Untitled 17 Flashcards

1
Q

__ topology e.g. Ethernet, ATM defines the rules of communication across the __ topology.

A

Logical topology (layer 2), Physical topology (layer 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

__ applies labels to packets, is commonly used to privately control international networks and is much cheaper than dedicated lines.

A

MPLS (Multi Protocol Label Switching)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

__ are asynchronous devices that provide dial-in and dial-out connections.

A

Access servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

__ are distributed series of caching web servers, designed to improve performance and availability by bring data closer to the end user.

A

CDN (Content Distribution Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

__ are the signaling protocols and __ is the packetization of your voice.

A

SIP and H.323 (which is wrapped around SIP for security), RTP (Real-time protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__ checks a system’s patches, antivirus and local firewall. If the client passes, access is granted, otherwise it is placed on an isolated VLAN where patches and antivirus updates may be provided.

A

NAC (Network Access Control). It builds on top of 802.1X.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

__ communications is where data is just sent with no need for start and stop bits. It is more efficient since there is no overhead (start/stop bits) but trasmitting and receiving stations need to be synchronized.

A

Synchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

__ communications is where data is sent by changes in levels of voltage or current in a sequential fashion. There are start and stop sequence bits.

A

Asynchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

__ DSL has the same upload and download rates.

A

SDSL (symmetric)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

__ DSL is higher download than upload. __ is much higher download than upload rates.

A

ADSL (Asymmetric), VDSL (very-high-data-rate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

__ DSL is used to provide the last mile of T1 service and uses two copper twisted pairs.

A

HDSL (high-rate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

__ extends Fibre channel to Ethernet networks.

A

FCoE (Fibre Channel over Ethernet) since FC was designed for high-performance directly attached storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__ integration is a common and phased approach for VoIP. The more long-term solution is __ integration.

A

PSTN PBX/VoIP integration: combines traditional and VoIP networks
IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

__ is a helpful network path troubleshooting tool that shows each of the nodes from a local machine to a destination.

A

traceroute, part of ICMP and built on ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

__ is a layer 2 error correction for serial connections.

A

HDLC (High-Level Data Link Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

__ is a layer 2 polling method for serial connections

A

SDLC (Synchronous Data Link Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

__ is a simple, weak authentication mechanism that sends the password in plaintext. This can be mitigated by sending a hash of the password but this is still vulnerable to a replay attack.

A

PAP (Password Authentication Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

__ is a TCP-based logon system with robust AAA, which is why Diameter came out.

A

TACACS (Terminal Access Controller Access Control System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

__ is a UDP-based logon system mostly focused on authentication and doesn’t focus much on authorization and accounting.

A

RADIUS (Remote Authentication Dial In User Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

__ is a vast improvement over WEP, requires NIC replacement and AP replacement or firmware upgrade (AES-CCMP).

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

__ is an authentication mechanism that uses challenge/response authentication and is not vulnerable to a replay attack.

A

CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

__ is an authentication mechanism, an extension to PPP and supports a variety of authentication protocols.

A

EAP (Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

__ is an IETF standard (RFC 2401) for establishing encrypted communication between users and devices. It offers sophisticated replay attack prevention and was issued as an open standard thus promoting multivendor interoperability.

