Network Flashcards

(128 cards)

1
Q

Layer 1

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Layer 2

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Layer 3

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Layer 4

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Layer 5

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Layer 6

A

Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Layer 7

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Physical

A

Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Link

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network

A

Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transport

A

Layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Session

A

Layer 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Presentation

A

Layer 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application

A

Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Usually, layer 6 (______) and 7 (_____) are _____ together.

A

Usually, layer 6 (presentation) and 7 (application) are joined together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

At layer 2, devices are identified by

A

MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

At layer 3, devices are identified by

A

IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Protocol that translates L3 addresses to L2 addresses

A

ARP, from IP to MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Security in depth is also called

A

layered security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A server that manages several VPN tunnels is called

A

A VPN Concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A general vulnerability of having a UTM appliance is…

A

It’s Single Point of Failure (SPoF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A Web Security Gateway can be used as a _____ ______ prevention measure.

A

data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A Web Security Gateway’s main role is

A

applying corporate policies to internet traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A WAF operates on layer…

A

7 (application)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
MOU
Memorandum of Understanding
26
BPA
Blanket Purchase Agreement
27
ISA
Internet Service Agreement
28
To prevent access to the network through exposed ports you can use
MAC Filtering
29
A control that detects a DoS attack and halt its traffic is called
Flood guards
30
To authenticate to wired and wireless networks to a central database using EAP you can use…
802.1x
31
802.1x encapsulates...
EAP
32
A supplicant is a...
client device trying to access a network
33
A DMZ creates an area
between the public internet and the internal network whereby the internal network can access outside resources, and only some resources can access the inside network
34
NAT allows
using two sets of IP addresses, internal and external, and translate between them
35
NAC
Network Access Control
36
In zero-trust, NAC is implemented with
Credentials and Posture Assessment
37
Segmentation of resources in a network creates
VLANs
38
IPv4 and IPv6 operate at the ____ layer
network (layer 3)
39
IPv6 is ____-bits
128 bits (16 bytes). It uses hex!
40
SAN
Storage Area Network
41
FC/FCP
Fiber Channel (Protocol)
42
SCSI
Small Computer System Interface
43
SCSI is used to control _____ devices
storage
44
FCP is used alongside with SCSI to control ______
storage devices
45
FCoE
Fiber Channel over Ethernet
46
iSCSI
Internet SCSI, L3 protocol between datacenters.
47
NetBIOS operates on layer
layer 5 (session)
48
NetBIOS is often used to access
printers and NAS
49
SNMP
Simple Network Management Protocol
50
IPsec modes
transport (host-to-host), tunnel (site-to-site)
51
Common attack to MAC filtering
MAC spoofing
52
Types of EAP
LEAP (Cisco), PEAP
53
Storage segmentation
Place controls on data access from a BYOD cellphone
54
TCP Wrappers
Host-based ACL for services under UNIX
55
RADIUS
AAA Protocol for network resources
56
TACACS+
AAA Protocol, less robust accounting than RADIUS, but better encryption
57
Kerberos
Authentication protocol
58
KDC
Key Distribution Center (Kerberos)
59
LDAP
Directory Service Protocol for Authentication, TCP 389
60
Secure LDAP
LDAP over SSL
61
SAML
XML-based standard for AA
62
Identity Federation
SSO method that allows access to multiple networks
63
Transitive Trust Authentication
Process of being authenticated by an entity because you're trusted by another trusted entity. Usually in a PKI.
64
SDV
Software-defined visibility, allows monitoring of cloud network assets.
65
Tool for monitoring open ports on Windows
Netstat
66
Tool for monitoring open ports on Windows
Netstat
67
Windows NTFS permissions
Read, Write, Modify, List folder, R+X, Full Control
68
Windows sharing permissions
Read, Change, Full Control
69
Where to put omnidirectional WAP
Center of building
70
Where do switches store MAC-to-port
CAM, Content Addressable Memory
71
SRTP
Secure Real-time Protocol, used for audio and video
72
Centralized VPN and dial-up
RADIUS
73
An updated version of RADIUS is called
Diameter
74
Attestation
Authentication of software or device state, instead of identity
75
LDAP over SSL port
689
76
LDAP over TLS port
636
77
636 port
LDAP over TLS
78
689 port
LDAP over SSL
79
TLS is _____ and ____ than SSL
Newer and safer
80
Because TLS is newer than SSL, its LDAP port is
out of scheme (636)
81
Managed PDU
Managed Power Distribution Units, on-rack
82
In terms of networks, SCADA systems should always be
segmented and isolated from the internet
83
DMZs are now called
Screened subnets
84
S/MIME is used in the _____ layer
presentation
85
Common SNMP vuln
default community strings
86
IPSec provides full ___
CIA
87
Transport IPSec encrypts
only data
88
Tunnel IPSec encrypts
data and header
89
What IPSec mode is used for VPNs
Tunnel (site-to-site) mode
90
In IPSec key management is provided by the ___
IKE, Internet Key Exchange
91
POP port is
110
92
IMAP port
143
93
Secure POP port
995
94
Secure IMAP port
993
95
IMAP ports end in
3
96
POP ports end in
0 and 5
97
Secure email starts at ___ (ports)
990
98
995
Secure POP
99
993
Secure IMAP
100
Protocols to read email
POP and IMAP
101
Protocol to send email
SMTP
102
SMTP port
25
103
SMTPS
465
104
465
SMTPS
105
25
SMTP
106
SMTPS encrypts using
TLS
107
In a LAN, what IPSec mode should be used
Transport mode, because you need the IP header
108
NGFW
Next Generation Firewall
109
NGFW also adds ___/___ capabilities
NIDS/NIPS
110
An active HIDS
blocks the intrusion
111
HIDS
Host Intrusion Detection System
112
EDR
Endpoint Detection and Response
113
Measure Boot in W10 provides boot _____
attestation
114
A screened subnet usually contains
public facing servers and bastion hosts
115
Extranets enable __ communication
B2B
116
VLAN basic types
Port-based, MAC address-based, Protocol-based (IP)
117
VLANs that depend on IP addresses are called _____-based VLANs
Protocol-based VLANs
118
A common VPN solution combines ____ along with IPSec
L2TP
119
L2TP
Layer 2 tunneling protocol
120
____ _____ is when VPNs allow only some traffic to go through the VPN while other types of traffic go through the normal internet
split tunneling
121
When all traffic is routed through a VPN it is called ____ _____.
full tunnelling.
122
BPDU guard
prevents misconfigurations and BDPU attacks by detecting loops in the network topology. Anomalies need to reenable interfaces manually
123
DHCP snooping
Inspects DHCP traffic for rogue servers and drops that traffic
124
A nontransparent proxy
modifies traffic
125
Sensors, Collectors, Aggregators
Sensors can be host or network based, collectors retrieve data using SNMP from sensors, Aggregators unify them
126
Protocol Analyze
intercepts and analyzes network traffic, but only specific segments between certain hosts
127
TKIP replacement in WPA2
CCMP
128
An _____ ____ creates, maintains, and manages identity information for an organization
identity provider