Ch11 Flashcards

(95 cards)

1
Q

LDAP secure communication occurs over port

A

TCP 636

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

LDAPS secure communication to a global catalog server occurs over port

A

TCP 3269

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

LDAP unsecure port for communication is

A

TCP 389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Layer 1 - Physical

A
EIA/TIA-232
EIA/TIA-449
X.21
HSSI
SONET
V.24
V.35
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Layer 2 - Data Link

A

SLIP, PPP, ARP, RARP, L2F, L2TP, PPTP, FDDI, ISDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Layer 3 - Network

A

ICMP, RIP, OSPF, BGP, IGMP, IP, IPSec, IPX, NAT, SKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Layer 4 - Transport

A

SPX, SSL, TLS, TCP, and UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layer 5 - Session

A

NFS, SQL, and RPC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Layer 6 - Presentation

A

ASCII, EBCDICM, TIFF, JPEG, MPEG, MIDI & SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Layer 7 - Application

A

HTTP, FTP, LPD, SMTP, Telnet, TFTP, EDI, POP3, IMAP, SNMP, NNTP, S-RPC, and SET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

which OSI layer manages the simplex and duplex modes of comunication

A

Layer 5 Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 4 TCP/IP Layers and what layers of the OSI model do they correspond to

A

Application - Layers 5,6,7
Transport - Layer 4
Internet - Layer 3
Link - Layers 1 & 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the name of the wireless attack on bluetooth and what device is most commonly associated with this attack

A

Bluejacking - cell phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the IEEE 802.xx wireless standards

A
Ethernet - 802.3
Token Ring - 802.5
Wireless 802.11
Wireless Personal Area Network 802.15
- 802.15.1 Blutooth
- 802.15.4 Zigbee
Wireless Metropolis Area Network 802.16
Wireless Broadband 802.20
Wireless Regional Area Network 802.22
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

examining data from a message header. Usually, the rules are concerned with source, destination,
and port addresses. firewall is unable to provide user authentication or to tell whether a packet originated from inside or outside the private network, and it is easily fooled with spoofed packets.

A

static packet filtering firewall - works on layer 3 of osi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

type of firewall that filters traffc based on the Internet service used to transmit or receive the data

A

application or proxy firewall - works layer 7 osi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

type of firewall used to establish communication sessions between trusted partners

A

circuit gateway firewall - works on layer 5 of OSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

type of firewall used evaluates the state or the context of network traffic. By examining source and destination addresses, application usage, source of origin, and relationship between current packets and the previous packets of the same session

A

dynamic or stateful inspection firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Coax & UTP Cable Category/Throughput/Length

A

Cat1 voice only usable by modems only
Cat2 4Mbps host to term on mainframes
Cat3 10Mbps 10BaseT Ethernet 300ft
Cat4 16Mbps TokenRing 300ft
Cat5 100Mbps 100BaseTX, FDDI & ATM 300ft
Cat6 1 Gbps on high speed networks
Cat7 10 Gbps on 10 Gb networks

10Base2 10Mbps 550ft
10Base5 10Mbps 1500ft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

rule that defines the number of repeaters/concentrators and segments that can be used in a network design.

A

5-4-3 rule - rule does not apply to switched networks or the use of bridges or routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

you are unlikely to obtain true end-to-end protection from a communications service provider

A

due to CALEA law which allows wiretapping by law enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are the mechanisms used to support TCP/

IP communications between mobile phones and the Internet are based on 3G and 4G technologies

A

WAP, GSM, EDGE, HPDSA, and LTE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what attack allows hackers to connect with your Bluetooth devices without your knowledge and extract information from them

A

blue-snarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what attack that grants hackers remote control over the feature and functions of a Bluetooth device

