Chapter 3 Flashcards

1
Q
  1. Name the layers of the OSI model and their numbers from top to bottom.
A
Application (7), 
Presentation (6),
Session (5)
Transport (4)
Network (3)
Data Link (2)
Physical (1).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name three problems with cabling and the methods to counteract those issues.

A

Problems with cabling and their countermeasures include - Attenuation (use repeaters or don’t violate distance recommendations)

  • Using the wrong CAT cable (check the cable specifications against throughput requirements, and err on the side of caution)
  • Crosstalk (use shielded cables, place cables in separate conduits, or use cables of different twists per inch)
  • Cable breaks (avoid running cables in locations where movement occurs)
  • Interference (use cable shielding, use cables with higher twists per inch, or switch to fiber-optic cables)
  • Eavesdropping (maintain physical security over all cable runs or switch to fiber-optic cables)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies?

A

Some of the frequency spectrum-use technologies are spread spectrum

Frequency Hopping Spread Spectrum (FHSS),

Direct Sequence Spread Spectrum (DSSS)

Orthogonal Frequency-Division Multiplexing (OFDM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Discuss methods used to secure 802.11 wireless networking.

A

Methods to secure 802.11 wireless networking include

  • disabling the SSID broadcast;
  • changing the SSID to something unique;
  • enabling MAC filtering;
  • considering the use of static IPs or using DHCP with reservations;
  • turning on the highest form of encryption offered (such as WEP, WPA, or WPA2/802.11i);
  • treating wireless as remote access and employing 802.1X, RADIUS, or TACACS;
  • separating wireless access points from the LAN with firewalls;
  • monitoring all wireless client activity with an IDS;
  • and considering requiring wireless clients to connect with a VPN to gain LAN access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
1. What is layer 4 of the OSI model?
A. Presentation
B. Network
C. Data Link
D. Transport
A

D. The Transport layer is layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What is encapsulation?
    A. Changing the source and destination addresses of a packet
    B. Adding a header and footer to data as it moves down the OSI stack
    C. Verifying a person’s identity
    D. Protecting evidence until it has been properly collected
A

B. Encapsulation is adding a header and footer to data as it moves down the OSI stack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
3. Which OSI model layer manages communications in simplex, half-duplex, and full-duplex modes?
A. Application
B. Session
C. Transport
D. Physical
A

B. Layer 5, Session, manages simplex (one-direction), half-duplex (two-way, but only one direction can send data at a time), and full-duplex (two-way, in which data can be sent in both directions simultaneously) communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
4. Which of the following is the least resistant to EMI?
A. Thinnet
B. 10Base-T UTP
C. 10Base5
D. Coaxial cable
A

B. 10Base-T UTP is the least resistant to EMI because it is unshielded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
5. Which of the following is not an example of network segmentation?
A. Intranet
B. DMZ
C. Extranet
D. VPN
A

D. A VPN is a secure tunnel used to establish connections across a potentially insecure intermediary network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
6. Which of the following is not considered a non-IP protocol?
A. IPX
B. UDP
C. AppleTalk
D. NetBEUI
A

B. UDP is a transport layer protocol that operates as the payload of an IP packet. While it is not IP itself, it depends upon IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
7. If you are the victim of a bluejacking attack, what was compromised?
A. Your car
B. Your switch
C. Your cell phone
D. Your web cookies
A

C. A bluejacking attack is a wireless attack on Bluetooth, and the most common device compromised in a bluejacking attack is a cell phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
8. Which networking technology is based on the IEEE 802.3 standard?
A. Ethernet
B. Token Ring
C. FDDI
D. HDLC
A

A. Ethernet is based on the IEEE 802.3 standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What is a TCP wrapper?
    A. An encapsulation protocol used by switches
    B. An application that can serve as a basic firewall by restricting access based on user IDs or system IDs
    C. A security protocol used to protect TCP/IP traffic over WAN links
    D. A mechanism to tunnel TCP/IP through non-IP networks
A

B. A TCP wrapper is an application that can serve as a basic firewall by restricting access based on user IDs or system IDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
What is both a benefit and a potentially harmful implication of multilayer protocols?
A. Throughput
B. Encapsulation
C. Hash integrity checking
D. Logical addressing
A

B. Encapsulation is both a benefit and a potentially harmful implication of multilayer protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
11. By examining the source and destination addresses, the application usage, the source of origin, and the relationship between current packets with the previous packets of the same session,\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ firewalls are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities.
A. Static packet-filtering
B. Application-level gateway
C. Stateful inspection
D. Circuit-level gateway
A

