Test 2 Flashcards Preview

Networking > Test 2 > Flashcards

Flashcards in Test 2 Deck (86):
1

The most widely used firewall filtering method is ______________.

Stateful packet inspection (SPI)

2

How does Stateful packet inspection (SPI) treat packets?

Stateful Packet Inspection (SPI) treats different types of packets differently by spending the most resources on the riskiest packets, which are relatively few, and spending less on the more numerous, less risky packets.

3

What are the two states of Stateful packet inspection (SPI)?

Opening a connection ( conversation)
Ongoing communication afterward

4

Stateful packet Inspection (SPI) looks at a packet and compares it to what?

Access control list

5

What are the three rules of Stateful packet inspection?

1: Check to see if the port connection is 25. Allow if true, check against rule 2 if false.
2. Check against a match with a single internal host on port 80. Allow if true, check against rule 3 if false.
3. Called the 'default rule' which checks if the packet is explicitly allowed and if not drops and logs it.

6

What happens if a Stateful packet inspection decides to permit a connection?

It adds the connection to its approved connections table.

7

What are Next-Generation Firewalls (NGFWS)?

Firewalls that deeply inspect packets by looking at EACH piece of the packet.

8

Next-Generation Firewalls (NGFWS) rely on what technology to process traffic at the full speed of the lines coming into them?

Application-specific integrated circuits

9

What is the difference between antivirus and a firewall?

Firewalls work at the level of packets and groups of packets. Antivirus (AV) programs, in contrast, examine entire files.

10

What are the Limitations of Stateful Packet Inspection (SPI) Firewalls?

-Limited primarily to examining socket data
-Cannot detect what applications are actually using Port 80
-Cannot identify problems in streams of packets

11

What can Intrusion Detection System (IDS) do?

-Can detect suspicious traffic
-Log suspicious traffic
-Notify the security administrator of high-threat suspicious traffic
-Produce many false alarms that can dull vigilance

12

What is signature detection?

Looks for byte patterns that characterize individual malware programs

13

What is the problem with signature detection?

-There are now too many malware programs to test for all malware program signatures
-Also, many malware programs mutate, changing their signatures

14

Filtering packets going from the network to the outside of the network.

Egress filtering

15

Filtering packets coming from outside of the network to the inside.

Ingress filtering

16

For humans, EUI-48 addresses are expressed in _______ notation.

hexadecimal

17

Ethernet switches can provide up to _____ priority levels.

eight

18

Manageable switches can be managed by _____.

SNMP

19

Although manageable switches cost much more than non-manageable switches, this is more than made up for by _____ management costs

lower

20

802.1X __________________ can stop someone from entering the building and plug their computer into a switch or into a wall RJ-45 port, which connects to a switch.

Port Based Access Control

21

802.1X Port Based Access Control was created by the ______ WG.

802.3 WG

22

The dominant WLAN standards today are _____

802.11

23

802.11 Standards were created by the ______

IEEE 802.11 Working Group

24

The term Wi-Fi steams from the _________ which is an industry consortium of 802.11 product vendors.

Wi-Fi Alliance

25

Radios for data transmission are called _______ because they both transmit and receive.

transcievers

26

While optical fiber waves are described in terms of wavelength, radio waves are described in terms of another wave characteristic called _______.

Frequency

27

In waves, frequency is the number of complete cycles per second. One cycle per second is one ________.

Hertz

28

The most common radio frequencies are between ________ and ________

500 megahertz
10 Gigahertz

29

A transceiver must have a _____ to transmit its signal.

antenna

30

____________ antennas transmit signals equally strong in all directions and receive incoming signals equally well from all directions. These are best for short distances.

Omnidirectional

31

____________ antennas point in a particular direction, which allows them to send stronger signals in that direction. Good for longer distances.

Dish

32

The area of the sphere is proportional to the square of its radius, so signal strength in any direction weakens by an __________.

Inverse square law

33

As radio signal travels, it is partially absorbed by the air molecules, plants, and other things it passes through. This is called ___________.

absorptive attenuation

34

Multiple signals travelling different paths will interfere, so we call this type of interference __________.

Multipath interference

35

Many devices produce _____ at frequencies used in wireless data communications which create wireless interference.

Electromagnetic Interference (EMI)

36

The _______ is the range of all possible frequencies from zero hertz to infinity.

frequency spectrum

37

Regulators divide the frequency spectrum into contiguous spectrum ranges called ___________.

Spectrum Bands.

