Telecommunications and Network Security Flashcards
(289 cards)
The ____ _____ layer is the lowest layer at which meaning is assigned to the
bits that are transmitted over the network.
Data Link
Data-link protocols address things, such as?
Size of each packet of data to be sent, a means of addressing each packet so that it’s delivered to the
intended recipient, and a way to ensure that two or more nodes don’t try to
transmit data on the network at the same time.
What does the data link layer provide for the network layer?
The data
link layer provides transparent network services to the network layer so the
network layer can be ignorant about the underlying physical network topology
What kind of devices operate of the Data Link layer?
Switches, bridges,
WAPs, and NICs
The ______ ______ layer is concerned with the local delivery of frames
between devices on the same LAN.
Data Link
What are the two sublayers of the Data link layer?
Logical Link Control
and Media Access Control
What services does the Data link Media access control sublayer provide?
Multiple access protocols (CSMA/CD for Ethernet bus and hub networks or
CSMA/CA for wireless networks), MAC Addressing, LAN switching (packet
switching), Data packet queuing, Quality of Service control, and VLANs
What layer handles the task of routing network messages from one computer to
another?
Network Layer
What is a Logical Address?
Logical addresses are created and used by
Network Layer protocols, such as IP or IPX. The Network Layer protocol
translates logical addresses to MAC addresses
What are the five steps of Data Encapsulation?
1) The application,
presentation, and session layer take user input and convert it into data
2)The transport layer adds a segment header converting the data into segments
3) The network layer adds a network header and converts the segments into
packets/datagrams
4) The data link layer adds a frame header converting the
packets/datagrams into frames 5) The MAC sublayer converts the frames into
bits, which the physical layer can put on the wire
What are two important functions of the Network layer?
Logical addressing
and routing
What type of threats are there to layer 1?
Theft, Unauthorized access, Vandalism, Sniffing, Interference, Data Emanation
What are some ways to strengthen security at the Data Link Layer (Layer 2)?
Disable unused ports in order to prevent fraudulent connections which could
lead to eavesdropping, flooding attacks, or ARP spoofing. Using secure
protocols for communication (using WPA2 or WPA over WEP) and correctly
configuring VLANs
What are the four general classes of Malware?
Virus, Worm, Trojan Horse,
Spyware
What framework handles multiple connections at the same time, provides
secure authentication and encryption, and works at the network layer and
provides security on top of IP?
IPSec
What does IPSec help protect against?
Network-based attacks from untrusted
computers, attacks that can result in the DOS of applications, services, or
the network, Data corruption, Data theft, User credential theft,
Administrative control of servers, other computers, and the network
What service usually runs on port 25?
Simple Mail Transfer Protocol (SMTP)
What service usually runs on port 21?
File Transfer Protocol (FTP)
What service usually runs on port 23?
Telnet
What service usually runs on port 53?
Domain Name Service (DNS)
What is the range of the Well Known Ports?
0 through 1023
Ports from 1024 through 49151 are called?
Registered Ports
Ports from 49152 through 65535 are called?
Dynamic and/or Private Ports
What is an example of a fast packet-switching network that can be used for
either data, voice or video, but packets are of a fixed size?
Asynchronous Transfer Mode (ATM)