A

blue bugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what is used to eavesdrop on conversations that are on 900Mhz, 2 & 5Ghz such as baby monitors and codeless phones
frequency scanner
26
high-speed token-passing technology that employs | two rings with traffc flowing in opposite directions
FDDI Fiber Distributed Data Interface
27
continuous signal that varies in frequency, | amplitude, phase, voltage, and so on. The variances in the continuous signal produce a wave shape
Analog Communication signal
28
use of a discontinuous electrical signal and a state change or on-off pulses
Digital Communications signal
29
rely on a timing or clocking mechanism embedded in the data stream; typically able to support very high rates of data transfer
Synchronous communications
30
rely on a stop and start delimiter bit to manage the transmission of data; best suited for smaller amounts of data.
Asynchronous communication Public switched telephone network (PSTN) modems are good examples of asynchronous communication devices.
31
can support only a single communication channel; digital signal and give examples
Baseband technology | Ethernet
32
can support multiple simultaneous signals; frequency modulation to support numerous channels; high throughput rates; analog signal. and give examples
Broadband technology | T1, T3, ISDN, DSL
33
communications to all possible recipients
Broadcast
34
communications to multiple specific recipients
Multicast
35
communication to a specific recipient
Unicast
36
1. The host listens to the LAN media to determine whether it is in use. 2. If the LAN media is not being used, the host transmits its communication. 3. The host waits for an acknowledgment. 4. If no acknowledgment is received after a time-out period, the host starts over at step 1
Carrier-Sense Multiple Access (CSMA)
37
1. The host has two connections to the LAN media: inbound and outbound. The host listens on the inbound connection to determine whether the LAN media is in use. 2. If the LAN media is not being used, the host requests permission to transmit. 3. If permission is not granted after a time-out period, the host starts over at step 1. 4. If permission is granted, the host transmits its communication over the outbound connection. 5. The host waits for an acknowledgment. 6. If no acknowledgment is received after a time-out period, the host starts over at step 1.
Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA)
38
examples of networks that employ CSMA/CA technologies
AppleTalk and 802.11 wireless
39
1. The host listens to the LAN media to determine whether it is in use. 2. If the LAN media is not being used, the host transmits its communication. 3. While transmitting, the host listens for collisions (in other words, two or more hosts transmitting simultaneously). 4. If a collision is detected, the host transmits a jam signal. 5. If a jam signal is received, all hosts stop transmitting. Each host waits a random period of time and then starts over at step 1.
Carrier-Sense Multiple Access with Collision Detection (CSMA/CD)
40
LAN media access technology that performs communications using a master-slave configuration Synchronous Data Link Control (SDLC) uses this
Polling
41
What the four data names within th OSI model and what layers are they at
``` Layer 1 - bit Layer 2 - frame Layer 3 - packet Layer 4 - segment/datagram Layers 5-7 data stream ```
42
Windows sharing protocol of Server Message Block (SMB), which is also known as
Common Internet File System (CIFS)
43
non-IP protocols are rare, most firewalls are unable to perform packet header, address, or payload content fltering on those protocols. Thus, when it comes to nonIP protocols, a firewall typically must either block all or allow
true
44
routing protocols maintain a list of destination networks along with metrics of direction and distance as measured in hops Routing Information Protocol (RIP), Interior Gateway Routing Protocol (IGRP), and Border Gateway Protocol (BGP)
Distance Vector
45
routing protocols maintain a topography map of all connected networks and use this map to determine the shortest path to the destination example Open Shortest Path First (OSPF).
Link State
46
Common ICMP type field values
``` 0=Echo Reply 3=Destination unreachable 5=Redirect 8=Echo Request 9=Router Advertisement 10=Router Solicitation 11=Time Exceeded ```
47
attacker inserts bogus information into the ARP cache
ARP Cache poisoning
48
TCP port 23
telnet
49
TCP port 20 & 21
FTP
50
UDP port 69
TFTP
51
TCP port 25
SMTP
52
TCP port 110
POP3
53
TCP port 143
IMAP
54
UDP port 67
BootP/DHCP server point to point response
55
UDP port 68
BootP/DHCP client request broadcast
56
TCP port 80
HTTP
57
TCP port 443
SSL
58
TCP port 515
LPD Line Print Daemon
59
TCP ports 6000-6063
X Windows - GUI AP for command line operating systems
60
TCP port 2049
NFS - Network File System for file sharing for dissimilar systems
61
UDP port 161
SNMP - collect network health information
62
UDP port 162
SNMP - trap messages
63
primarily used in the electric and water utility and management industries. It is used to support communications between data acquisition systems and the system control equipment. This includes substation computers, RTUs (remote terminal units) (devices controlled by an embedded microprocessor), IEDs (Intelligent Electronic Devices), and SCADA master stations (i.e., control centers).
