Chapter 11 Flashcards

1
Q

What is the addition of a header, and possibly a footer, to the data received by each layer from the layer above before it’s handed off to the layer below.

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the container name for OSI layers 5-7?

A

PDU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the container name for OSI layer 4?

A

Segment/Datagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the container name for OSI layer 3?

A

Packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the container name for OSI layer 2?

A

Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the container name for OSI layer 1?

A

Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the protocols for interior routing ?

A

RIP
IGRP
OSPF
IS-IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the protocols for exterior routing?

A

BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are attacks related to DNS poisoning ?

A

Rouge DNS Server
Pharming
Altering host file
Corrupting IP configuration
DNS query spoofing
Proxy Falsification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What attack is the act of changing the registration of the domain name without the authorization of the owner ?

A

Domain Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the drawbacks of using multilayer protocols ?

A

Covert Channels
Filter bypass
Violation of network segmentation boundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the benefits of multilayer protocols?

A

Can be used at higher OSI layers
Encryptions
Flexibility
Resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some examples of network segmentation?

A

Intranet
Extranet
Screened Subnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the benefits of network segmentation?

A

Manage traffic
Improve performance
Enforce security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the act of dividing up an internal network into numerous sub zones ?

A

Micro segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How are micro-segmentated zones separated ?

A

ISFWs
Subnets
VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some converged protocols ?

A

FCoE
MPLS
iSCSI
VPN
SDN
IaC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the two authentication options supported by WPA2?

A

PSK/PER and 802.1x/ENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What encryption standard does WPA3 use ?

A

192-bit AES-CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What encryption standard does WPA3-PER use?

A

128-bit AES CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which WPA3 method uses SAE?

A

WPA3 128-bit AES CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What performs a zero knowledge proof process known as dragonfly key exchange which is a derivative of Diffie-Hellman?

A

SAW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are some wireless attacks ?

A

Evil Twin
Rouge Access Points
Disassociation
Jamming
IV Abuse
War Driving
Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What security mechanism seeks to detect, record, evaluate, and respond to suspicious activities?

A

EDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a combination of multiple technologies such as a SIEM, EDR, NTA, and IDS?

A

MDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What service monitors an IT environment in real time to quickly detect and resolve threats ?

A

MDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What service is not limited to endpoints and focuses on threat detection and mediation ?

A

MDR
Managed Detection and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a variation of EDR?

A

EPP
Endpoint Protection Platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the four main security functions of EPP?

A

Predict
Prevent
Detect
Respond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What often includes components of EDR, MDR, and EPP?

A

XDR
Extended Detection and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What can be deployed fully on premises, in the cloud, or as a hybrid structure ?

A

MSSP
Managed Security Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What can provide XDR solutions that are centrally controlled and managed ?

A

MSSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a remote access multilayer switch used to connect distant networks over WAN links ?

A

LAN Extender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a remote access system used to make accessing a system or network easier or more securely.

A

Jumpbox / Jump server

35
Q

What is often deployed in extranets, screened subnets, or cloud networks where standard direct links or private channels is not available.

A

Jump box / Jump server

36
Q

What is based on SoC and collects and transmits information back to a central system for storage and analysis?

A

Sensors

37
Q

What enables the leveraging of an existing AAA service like RADIUS or TACACS+ for authentication?

A

ENT

38
Q

What is a mapping of signal strength measurements over a building’s blueprints?

A

Heat Map

39
Q

What are the concerns of IPV6?

A

More addresses for attackers
All security products must be upgraded
Loss/Lack for NAT

40
Q

What are three ways for IPV4 and IPV6 to coexist on the same network ?

A

Dual Stack
Tunneling
NAT-PT

41
Q

What means having the system run both IPV4 and IPV6 and using the correct protocol for each conversation?

A

Dual stack

42
Q

What allows most systems to operate a single stack of either IPV4 or IPV6 and use an encapsulation tunnel to access systems of the other protocol.

A

Tunneling

43
Q

What can be used to convert between IPv4 and IPv6 network segments?

A

NAT-PT

44
Q

What is the default subnet mask of Class A and CIDR equivalent?

A

255.0.0.0 or /8

45
Q

What is the default subnet mask of Class B and CIDR equivalent?

A

255.255.0.0 or /16

46
Q

What is the default subnet mask of Class C and CIDR equivalent?

A

255.255.255.0 or /24

47
Q

What is used to determine the health of a network or specific link?

