Network Security Flashcards

(98 cards)

1
Q

allows you to view and modify the layer 2 to layer 3 address bindings?

A

That’s the ARP cache (Address Resolution Protocol cache).
ARP cache:

Stores Layer 3 (IP address) to Layer 2 (MAC address) mappings.

You can view and modify it with commands like arp -a (view) or arp -d (delete) on most systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following types of hosting would an organization use if they wanted to maintain their own datacenter in their worldwide headquarters? On-premise Branch office Collocation

A

On-premise

This means the organization owns and operates its own datacenter at its headquarters.

Branch office: A remote site, not the headquarters.
Collocation: Renting space in a third-party datacenter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Traffic directions

A

Northbound: Traffic leaving the datacenter (out to WAN/Internet).

Southbound: Traffic entering the datacenter from external sources.

East-West: Traffic inside the datacenter between internal systems (server-to-server).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It provides a single point of access for clients to a service offered by multiple servers.

A

Virtual IP (VIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the context of dynamic routing, what is the primary function of the Border Gateway Protocol (BGP)?

A

To exchange routing information between autonomous systems on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(MTTR)

A

The mean time to repair measures the average time it takes to repair a network device when it breaks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(MTBF)

A

The mean time between failures measures the average time between when failures occur on a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(RTO)

A

The recovery time objective (RTO) is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in continuity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(RPO)

A

The recovery point objective (RPO) is the interval of time that might pass during a disruption before the quantity of data lost during that period exceeds the Business Continuity Plan’s maximum allowable threshold or tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Runts

A

Frames smaller than 64 bytes, usually due to collisions or transmission errors, indicating issues with the transmission medium or NIC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CRC Errors

A

Occur when the cyclic redundancy check fails, signaling data corruption during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Giants

A

Frames larger than 1518 bytes, often caused by network congestion or misconfiguration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Drops

A

Frames discarded by a switch due to lack of buffer space, typically caused by congestion or port misconfiguration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Evil Twin

A

A rogue wireless access point that mimics a legitimate one to trick users into connecting, enabling data interception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IP Spoofing

A

An attack where a packet is sent with a forged source IP address to disguise the sender or impersonate another device at Layer 3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MAC Spoofing

A

Faking a device’s MAC address, such as the gateway’s, which can disrupt communication for all devices on the subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ARP Spoofing

A

Sending fake ARP messages to associate the attacker’s MAC address with a valid IP, enabling on-path attacks like interception or redirection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Layer at which Data is transmitted.

A

Layers 5–7 (Application, Presentation, Session)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Layer at which Data is encapsulated into segments.

A

Layer 4 (Transport)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Layer at which Segments are encapsulated into packets.

A

Layer 3 (Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Layer at which Packets are encapsulated into frames.

A

Layer 2 (Data Link)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Layer at which Frames are converted into bits for transmission.

A

Layer 1 (Physical)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Part of the 802.1d standard; prevents Layer 2 switching loops.

A

Spanning Tree Protocol (STP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Standard for defining VLANs on Ethernet networks.

