701 - Chapter 3 Flashcards
(110 cards)
What are the seven layers of the OSI model starting from lowest to highest?
Physical, data link, network, transport, session, presentation, application
This layer is where the network switches reside, it format, data, and data frames and routes it between systems using their media access control addresses?
Data link
This layer introduces IP addresses. At this layer, routers use IP addresses to send information between systems that are not located on the same local network. The Internet protocol is the primary protocol at this layer.
Network
This layer is all about the basic equipment of networking, copper, wires, fiber, optic cables, and radio waves?
Physical
This layer provides Aunt and communication services for applications. TCP and UDP exist at this layer.
Transport
This layer establishes, manages, and terminates sessions between applications, running on different devices, allowing them to communicate and exchange data
Session
This layer translates data into a standard format that can be understood by the application layer and provides encryption compression and other data transformation services
Presentation
This layer provides network services to applications, allowing them to communicate with other applications over the network
Application
This protocol provides connection oriented traffic with guaranteed delivery. It uses a three-way handshake….
TCP
This protocol provides connection sessions without a three-way handshake. It also makes a best effort to deliver data without using extra traffic to ensure delivery…
UDP
Many network based denial of service attacks, use what protocol?
UDP
This protocol identifies hosts in a TCP/IP network and delivers traffic from one host to another using IP addresses
IP
This protocol tests basic connectivity and includes tools like ping and tracert?
Internet control message protocol ICMP
True or false blocking ICMP prevents attackers from discovering devices on a network
True
It is not common to block ICMP at firewall and routers
False, because I often ICMP is used in attack. It has become common to block IMCP.
This protocol resolves IPV four addresses to Mac addresses
Address Resolution protocol ARP
Name the three protocols that are now insecure and should no longer be used to transfer data over a network?
FTP, trivial file transfer protocol TFTP, secure socket layer SSL
What is the designated secure replacement for SSL?
Transport layer security TLS
This protocol is used to encrypt IP traffic?
IPSec
This protocol encrypt data in transit and can be used to encrypt other protocols, such as FTP… what port does it use?
Secure shell SSH, port 22
This protocol is based on SSH and is used to copy encrypted files over a network?
Secure copy SCP
This protocol is a secure implementation of FTP and uses SSH to encrypt traffic?
Secure file transfer protocol SFTP
This protocol is another secure implementation of FTP, it uses TLS to encrypt FTP traffic?
File transfer protocol secure, FTPS
What is the secure version of email protocol SMTP (port 25)? And what protocol and port does it use?
Simple mail transfer protocol secure SMTPS, it uses TLS encryption and uses TCP port 587