined everything. Storage, networking, etc..

81
Q

What is a boot sector virus?

A

It runs on the master boot record

82
Q

What is a stealth virus?

A

It tries to hide from the OS and AV

83
Q

What is a multipart virus?

A

It spreads across multiple vectors.

84
Q

What are worms?

A

They are spread through self-propagation and do not need human interaction.

85
Q

What is a RAT?

A

They give an attacker admin control over the target system.

86
Q

What is a signature based AV?

A

Looks for known malware signatures

87
Q

What is a heuristic AV?

A

It is behavior based. It looks for abnormal behavior.

88
Q

What are the two types of IDS / IPS systems

A

Signature Based

Heuristic Based

89
Q

What is the downside of heuristic based systems?

A

Lots of false positives

90
Q

What is the best practice for IDS / IPS

A

Having it both at the network and host level

91
Q

Can network IDS / IPS read encrypted traffic?

A

No. You need a host based system for that.

92
Q

What are hybrid based IDS / IPS systems?

A

They look at behavioral and signature based anomalies.

93
Q

How can attackers avoid IDS / IPS?

A

Fragmentation. Sending fragmented packets.

Avoiding default attack vectors

94
Q

What is the difference between honey pot and honey net?

A

A honeypot is a single system and a honey net is a group of systems.

95
Q

What is a big pro of virtualization?

A

Cost efficiencies and flexibility

96
Q

What is a Type 1 hypervisor?

A

Known as bare metal. Part of a virtualization OS that runs on top of the host hardware.

97
Q

What is a Type 2 hypervisor?

A

It runs on top of a regular OS like windows 10. Think Hyper V.

98
Q

What hypervisor type does AWS use?

A

A type 1 hypervisor

99
Q

What is a VM escape?

A

Where an attacker jumps from host to host.

100
Q

Who creates a private cloud?

A

Your organization. It is yours.

101
Q

What is an organization responsible for in a PaaS agreement?

A

Applications only.

102
Q

Where should smart devices be kept in the network?

A

A separate VLAN.

103
Q

What is hardware hardening?

A

We harden it ASAP before provisioning it or connecting to the network. routers, laptops, hardware anything… Should be automated.

104
Q

What is a Power Distribution Unit (PDU) used for?

A

They make sure that voltage is clean / regulated.

105
Q

What is the difference between an incremental and differential backup?

A

An incremental backup will backup everything since the last backup

A differential backup will backup everything since the last FULL backup.

106
Q

Do incremental backups clear the archive bit?

A

Yes

107
Q

Do differential backups clear the archive bit?

A

No

108
Q

Can you can use differential and incremental backups in the same policy?

A

No

109
Q

What is database shadowing?

A

Exact real-time copy of the database or files to another location.

110
Q

What is remote journaling backup strategies?

A

The logs are sent offsite that can be used to rebuild the database later.

111
Q

What does Halon, FM200, and Aron suppression do?

A

It replaces oxygen in a room where there is a fire.

112
Q

What is a class C fire?

A

Electrical fire

113
Q

What is a class A fire?

A

ordinary combustable

114
Q

What kind of control is patching?

A

A corrective Control

115
Q
A