A

802.1q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Layer 3 distance-vector routing protocol for LANs and WANs; uses split horizon and route poisoning to help avoid routing loops.
RIPv2
26
Layer 3 link-state routing protocol based on the Shortest Path First algorithm; relies on mechanisms like split horizon and route poisoning for loop prevention.
OSPF
27
What is link-state?
Link-state refers to a type of routing protocol where each router: Learns the full topology of the network. Builds a map of all routers and links. Uses algorithms (like Dijkstra’s SPF) to calculate the best path. OSPF and IS-IS. This contrasts with distance-vector protocols (like RIP), which only know the next hop and distance.
28
Primary DNS Server
Holds the original, writable copy of the DNS zone data.
29
Secondary DNS Server
Holds a read-only copy of the zone data, used to reduce load on the primary server by answering queries.
30
Zone Data
A database of DNS records for a domain, including mappings of domain names to IP addresses.
31
Secondary DNS Server
Contains a read-only copy of the zone file from the primary server; helps with load distribution, availability, and redundancy.
32
Authoritative DNS Server
Answers queries for zones it manages; can be either primary or secondary.
33
Recursive DNS Server
Resolves domain names by querying other DNS servers; does not store zone files.
34
Primary DNS Server
Holds the editable master copy of the zone records.
35
10GBase-LR
A 10 Gbps Ethernet standard designed for long-range transmissions over single-mode fiber (SMF) up to 10 km.
36
10GBase-SR
A 10 Gbps Ethernet standard for short-range transmissions over multimode fiber (MMF) up to ~300–400 meters (depending on fiber type).
37
Multimode Fiber (MMF)
Fiber optic cable with a larger core, used for short-distance communication; not suitable for 10GBase-LR.
38
Single-mode Fiber (SMF)
Fiber with a smaller core, used for long-distance transmissions like those with 10GBase-LR.
39
SFP+ Transceiver
A compact, hot-pluggable transceiver used for 10 Gbps connections; must match both the fiber type and distance requirements.
40
Channel Congestion
Occurs when multiple Wi-Fi networks use the same or overlapping channels, leading to interference and degraded performance, especially during peak hours.
41
Environmental Interference
Physical objects or appliances (e.g., microwaves, walls) that disrupt Wi-Fi signals, causing signal weakening.
42
Outdated Firmware
Old router software that may lead to bugs or inefficiencies, but usually doesn’t cause consistent signal degradation.
43
Device Interference
Interference from nearby electronics; can cause issues but typically results in irregular, not time-specific, degradation.
44
Throttling
ISP-imposed speed reduction, often during high usage or after data caps; doesn’t cause Wi-Fi signal weakening.
45
Take advantage of the existing Cat 6a lines that run to each server. Which Ethernet standard should be used to meet this requirement?
10GBase-T
46
FIN (Finish) Flag
Used to gracefully request the termination of a TCP connection, allowing systems to release resources.
47
RST (Reset) Flag
Used to abruptly terminate a TCP connection, often due to errors or unexpected packets outside an established session.
48
SYN (Synchronize) Flag
Initiates a TCP connection; sent in the first step of the three-way handshake.
49
ACK (Acknowledgment) Flag
Confirms receipt of a packet; used in the second and third steps of the TCP three-way handshake.
50
T1 Connection
A copper-based digital transmission line commonly used for voice and data.
51
Loopback Adapter
A plug used to test a network device's interface by looping the transmit and receive paths; also used for remote line testing.
52
Fiber Light Meter (Optical Power Meter)
Measures the power level of an optical signal in a fiber optic cable.
53
Cable Tester
Verifies the electrical continuity and proper wiring of twisted pair or coaxial cables; does not test interfaces.
54
Tone Generator
Used with a toner probe to trace and identify cables in a bundle or at endpoints; not used for interface testing.
55
SAML (Security Assertion Markup Language)
A protocol used to exchange authentication and authorization data between trusted parties, enabling Single Sign-On (SSO).
56
TLS (Transport Layer Security)
Provides secure communication over a network; ensures confidentiality and integrity, but not designed for auth data exchange.
57
IPsec (Internet Protocol Security)
Secures IP communications through encryption and authentication but does not manage SSO or auth data exchange.
58
SOAP (Simple Object Access Protocol)
A protocol for exchanging structured information in web services; not primarily focused on authentication or SSO.
59
To achieve detailed control over routing and address allocation, a technician should focus on
To achieve detailed control over routing and address allocation, a technician should focus on the subnet mask, which defines the size of the subnet and the number of usable host addresses. A more specific subnet mask (longer prefix) allows: Precise host allocation Efficient IP address use More granular route entries, enabling routing protocols to select the most specific path (longest prefix match).
60
A technician was replacing a client’s security device that protects their DMZ. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users cannot connect remotely to the application anymore. Which of the following devices was MOST likely misconfigured and is now causing a problem? Content filter, DNS, Firewall, DHCP
