Network Flashcards

(42 cards)

1
Q

Used to explain network communications between a host and remote device over LAN or WAN

A

OSI Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Layer of OSI Model represent the actual network cables and radio waves used to carry date over network

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A data carried over a network to Physical layer

A

Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describes how a connection is established, maintained and transferred over the physical layer and uses physical addressing

MAC Addresses

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Its a group of bits in the data link layer

A

Frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Uses logical address to route or switch information and between host, the network and the internetworks

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

At network layer the frames are taken and group. An example of this are the IP addresses.

A

Packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Manages and ensures transmission of the packets occurs from a host to a designation using either TCP or UDP

A

Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Manages the establishment, termination and synchronization of a session over the network

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Translate the information into a format that the sender and receiver both understand

A

Presentaion Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layer from which the message is created, formed and originated. It consist of high level protocols like HTTP, SMTP and FTP

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It is the combine evolution of hubs and bridges. It improves the data transfer and security through the intelligent use of MAC Addresses being able to figure out where a device is and only sending information out that particular port of the switch and ignoring the rest.

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attempt to overwhelmed the limited switch memory set aside to store the MAC address for each port and this is known as the content addressable memory or CAM table

A

MAC Flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Occurs when an attacker masks their own MAC address to pretend they have the MAC address of another device

A

MAC Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is a man in the middle (MitM) attack that allows the attacker to intercept the communication between network devices. The forge the responses advertise that the correct MAC address for both IP addressess, belongin to the router and workstation, is the attacker’s MAC address ( MAC Spoofing). Mac spoofing is often combine with this attack.

A

ARP Spoofing/ ARP Poinsoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Occurs when an attacker attempts to gain physical access.

A

Physical tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It operates at layer lll
Used to connect two or more networks to form an internetwork
It rely on a packets IP Addresses to determine the proper destination
Once on the network, it conducts an ARP request to find final destination

18
Q

It can be configure on router’s interface to control the flow of traffic into or put of a
Certain part of the network.

It is an ordered set of rules that a router uses to decide where to permit or deny traffic based upon given characteristics like its source or destination IP address the ports associated with it and the application.

A

Access Control List

19
Q

It is used to trick a router’s ACL

20
Q

Focuses on providing controlled access to publicly available servers that are hosted within your organization network

A

De-Militarized Zone DMZ

21
Q

Can be created to provide addtional protection for some servers

22
Q

Specialized type of DMZ that is created for your partner organization to access overa wide area network

23
Q

Used when only one company is involved

24
Q

Any host that accepts inbound connections from the internet

A

Internet-facing host

25
A segment isolated from the rest of a private network by one or more firewalls that accepts connections from the internet over designated ports
Demilitarized Zone DMZ
26
Host or services in the DMZ which are not configured with any services that run on the local network
Bastion Host
27
Used to configure device in the DMZ. A hardened server that provides access to other host within the DMZ. Administrator connects to it and it connects to the hose in the DMZ
Jumpbox
28
Security technique in which a devices are scanned to determine its current state prior to being allowed access onto given network
Network Access Control
29
A NAC solution piece of software that is installed on the device requesting access to the network
Persistent Agents
30
A NAC solution that uses a piece of software that scans the device remotely or is installed and subsequently removed after the scan
Non-Persistent Agents
31
Standard Access control mechanism used in port-based NAC
IEEE 802.1x
32
This adds a layer of separation to networks without requiring to purchase additional switches that have to be configured and installed on the network. It is implemented to segment the network, reduce collisions, organize the network,boost performance and increase security
Vlans Virtual Local Area Network
33
Attacker configures their device to pretend it is a switch and uses it to negotiate a trunk link to break out of a VLAN
Switch spoofing
34
Attacker adds an additional VLAN tag to create an outer and inner tag
Double Tagging
35
Acts of creating subnetworks logically through the manipulation of IP addresses. It compartmentalized networks to more efficiently use the IP address space that is given.
Subnetting
36
Process of changing an IP address while it. Transits acrooss a router. It helps hide network IP from attackers.
Network Address Translation
37
Router Keeps track of request from internal host by assigning them random high number ports for each request.
Port Address Translation
38
Term used to describe drvices that provide voice communication to users
Telephony
39
A device that could modulate digital information into an analog signal for transmission over a standard dial-up phone line.
Modem
40
An attacker starts dialing random phone numbers to see if any modem would answer on the other side
War dialing
41
Internal phone system used in large organization
Public Branch Exchange PBX
42
Digital phone service provided by software or hardware devices over a data network
(Voice Over Internet Protocol) VoIP