C. Stateful inspection firewalls are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
12. \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ firewalls are known as third-generation firewalls.
A. Application-level gateway
B. Stateful inspection
C. Circuit-level gateway
D. Static packet-filtering
A

B. Stateful inspection firewalls are known as third-generation firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. Which of the following is not true regarding firewalls?
    A. They are able to log traffic information.
    B. They are able to block viruses.
    C. They are able to issue alarms based on suspected attacks.
    D. They are unable to prevent internal attacks.
A

B. Most firewalls offer extensive logging, auditing, and monitoring capabilities as well as alarms and even basic IDS functions. Firewalls are unable to block viruses or malicious code transmitted through otherwise authorized communication channels, prevent unauthorized but accidental or intended disclosure of information by users, prevent attacks by malicious users already behind the firewall, or protect data after it passed out of or into the private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
14. Which of the following is not a routing protocol?
A. OSPF
B. BGP
C. RPC
D. RIP
A

C. There are numerous dynamic routing protocols, including RIP, OSPF, and BGP, but RPC is not a routing protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
15. A \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ is an intelligent hub because it knows the addresses of the systems connected on each outbound port. Instead of repeating traffic on every outbound port, it repeats traffic only out of the port on which the destination is known to exist.
A. Repeater
B. Switch
C. Bridge
D. Router
A

B. A switch is an intelligent hub. It is considered to be intelligent because it knows the addresses of the systems connected on each outbound port.

20
Q
16. Which of the following is not a technology specifically associated with 802.11 wireless networking?
A. WAP
B. WPA
C. WEP
D. 802.11i
A

A. Wireless Application Protocol (WAP) is a technology associated with cell phones accessing the Internet rather than 802.11 wireless networking.

21
Q
17. Which wireless frequency access method offers the greatest throughput with the least interference?
A. FHSS
B. DSSS
C. OFDM
D. OSPF
A

C. Orthogonal Frequency-Division Multiplexing (OFDM) offers high throughput with the least interference. OSPF is a routing protocol, not a wireless frequency access method.

22
Q
18. What security concept encourages administrators to install firewalls, malware scanners, and an IDS on every host?
A. Endpoint security
B. Network access control (NAC)
C. VLAN
D. RADIUS
A

A. Endpoint security is the security concept that encourages administrators to install firewalls, malware scanners, and an IDS on every host.

23
Q
  1. What function does the RARP protocol perform?
    A. It is a routing protocol.
    B. It converts IP addresses into MAC addresses.
    C. It resolves physical addresses into logical addresses.
    D. It manages multiplex streaming.
A

C. Reverse Address Resolution Protocol (RARP) resolves physical addresses (MAC addresses) into logical addresses (IP addresses).

24
Q
20. What form of infrastructure mode wireless networking deployment supports large physical environments through the use of a single SSID but numerous access points?
A. Stand-alone
B. Wired extension
C. Enterprise extension
D. Bridge
A
  1. C. Enterprise extended infrastructure mode exists when a wireless network is designed to support a large physical environment through the use of a single SSID but numerous access points.
25
Q

In OSI What is Encapsulation

A

The addition of a header, and possibly a footer, to the data received by each layer from the layer above (the payload), before it’s handed off to the layer below
A footer is added by the Data Link layer

Occurs as data moves from the top layer to the bottom layer

26
Q

In OSI What is Deencapsulation

A

Occurs as received data moves from the bottom layer to the top layer

Each layer’s header (and footer) is processed and removed, before sending the payload up to the layer above

27
Q

Describe Layer 1 - Physical Layer

A

Accepts frames from the Data Link layer and converts them into bits for transmission over the physical connection medium

Receives bits from the physical connection medium and converts them into frames to be used by the Data Link layer

28
Q

Describe Layer 2 - Data Link Layer

A

Accepts packets from the Network layer and converts them into the proper format for transmission (frames)

29
Q

What are the Protocols within Layer 2 - Data Link Layer

A

Protocols found within the Data Link layer include
Address Resolution Protocol (ARP), Used to resolve IP addresses into MAC addresses.