A

IPsec VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

__ is an improved version of RADIUS which focuses on all three areas of AAA.

A

Diameter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
__ is an improvement over WEP (Wired Equivalent Privacy) and compatible with WEP hardware (TKIP).
WPA (Wi-Fi Protected Access)
26
__ is built on ping and used to plot the path a packet took through the network.
traceroute, part of ICMP and built on ping
27
__ is layer 2 network level authentication to authenticate a device, using MAC addresses (can be spoofed) and/or certificates.
802.1X. Using both would be ideal.
28
__ is used to find whether a given Internet host is reachable or not.
Ping, part of ICMP
29
__ layer convers bits into electrical signals or light impulses for transmission.
Physical Layer 1
30
__ of the OSI model connects the physical part of the network with the abstract part?
Data link layer 2
31
__ offers SCSI disk access via TCP/IP and is routed via IP.
iSCSI (Internet Small Computer System Interface)
32
__ or __ which are forms of __ should be used for wireless networks where we should have mutual authentication. Otherwise if just using CHAP, the server authenticates the client but the client does not authenticate the server.
LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), forms of EAP
33
__ topology (layer 1) describes how systems are connected together e.g. bus ring, star.
Physical topology (layer 1)
34
__ VPN is also known as Transport Mode.
Client-to-site VPN: provide remote access from a remote client such as a traveling sales rep or telecommuting employee.
35
__ VPN is also known as Tunnel Mode.
Site-to-site VPN: provide connectivity to networks such as headquarters and a remote office. Gateway devices are located in front of both networks.
36
__, given a MAC address, will find out what the corresponding IP address is.
RARP (Reverse Address Resolution Protocol)
37
__, given an IP address, will find out what the corresponding MAC address is.
ARP (Address Resolution Protocol), so computer can determine the next hop
38
105.255.255.255 is a Class __ __ broadcast address.
Class A directed broadcast
39
150.5.255.255 is a Class __ __ broadcast address.
Class B directed broadcast
40
802.11 supports which frequencies and speeds?
BAGN: 11,54,54,144+Mbps. 2.4,5,2.4,2.4/5
41
802.11 supports which two physical layers?
IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that's all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)
42
A __ broadcast goes to every system on the LAN
limited broadcast. Will not get routed to any other networks
43
A __ broadcast is where the entire address is set to all 1's or 255.255.255.255.
limited broadcast
44
A __ broadcast is where the host portion is set to all 1's
directed broadcast
45
A __ broadcast would be routed to every computer on the destination network.
directed broadcast
46
A __ determines the path a packet will take.
IP address
47
A __ firewall operates at layer 3.
packet filtering
48
A __ firewall operates at layer 4.
stateful filtering
49
A __ identifies a device by vendor code (first 3 bytes) and a unique identifier (last 3 bytes).
MAC address
50
A __ is a layer 3 device that connects two different networks together and moves packets between networks.
Router
51
A __ is a mapping of FCoE over the network.
vSAN
52
A __ is a path through intermediate devices and bridges where there are multiple physical connections but virtually makes a single connection.
VC (Virtual Circuit)
53
A __ is a physical topology that is not very scalable or fault tolerant since a single wire connects all of them together. If one goes down they all do.
bus. legacy Ethernet uses a bus
54
A __ is a router (inline device connecting two devices together) with a filtering capability (ruleset)
firewall
55
A __ is a single broadcast domain and defines LANs logically.
VLAN
56
A __ is always at layer 1 of the OSI model.
Bit
57
A __ is always at layer 2 of the OSI model.
Frame e.g. an Ethernet Frame
58
A __ is always at layer 4 of the OSI model.
Segment
59
A __ is information at layer 3 of the OSI model.
Packet
60
A __ is like a bus where you connect the two endpoints together
ring
61
A __ is often used to connect multiple bus networks.
tree
62
A __ is the most common physical topology. It is very fault tolerant since there are multiple paths, scalable since easy to add more connections without interrupting others and easy to troulbeshoot.
star
63
A __ is used to directly connect two similar devices (e.g. two computers, two switches, etc), otherwise there will be constant collisions.
crossover
64
A __ is used to get to the next hop.
MAC address
65
A __ is where two locations may be 20 miles apart which is good for a very local disaster (building fire). A __ is where two locations may be 200 miles apart which is best for large scale disasters.
MAN: Metropolitan Area Network, WAN: Wide Area network
66
A __ line is great because it is reserved for use however when not in use you're paying for bandwidth no one is utilizing. A __ line means you don't need to know bandwith.
Dedicated line, leased line
67
A __ NAT formally referred to as PAT.
Many to one NAT aka PAT (Port address translation)
68
A __ NAT is a set of public addresses that are mapped and is not as scalable today since computers have many connections.
pool NAT
69
A __ operates at layer 2 and can connect multiple LANs. It is useful in breaking up a large LAN into smaller LANs.
bridge
70
A __ provides block-level network file system access and is equivalent to directly attached storage (such as an IDE, SATA or SCSI drive) via a network.
SAN (Storage Area Network)
71
A __ provides file and directory access via Ethernet but there is no direct access to blocks or clusters.
NAS (Network Attached Storage)
72
A __ virtual circuit is better for small data transfers or infrequent transfers. A __ virtual circuit is better for large or frequent data transfers.
SVC (Switched Virtual Circuit), PVC (Permanent Virtual Circuit, permanently keeps connection up rather than constantly creating and tearing down connections like SVC)
73
A bridge is a layer __ device that breaks up an Ethernet domain into two different collission domains to increase performance.
Data link layer 2
74
A computer will only use DNS if a __ is not present
static host file. Every OS supports a static host file which is where the computer goes first to translate a domain to IP address.
75
A firewall without a ruleset, a firewall with an any-any ruleset, or a firewall with a default allow is a __.
Router
76
A hub operates at layer __.
Physical layer 1 since it is just re-transmitting raw data.
77
A layer __ switch can do load balancing because it is __ aware.
Layer 7, Application-aware
78
A MAC address operates at layer __.
layer 2
79
A modulator/demodulator that converts digital signals to analog signals, transmits over conventional telephone lines and then converts analog back to digital signals.
modem
80
A packet filtering firewall operates at layer __.
3
81
A proxy firewall or next gen firewall operates at layer __.
7
82
A stateful firewall operates at layer __.
4
83
A switch is a layer __ device that acts like a hub except that it probes each system and stores it's MAC address so it can send communications directly from one computer to another which increases performance and security.
Layer 2
84
A type of network that could be used by an electrical company to read meters at multiple locations in a small area without going to each location.
NAN (Neighborhood Area Network) e.g. so don't have to worry about dogs/guns when he reads the meter at a house.
85
All DSL requires a __ in the neighborhood.
POP (Point of Presence)
86
An __ is connecting from your organization to only another organization (e.g. via T1, MPLS, VPN). What can be a problem with this?
Extranet. Your security is only as good as the other organization's security e.g. Target's extranet with HVAC vendor is how the adversary go to their POS systems.
87
An example of a distance vector routing protocol where hop count is used as the metric is __
RIP (Routing Information Protocol)
88
An example of a link state routing protocol which is not subject to routing loops, is more efficient, uses multiple parameters to determine the best route and only sends an update if there's a change is __
OSPF (Open Shortest Path First)
89
An IPv6 is __ bits or __ bytes.
128-bit or 16 bytes
90
An unmanaged switch has no __ capability while a managed switch does. Both are layer __.
VLAN, Layer 2
91
Any time you enter in a domain name you need to do a __ before you get to layer 3 in the protocol stack, otherwise you won't get the IP so you won't get routing.
forward lookup or gethostbyname
92
As you go down a stack you __ a header. As you go up the stack you __ a header.
Add,Remove e.g. layer 1 processes layer 1 and then takes the header off and passes it up to layer 2
93
ATM is designed for high speed networks sending small amounts of information, using 48 byte box plus 5 byte header so it's very optimized and minimal chance of collisions. It uses layers __ and __.
Layers 2 & 3
94