The firewall protecting the DMZ likely requires specific port forwarding or access control rules to allow external users to connect to the internal application. After replacement, those rules may not have been reconfigured properly, blocking remote access.
61
Rollover (Console) Cable
A null-modem cable with an RS-232 (DB-9) and RJ-45 connector, used to connect a terminal or PC to a router or switch’s console port.
62
RG-6 Cable
A coaxial cable used to connect cable modems or televisions.
63
Ethernet Crossover Cable
A cable used to connect two network devices directly (e.g., PC to PC) without a switch or router.
64
Straight-Through Cable
A twisted pair Ethernet cable used to connect a computer to a switch or other network device in LANs.
65
ESSID (Extended Service Set Identifier)
The unique name identifying a wireless network across multiple access points, allowing devices to connect to the correct extended network.
66
SSID (Service Set Identifier)
The basic name of a wireless network, typically associated with a single access point.
67
Tracert
A Windows network diagnostic tool that traces the path packets take to a destination, showing each hop and its response time.
68
Traceroute
The Unix/Linux/macOS version of Tracert; tracks packet paths and response delays, useful for diagnosing routing issues and failures.
69
Ping
A tool that tests connectivity and measures round-trip time between two network devices.
70
ip Command
A Linux command used to configure and manage network interfaces, replacing the deprecated ifconfig.
71
ifconfig (Deprecated)
An older Linux command for network interface configuration, now replaced by the ip command.
72
Tracert vs Traceroute
| **Tracert (Windows)** | **Traceroute (Unix/Linux/macOS)** | | ---------------------------------------- | ------------------------------------------------------ | | Windows | Unix, Linux, macOS | | Uses ICMP Echo Requests | Typically uses UDP packets (can use ICMP with options) | | Lists each hop with IP and response time | Lists each hop with IP and response time | | Diagnose path and latency to destination | Diagnose path and latency to destination | | `tracert` | `traceroute` |
73
Shielded Twisted Pair (STP)
Twisted pair cables with a protective shield to reduce electromagnetic interference (EMI), ideal for high-EMI environments.
74
Unshielded Twisted Pair (UTP)
Common twisted pair cables without shielding, susceptible to EMI.
75
Multimode Fiber Optic Cable
Fiber optic cable supporting high data rates over short to medium distances, but not specifically for EMI protection.
76
Single-mode Fiber Optic Cable
Fiber optic cable for long distances, immune to EMI, but often unnecessary for short, EMI-specific scenarios.
77
Fusion Splicer
Device used to join or repair fiber optic cables by fusing fibers together for low-loss connections.
78
Cable Crimper
Tool used to attach connectors (e.g., RJ-45) to twisted pair cables by securing wires to pins.
79
Cable Snip/Cutter
Tool used to cut copper cables into desired lengths.
80
Media Converter
Layer 1 device that connects different media types, such as copper Ethernet to fiber optic cable.
81
show vlan
Displays VLAN information, showing network segmentation on Cisco switches.
82
show interfaces
Shows interface status and statistics, but not VLAN or segmentation info.
83
802.1x with EAP-TTLS and PAP
Authentication method using 802.1x with EAP-TTLS tunneled authentication and PAP for credential validation.
84
PAP (Password Authentication Protocol)
A simple password-based protocol used in PPP for user authentication.
85
MAC Address Filtering
Controls network access by allowing or blocking devices based on their MAC hardware address.
86
WPA (Wi-Fi Protected Access)
Wireless encryption protocol supporting pre-shared keys or 802.1x; less secure than WPA2.
87
WPA2
More secure wireless encryption protocol; requires support, not compatible if only WPA is supported.
88
PKI with User Authentication (EAP-TLS)
Certificate-based authentication using public key infrastructure; not compatible with EAP-TTLS.
89
802.1x
Network access control protocol that provides port-based authentication to devices trying to connect.
90
EAP (Extensible Authentication Protocol)
A framework for transporting authentication protocols, allowing multiple methods under 802.1x.
91
EAP-TTLS (Tunneled Transport Layer Security)
An EAP method that creates a secure tunnel for credential exchange, supporting password-based auth like PAP.
92
Credential-Based Authentication
Authentication that uses username and password rather than certificates or tokens.
93
Certificate-Based Authentication
Uses digital certificates for strong identity verification instead of passwords.
94
Pre-shared Key (PSK)
A shared secret key used for authenticating clients on WPA or WPA2 wireless networks.
95
PPP (Point-to-Point Protocol)
A data link layer protocol commonly used to establish direct connections over serial links, uses PAP for authentication.
96
MAC Address
A unique hardware identifier assigned to network interfaces, used for filtering and network access control.
97
User Authentication
The process of verifying the identity of a user before granting access to network resources.
98
Tunneled Authentication
A method where authentication credentials are securely sent inside an encrypted tunnel to prevent interception.