Chapter 11 Flashcards

1
Q

This category of routing protocols maintain a list of destination networks along with metrics of direction and distance as measured in hops

A

Distance vector routing protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

this category of routing protocols gather routing characteristics, such as speed, latency, etc to make a next hop routing decision

A

Link State Routing protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Examples of vector routing protocols

A

RIP, IGRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of link state routing protocols

A

OSPF, IS-IS, EIGRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this category of routing protocols make next hop decisions based on the entire remaining path to the destination, and is a kind of exterior routing protocol

A

path vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is an example of a path vector routing protocol?

A

BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is an insecure terminal emulation network application that supports remote connectivity for executing commands and running applications but does not support transfer of files.

A

Telnet, TCP/23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is an insecure network application that supports an exchange of files that requires anonymous or specific authentication.

A

FTP, TCP/20&21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is an insecure network application that supports an exchange of files that does not require authentication. Used to host network device configuration files and can support multicasting.

A

TFTP, UDP/69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is a protocol used to transmit email messages from a client to an email server and from one email server to another.

A

SMTP, TCP/25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is a protocol used to pull email messages from an inbox on an email server down to an email client (aka client archiving).

A

POP3, TCP/110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is a protocol used to pull email messages from an inbox on an email server down to an email client.

A

IMAP4, TCP/110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This protocol provides for centralized control of TCP/IP configuration settings assigned to systems upon bootup.

A

DHCP, UDP/67,68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is the protocol used to transmit web page elements from a web server to web browsers in cleartext.

A

HTTP, TCP/80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is the TLS-encrypted version of HTTP.

A

HTTPS, TCP/443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is a network service that is used to spool print jobs and send print jobs to printers. Consider enclosing in a VPN for use.

A

LPD, TCP/515

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This is a GUI API for command-line operating systems. Consider enclosing in a VPN for use.

A

X Window, TCP/6000-6063

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This is a network service used to support file sharing between dissimilar systems. Consider enclosing in a VPN for use.

A

NFS, TCP/2049

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This is a network service used to collect network health and status information from a central monitoring station.

A

SNMP, UDP 161, 162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

combination of IP and port

A

socket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ports that have one or more networking software products specifically registered with IANA

A

registered software ports
1024-49151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

ports used randomly and temporarily by clients as a source port

A

random, dynamic, ephemeral ports (49152-65535)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

3 steps of a TCP handshake

A

SYN
SYN/ACK
ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

this name server hosts the original editable zone file for the domain

A

primary authoritative name server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

these name servers host read-only copies of the zone file

A

secondary authoritative name server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

a security improvement to DNS; provides mutual certificate authentication and encrypted sessions between devices

A

DNSSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

this system protects clients during DNS transactions by creating an encrypted session with a DNS server using HTTPS

A

DNS over HTTPS (DoH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

this system protects clients during DNS transactions by adding a DNS proxy between the client and the DNS resolver thus providing anonymity and privacy to DNS queries

A

Oblivious DoH (ODoH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

a malicious device that responds to DNS queries with false IP information

A

rogue DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

putting incorrect information into a DNS server’s zone file or cache

A

DNS Cache Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

malicious redirection of a valid website’s URL to a fake website by modifying the local hosts file on a system

A

DNS Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

when a client has a false DNS server definition

A

corrupting the IP configuration through DHCP or a script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

when an attacker sends back a DNS response with false information

A

DNS query spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

protecting against DNS poisoning methods

A

block inbound TCP 53
block outbound UDP 53
NIDS
use DNSSEC
use DoH or ODoH
regularly audit DNS and DHCP servers
use split DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

deploying separate DNS servers for public and private use

A

split DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

defensive use of DNS spoofing to prevent users from visiting malicious sites

A

DNS Sinkhole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

malicious action of changing the registration of a domain name without the authorization of the valid owner

A

domain hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

displaying a link that looks like a well-known product that redirects the user to an alternate location

A

URL Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

IPv6 new features

A

scoped addresses, autoconfiguration, QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

since IPv6 does not support NAT, will this reduce security or privacy?

