Domain 4: Communications and Network Security Flashcards

1
Q

IEEE 802.3

A

Ethernet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SPX

A

Archaic OSI Layer 4 (transport layer) protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Four network Topologies

A

Ring - all endpoints are conneted in ring

Bus - one central trunk each pc connects to

Star - central router or hub

Mesh - every endpoint is connected to every other endpoint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Layer 6 OSI

A

The Presentation Layer. The presentation layer transforms data into format structures that other systems can understand. Examples of presentation layer formats include JPEG, MPEG, ASCII, and GIF.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Layer 5 OSI

A

Session Layer: The Session layer of the Open Systems Interconnection (OSI) model is used primarily to track application dialogue. The Session layer (Layer 5) establishes, coordinates, and terminates communication sessions between applications. Examples of Session layer protocols are Remote Procedure Call (RPC) and Network File System (NFS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DTE vs DCE on old Serial Equipment

A

Data terminal equipment (DTE) is a term for the interface a customer will connect to when using older serial-based wide-area network (WAN) connections. This is common in Frame Relay and Asynchronous Transfer Mode (ATM) connections. The circuit-terminating equipment (DCE) end connects to the provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Layer 2 TCP/IP

A

Internet layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

802.1AE

A

MACsec

802.1AE, also known as MACsec, is an Institute of Electrical and Electronics Engineers (IEEE) standard that provides confidentiality and integrity at the data link layer of the Open Systems Interconnection (OSI) model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WEP

A

IEEE 802.11

Uses a shared key between clients and APs.

Not considered secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is IP considered a connectionless protocol?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is Web Security Gateway an actual term?

A

Yes - once upon a time this was a dedicated appliance for content filtering.

Most firewalls have this built in as a feature now.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Packet Switching Protocol

A

TCP, UDP, GRE, SPX, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CSMA/CD and CSMA/CA

A

Carrier-sense multiple access with collision detection

Carrier-sense multiple access with collision avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DSSS

A

Direct-sequence spread spectrum

Direct-sequence spread spectrum (DSSS) is a modulation technology that increases bandwidth and adds redundancy by adding sub-bits to messages. These sub-bits are called “chips” and can be used to reconstruct data similar to how RAID-5 reconstructs data after a drive failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Most fundamental component of a VPN

A

Tunneling

The communication between the two endpoints is encapsulated and travels through another network medium. Since a VPN is impossible without encapsulation or tunneling, it is the most crucial component.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Baseband

A

Baseband has only one channel, so it can only send one communication signal at a time. Baseband signaling uses a single channel for the transmifssion of digital signals and is common in twisted-pair cabling.

Ethernet networks are baseband: a “100baseT” UTP cable means 100 megabit, baseband, and twisted pair.

17
Q

FCoE

A

Fiber Channel over Ethernet

18
Q

Phreaker

A

phone + freak = phreak

Someone who abuses phone systems/telecommunications.

19
Q

Latest WiFi Standard

A

Wifi 6E

20
Q

VLAN Hopping Attack

A

VLAN hopping occurs when an attacker manipulates a frame, so the switch moves it to a different VLAN. VLAN hopping can happen by spoofing a switch, setting up a dynamic trunk or tagged interface, or creating a double-encapsulated 802.1Q tag.

21
Q

TCP/IP layers

A

Layer 1: datalink/Network Access Layer.
Layer 2: network/Internet Layer.
Layer 3: Transport Layer.
Layer 4: Application Layer.

22
Q

OSI model layers

A

Physical, Data Link, Network, Transport, Session, Presentation, and Application.

23
Q

TCP URG header

A

Marks the packet as urgent, requires immediate attention.T

24
Q

Pre-admit NAC

A

Systems are tested BEFORE they are admitted network access.

25
Q

Post-admit NAC

A

Systems are tested AFTER they are admitted network access.

26
Q

Clientless NAC

A

No Agent deployed to the endpoints being verified by NAC.

27
Q

Client-based NAC

A

The NAC Service has an agent running on the endpoint to gather more data.

28
Q

Disassociation Attack

A

Attack on WiFI, used to:

Discover SSID of hidden networks - If forced to disassociate, an endpoint will send a connection request with the plaintext of the hidden SSID

Entice clients to connect to a rogue WAP

DOS Attack

29
Q

APIPA - Automatic Private IP Addressing

A

AKA link-local address assignment, assigns an IP address to a system if DHCP fails.

169.254.0.1 to 169.254.255.254.

30
Q

Bluejacking

A

Bluejacking is the sending of unsolicited messages over Bluetooth. An attacker may also send a malicious attachment via Bluetooth. The goal is for the victim to allow an attacker to connect to the device enabling the hacker can gain access to contacts, images, and other private data.

31
Q

Bluesnarfing

A

Bluesnarfing allows hackers to connect with a Bluetooth device without the user’s knowledge and extract information from the device.

32
Q

Bluebugging

A

Bluebugging is an attack that grants hackers remote control over the features and functions of a Bluetooth device.

33
Q

Cat 7 cable

A

is used for 10 gigabit Ethernet for data up to 10Gbps

34
Q

OSI Model - Please Do Not Throw Salami Pizza Away

A

Please Do Not Throw Salami Pizza Away

Physical
Datalink
Network
Transport
Session
Presentation
Application

35
Q

TCP/IP Model

A

Network Access (Physical, Data Link)

Internet (Network)

Transport (Transport)

Application (Session, presentation, application)

36
Q

FDDI

A

Fiber Distributed Data Interface (FDDI) is a high-speed token-passing technology that employs two rings with traffic flowing in opposite directions.

37
Q

Screened Subnet/DMZ

A

A screened subnet is a network between two routers or firewalls and is frequently called a Demilitarized Zone (DMZ). Screened subnets are generally used when internet users need to access internal resources. Designated systems are placed in the DMZ with firewall policies that allow internet users access. This allows firewall administrators to expose only a small network to the internet without adding private networks.

38
Q

Type of firewall that automatically adjusts filtering based on context and content of traffic.

A

Stateful firewall.

(For CISSP, NOT a WAF)

39
Q

WPA3 supported Authentication Mechanisms

A

ENT - Enterprise WiFi Authenticaition AKA 802.1x

SAE - Simaltaneous auth of equals