Domain 4 set 2 Flashcards

(32 cards)

1
Q

SSL/TLS work at what layer?

A

single Layer = 4 Transport

multiple layer = 4- 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what layer Provides end to end data transport service and establishes a logical connection between 2 system

A

Layer 4 Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SYN floods happen to what protocol and what layer?

A

TCP at layer 4 Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP 3-way Handshake process:

A
  1. SYN
  2. SYN / ACK
  3. ACK
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Media streaming use what protocol?

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fraggle attack happens on what layer

A

layer 4 Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what layer is responsible for establishing connections between applications

A

The session layer (5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What layer handles file-level encryption, compression, and formatting duties.

A

The presentation layer (6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

no protocols exist at what layer ?

A

The presentation layer (6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What layer uses a negotiation procedure or handshake to setup, transfer data (maintenance), and tear down the connection or session.

A

The session layer (5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security threats tapping, data sniffing, equipment and media theft, vandalism, electromagnetic interference, unauthorized access, and data emanation.
Are at what layer

A

Physical (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Content inspection is possible at what layer ?

A

Layer 7 Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Non-Repudiation is at what layer

A

Layer 7 Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Certificates is at what layer

A

Layer 7 Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Directory services (e.g. ActiveDirectory) at what layer

A

Layer 7 Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP/IP Model 4 layer

A
  1. Application
  2. Host to Host or Transport
  3. Internetwork
  4. Network access
17
Q

TCP/IP Model Application layer maps to IOS layers?

A

application
presentation
Session

18
Q

TCP/IP Model Host to Host or Transport layer maps to IOS layers?

19
Q

TCP/IP Model Internetwork maps to IOS layers?

20
Q

TCP/IP Model Network access maps to IOS layers?

A

Data link

Physical

21
Q

MPLS

A

Labeling on packet at layer 3

22
Q

greatest threat to VOIP

A

Eavesdropping

23
Q

stop eavesdropping on VOIP

A

enable S/RTP (Secure Real Time Protocol)

24
Q

wireless pc to pc use what mode

25
AP use what mode
Infrastructure Wlan
26
WPA2 use what cipher
AES (block cipher) with CCMP
27
WPA use what cipher
TKIP with RC-4 (for backwards compatibility)
28
WEP 4 main issues ?
1. Shared Authentication password 2. Weak IV (24bits) 3. IV trainsmitted in clear text 4. RC-4 cipher
29
WPA2 Enterprise
use 802.1X (RADUS)
30
Blue Jacking
sending SPAM to bluethooth
31
Blue Sarfing
copies info off of remote devices
32
how to secure bluetooth device?
1. turn off when not using it 2. turn off auto-discovery 3. Turn off auto-pairing