Domain 4 Flashcards

1
Q

One way communication

A

simplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

communication sends or receives at one time only, not simutaneously

A

half duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

communication sends and receives simutaneously

A

full duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

small network, typically confined to a building or an area within a building

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A metropolitan area network typically confined to a city

A

MAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A wide network typically covering cities, states, or countries

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A global connection of WANs

A

GAN (global area network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Smallest of networks with a range of 100 m or less

A

PAN (personal area network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A privately owned network running TCP/IP like a company network

A

intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A connection between private intranets such as connections to business partner intranets

A

extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ switched networks can provide dedicated bandwidth to point-to-point connections, such as a T1 connecting two offices

A

circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A drawback of this network switching is that once connected, it is dedicated only to that purpose even if no data is being transferred

A

circuit switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ switch networks use QOS to give specific traffic precedence over other traffic

A

packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This layer of OSI handles access to the physical layer as well as LAN communications

A

data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In the data link layer ____ transfers data to and from the physical layer while __- handles LAN communications

A

MAC (media access control); LLC (logical link control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The ___ layer of the OSI handles packet sequencing, flow control, and error detection

A

transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The ___ layer of the OSI manages sessions which provide maintenance on connections

A

session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The ___ layer of the OSI model presents data to the application and user in a comprehensible way

A

presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The protocols Telnet and FTP are ____ layer protocols

A

application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The first half of a MAC address (24 bits) form the ____ and the last 24 bits form a ___

A

OUI (organizationally unique identifier); serial number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

____ is used to troubleshoot and report error conditions on layer 3 and is a helper protocol to IP

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Port 23

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Port 21

A

FTP - control connnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Port 20

A

FTP - data connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Port 22

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Port 25

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Port 110

A

POPv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Port 143

A

IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Port 53

A

DNS; small data uses UDP; large data uses TCP

30
Q

Port 80

A

HTTP

31
Q

Port 443

A

HTTPS

32
Q

Ethernet operates at ____ layer

A

data link

33
Q

A dedicated 1.544 megabit circuit that carries 24.64 kbits

A

T1

34
Q

28 bundled T1s forming a 44.736 megabit current

A

T3

35
Q

Dedicated 2.048 megabit circuit that carries 30 channels

A

E1

36
Q

16 bundled E1s forming a 34.368 megabit circuit

A

E3

37
Q

A packet switched layer 2 WAN protocol that provides no error recovery and focuses on speed

A

frame relay

38
Q

___ label switching provides a way to forward WAN data using labels via a shared MPLS cloud network

A

MPLS (multiprotocol label switching)

39
Q

An open standard used primarily within the energy sector for interoperability between various vendors

A

DNP3 (distributed network protocol)

40
Q

____ and ___ are SAN protocols that provide cost-effective way to leverage existing network infrastructure technologies and protocols to interface with storage

A

FCoE (fibre channel over ethernet) and iSCSI (internet small computer system interface)

41
Q

___ is a VoIP protocol used to carry streaming audio and video

A

RTP (real-time protocol)

42
Q

___ is able to provide secure VoIP. It uses AES for confidentiality and SHA-1 for integrity

A

SRTP (secure real-time protocol)

43
Q

_____ uses both 2.4 and 5 GHz frequencies and is able to use multiple antennas with multiple input multiple output (MIMO)

A

802.11n

44
Q

2 megabits/second, 2.4 GHz frequency

A

802.11

45
Q

11 Mbps, 2.4 GHz

A

802.11b

46
Q

Designed to be backwards compatible with 802.11b, 54 Mbps, 2.4 Ghz frequency

A

802.11g

47
Q

54 Mbps, 5 GHz frequency

A

802.11a

48
Q

uses 5 GHz frequency only offering speeds up to 1.3 Gbps

A

802.11ac

49
Q

The first wireless security standard that provides reasonable security

A

802.11i aka WPA2

50
Q

WPA uses __ for confidentiality and ___ for integrity

A

RC4; TKIP

51
Q

IEEE standard 802.15 describes ___ technologies and operates at 2.4 Ghz

A

bluetooth

52
Q

The security of bluetooth relies on the secrecy of ___

A

48 bit mac address

53
Q

Cisco proprietary protocol released before 802.1X was finalized. Has significant security flaws and should not be used

A

LEAP (lightweight extensible authentication protocol)

54
Q

uses PKI, requiring both client and server side certificates. It establishes a secure TLS tunnel used for authentication. Very secure but costly

A

EAP-TLS (EAP- Transport Layer Security)

55
Q

Same as EAP-TLS but drops client side authentication and replaces it with passwords. Easy to deploy but less secure when omitting client side certificate

A

EAP-TTLS (EAP Tunneled Transport Layer Security)

56
Q

Developed by Cisco and similar to EAP-TTLS in omitting client side certificate

A

PEAP

57
Q

ESP is protocol number

A

50

58
Q

AH is protocol number

A

51

59
Q

The closer the site is to the central office, the faster the available service will be. List the DSL types in order from fastest to slowest

A

ADSL
SDSL
HDSL (same speed as SDSL but uses two copper pairs)
VDSL

60
Q

VNC (virtual network computing) port number

A

TCP 5900

61
Q

RDP port number

A

TCP 3389

62
Q

ARP operates at what layer?

A

2 datalink and 3 network

63
Q

802.11 standard is a protocol that operates at what layer

A

1

64
Q

packet filtering firewalls and stateful packet filtering firewalls operate at what layer

A

3 network

65
Q

circuit proxy firewalls operate at what layer

A

5 session

66
Q

application firewalls operate at what layer

A

7 application

67
Q

Private IPv4 address

A

10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255

any of these are not routable on the internet

68
Q

Reconaissance is ____

A

passive

69
Q

Enumeration is ___

A

active

70
Q

Attacker modifies arp table to redirect traffic

A

arp poisoning

71
Q

computers configured to withstand attacks, usually a public facing server

A

bastion host

72
Q

The protocol used to establish security associations

A

IKE (internet key exchange)