Autoconfiguration embeds the __ byte __ address into the __ portion of IPv6.
6 byte MAC address into the host portion of IPv6
95
Client-to-site VPN which provides access from a remote client such as a traveling sales rep or telecommuting employee is also known as __.
Transport Mode
96
Common __ solutions are iSCSI, Fibre Channel and FCoE.
SAN
97
Convert the nibble 1101 to decimal.
13. Write each digit separate 1 1 0 1. Label number from right to left 0,1,2,3. Then put base (in this case 2) on bottom left of those numbers, multiply down, add across. 'Binary,Hex to Decimal conversion - Drawing 4A'
98
CSMA with __ is a one way link and not typically used. CSMA with __ is typically used and is where the computer monitors the line to see if another computer is transmitting, if not the computer transmits.
CSMA/CA (collision avoidance), CSMA/CD (collision detection)
99
Draw the OSI and TCP/IP models
OSI vs TCP-IP - Domain 4 pg 15' Also add hub/repeater, switch/bridge, router, firewall so I know the layers for those
100
Ethernet is a baseband or shared media where data is transmitted using __
CSMA/CD
101
Ethernet, ATM (Asynchronous Transfer Mode), HDLC (High-level data link control), ISDN (Integrated Services Digital Network) and X.25 and examples of __ which are the rules for sending signals to each other.
Logical topology
102
Even though networks are packet-based this OSI layer sets up a virtual session to make it look like we're on a circuit-switched network.
Layer 5 Session
103
Every single piece of information must have a readable unencrypted __ which routers use to determine the path.
IP header. This is why the IP protocol is often called the workhorse of the internet
104
Examples of leased lines in the US are __ and in Europe are __.
T's e.g. T1, T3 vs E's in Europe e.g. E1, E3
105
Explain the 3 way handshake
A synchronizes with B (1), B acknowledges (2), B synchronizes with A (3), A acknowledges. Syn (1), Syn/Ack (2,3), Ack (4). So it's a 4 step process but since Steps 2 & 3 are done over one packet it's a three-way handshake. '3 way handshake - drawing 4C'
106
For IPsec VPN you would primarily want to use __ for confidentiality.
ESP (Encapsulating Security Payload): protects the payload only; provides confidentiality
107
For IPsec VPN you would primarily want to use __ for integrity and authentication.
AH (Authentication Header): protects entire packet including headers; provides authentication and integrity but no confidentiality. AH used for internal tunnels.
108
For LAN transmission methods, a __ is one-to-one, a __ is one-to-many but not all, a __ is one-to-all.
Unicast, Multicast (Multi=Many), Broadcast
109
For TCP every single packet has __ bytes more than UDP.
12 bytes. TCP header is 20 bytes, UDP has 8 bytes.
110
gethostbyaddr is also known as __.
reverse lookup
111
gethostbyname is also known as __.
forward lookup
112
How do we uniquely identify a connection?
Socket pair which consists of the source/destination IPs and ports.
113
How does the Network layer know which protocol at layer 4 to hand off to?
That's the 9th byte (protocol field) in the IP header.
114
How many more bytes does IPv4 use for overhead than IPv6?
4 bytes since IPv6 header has 8 bytes overhead as opposed to 12 for IPv4. 'IPv4 vs IPv6 header overhead - Drawing 4B'
115
Hubs and switches connect computers together to create a network. __ connect hubs and switches together to move packets between those networks.
Routers
116
ICMP is a layer __ protocol.
Layer 3 Network
117
If an attacker wants to bypass DNS completely, she can modify the __.
host table aka static host file
118
If an organization is using wireless and wants mutual authentication, which could be used?
LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), EAP
119
If the sender compresses the data prior to transmission the __ layer on the receiving end would have to decompress it before the receiver could use it.
Presentation Layer 6
120
If you add security directly into the protocol stack, it would be the __ layer in OSI.
Presentation Layer 6
121
If you are running a sniffer in a switch, which traffic will you see, if any?
Anything coming from your computer, anything going to your computer and any broadcast traffic. It is INCORRECT to say that you will not see any traffic.
122
__ topology e.g. Ethernet, ATM defines the rules of communication across the __ topology.
Logical topology (layer 2), Physical topology (layer 1)
123
__ applies labels to packets, is commonly used to privately control international networks and is much cheaper than dedicated lines.
MPLS (Multi Protocol Label Switching)
124
__ are asynchronous devices that provide dial-in and dial-out connections.
Access servers
125
__ are distributed series of caching web servers, designed to improve performance and availability by bring data closer to the end user.
CDN (Content Distribution Network)
126
__ are the signaling protocols and __ is the packetization of your voice.
SIP and H.323 (which is wrapped around SIP for security), RTP (Real-time protocol)
127
__ checks a system's patches, antivirus and local firewall. If the client passes, access is granted, otherwise it is placed on an isolated VLAN where patches and antivirus updates may be provided.
NAC (Network Access Control). It builds on top of 802.1X.
128
__ communications is where data is just sent with no need for start and stop bits. It is more efficient since there is no overhead (start/stop bits) but trasmitting and receiving stations need to be synchronized.
Synchronous
129
__ communications is where data is sent by changes in levels of voltage or current in a sequential fashion. There are start and stop sequence bits.
Asynchronous
130
__ DSL has the same upload and download rates.
SDSL (symmetric)
131
__ DSL is higher download than upload. __ is much higher download than upload rates.
ADSL (Asymmetric), VDSL (very-high-data-rate)
132
__ DSL is used to provide the last mile of T1 service and uses two copper twisted pairs.
HDSL (high-rate)
133
__ extends Fibre channel to Ethernet networks.
FCoE (Fibre Channel over Ethernet) since FC was designed for high-performance directly attached storage.
134
__ integration is a common and phased approach for VoIP. The more long-term solution is __ integration.
PSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes calls
135
__ is a helpful network path troubleshooting tool that shows each of the nodes from a local machine to a destination.
traceroute, part of ICMP and built on ping
136
__ is a layer 2 error correction for serial connections.
HDLC (High-Level Data Link Control)
137
__ is a layer 2 polling method for serial connections
SDLC (Synchronous Data Link Control)
138
__ is a simple, weak authentication mechanism that sends the password in plaintext. This can be mitigated by sending a hash of the password but this is still vulnerable to a replay attack.
PAP (Password Authentication Protocol)
139
__ is a TCP-based logon system with robust AAA, which is why Diameter came out.
TACACS (Terminal Access Controller Access Control System)
140
__ is a UDP-based logon system mostly focused on authentication and doesn't focus much on authorization and accounting.
RADIUS (Remote Authentication Dial In User Service)
141
__ is a vast improvement over WEP, requires NIC replacement and AP replacement or firmware upgrade (AES-CCMP).
WPA2
142
__ is an authentication mechanism that uses challenge/response authentication and is not vulnerable to a replay attack.
CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.
143
__ is an authentication mechanism, an extension to PPP and supports a variety of authentication protocols.
EAP (Extensible Authentication Protocol
144
__ is an IETF standard (RFC 2401) for establishing encrypted communication between users and devices. It offers sophisticated replay attack prevention and was issued as an open standard thus promoting multivendor interoperability.
IPsec VPN
145
__ is an improved version of RADIUS which focuses on all three areas of AAA.
Diameter
146
__ is an improvement over WEP (Wired Equivalent Privacy) and compatible with WEP hardware (TKIP).
WPA (Wi-Fi Protected Access)
147
__ is built on ping and used to plot the path a packet took through the network.
traceroute, part of ICMP and built on ping
148
__ is layer 2 network level authentication to authenticate a device, using MAC addresses (can be spoofed) and/or certificates.
802.1X. Using both would be ideal.
149
__ is used to find whether a given Internet host is reachable or not.
Ping, part of ICMP
150
__ layer convers bits into electrical signals or light impulses for transmission.
Physical Layer 1
151
__ of the OSI model connects the physical part of the network with the abstract part?
Data link layer 2
152
__ offers SCSI disk access via TCP/IP and is routed via IP.
iSCSI (Internet Small Computer System Interface)
153
__ or __ which are forms of __ should be used for wireless networks where we should have mutual authentication. Otherwise if just using CHAP, the server authenticates the client but the client does not authenticate the server.
LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), forms of EAP
