Ch11 Flashcards
(95 cards)
LDAP secure communication occurs over port
TCP 636
LDAPS secure communication to a global catalog server occurs over port
TCP 3269
LDAP unsecure port for communication is
TCP 389
Layer 1 - Physical
EIA/TIA-232 EIA/TIA-449 X.21 HSSI SONET V.24 V.35
Layer 2 - Data Link
SLIP, PPP, ARP, RARP, L2F, L2TP, PPTP, FDDI, ISDN
Layer 3 - Network
ICMP, RIP, OSPF, BGP, IGMP, IP, IPSec, IPX, NAT, SKIP
Layer 4 - Transport
SPX, SSL, TLS, TCP, and UDP
Layer 5 - Session
NFS, SQL, and RPC
Layer 6 - Presentation
ASCII, EBCDICM, TIFF, JPEG, MPEG, MIDI & SSL
Layer 7 - Application
HTTP, FTP, LPD, SMTP, Telnet, TFTP, EDI, POP3, IMAP, SNMP, NNTP, S-RPC, and SET
which OSI layer manages the simplex and duplex modes of comunication
Layer 5 Session
What are the 4 TCP/IP Layers and what layers of the OSI model do they correspond to
Application - Layers 5,6,7
Transport - Layer 4
Internet - Layer 3
Link - Layers 1 & 2
what is the name of the wireless attack on bluetooth and what device is most commonly associated with this attack
Bluejacking - cell phone
What are the IEEE 802.xx wireless standards
Ethernet - 802.3 Token Ring - 802.5 Wireless 802.11 Wireless Personal Area Network 802.15 - 802.15.1 Blutooth - 802.15.4 Zigbee Wireless Metropolis Area Network 802.16 Wireless Broadband 802.20 Wireless Regional Area Network 802.22
examining data from a message header. Usually, the rules are concerned with source, destination,
and port addresses. firewall is unable to provide user authentication or to tell whether a packet originated from inside or outside the private network, and it is easily fooled with spoofed packets.
static packet filtering firewall - works on layer 3 of osi
type of firewall that filters traffc based on the Internet service used to transmit or receive the data
application or proxy firewall - works layer 7 osi
type of firewall used to establish communication sessions between trusted partners
circuit gateway firewall - works on layer 5 of OSI
type of firewall used evaluates the state or the context of network traffic. By examining source and destination addresses, application usage, source of origin, and relationship between current packets and the previous packets of the same session
dynamic or stateful inspection firewall
Coax & UTP Cable Category/Throughput/Length
Cat1 voice only usable by modems only
Cat2 4Mbps host to term on mainframes
Cat3 10Mbps 10BaseT Ethernet 300ft
Cat4 16Mbps TokenRing 300ft
Cat5 100Mbps 100BaseTX, FDDI & ATM 300ft
Cat6 1 Gbps on high speed networks
Cat7 10 Gbps on 10 Gb networks
10Base2 10Mbps 550ft
10Base5 10Mbps 1500ft
rule that defines the number of repeaters/concentrators and segments that can be used in a network design.
5-4-3 rule - rule does not apply to switched networks or the use of bridges or routers
you are unlikely to obtain true end-to-end protection from a communications service provider
due to CALEA law which allows wiretapping by law enforcement
what are the mechanisms used to support TCP/
IP communications between mobile phones and the Internet are based on 3G and 4G technologies
WAP, GSM, EDGE, HPDSA, and LTE)
what attack allows hackers to connect with your Bluetooth devices without your knowledge and extract information from them
blue-snarfing
what attack that grants hackers remote control over the feature and functions of a Bluetooth device
blue bugging