Chapter 5 - Networks and Telecommunications Flashcards

1
Q

Open Systems Interconnection Reference Model (OSI) Layers

A

Layer 1: Physical
Layer 2: Data link
Layer 3: Network
Layer 4: Transport
Layer 5: Session
Layer 6: Presentation
Layer 7: Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Function of Layer 1 of the OSI

A

Establishes and manages the physical transmission of data between network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Function of Layer 2 of the OSI

A

Responsible for the transfer of data between adjacent nodes on a network segment using MAC addresses to identify devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Function of Layer 3 of the OSI

A

Routing and forwarding data packets between different networks, using IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Function of Layer 4 of the OSI

A

Responsible for ensuring reliable end-to-end communications and maintenance between applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Function of Layer 5 of the OSI

A

Opens, closes, and manages sessions between end-user application processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Function of Layer 6 of the OSI

A

Ensures that data is formatted and encoded in a way that the application can understand. Includes tasks like data translation and encryption/decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Function of Layer 7 of the OSI

A

Provides the protocols that end-user applications use to interact with the network. For example: HTTP for browsing the web and FTP for file transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WAN

A

Wide-area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Example of a WAN

A

The internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Disadvantage of WANs

A

Data security cannot be guaranteed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can we make data more secure as it travels across a WAN

A

Encrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

LAN

A

Local-area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Function of a LAN

A

Provide network connectivity for computers that are in the same geographic area and are typically connected with hubs and switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hubs

A

devices that contain plugs and ports to connect ethernet cables for different network systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Switches

A

Receive packets of information, look at the destination MAC address, and then send the packet there. (perform intelligent filtering)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Disadvantage of a LAN

A

Oftentimes, they do not protect themselves from each other. So if one becomes infected, malware can quickly spread to all the devices on the network

18
Q

Example of a LAN

A

Ethernet networks (the most common LAN)

19
Q

The ethernet standard

A

Defines how computers use media access control (MAC) addresses to communicate with each other

20
Q

The ethernet standard governs which layers of the OSI?

A

Physical (layer 1) and data link (layer 2)

21
Q

Virtual LANs

A

A collection of logically related network devices that are viewed as a network segment. Allows administrators the ability to separate network segments without physically separating the cabling

22
Q

Transmission control protocol (TCP) and internet protocol (IP) are apart of which layers of the OSI reference model?

A

Network and transport

23
Q

TCP and IP

A

a suite of protocols that govern all activity across the internet and through most corporate and home networks

24
Q

Network port

A

A number that tells a receiving device where to send messages it receives

25
IPv4 addresses
4-byte, 32-bit; still the most common
26
IPv6 addresses
128-bits long; more complex and secure
27
Dynamic Host Configuration Protocol (DHCP)
Provides a computer with an IPv4 address, a subnet mask, and other essential communication information
28
Internet Control Message Protocol (ICMP)
A management and control protocol for IP that delivers messages about the health of the network
29
Vulnerability of ICMP
Attackers can use it to create a DoS attack
30
Reconnaissance
Gathering information about a network for use in a future attack
31
Eavesdropping
When an attacker taps a data cable to see all the data passing through it
32
Denial-of-service (DoS)
Flooding a network with traffic and shutting down a single point of failure
33
Distributed denial-of-service (DDoS)
Uses multiple compromised systems to flood the network from many different directions
34
Telephony denial-of-service (TDoS)
Attempts to prevent telephone calls from being successfully initiated or received by some person or organization
35
Firewalls
Controls the flow of traffic by preventing unauthorized network traffic from entering or leaving a particular portion of the network
36
Border firewalls
Separate the protected network from the internet
37
Three parts of Unified Threat Management
1. URL filter - filters web traffic by examining the URL instead of the IP 2. Content inspection - looks at network packet content to determine if the packet should be allowed to pass 3. Malware inspection - looks at packet content for signs of malware
38
Network Access Control (NAC)
Enables you to add more security requirements before allowing a device to connect to the network
39
Wireless access points (WAPs)
A radio that sends and receives networking information over the air between wireless devices and the wired network
40
Who can attempt to connect to wireless access points?
Anyone who is in radio range
41
Examples of wireless network security controls
- VPNs - Wireless encryption (such as WEP, CCMP, WPA) - MAC address filtering - SSID broadcast