154
__ topology (layer 1) describes how systems are connected together e.g. bus ring, star.
Physical topology (layer 1)
155
__ VPN is also known as Transport Mode.
Client-to-site VPN: provide remote access from a remote client such as a traveling sales rep or telecommuting employee.
156
__ VPN is also known as Tunnel Mode.
Site-to-site VPN: provide connectivity to networks such as headquarters and a remote office. Gateway devices are located in front of both networks.
157
__, given a MAC address, will find out what the corresponding IP address is.
RARP (Reverse Address Resolution Protocol)
158
__, given an IP address, will find out what the corresponding MAC address is.
ARP (Address Resolution Protocol), so computer can determine the next hop
159
105.255.255.255 is a Class __ __ broadcast address.
Class A directed broadcast
160
150.5.255.255 is a Class __ __ broadcast address.
Class B directed broadcast
161
802.11 supports which frequencies and speeds?
BAGN: 11,54,54,144+Mbps. 2.4,5,2.4,2.4/5
162
802.11 supports which two physical layers?
IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that's all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)
163
A __ broadcast goes to every system on the LAN
limited broadcast. Will not get routed to any other networks
164
A __ broadcast is where the entire address is set to all 1's or 255.255.255.255.
limited broadcast
165
A __ broadcast is where the host portion is set to all 1's
directed broadcast
166
A __ broadcast would be routed to every computer on the destination network.
directed broadcast
167
A __ determines the path a packet will take.
IP address
168
A __ firewall operates at layer 3.
packet filtering
169
A __ firewall operates at layer 4.
stateful filtering
170
A __ identifies a device by vendor code (first 3 bytes) and a unique identifier (last 3 bytes).
MAC address
171
A __ is a layer 3 device that connects two different networks together and moves packets between networks.
Router
172
A __ is a mapping of FCoE over the network.
vSAN
173
A __ is a path through intermediate devices and bridges where there are multiple physical connections but virtually makes a single connection.
VC (Virtual Circuit)
174
A __ is a physical topology that is not very scalable or fault tolerant since a single wire connects all of them together. If one goes down they all do.
bus. legacy Ethernet uses a bus
175
A __ is a router (inline device connecting two devices together) with a filtering capability (ruleset)
firewall
176
A __ is a single broadcast domain and defines LANs logically.
VLAN
177
A __ is always at layer 1 of the OSI model.
Bit
178
A __ is always at layer 2 of the OSI model.
Frame e.g. an Ethernet Frame
179
A __ is always at layer 4 of the OSI model.
Segment
180
A __ is information at layer 3 of the OSI model.
Packet
181
A __ is like a bus where you connect the two endpoints together
ring
182
A __ is often used to connect multiple bus networks.
tree
183
A __ is the most common physical topology. It is very fault tolerant since there are multiple paths, scalable since easy to add more connections without interrupting others and easy to troulbeshoot.
star
184
A __ is used to directly connect two similar devices (e.g. two computers, two switches, etc), otherwise there will be constant collisions.
crossover
185
A __ is used to get to the next hop.
MAC address
186
A __ is where two locations may be 20 miles apart which is good for a very local disaster (building fire). A __ is where two locations may be 200 miles apart which is best for large scale disasters.
MAN: Metropolitan Area Network, WAN: Wide Area network
187
A __ line is great because it is reserved for use however when not in use you're paying for bandwidth no one is utilizing. A __ line means you don't need to know bandwith.
Dedicated line, leased line
188
A __ NAT formally referred to as PAT.
Many to one NAT aka PAT (Port address translation)
189
A __ NAT is a set of public addresses that are mapped and is not as scalable today since computers have many connections.
pool NAT
190
A __ operates at layer 2 and can connect multiple LANs. It is useful in breaking up a large LAN into smaller LANs.
bridge
191
A __ provides block-level network file system access and is equivalent to directly attached storage (such as an IDE, SATA or SCSI drive) via a network.
SAN (Storage Area Network)
192
A __ provides file and directory access via Ethernet but there is no direct access to blocks or clusters.
NAS (Network Attached Storage)
193
A __ virtual circuit is better for small data transfers or infrequent transfers. A __ virtual circuit is better for large or frequent data transfers.
SVC (Switched Virtual Circuit), PVC (Permanent Virtual Circuit, permanently keeps connection up rather than constantly creating and tearing down connections like SVC)
194
A bridge is a layer __ device that breaks up an Ethernet domain into two different collission domains to increase performance.
Data link layer 2
195
A computer will only use DNS if a __ is not present
static host file. Every OS supports a static host file which is where the computer goes first to translate a domain to IP address.
196
A firewall without a ruleset, a firewall with an any-any ruleset, or a firewall with a default allow is a __.
Router
197
A hub operates at layer __.
Physical layer 1 since it is just re-transmitting raw data.
198
A layer __ switch can do load balancing because it is __ aware.
Layer 7, Application-aware
199
A MAC address operates at layer __.
layer 2
200
A modulator/demodulator that converts digital signals to analog signals, transmits over conventional telephone lines and then converts analog back to digital signals.
modem
201
A packet filtering firewall operates at layer __.
3
202
A proxy firewall or next gen firewall operates at layer __.
7
203
A stateful firewall operates at layer __.
4
204
A switch is a layer __ device that acts like a hub except that it probes each system and stores it's MAC address so it can send communications directly from one computer to another which increases performance and security.
Layer 2
205
A type of network that could be used by an electrical company to read meters at multiple locations in a small area without going to each location.
NAN (Neighborhood Area Network) e.g. so don't have to worry about dogs/guns when he reads the meter at a house.
206
All DSL requires a __ in the neighborhood.
POP (Point of Presence)
207
An __ is connecting from your organization to only another organization (e.g. via T1, MPLS, VPN). What can be a problem with this?
Extranet. Your security is only as good as the other organization's security e.g. Target's extranet with HVAC vendor is how the adversary go to their POS systems.
208
An example of a distance vector routing protocol where hop count is used as the metric is __
RIP (Routing Information Protocol)
209
An example of a link state routing protocol which is not subject to routing loops, is more efficient, uses multiple parameters to determine the best route and only sends an update if there's a change is __
OSPF (Open Shortest Path First)
210
An IPv6 is __ bits or __ bytes.
128-bit or 16 bytes
211
An unmanaged switch has no __ capability while a managed switch does. Both are layer __.
VLAN, Layer 2
212
Any time you enter in a domain name you need to do a __ before you get to layer 3 in the protocol stack, otherwise you won't get the IP so you won't get routing.
forward lookup or gethostbyname
213
As you go down a stack you __ a header. As you go up the stack you __ a header.
Add,Remove e.g. layer 1 processes layer 1 and then takes the header off and passes it up to layer 2
214
ATM is designed for high speed networks sending small amounts of information, using 48 byte box plus 5 byte header so it's very optimized and minimal chance of collisions. It uses layers __ and __.
Layers 2 & 3
215
Autoconfiguration embeds the __ byte __ address into the __ portion of IPv6.
6 byte MAC address into the host portion of IPv6
216
Client-to-site VPN which provides access from a remote client such as a traveling sales rep or telecommuting employee is also known as __.
Transport Mode
217
Common __ solutions are iSCSI, Fibre Channel and FCoE.
SAN
218
Convert the nibble 1101 to decimal.
13. Write each digit separate 1 1 0 1. Label number from right to left 0,1,2,3. Then put base (in this case 2) on bottom left of those numbers, multiply down, add across. 'Binary,Hex to Decimal conversion - Drawing 4A'
219
CSMA with __ is a one way link and not typically used. CSMA with __ is typically used and is where the computer monitors the line to see if another computer is transmitting, if not the computer transmits.
CSMA/CA (collision avoidance), CSMA/CD (collision detection)
220
Draw the OSI and TCP/IP models
OSI vs TCP-IP - Domain 4 pg 15' Also add hub/repeater, switch/bridge, router, firewall so I know the layers for those
221
Ethernet is a baseband or shared media where data is transmitted using __
CSMA/CD
222
Ethernet, ATM (Asynchronous Transfer Mode), HDLC (High-level data link control), ISDN (Integrated Services Digital Network) and X.25 and examples of __ which are the rules for sending signals to each other.
