Sybex Chp 11 Flashcards

1
Q

This layer of the OSI contains the device drivers that tell the protocol how to employ the hardware for the transmission and reception of bits.

A

Layer 1 - Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ARP resolves __________ into __________

A

ARP resolved IP Addresses into MAC Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the concern with firewalls and non-IP protocols on private networks?

A

Firewalls may not be able to inspect the packet header, address, or payload content of non-IP protocols. The firewalls must be configured to allow all or deny all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List the example(s) of Distant Vector Protocols.

OSPF
RIP
IGRP
BGP

A

The following are Distant Vector Protocols:
RIP
IGRP
BGP

OSPF is a Link State Routing Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This layer of OSI provides segmentation and sequencing.

A

Transport Layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This layer of OSI has half-duplex, full-duplex, and sinplex

A

Session Layer 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In the OSI Layer 7, is the user application (ex: MS Word) loaded into this layer?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the TCP Model and OSI Model mapping?

A

TCP Application Layer has OSI layers 7,6,5

TCP Transport Layer has OSI Layer 4 (Transport)

TCP Internet Layer has OSI Layer 3 (Network)

TCP Link Layer has OSO layers 2,1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protocols used to establish VPNs:

A

PPTP - IP only
L2F - encapsulate any LAN protocol
L2TP - encapsulate any LAN protocol
IPSec - IP only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True / False

UDP is half-duplex

A

False

UDP is Simplex Connectionless

TCP is Full-Duplex Connection-oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True / False

A TCP Wrapper serves as a basic firewall.

A

True

A TCP Wrapper serves as a basic firewall because it restricts access to ports and resources based on USER IDs or SYSTEM IDs.

TCP Wrappers is a form of port-based access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True / False

TCP has sequence numbers

A

True

TCP uses sequence numbers to rebuild original communication by reordering received segments using the sequence number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name the TCP Flags in order

A

“Unskilled Attackers Pester Real Security Folk”

URG
ACK
PSH
RST
SYN
FIN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ping of Death does what?

A

Ping of Death sends a malformed ping larger than 65,535 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Smurf Attack does what?

A

Smurf attack generates generate large amounts of traffic by spoofing broadcast pings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True / False

ARP uses caching while RARP uses broadcasting.

A

False

Both ARP and RARP use caching and broadcasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What OSI layer does Fiber Channel over Ethernet (FCoE) operate?

A

FCoE - Network Layer 3

  • used for network attached storage
  • operates at 10 Gbps
  • used to encapsulate Fiber Channel over Ethernet

iSCSI is considered a low-cost alternative

18
Q

What is Software Defined Networking?

A

SDN aims at separating the infrastructure layer from the control layer

mix and match hardware - centralized administration

-network virtualization

19
Q

What is Content Distribution Networks?

A

Collection of resource services deployed in numerous data centers across the Internet in order to provide low latency, high performance, and high availability of the hosted content.

20
Q

What is the difference between wireless infrastructure mode and wireless ad-hoc mode?

A

Ad hoc Mode means that two wireless devices can communicate without a centralized control authority (w/o an AP)

Infrastructure Mode means that wireless devices require an AP to communicate. This mode has the following:

Stand-alone: APs connected to each other (like a hub) but not to a wired connection.

Wired Extension: AP acts like a connection point to the wired network

Enterprise Extended: allows for wired roaming across multiple APs.

21
Q

Wireless security

A

SSID should be changed to something unique

SSID broadcasting should be disabled

Treat wireless as remote access (802.1X)

Treat wireless as external access (Separate wireless from wired with a firewall)

Treat wireless as an entry point for attackers (use IDS)

Require all wireless communications to be encrypted

22
Q

WPA pass-phrases are recommended to be how long?

A

14 characters or more

23
Q

Wireless omidirectional antennas should point what direction?

A

Up

Directional antennas should point in whatever direction you want.

24
Q

What is a wireless captive portal?

A

Authentication technique that redirects newly connected wireless web clients to a portal page (input logon creds, privacy policy, etc.)

25
Security aspect of Network Access Control
802. 1X is not enough 1. preadmission philosophy requires clients to be fully patched / AV etc before it is allowed to connect to the network 2. postadmission philosophy allows or denies access based on user activity, which is a predefined authorization matrix
26
True or False Firewalls can block viruses or malicious code
False
27
True or False Firewalls can prevent attacks by malicious users already behind the firewall
False
28
True or False Static Packet-Filtering Firewalls filters traffic by examining data from a messag eheader
True - these are at OSI Layer 3
29
True or False Application-level gateway firewalls are known as second-generation firewalls
True These operate at OSI Layer 7
30
True or False Circuit-level gateway firewalls are known as second-generation firewalls
True These operate at OSI Layer 5
31
True or False Stateful inspection firewalls are known as second-generation firewalls
False Stateful inspection firewalls are third-generation firewalls Operate at layer 3 and 4 of OSI
32
Collision domains are divided layer __________
Collision Domains are divided by Layer 2 Broadcasts Domains are divided by Layer 3
33
Broadcast domains are divided layer __________
Broadcasts Domains are divided by Layer 3 Collision Domains are divided by Layer 2
34
Systems on either side of a repeater, concentrator, or amplifier are part of: (same / different) Collision Domain (same / different) Broadcast Domain
Same Collision and Broadcast Domains
35
Systems on either side of a hub are part of: (same / different) Collision Domain (same / different) Broadcast Domain
Same Collision and Broadcast Domains
36
Systems on either side of a bridge are part of: (same / different) Collision Domain (same / different) Broadcast Domain
same Broadcast Domain | different Collision Domain
37
Systems on either side of a Layer 2 Switch or Brouter are part of: (same / different) Collision Domain (same / different) Broadcast Domain
same Broadcast Domain | different Collision Domain
38
Systems on either side of a Layer 3 Switch or Brouter are part of: (same / different) Collision Domain (same / different) Broadcast Domain
different Broadcast Domain | different Collision Domain
39
Systems on either side of a Router are part of: (same / different) Collision Domain (same / different) Broadcast Domain
different Broadcast Domain | different Collision Domain
40
Systems on either side of a proxy are part of: (same / different) Collision Domain (same / different) Broadcast Domain
different Broadcast Domain | different Collision Domain
41
True / False Communications over a cell provider's network are secure
False Cell Towers can be used for man-in-the-middle attacks Cell conversations can be sniffed All traffic is unencrypted at some point to be recorded (by law) - so pre-encrypt your traffic before sending it out on a telcom link.