A

Privacy, because a systems local IP address will not be masked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

having systems operate both IPv4 and IPv6

A

dual stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

systems operate a single stack of either IPv4 or IPv6 and use an encapsulation tunnel to access systems of the other protocol

A

tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

used to convert between IPv6 and IPv4 network segments similarly to how NAT converts between internal and external adresses

A

NAT-PT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

this router protocol allows systems to support multicasting

A

IGMP - Internet Group Management Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

this protocol resolves IP addresses into MAC addresses

A

ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

when an attacker sends false ARP replies to a switch

A

ARP cache poisoning

47
Q

best defense against ARP attacks

A

port security on switches

48
Q

this security measure can prohibit communications with unknown, unauthorized, rogue devices

A

switch port security

49
Q

this secure protocol uses public key cryptography to provide encryption, access control, nonrepudiation and message authentication using IP protocols. Primarily used for VPNs

A

IPsec

50
Q

this secure protocol offers a SSO solution and provides protection for logon credentials

A

Kerberos

51
Q

this secure protocol is an end-to-end encryption technique that can encrypt plaintext utilities, often used to remotely access the CLI of a device

A

SSH

52
Q

this is a cryptographic protocol that provides end-to-end encryption for voice communications, videoconferencing, and text messages

A

signal protocol

53
Q

this is an authentication service for cross-network service communications and prevents unauthorized execution of code on remote systems

A

Secure Remote Procedure Call (S-RPC)

54
Q

this is an encryption protocol that operates at OSI layer 4 by encrypting the payload of TCP communications

A

TLS

55
Q

this protocol is primarily used in the electric and water utility management industries to support communications between data aquisition systems and the system control equipment. It is similar to TCP/IP for ICS

A

DNP3 (Distributed Network Protocol 3)

56
Q

merging of specialty or proprietary protocols with standard protocols

A

converged protocols

57
Q

a secondary network used to consolidate and manage various storage devices into a single consolidated network-accessible storage container

A

Storage Area Network (SAN)

58
Q

used to encapsulate Fibre Channel communications over ethernet networks

A

Fiber Channel over Ethernet (FCoE)

59
Q

high-throughput high-performance network technology that directs data across a network based on short path labels to save time over traditional IP based routing; designed to handle a wide range of protocols through encapsulation rather than just TCP/IP

A

MPLS (Multiprotocol label switching)

60
Q

a networking storage standard based on IP used to enable location-independent file storage, transmission, and retrieval over LAN, WAN, or public internet

A

Internet Small Computer System Interface (iSCSI)

61
Q

a tunnelling mechanism that encapsulates audio, video, and other data into IP packets

A

VoIP

62
Q

a new network design that is directly programmable from a central location, is flexible, vendor neutral, and open standards based.

A

software defined networking SDN

63
Q

3 benefits of segmentation

A

boosting performance
reducing communication problems
increasing security

64
Q

creates a separate and distinct network structure for traffic that would otherwise interfere with the production network by creating secondary network paths to support data storage traffic

A

an out-of-band pathway

65
Q

diving an internal network into numerous subzones with filtering mechanisms between all of them

A

microsegmentation

66
Q

an encapsulation protocol that enables VLANs to be stretched across subnets and geographic distances

A

Virtual eXtensible LAN (VXLAN)

67
Q

IEEE standard for wireless network communications

A

802.11

68
Q

Wi-Fi deployment model where any two wireless networking devices can communicate without a centralized control authority

A

ad hoc mode

69
Q

Wi-Fi deployment model where a WAP is required and restrictions for wireless network access are enforced

A

Infrastructure

70
Q

a wireless deployment where there is a WAP connecting wireless clients to one another but not to any wired resources

A

standalone mode

71
Q

a wireless deployment where the WAP acts as a connection point to link the wireless clients to the wired network

A

wired extension

72
Q

a wireless deployment where multiple WAPs are used to connect a large physical area to the same network

A

enterprise extended mode

73
Q

a wireless deployment where a wireless connection links two different wired networks

A

bridge mode

74
Q

the SSID used by WiFi direct or ad hoc mode

A

ISSID - Independent service set identifier

75
Q

a formal assessment of wireless signal strength, quality, and interference using an RF signal detector

A

site survey

76
Q

a mapping of signal strength measurements over a building’s blueprint

A

heat map

77
Q

wireless authentication method that does not require authentication and sends data in the clear