Logical topology
223
Even though networks are packet-based this OSI layer sets up a virtual session to make it look like we're on a circuit-switched network.
Layer 5 Session
224
Every single piece of information must have a readable unencrypted __ which routers use to determine the path.
IP header. This is why the IP protocol is often called the workhorse of the internet
225
Examples of leased lines in the US are __ and in Europe are __.
T's e.g. T1, T3 vs E's in Europe e.g. E1, E3
226
Explain the 3 way handshake
A synchronizes with B (1), B acknowledges (2), B synchronizes with A (3), A acknowledges. Syn (1), Syn/Ack (2,3), Ack (4). So it's a 4 step process but since Steps 2 & 3 are done over one packet it's a three-way handshake. '3 way handshake - drawing 4C'
227
For IPsec VPN you would primarily want to use __ for confidentiality.
ESP (Encapsulating Security Payload): protects the payload only; provides confidentiality
228
For IPsec VPN you would primarily want to use __ for integrity and authentication.
AH (Authentication Header): protects entire packet including headers; provides authentication and integrity but no confidentiality. AH used for internal tunnels.
229
For LAN transmission methods, a __ is one-to-one, a __ is one-to-many but not all, a __ is one-to-all.
Unicast, Multicast (Multi=Many), Broadcast
230
For TCP every single packet has __ bytes more than UDP.
12 bytes. TCP header is 20 bytes, UDP has 8 bytes.
231
gethostbyaddr is also known as __.
reverse lookup
232
gethostbyname is also known as __.
forward lookup
233
How do we uniquely identify a connection?
Socket pair which consists of the source/destination IPs and ports.
234
How does the Network layer know which protocol at layer 4 to hand off to?
That's the 9th byte (protocol field) in the IP header.
235
How many more bytes does IPv4 use for overhead than IPv6?
4 bytes since IPv6 header has 8 bytes overhead as opposed to 12 for IPv4. 'IPv4 vs IPv6 header overhead - Drawing 4B'
236
Hubs and switches connect computers together to create a network. __ connect hubs and switches together to move packets between those networks.
Routers
237
ICMP is a layer __ protocol.
Layer 3 Network
238
If an attacker wants to bypass DNS completely, she can modify the __.
host table aka static host file
239
If an organization is using wireless and wants mutual authentication, which could be used?
LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), EAP
240
If the sender compresses the data prior to transmission the __ layer on the receiving end would have to decompress it before the receiver could use it.
Presentation Layer 6
241
If you add security directly into the protocol stack, it would be the __ layer in OSI.
Presentation Layer 6
242
If you are running a sniffer in a switch, which traffic will you see, if any?
Anything coming from your computer, anything going to your computer and any broadcast traffic. It is INCORRECT to say that you will not see any traffic.
243
__ topology e.g. Ethernet, ATM defines the rules of communication across the __ topology.
Logical topology (layer 2), Physical topology (layer 1)
244
__ applies labels to packets, is commonly used to privately control international networks and is much cheaper than dedicated lines.
MPLS (Multi Protocol Label Switching)
245
__ are asynchronous devices that provide dial-in and dial-out connections.
Access servers
246
__ are distributed series of caching web servers, designed to improve performance and availability by bring data closer to the end user.
CDN (Content Distribution Network)
247
__ are the signaling protocols and __ is the packetization of your voice.
SIP and H.323 (which is wrapped around SIP for security), RTP (Real-time protocol)
248
__ checks a system's patches, antivirus and local firewall. If the client passes, access is granted, otherwise it is placed on an isolated VLAN where patches and antivirus updates may be provided.
NAC (Network Access Control). It builds on top of 802.1X.
249
__ communications is where data is just sent with no need for start and stop bits. It is more efficient since there is no overhead (start/stop bits) but trasmitting and receiving stations need to be synchronized.
Synchronous
250
__ communications is where data is sent by changes in levels of voltage or current in a sequential fashion. There are start and stop sequence bits.
Asynchronous
251
__ DSL has the same upload and download rates.
SDSL (symmetric)
252
__ DSL is higher download than upload. __ is much higher download than upload rates.
ADSL (Asymmetric), VDSL (very-high-data-rate)
253
__ DSL is used to provide the last mile of T1 service and uses two copper twisted pairs.
HDSL (high-rate)
254
__ extends Fibre channel to Ethernet networks.
FCoE (Fibre Channel over Ethernet) since FC was designed for high-performance directly attached storage.
255
__ integration is a common and phased approach for VoIP. The more long-term solution is __ integration.
PSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes calls
256
__ is a helpful network path troubleshooting tool that shows each of the nodes from a local machine to a destination.
traceroute, part of ICMP and built on ping
257
__ is a layer 2 error correction for serial connections.
HDLC (High-Level Data Link Control)
258
__ is a layer 2 polling method for serial connections
SDLC (Synchronous Data Link Control)
259
__ is a simple, weak authentication mechanism that sends the password in plaintext. This can be mitigated by sending a hash of the password but this is still vulnerable to a replay attack.
PAP (Password Authentication Protocol)
260
__ is a TCP-based logon system with robust AAA, which is why Diameter came out.
TACACS (Terminal Access Controller Access Control System)
261
__ is a UDP-based logon system mostly focused on authentication and doesn't focus much on authorization and accounting.
RADIUS (Remote Authentication Dial In User Service)
262
__ is a vast improvement over WEP, requires NIC replacement and AP replacement or firmware upgrade (AES-CCMP).
WPA2
263
__ is an authentication mechanism that uses challenge/response authentication and is not vulnerable to a replay attack.
CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.
264
__ is an authentication mechanism, an extension to PPP and supports a variety of authentication protocols.
EAP (Extensible Authentication Protocol
265
__ is an IETF standard (RFC 2401) for establishing encrypted communication between users and devices. It offers sophisticated replay attack prevention and was issued as an open standard thus promoting multivendor interoperability.
IPsec VPN
266
__ is an improved version of RADIUS which focuses on all three areas of AAA.
Diameter
267
__ is an improvement over WEP (Wired Equivalent Privacy) and compatible with WEP hardware (TKIP).
WPA (Wi-Fi Protected Access)
268
__ is built on ping and used to plot the path a packet took through the network.
traceroute, part of ICMP and built on ping
269
__ is layer 2 network level authentication to authenticate a device, using MAC addresses (can be spoofed) and/or certificates.
802.1X. Using both would be ideal.
270
__ is used to find whether a given Internet host is reachable or not.
Ping, part of ICMP
271
__ layer convers bits into electrical signals or light impulses for transmission.
Physical Layer 1
272
__ of the OSI model connects the physical part of the network with the abstract part?
Data link layer 2
273
__ offers SCSI disk access via TCP/IP and is routed via IP.
iSCSI (Internet Small Computer System Interface)
274
__ or __ which are forms of __ should be used for wireless networks where we should have mutual authentication. Otherwise if just using CHAP, the server authenticates the client but the client does not authenticate the server.
LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), forms of EAP
275
__ topology (layer 1) describes how systems are connected together e.g. bus ring, star.
Physical topology (layer 1)
276
__ VPN is also known as Transport Mode.
Client-to-site VPN: provide remote access from a remote client such as a traveling sales rep or telecommuting employee.
277
__ VPN is also known as Tunnel Mode.
Site-to-site VPN: provide connectivity to networks such as headquarters and a remote office. Gateway devices are located in front of both networks.
278
__, given a MAC address, will find out what the corresponding IP address is.
RARP (Reverse Address Resolution Protocol)
279
__, given an IP address, will find out what the corresponding MAC address is.
ARP (Address Resolution Protocol), so computer can determine the next hop
280
105.255.255.255 is a Class __ __ broadcast address.
Class A directed broadcast
281
150.5.255.255 is a Class __ __ broadcast address.
Class B directed broadcast
282
802.11 supports which frequencies and speeds?
BAGN: 11,54,54,144+Mbps. 2.4,5,2.4,2.4/5
283
802.11 supports which two physical layers?
IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that's all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)
284
A __ broadcast goes to every system on the LAN