Reverse Address Resolution Protocol (RARP)

30
Q

What Devices function at Layer 2 - Data Link Layer

A

Network devices that function at layer 2 are switches and bridges

31
Q

What Devices function at Layer 1 - Physical Layer

A

Network hardware devices that function at Layer 1 are

Network interface cards (NICs), hubs, repeaters, and concentrators

32
Q

Describe Layer 3 - Network Layer

A

Responsible for adding routing and addressing information to the data

Accepts segments from the Transport layer and adds information to it to create a packet

The packet includes the source and destination IP addresses

The Network layer is responsible for providing routing or delivery information, but it is not responsible for verifying guaranteed delivery, That is the responsibility of the Transport layer

The Network layer also manages error detection and traffic control

33
Q

What are the Protocols within Layer 3 Network Layer

A

Protocols found within the Network layer include

  • Internet Control Message Protocol (ICMP)
  • Routing Information Protocol (RIP)
  • Open Shortest Path First (OSPF)
  • Border Gateway Protocol (BGP)
  • Internet Protocol (IP), IP Security (IPSec)
  • Network Address Translation (NAT)
34
Q

What Devices function within Layer 3 Network Layer

A

Routers are among the network hardware devices that function at layer 3
Routers determine the best logical path for the transmission of packets based on speed, hops, preference, and so on
Routers use the destination IP address to guide the transmission of packets

35
Q

Describe Layer 4 - Transport Layer

A

Establishes a logical connection between two devices and provides end-to-end transport services to ensure data delivery
Accepts PDUs from the Session layer and converts them into segments

Includes mechanisms for segmentation, sequencing, error checking, controlling the flow of data, error correction

36
Q

What are the Protocols within Layer 4 - Transport Layer

A

Protocols found within the Transport layer include

  • Transmission Control Protocol (TCP)
  • User Datagram Protocol (UDP)
  • Secure Sockets Layer (SSL)
  • Transport Layer Security (TLS)
37
Q

Describe Layer 5 - Session Layer

A

Responsible for establishing, maintaining, and terminating communication sessions between two computers

Establishes checkpoints for recovery, and retransmits PDUs that have failed or been lost since the last verified checkpoint

Communication sessions can operate in different control modes

  • Simplex: One-way communication
  • Half-duplex: Two-way communication, but only one direction can send data at a time
  • Full-duplex: Two-way communication, in which data can be sent in both directions simultaneously
38
Q

What are the Protocols within Layer 5 - Session Layer

A

Protocols operating at the Session layer include

  • Network File System (NFS)
  • Remote Procedure Call (RPC)
39
Q

Describe Layer 6 - Presentation Layer

A

Responsible for transforming data received from the Application layer into a standard format that any system following the OSI model can understand
Responsible for encryption and compression
Acts as an interface between the network and the applications

40
Q

What are the Protocols within Layer 6 - Presentation Layer

A

Most file or data formats for images, video, sound, documents, email, and web pages operate within this layer, including

  • American Standard Code for Information Interchange (ASCII)
  • Tagged Image File Format (TIFF)
  • Joint Photographic Experts Group (JPEG)
  • Moving Picture Experts Group (MPEG)
41
Q

Describe Layer 7 - Application Layer

A

Responsible for interfacing user applications, network services, or the operating system with the protocol stack
Allows applications to communicate with their peers through the protocol stack

The Application layer determines whether a remote communication partner is available and accessible, and resources are available to support the requested communications

42
Q

What are the Protocols within Layer 7 - Application Layer

A

Numerous application-specific protocols are found the application layer, such as the following

  • Hypertext Transfer Protocol (HTTP)
  • File Transfer Protocol (FTP)
  • Simple Mail Transfer Protocol (SMTP)
  • Telnet
  • Electronic Data Interchange (EDI)
  • Post Office Protocol version 3 (POP3)
  • Internet Message Access Protocol (IMAP)
  • Simple Network Management Protocol (SNMP)
  • Network News Transport Protocol (NNTP)
  • Secure Remote Procedure Call (S-RPC)
  • Secure Electronic Transaction (SET)
43
Q

How Many Layers on the TCP/IP Model

A
Consisted of 4 Layers 
Application Layer
Transport Layer
Internet Layer
Network Layer
Network Interface Layer
44
Q

TCP/IP Model, Name 4 Application Layer Protocols

important

A
HTTP
FTP
SMTP
DNS
SNMP
RIP
45
Q

TCP/IP Model, Name 2 Transport Layer Protocols

A

TCP and UDP

46
Q

TCP/IP Model, Name 2 Internet Layer Protocols

A

IP
IPSEC
ICMP
ARP

47
Q

TCP/IP Model, Name 2 Network Interface Layer Protocols

A

Ethernet
Token Ring
Relay Frame
ATM