4. Communications And Network Security Flashcards

1
Q

What is the OSI model mnemonic?

A

All People Seem To Need Data Processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the 7th level of the OSI model, and an example?

A

Application

Example: data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the 6th level of the OSI model, and an example?

A

Presentation
Example: data
Present data in a format that all computers can understand.
The ONLY layer without any protocols.
Concerned with (file level) encryption, compression and formatting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the 5th level of the OSI model, and an example?

A

Session
Example: data
Responsible for establishing a connection between two applications (either on the same or different computers).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the 4th level of the OSI model, and an example?

A

Transport
Example: segments
Pervades end-to-end data transport between two machines.
Protocols used here: SSL/TLS, TCP, UDP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the 3th level of the OSI model, and an example?

A

Network

Example: packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the 2nd level of the OSI model, and an example?

A

Data

Example: frame, dumb switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the 1st level of the OSI model, and an example?

A

Physical

Example: bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are common threats to the 1st level of the OSI model?

A

Theft, unauthorized access, vandalism, sniffing, data emanation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do switches in the 2nd layer of the OSI model direct traffic?

A

They use IP addressing to direct traffic and isolate traffic into broadcast domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is a layer 3 switch necessary for inter-VLAN communication?

A

No, layer 2 switches can perform this function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the frequently exploited attacks for layer 3 of the OSI model?

A

Loki - sending data in ICMP headers(as a covert channel).
Ping of Death - violates the MTU (maximum transmission unit) size.
Ping floods - lots of ping traffic
SMURF - uses spoofed source address (target) and directed broadcasts to launch a DDoS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In what case is UDP better to use then TCP?

A

When “real time” transfer is essential. Media streaming, gaming, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What kind of firewall is at the 3rd layer of the OSI model?

A

Packet filters

  • uses ACL to control access.
  • not stateful, just looks at the network and transport layers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What kind of firewall is at the 5th layer of the OSI model?

A

Stateful Firewalls

- router keeps track of connections table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What kind of firewall is at the 7th layer of the OSI model?

A

Application Firewalls
- NAT/PAT
—NAT allows one-to-one mapping of IP addresses.
—PAT allows multiple private addresses to share one public address.
- like what is at work.

17
Q

What subnets are set aside for private IP addressing?

A
  1. x.x.x
  2. 16.x.x - 172.31.x.x
  3. 168.x.x
18
Q

What does POTS stand for?

A

Plain old telephone system.

Type of circuit switching technology for WAN.

19
Q

What does PSTN stand for?

A

Public Service Telephone Network. Type of circuit switching for WAN.

20
Q

What does ISDN stand for ?

A

DSL. It is a type of circuit switching for WAN.

Uses the same lines as phone lines.

21
Q

What kind of packet switching do cable modems use?

A

MPLS (multi-protocol labeled switching)

Purely layer 3 technology

22
Q

How does VOIP work?

A

It converts analog to digital through use of telephony adapters or smartphones.
Not designed to be secure.
Greatest threat is eavesdropping.

23
Q

What are the security threats to wireless APs?

A

Unauthorized access
Sniffing data
War driving
Unauthorized access points.

24
Q

What is the weakest transmission encryption?

A

WEP - wired equivalent privacy.

25
Q

Describe WEP

A

It has a weak initialization vector (IV)
IV transmitted in plain text
Uses RC-4 stream cipher
Only option for 802.11b

26
Q

Describe WPA

A

Wireless protected access
Introduced TKIP
Still uses RC-4

27
Q

Describe WPA2

A

Wireless Protected Access 2
Introduced AES
Is not backwards compatible with WPA.

28
Q

What are the three main flavors of cloud computing?

A

Software as a service
Platform as a service
Infrastructure as a service

29
Q

What are the different types of cloud networks?

A
  1. Private
  2. Public
  3. Community
  4. Hybrid (public and private)