limited broadcast. Will not get routed to any other networks
285
A __ broadcast is where the entire address is set to all 1's or 255.255.255.255.
limited broadcast
286
A __ broadcast is where the host portion is set to all 1's
directed broadcast
287
A __ broadcast would be routed to every computer on the destination network.
directed broadcast
288
A __ determines the path a packet will take.
IP address
289
A __ firewall operates at layer 3.
packet filtering
290
A __ firewall operates at layer 4.
stateful filtering
291
A __ identifies a device by vendor code (first 3 bytes) and a unique identifier (last 3 bytes).
MAC address
292
A __ is a layer 3 device that connects two different networks together and moves packets between networks.
Router
293
A __ is a mapping of FCoE over the network.
vSAN
294
A __ is a path through intermediate devices and bridges where there are multiple physical connections but virtually makes a single connection.
VC (Virtual Circuit)
295
A __ is a physical topology that is not very scalable or fault tolerant since a single wire connects all of them together. If one goes down they all do.
bus. legacy Ethernet uses a bus
296
A __ is a router (inline device connecting two devices together) with a filtering capability (ruleset)
firewall
297
A __ is a single broadcast domain and defines LANs logically.
VLAN
298
A __ is always at layer 1 of the OSI model.
Bit
299
A __ is always at layer 2 of the OSI model.
Frame e.g. an Ethernet Frame
300
A __ is always at layer 4 of the OSI model.
Segment
301
A __ is information at layer 3 of the OSI model.
Packet
302
A __ is like a bus where you connect the two endpoints together
ring
303
A __ is often used to connect multiple bus networks.
tree
304
A __ is the most common physical topology. It is very fault tolerant since there are multiple paths, scalable since easy to add more connections without interrupting others and easy to troulbeshoot.
star
305
A __ is used to directly connect two similar devices (e.g. two computers, two switches, etc), otherwise there will be constant collisions.
crossover
306
A __ is used to get to the next hop.
MAC address
307
A __ is where two locations may be 20 miles apart which is good for a very local disaster (building fire). A __ is where two locations may be 200 miles apart which is best for large scale disasters.
MAN: Metropolitan Area Network, WAN: Wide Area network
308
A __ line is great because it is reserved for use however when not in use you're paying for bandwidth no one is utilizing. A __ line means you don't need to know bandwith.
Dedicated line, leased line
309
A __ NAT formally referred to as PAT.
Many to one NAT aka PAT (Port address translation)
310
A __ NAT is a set of public addresses that are mapped and is not as scalable today since computers have many connections.
pool NAT
311
A __ operates at layer 2 and can connect multiple LANs. It is useful in breaking up a large LAN into smaller LANs.
bridge
312
A __ provides block-level network file system access and is equivalent to directly attached storage (such as an IDE, SATA or SCSI drive) via a network.
SAN (Storage Area Network)
313
A __ provides file and directory access via Ethernet but there is no direct access to blocks or clusters.
NAS (Network Attached Storage)
314
A __ virtual circuit is better for small data transfers or infrequent transfers. A __ virtual circuit is better for large or frequent data transfers.
SVC (Switched Virtual Circuit), PVC (Permanent Virtual Circuit, permanently keeps connection up rather than constantly creating and tearing down connections like SVC)
315
A bridge is a layer __ device that breaks up an Ethernet domain into two different collission domains to increase performance.
Data link layer 2
316
A computer will only use DNS if a __ is not present
static host file. Every OS supports a static host file which is where the computer goes first to translate a domain to IP address.
317
A firewall without a ruleset, a firewall with an any-any ruleset, or a firewall with a default allow is a __.
Router
318
A hub operates at layer __.
Physical layer 1 since it is just re-transmitting raw data.
319
A layer __ switch can do load balancing because it is __ aware.
Layer 7, Application-aware
320
A MAC address operates at layer __.
layer 2
321
A modulator/demodulator that converts digital signals to analog signals, transmits over conventional telephone lines and then converts analog back to digital signals.
modem
322
A packet filtering firewall operates at layer __.
3
323
A proxy firewall or next gen firewall operates at layer __.
7
324
A stateful firewall operates at layer __.
4
325
A switch is a layer __ device that acts like a hub except that it probes each system and stores it's MAC address so it can send communications directly from one computer to another which increases performance and security.
Layer 2
326
A type of network that could be used by an electrical company to read meters at multiple locations in a small area without going to each location.
NAN (Neighborhood Area Network) e.g. so don't have to worry about dogs/guns when he reads the meter at a house.
327
All DSL requires a __ in the neighborhood.
POP (Point of Presence)
328
An __ is connecting from your organization to only another organization (e.g. via T1, MPLS, VPN). What can be a problem with this?
Extranet. Your security is only as good as the other organization's security e.g. Target's extranet with HVAC vendor is how the adversary go to their POS systems.
329
An example of a distance vector routing protocol where hop count is used as the metric is __
RIP (Routing Information Protocol)
330
An example of a link state routing protocol which is not subject to routing loops, is more efficient, uses multiple parameters to determine the best route and only sends an update if there's a change is __
OSPF (Open Shortest Path First)
331
An IPv6 is __ bits or __ bytes.
128-bit or 16 bytes
332
An unmanaged switch has no __ capability while a managed switch does. Both are layer __.
VLAN, Layer 2
333
Any time you enter in a domain name you need to do a __ before you get to layer 3 in the protocol stack, otherwise you won't get the IP so you won't get routing.
forward lookup or gethostbyname
334
As you go down a stack you __ a header. As you go up the stack you __ a header.
Add,Remove e.g. layer 1 processes layer 1 and then takes the header off and passes it up to layer 2
335
ATM is designed for high speed networks sending small amounts of information, using 48 byte box plus 5 byte header so it's very optimized and minimal chance of collisions. It uses layers __ and __.
Layers 2 & 3
336
Autoconfiguration embeds the __ byte __ address into the __ portion of IPv6.
6 byte MAC address into the host portion of IPv6
337
Client-to-site VPN which provides access from a remote client such as a traveling sales rep or telecommuting employee is also known as __.
Transport Mode
338
Common __ solutions are iSCSI, Fibre Channel and FCoE.
SAN
339
Convert the nibble 1101 to decimal.
13. Write each digit separate 1 1 0 1. Label number from right to left 0,1,2,3. Then put base (in this case 2) on bottom left of those numbers, multiply down, add across. 'Binary,Hex to Decimal conversion - Drawing 4A'
340
CSMA with __ is a one way link and not typically used. CSMA with __ is typically used and is where the computer monitors the line to see if another computer is transmitting, if not the computer transmits.
CSMA/CA (collision avoidance), CSMA/CD (collision detection)
341
Draw the OSI and TCP/IP models
OSI vs TCP-IP - Domain 4 pg 15' Also add hub/repeater, switch/bridge, router, firewall so I know the layers for those
342
Ethernet is a baseband or shared media where data is transmitted using __
CSMA/CD
343
Ethernet, ATM (Asynchronous Transfer Mode), HDLC (High-level data link control), ISDN (Integrated Services Digital Network) and X.25 and examples of __ which are the rules for sending signals to each other.
Logical topology
344
Even though networks are packet-based this OSI layer sets up a virtual session to make it look like we're on a circuit-switched network.
Layer 5 Session
345
Every single piece of information must have a readable unencrypted __ which routers use to determine the path.
IP header. This is why the IP protocol is often called the workhorse of the internet
346
Examples of leased lines in the US are __ and in Europe are __.
T's e.g. T1, T3 vs E's in Europe e.g. E1, E3
347
Explain the 3 way handshake
A synchronizes with B (1), B acknowledges (2), B synchronizes with A (3), A acknowledges. Syn (1), Syn/Ack (2,3), Ack (4). So it's a 4 step process but since Steps 2 & 3 are done over one packet it's a three-way handshake. '3 way handshake - drawing 4C'
348
For IPsec VPN you would primarily want to use __ for confidentiality.
ESP (Encapsulating Security Payload): protects the payload only; provides confidentiality
349
For IPsec VPN you would primarily want to use __ for integrity and authentication.
AH (Authentication Header): protects entire packet including headers; provides authentication and integrity but no confidentiality. AH used for internal tunnels.
350