A

ICMP

48
Q

What commands utilize ICMP?

A

Ping
Traceroute
Pathping

49
Q

What attacks are used against ICMP?

A

Ping of Death
Smurf
Ping Flood

50
Q

What protocol allows systems to support multicasting ?

A

IGMP

51
Q

What protocol is used to convert IP 32 bit addresses into MAC addresses?

A

ARP

52
Q

What attack is where an attacker send bogus information into the ARP cache?

A

ARP poisoning/spoofing

53
Q

What is the best defense against ARP poisoning?

A

Port Security

54
Q

What are all the ways to protect against ARP poisoning ?

A

Port Security
Endpoint security products
Static ARP entries

55
Q

What is an authentication service for cross-network service communications and is simply a means to prevent unauthorized execution of code on remote systems.

A

S-RPC

56
Q

What is a cryptographic protocol that provides end-to-end encryption for voice communications, videoconferencing, and text message services.

A

Signal protocol

57
Q

What is nonfederated and is a core element in the messaging app named Signal.

A

Signal Protocol

58
Q

What is an encryption protocol that operates at OSI layer 4 (by encrypting the payload of TCP communications).

A

TLS

59
Q

What are the drawbacks of multilayered protocols ?

A

Covert channels are allowed.

Filters can be bypassed.

Logically imposed network segment boundaries can be overstepped.

60
Q

What operate by encapsulating or converging data storage signals into TCP/IP communications in order to separate storage and proximity.

A

SAN

61
Q

What are often used to enhance networked storage devices such as hard drives, drive arrays, optical jukeboxes, and tape libraries

A

SAN

62
Q

What is a high-throughput high-performance network technology that directs data across a network based on short path labels rather than longer network addresses.

A

MPLS

63
Q

What is a networking storage standard based on IP that operates at layer 3.

A

ISCSI

64
Q

What technology can be used to enable location-independent file storage, transmission, and retrieval over LAN, WAN, or public internet connections ?

A

ISCSI

65
Q

What is often viewed as a low-cost alternative to Fibre Channel.

A

ISCSI

66
Q

What attacks are VOIP vulnerable to?

A

SPIT
Host OS and DoS attacks

67
Q

What aims to minimize the risk of DoS, on-path attacks, and other VoIP exploits through robust encryption and reliable authentication.

A

SRTP

68
Q

What refers to the traffic flow that occurs within a specific network, data center, or cloud environment.

A

East-West Traffic

69
Q

What refers to the traffic flow that occurs inbound or outbound between internal systems and external systems.

A

North-South Traffic

70
Q

What philosophy requires a system to meet all current security requirements (such as patch application and malware scanner updates) before it is allowed to communicate with the network.

A

Preadmission

71
Q

What philosophy allows and denies access based on user activity, which is based on a predefined authorization matrix.

A

Postadmission

72
Q

What common ingress filters and egress filters can be used to block spoofed packets that often relate to malware, botnets, and other unwanted activities.

A

Blocking inbound packets claiming to have an internal source address

Blocking outbound packets claiming to have an external source address

Blocking packets with source or destination addresses listed on a block list

Blocking packets that have source or destination addresses from the local area network (LAN) but haven’t been officially assigned to a host

73
Q

What is a standard or common proxy that acts as an intermediary for queries of external resources.

A

Forward Proxy

74
Q

What handles inbound requests from external systems to internally located services.

A

Reverse Proxy

75
Q

What is a type of security zone that can be positioned so that it operates as a buffer network between the secured private network and the internet and can host publicly accessible services.

A

Screened Subnet

76
Q

What is a set of rules and restrictions that define how data is transmitted over a network medium (e.g., twisted-pair cable, wireless transmission).

A

Protocol

77
Q

What is the addition of a header, and possibly a footer, to the data received by each layer from the layer above before it’s handed off to the layer below.

A

Encapsulation

78
Q

What layer is responsible for interfacing user applications, network services, or the operating system with the protocol stack.

A

Application Layer

79
Q

What layer is responsible for transforming data into a format that any system following the OSI model can understand.

A

Presentation

80
Q

What layer is responsible for managing the integrity of a connection and controlling the session.

A

Transport

81
Q

What protocol is a path vector ?

A

BGP

82
Q

What protocols make next hop decisions based on the entire remaining path (i.e., vector) to the destination.

A

Path Vector Protocols

83
Q

What is a 6-byte (48-bit) binary address written in hexadecimal notation?

A

MAC Address