38

Service bands are subdivided further into smaller frequency ranges called ______.

Channels

39

Signals spread over a range of frequencies. This range is called the signal's _______.

Bandwidth

40

A channel also has a bandwidth. For instance, if the lowest frequency of an FM channel is 89.0 MHz and the highest frequency is 89.2 MHz, then the ___________ is .2 MHz.

Channel bandwidth

41

2.4 GHz service bands have only __ channels.

3

42

The 3 channels that the 2.4 GHz band has are ____

1, 6, 11

43

The 5 GHz service band is far wider than the 2.4 GHz with between __ and __ non-overlapping 20 MHz bands.

11; 24

44

A _______ consists of an access point and the wireless hosts it serves.

Basic service set (BSS)

45

The access point in a BSS has an identifier called the _______.

service set identifier (SSID)

46

When a host wishes to send, the host may send a ________ message to the wireless access point. This message asks the access point for permission to send messages.

request-to-send (RTS)

47

If the access point responds by broadcasting a ________ message, then other hosts must wait. The host sending the RTS may then transmit, ignoring CSMA/CA.

clear-to-send (CTS)

48

This channel bandwidth is dominant in sales today

802.11 ac

49

This channel bandwidth is dominant in installed base today

802.11n

50

______ can double, triple, or even quadruple transmission speed by sending two signal through the same channel.

MIMO (multiple input/multiple output)

51

Total _______ is substantially lower than rated speed.

Throughput

52

_________ is the number of bits that the host or access point will transmit per second according to 802.11.

Rated Speed

53

_________ throughput is shared by all users of an access point.

aggregate

54

_______ mode or personal mode was created for home use.

pre-shared key (PSK)

55

A ________ is used for a limited time between the host and the user.

session key

56

Most PSK wireless access points have a serious security vulnerability. To simplify the configuration of wireless clients so that users can connect to acess points more easily, the WIFI Alliance created _________.

Wireless Protected Setup (WPS)

57

802.1X mode is called _______ mode

Enterprise

58

A ____ access point is an unauthorized access point set up within a firm by an employee or department.

rogue

59

An _____ access point has software to impersonate a real access point.

evil twin

60

____ is a short-range radio technology designed for personal area networks (PANs).

Bluetooth

61

The switches that connect hosts to the network are called _______ switches.

Workgroup

62

The switches that connect switches to other switches are called _____ switches.

core switches

63

_______ is copper wire that carries electrical signals over copper wire pairs.

4-pair unshieled twisted pair (UTP)

64

_________ carries light signals through very thin glass tubes.

Optical fiber

65

Transmission links that connect hosts to workgroup switches are called _____ links.

access

66

Transmission links that connect switches to other switches are called ______ links.

trunk

67

Single networks use standards at the ______ layer and the ____ link layer.

physical; data

68

______ signaling has two states which may be two voltage levels or light being turned off and on.

Binary

69

____ signaling has a few states but is more expensive.

Digital

70

When other wire pairs in a wire bundle create interference, this is called ________.

Crosstalk interference

71

In fiber, the core is surrounded by a thin glass cylinder called _____.

cladding

72

Travelling different distances, signals will arrive at slightly different times is called ________

Modal dispersion

73

The strength of signal is called ______ amplitude

amplitude

74

OM4 fiber can carry signals _______ than OM3 fiber.

further

75

A company can use two or more UTP or fiber trunk links to connect a pair of switches. This is called _______.

Link aggregation

76

Ethernet requires ______ switch topology.

Heiriarchial

77

________ (RSTP) is used by Ethernet switches to detect and break loops automatically and restore the hierarchy.

Rapid Spanning Tree Protocol (RSTP)

78

______ poisoning packet is a packet that falsely tells the victim that the EUI-48 address for 1.2.3.4 is FF-FF-FF-DD-DD-DD. This is really the EUI-48 address of the hacker.

ARP Poisioning

79

Transmitting over a single pair of wires is called ______ because the bits of successive clock cycles follow one another in a series.

serial transmittion

80

If there is more than one pair carrying the transmission bits, this is called __________.

parallel transmittion

81

100BASE-TX speed is

100 Mbps

82

1000BASE-T speed is

1 Gbps

83

10GBASE-T speed is

10 Gbps

84

Wireless network standards operate at ________.

the Data Link layer

85

A wireless host sends a packet to a server on the company's wired Ethernet LAN via an access point. How many frames will be involved in this one-way transmission?

2

86

Which is usually optional in wireless access point operation?

RTS/CTS