For LAN transmission methods, a __ is one-to-one, a __ is one-to-many but not all, a __ is one-to-all.
Unicast, Multicast (Multi=Many), Broadcast
351
For TCP every single packet has __ bytes more than UDP.
12 bytes. TCP header is 20 bytes, UDP has 8 bytes.
352
gethostbyaddr is also known as __.
reverse lookup
353
gethostbyname is also known as __.
forward lookup
354
How do we uniquely identify a connection?
Socket pair which consists of the source/destination IPs and ports.
355
How does the Network layer know which protocol at layer 4 to hand off to?
That's the 9th byte (protocol field) in the IP header.
356
How many more bytes does IPv4 use for overhead than IPv6?
4 bytes since IPv6 header has 8 bytes overhead as opposed to 12 for IPv4. 'IPv4 vs IPv6 header overhead - Drawing 4B'
357
Hubs and switches connect computers together to create a network. __ connect hubs and switches together to move packets between those networks.
Routers
358
ICMP is a layer __ protocol.
Layer 3 Network
359
If an attacker wants to bypass DNS completely, she can modify the __.
host table aka static host file
360
If an organization is using wireless and wants mutual authentication, which could be used?
LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), EAP
361
If the sender compresses the data prior to transmission the __ layer on the receiving end would have to decompress it before the receiver could use it.
Presentation Layer 6
362
If you add security directly into the protocol stack, it would be the __ layer in OSI.
Presentation Layer 6
363
If you are running a sniffer in a switch, which traffic will you see, if any?
Anything coming from your computer, anything going to your computer and any broadcast traffic. It is INCORRECT to say that you will not see any traffic.
364
If you are using ESP with data transport mode, does that effect security?
Yes, you can only do layer 3 filtering, not higher level filtering since IPsec data is encrypted at layer 4 and higher so all you can see is the IP header.
365
If you have the address and are looking for the FQDC or local name you would perform the __ command.
gethostbyaddr aka forward lookup to find the FQDN (eric.sans.org) or local name (eric)
366
If you have the FQDN or local name and need the address you would perform the __ command.
gethostbyname aka forward lookup if you have the FQDN (eric.sans.org) or local name (eric)
367
If you want your IPv4 network to communicate with the v6 internet you need __.
translation: IPv4 over IPv6
368
If your network is IPv6 and the Internet is IPv4, what must you do with your gateways?
tunneling: IPv6 over IPv4
369
In __ mode, the IPsec header is after the IP header and before the TCP/UDP header.
Transport mode: between two hosts, pg 160
370
In __, a server generates a new challenge every time and combines the client's response with the password so if it is sniffed, it's a new password every time.
CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.
371
In __, the same password is used every time you authenticate so it sould be sniffed and used in a replay attack.
PAP (Password Authentication Protocol)
372
In 802.1X the __ is responsible for forwarding authentication credentials supplied by a user or a digital certificate to an authenticating entity.
Supplicant
373
__ topology e.g. Ethernet, ATM defines the rules of communication across the __ topology.
Logical topology (layer 2), Physical topology (layer 1)
374
__ applies labels to packets, is commonly used to privately control international networks and is much cheaper than dedicated lines.
MPLS (Multi Protocol Label Switching)
375
__ are asynchronous devices that provide dial-in and dial-out connections.
Access servers
376
__ are distributed series of caching web servers, designed to improve performance and availability by bring data closer to the end user.
CDN (Content Distribution Network)
377
__ are the signaling protocols and __ is the packetization of your voice.
SIP and H.323 (which is wrapped around SIP for security), RTP (Real-time protocol)
378
__ checks a system's patches, antivirus and local firewall. If the client passes, access is granted, otherwise it is placed on an isolated VLAN where patches and antivirus updates may be provided.
NAC (Network Access Control). It builds on top of 802.1X.
379
__ communications is where data is just sent with no need for start and stop bits. It is more efficient since there is no overhead (start/stop bits) but trasmitting and receiving stations need to be synchronized.
Synchronous
380
__ communications is where data is sent by changes in levels of voltage or current in a sequential fashion. There are start and stop sequence bits.
Asynchronous
381
__ DSL has the same upload and download rates.
SDSL (symmetric)
382
__ DSL is higher download than upload. __ is much higher download than upload rates.
ADSL (Asymmetric), VDSL (very-high-data-rate)
383
__ DSL is used to provide the last mile of T1 service and uses two copper twisted pairs.
HDSL (high-rate)
384
__ extends Fibre channel to Ethernet networks.
FCoE (Fibre Channel over Ethernet) since FC was designed for high-performance directly attached storage.
385
__ integration is a common and phased approach for VoIP. The more long-term solution is __ integration.
PSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes calls
386
__ is a helpful network path troubleshooting tool that shows each of the nodes from a local machine to a destination.
traceroute, part of ICMP and built on ping
387
__ is a layer 2 error correction for serial connections.
HDLC (High-Level Data Link Control)
388
__ is a layer 2 polling method for serial connections
SDLC (Synchronous Data Link Control)
389
__ is a simple, weak authentication mechanism that sends the password in plaintext. This can be mitigated by sending a hash of the password but this is still vulnerable to a replay attack.
PAP (Password Authentication Protocol)
390
__ is a TCP-based logon system with robust AAA, which is why Diameter came out.
TACACS (Terminal Access Controller Access Control System)
391
__ is a UDP-based logon system mostly focused on authentication and doesn't focus much on authorization and accounting.
RADIUS (Remote Authentication Dial In User Service)
392
__ is a vast improvement over WEP, requires NIC replacement and AP replacement or firmware upgrade (AES-CCMP).
WPA2
393
__ is an authentication mechanism that uses challenge/response authentication and is not vulnerable to a replay attack.
CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.
394
__ is an authentication mechanism, an extension to PPP and supports a variety of authentication protocols.
EAP (Extensible Authentication Protocol
395
__ is an IETF standard (RFC 2401) for establishing encrypted communication between users and devices. It offers sophisticated replay attack prevention and was issued as an open standard thus promoting multivendor interoperability.
IPsec VPN
396
__ is an improved version of RADIUS which focuses on all three areas of AAA.
Diameter
397
__ is an improvement over WEP (Wired Equivalent Privacy) and compatible with WEP hardware (TKIP).
WPA (Wi-Fi Protected Access)
398
__ is built on ping and used to plot the path a packet took through the network.
traceroute, part of ICMP and built on ping
399
__ is layer 2 network level authentication to authenticate a device, using MAC addresses (can be spoofed) and/or certificates.
802.1X. Using both would be ideal.
400
__ is used to find whether a given Internet host is reachable or not.
Ping, part of ICMP
401
__ layer convers bits into electrical signals or light impulses for transmission.
Physical Layer 1
402
__ of the OSI model connects the physical part of the network with the abstract part?
Data link layer 2
403
__ offers SCSI disk access via TCP/IP and is routed via IP.
iSCSI (Internet Small Computer System Interface)
404
__ or __ which are forms of __ should be used for wireless networks where we should have mutual authentication. Otherwise if just using CHAP, the server authenticates the client but the client does not authenticate the server.
LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), forms of EAP
405
__ topology (layer 1) describes how systems are connected together e.g. bus ring, star.
Physical topology (layer 1)
406
__ VPN is also known as Transport Mode.
Client-to-site VPN: provide remote access from a remote client such as a traveling sales rep or telecommuting employee.
407
__ VPN is also known as Tunnel Mode.
Site-to-site VPN: provide connectivity to networks such as headquarters and a remote office. Gateway devices are located in front of both networks.
408
__, given a MAC address, will find out what the corresponding IP address is.
RARP (Reverse Address Resolution Protocol)
409
__, given an IP address, will find out what the corresponding MAC address is.
ARP (Address Resolution Protocol), so computer can determine the next hop
410
105.255.255.255 is a Class __ __ broadcast address.
Class A directed broadcast
411
150.5.255.255 is a Class __ __ broadcast address.
Class B directed broadcast
412
802.11 supports which frequencies and speeds?
BAGN: 11,54,54,144+Mbps. 2.4,5,2.4,2.4/5
