A Protocol Layer Survey of Network Security Flashcards

1
Q

_____ is the lowest layer in the TCP/IP hierarchy.

A

link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ is the term applied to the basic unit of data that passes through the link layer.

A

frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____ is the second lowest layer in the TCP/IP hierarchy.

A

network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(T/F) TCP is a connectionless protocol

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(T/F) IP is a connection-oriented protocol.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____ is the transport layer protocol within TCP/IP.

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ enables the receiving TCP/IP stack to reconstruct the data stream at the destination in the correct order.

A

the sequence number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ and _____ are two transport layer protocols within TCP/IP.

A

hypertext transport protocol (HTTP) and (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____ is the top layer of the TCP/IP stack.

A

application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List three physical layer protocols.

A

ethernet, token ring, and DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If a network interface is placed in _____ mode, it will receive all network traffic irrespective of source or destination.

A

promiscuous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____ and _____ are the two address types that correspond to a networked computer.

A

Media Access Control (MAC) and Internet Protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_____ is the protocol that resolves IP addresses into MAC ID’s.

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain how the following Teardrop attack works.

hacker. net 22 > target.org 33: UDP (frag 123:64@0++)
hacker. net > target.org(frag 123:20@24)

A

Two UDP packets are sent where the second overwrites bytes 21-45 in the original packet to camouflage the packet signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____ is the goal of a Teardrop attack.

A

avoid static firewalls and older intrusion detection systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In a Smurf attack, which of the two IP addresses are spoofed?

(a) source
(b) destination

A

(a) source

17
Q

What is the procedure used to establish a TCP/IP connection between two hosts?

A

Server waits for connection request from client. Client sends TCP segment specifying information. Server responds with a segment specifying information. Client sends final segment with ACK flag set.

18
Q

_____ spoofing occurs when the attacker’s computer is on the same subnet as the victim.

A

non-blind (TCP)

19
Q

_____ spoofing occurs when the attacker has to guess how the victim TCP layer generates sequence numbers.

A

blind (TCP)

20
Q

_____ attacks employ spoofing in order to intercept network traffic and/or take over the network session.

A

Man in the Middle (MITM)

21
Q

_____ compromise an operating systems kernel.

A

kernel-mode rootkits

22
Q

If we describe the complexity of a password as R**L, where R is the radix of the symbol set and L is the length of the password string, in most practical situations increasing _____ adds more security than increasing _____.

A

L, R

23
Q

The fact that HTTP is _____ requires the storage of transaction information in order to create online shopping carts.

A

state dependent

24
Q

_____ is an HTML image tag occurring within a web page that may result in malicious activity.

A

A web bug

25
Q

List three types of information that may be harvested by means of web bugs

A

date and time page was viewed, browser type and monitor resolution, and IP address of the computer the victim used to view the document

26
Q

List three types of social engineering that are used to mislead or defraud computer and network users

A

Email spoofing, IP spoofing, and ARP spoofing

27
Q

List four types of viruses that infect computer systems

A

Boot virus, file virus, macro virus, and script virus

28
Q

_____ are two types of malware that create a mechanism by means of which an attacker can remotely access and control the victim’s computer

A

Trojans and backdoors

29
Q

_____ is a type of encryption where the encryption and decryption keys are either the same or algorithmically related

A

Symmetric-key encryption

30
Q

_____ is the type of encryption where the encryption and decryption keys are different: one is published and the other is secret

A

Public-key encryption

31
Q

_____ is an information system resource whose value lies in unauthorized or illicit use of that resource

A

A honeypot