DNP3 - Distributed Network Protocol
64
open and public standard, multilayer protocol that functions similarly to that of TCP/IP, in that it has link, transport, and transportation layers.
DNP3 - Distributed Network Protocol
65
merging of specialty or proprietary protocols with standard protocols, such as those from the TCP/IP suite. the ability to use existing TCP/IP supporting network infrastructure to host special or proprietary services without the need for unique deployments of alternate networking hardware
Converged protocols
66
a form of network data-storage solution (storage area network [SAN]) or network-attached storage [NAS]) that allows for high-speed file transfers at upward of 16 Gbps. requires its own dedicated infrastructure (separate cables)
Fibre Channel
67
can be used to support fiber communication over the existing network infrastructure. used to encapsulate communications over Ethernet networks. It typically requires 10 Gbps Ethernet in order to support the fiber channel protocol
Fibre Channel over Ethernet (FCoE)
68
high-throughput high-performance network technology that directs data across a network based on short path labels rather than longer network addresses; network is not limited to TCP/IP and compatible protocols. Thisenables the use of many other networking technologies, including T1/E1, ATM, Frame Relay, SONET, and DSL.
MPLS (Multiprotocol Label Switching)
69
networking storage standard based on IP; Low cost alternative to Fibre Channel
Internet Small Computer System Interface (iSCSI)
70
Another name for network virtualization. It allows data transmission paths, communication decision trees, and flow control to be virtualized in the control layer rather than being handled on the hardware on a per-device basis; No longer required to have only one vendor for networking equipment
SDN - Software Defined Networking
71
a collection of resource services deployed in numerous data centers across the Internet in order to provide low latency, high performance, and high availability of the hosted content
CDN - Content Distributed Network
72
most widely recognized P2P CDN
BitTorrent
73
802.11 wireless amendments (versions) and speed of each
802. 11 2Mb 802. 11a 54Mb 802. 11b 11Mb 802. 11g 54Mb 802. 11n 200+Mb 802. 11ac 1Gbps
74
when the wireless access point acts as a connection point to link the wireless clients to the wired network
Wired Extension mode
75
when multiple wireless access points (WAPs) are used to connect a large physical area to the same wired network
enterprise extended mode
76
how many wireless channels are in the US? Europe? Japan?
11, 13, 17
77
similar in structure to that of traditional roof TV antennas. antennas are crafted from a straight bar with cross sections to catch specifc radio frequencies in the direction of the main bar
Yagi antenna
78
constructed from tubes with one sealed end. They focus along the direction of the open end of the tube. Some of the first of these antennas were crafted from Pringles cans.
cantennas
79
constructed from tubes with one sealed end. They focus along the direction of the open end of the tube. Some of the first of these antennas were crafted from Pringles cans.
cantennas antenna
80
used to focus signals from very long distances or weak sources
parabolic antenna
81
other names for omni directional antenna
base antenna or rubber duck antenna
82
What are three benefits to network segmentation
- boost performance - reduce communications problems - increase security
83
what technology is associated with cell phones accessing the internet rather than the 802.11 wireless networking
Wireless Application Protocol (WAP)
84
alternative to WEP; It is based on the LEAP and TKIP cryptosystem and employs a secret passphrase
Wi-Fi Protected Access (WPA)
85
known as the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP), which is based on the AES encryption scheme.
WPA2
86
authentication framework allows for new authentication technologies to be compatible with existing wireless or point-to-point connection technologies
EAP - Extensible Authentication Protocol
87
encapsulates EAP methods within a TLS tunnel that provides authentication and potentially encryption
PEAP (Protected Extensible Authentication Protocol)
88
Cisco proprietary alternative to TKIP for WPA
LEAP (Lightweight Extensible Authentication Protocol)
89
designed as the replacement for WEP without requiring replacement of legacy wireless hardware
TKIP (Temporal Key Integrity Protocol)
90
authentication technique that redirects a newly connected wireless web client to a access control page
captive portal
91
what frequency division multiplexing offers high throughput with the least interference.
Orthogonal Frequency‐Division Multiplexing (OFDM)
92
portable devices use a cell phone carrier’s network to establish communication links with the Internet
Wireless Application Protocol
93
provides security connectivity services similar to those of SSL or TLS for cell phones
Wireless Transport Layer Security
94
What are Common private circuit technologies include dedicated or leased lines
PPP, SLIP, ISDN, and DSL connections.
95
What are packet-switching technologies
X.25, Frame Relay, asynchronous transfer mode (ATM), Synchronous Data Link Control (SDLC), and High-Level Data Link Control (HDLC), SMDS & HSSI