A

OSA - open system authentication

78
Q

wireless authentication method that requires authentication before communications can occur

A

shared key authentication (SKA)

79
Q

a SKA protocol that uses a predefined shared RC4 secret key; extremely weak

A

WEP

80
Q

a SKA protocol that replaced WEP and negotiates a unique key set with each host. Uses RC4 nd TKIP or LEAP

A

WPA

81
Q

a SKA protocol that implements AES-CCMP encryption

A

WPA2

82
Q

a SKA protocol that uses 192-bit AES CCMP encryption and replaces preshared key authentication with Simultaneous Authentication of Equals (SAE)

A

WPA3

83
Q

a standard port-based network access control that ensures clients cannot communicate with a resource until proper authentication has taken place

A

802.1X/EAP

84
Q

encapsulates EAP methods within a TLS tunnel that provides authentication

A

Protected Extensible Authentication Protocol (PEAP)

85
Q

security standard that operates by auto-connecting and automatically authenticating the first new wireless client to initiate a connection to the network at the push of a button or remote PIN

A

WPS

86
Q

is WPS secure?

A

No, an attacker could brute force the PIN that could allow access to the network

87
Q

a list of authorized wireless client interface MAC addresses that is used by a WAP to block access to unauthorized devices

A

Wireless MAC filter

88
Q

an authentication technique that redirects a newly connected client to a web-based portal access control page

A

captive portal

89
Q

4 radio frequency spectrum-use techniques

A

spread spectrum
FHSS - Frequency Hopping Spread Spectrum
DSSS - Direct Sequence Spread Spectrum
OFDM - Orthogonal Frequency-Division Multiplexing

90
Q

blue-tooth focused network packet capture

A

Bluesniffing

91
Q

a DoS attack against a Bluetooth device

A

Bluesmacking

92
Q

sending unsolicited messages to Bluetooth-capable devices

A

Bluejacking

93
Q

the unauthorized access of data via a Bluetooth connection

A

Bluesnarfing

94
Q

an attacker gains remote control over the hardware and software over a Bluetooth connection

A

Bluebugging

95
Q

wireless used by SCADA systems

A

Narrow-band wireless

96
Q

IoT wireless

A

Zibgee

97
Q

a collection of resource services deployed in numerous data centers to provide low latency, high performance, and high availability of hosted content.

A

content delivery network CDN

98
Q

a section of the organization’s network that has been sectioned off so that it acts as an intranet for the private network but also serves information to outsiders

A

extranet

99
Q

a special-purpose extranet that is designed specifically for low-trust and unknown users to access public facing services

A

DMZ, screened subnet

100
Q

network devices that operate at OSI layer 1 to strengthen the communication signal over a cable segment

A

RCAs - Repeaters, Concentrators, and Amplifiers

101
Q

network devices that operate at OSI layer 1 to connect multiple systems - create a single collision and broadcast domain

A

Hub

102
Q

a device that covers or modulates between an analog carrier signal and a ditial information

A

modem

most modern modems are actually routers

103
Q

a network device that connects two networks together; operate at OSI layer 2

A

bridge

104
Q

network devices that operate at OSI layer to to manage the transmission of frames via MAC addresses and can separate broadcast domains with the creation of VLANs

A

Switch

105
Q

network devices that operate at OSI layer 3 to control traffic flow based on IP addressing; connect networks together

A

Routers

106
Q

a network device that is a remote access, multilayer switch used to connect distant networks over WAN links

A

LAN extenders, WAN switch, WAN router

107
Q

a network device that is a remote access system deployed to make accessing other devices more secure

A

jumpbox

108
Q

a network device that collects information and transits it back to a central system for storage and analysis

A

Sensor

109
Q

a network device that gathers data into a log or record file; waits for specific activity, event, or traffic and then records it into a record file

A

Collector

110
Q

a device that takes numerous inputs and integrates them into a single data stream and can multiplex

A

aggregator

111
Q

the concept of controlling access to the environment through strict adherence to and enforcement of security policy

A

NAC Network Access Control

112
Q

what level of the OSI model do circuit-level firewalls operate on?

A

Layer 5

113
Q

a firewall deployed between internal network segments to prevent the further spread of malicious code

A

Internal Segmentation Firewall (ISFW)