413
802.11 supports which two physical layers?
IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that's all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)
414
A __ broadcast goes to every system on the LAN
limited broadcast. Will not get routed to any other networks
415
A __ broadcast is where the entire address is set to all 1's or 255.255.255.255.
limited broadcast
416
A __ broadcast is where the host portion is set to all 1's
directed broadcast
417
A __ broadcast would be routed to every computer on the destination network.
directed broadcast
418
A __ determines the path a packet will take.
IP address
419
A __ firewall operates at layer 3.
packet filtering
420
A __ firewall operates at layer 4.
stateful filtering
421
A __ identifies a device by vendor code (first 3 bytes) and a unique identifier (last 3 bytes).
MAC address
422
A __ is a layer 3 device that connects two different networks together and moves packets between networks.
Router
423
A __ is a mapping of FCoE over the network.
vSAN
424
A __ is a path through intermediate devices and bridges where there are multiple physical connections but virtually makes a single connection.
VC (Virtual Circuit)
425
A __ is a physical topology that is not very scalable or fault tolerant since a single wire connects all of them together. If one goes down they all do.
bus. legacy Ethernet uses a bus
426
A __ is a router (inline device connecting two devices together) with a filtering capability (ruleset)
firewall
427
A __ is a single broadcast domain and defines LANs logically.
VLAN
428
A __ is always at layer 1 of the OSI model.
Bit
429
A __ is always at layer 2 of the OSI model.
Frame e.g. an Ethernet Frame
430
A __ is always at layer 4 of the OSI model.
Segment
431
A __ is information at layer 3 of the OSI model.
Packet
432
A __ is like a bus where you connect the two endpoints together
ring
433
A __ is often used to connect multiple bus networks.
tree
434
A __ is the most common physical topology. It is very fault tolerant since there are multiple paths, scalable since easy to add more connections without interrupting others and easy to troulbeshoot.
star
435
A __ is used to directly connect two similar devices (e.g. two computers, two switches, etc), otherwise there will be constant collisions.
crossover
436
A __ is used to get to the next hop.
MAC address
437
A __ is where two locations may be 20 miles apart which is good for a very local disaster (building fire). A __ is where two locations may be 200 miles apart which is best for large scale disasters.
MAN: Metropolitan Area Network, WAN: Wide Area network
438
A __ line is great because it is reserved for use however when not in use you're paying for bandwidth no one is utilizing. A __ line means you don't need to know bandwith.
Dedicated line, leased line
439
A __ NAT formally referred to as PAT.
Many to one NAT aka PAT (Port address translation)
440
A __ NAT is a set of public addresses that are mapped and is not as scalable today since computers have many connections.
pool NAT
441
A __ operates at layer 2 and can connect multiple LANs. It is useful in breaking up a large LAN into smaller LANs.
bridge
442
A __ provides block-level network file system access and is equivalent to directly attached storage (such as an IDE, SATA or SCSI drive) via a network.
SAN (Storage Area Network)
443
A __ provides file and directory access via Ethernet but there is no direct access to blocks or clusters.
NAS (Network Attached Storage)
444
A __ virtual circuit is better for small data transfers or infrequent transfers. A __ virtual circuit is better for large or frequent data transfers.
SVC (Switched Virtual Circuit), PVC (Permanent Virtual Circuit, permanently keeps connection up rather than constantly creating and tearing down connections like SVC)
445
A bridge is a layer __ device that breaks up an Ethernet domain into two different collission domains to increase performance.
Data link layer 2
446
A computer will only use DNS if a __ is not present
static host file. Every OS supports a static host file which is where the computer goes first to translate a domain to IP address.
447
A firewall without a ruleset, a firewall with an any-any ruleset, or a firewall with a default allow is a __.
Router
448
A hub operates at layer __.
Physical layer 1 since it is just re-transmitting raw data.
449
A layer __ switch can do load balancing because it is __ aware.
Layer 7, Application-aware
450
A MAC address operates at layer __.
layer 2
451
A modulator/demodulator that converts digital signals to analog signals, transmits over conventional telephone lines and then converts analog back to digital signals.
modem
452
A packet filtering firewall operates at layer __.
3
453
A proxy firewall or next gen firewall operates at layer __.
7
454
A stateful firewall operates at layer __.
4
455
A switch is a layer __ device that acts like a hub except that it probes each system and stores it's MAC address so it can send communications directly from one computer to another which increases performance and security.
Layer 2
456
A type of network that could be used by an electrical company to read meters at multiple locations in a small area without going to each location.
NAN (Neighborhood Area Network) e.g. so don't have to worry about dogs/guns when he reads the meter at a house.
457
All DSL requires a __ in the neighborhood.
POP (Point of Presence)
458
An __ is connecting from your organization to only another organization (e.g. via T1, MPLS, VPN). What can be a problem with this?
Extranet. Your security is only as good as the other organization's security e.g. Target's extranet with HVAC vendor is how the adversary go to their POS systems.
459
An example of a distance vector routing protocol where hop count is used as the metric is __
RIP (Routing Information Protocol)
460
An example of a link state routing protocol which is not subject to routing loops, is more efficient, uses multiple parameters to determine the best route and only sends an update if there's a change is __
OSPF (Open Shortest Path First)
461
An IPv6 is __ bits or __ bytes.
128-bit or 16 bytes
462
An unmanaged switch has no __ capability while a managed switch does. Both are layer __.
VLAN, Layer 2
463
Any time you enter in a domain name you need to do a __ before you get to layer 3 in the protocol stack, otherwise you won't get the IP so you won't get routing.
forward lookup or gethostbyname
464
As you go down a stack you __ a header. As you go up the stack you __ a header.
Add,Remove e.g. layer 1 processes layer 1 and then takes the header off and passes it up to layer 2
465
ATM is designed for high speed networks sending small amounts of information, using 48 byte box plus 5 byte header so it's very optimized and minimal chance of collisions. It uses layers __ and __.
Layers 2 & 3
466
Autoconfiguration embeds the __ byte __ address into the __ portion of IPv6.
6 byte MAC address into the host portion of IPv6
467
Client-to-site VPN which provides access from a remote client such as a traveling sales rep or telecommuting employee is also known as __.
Transport Mode
468
Common __ solutions are iSCSI, Fibre Channel and FCoE.
SAN
469
Convert the nibble 1101 to decimal.
13. Write each digit separate 1 1 0 1. Label number from right to left 0,1,2,3. Then put base (in this case 2) on bottom left of those numbers, multiply down, add across. 'Binary,Hex to Decimal conversion - Drawing 4A'
470
CSMA with __ is a one way link and not typically used. CSMA with __ is typically used and is where the computer monitors the line to see if another computer is transmitting, if not the computer transmits.
CSMA/CA (collision avoidance), CSMA/CD (collision detection)
471
Draw the OSI and TCP/IP models
OSI vs TCP-IP - Domain 4 pg 15' Also add hub/repeater, switch/bridge, router, firewall so I know the layers for those
472
Ethernet is a baseband or shared media where data is transmitted using __
CSMA/CD
473
__ topology e.g. Ethernet, ATM defines the rules of communication across the __ topology.
Logical topology (layer 2), Physical topology (layer 1)
474
__ applies labels to packets, is commonly used to privately control international networks and is much cheaper than dedicated lines.
MPLS (Multi Protocol Label Switching)
475
__ are asynchronous devices that provide dial-in and dial-out connections.
Access servers
476
__ are distributed series of caching web servers, designed to improve performance and availability by bring data closer to the end user.
CDN (Content Distribution Network)
477
__ are the signaling protocols and __ is the packetization of your voice.
SIP and H.323 (which is wrapped around SIP for security), RTP (Real-time protocol)
478
__ checks a system's patches, antivirus and local firewall. If the client passes, access is granted, otherwise it is placed on an isolated VLAN where patches and antivirus updates may be provided.
NAC (Network Access Control). It builds on top of 802.1X.
479
__ communications is where data is just sent with no need for start and stop bits. It is more efficient since there is no overhead (start/stop bits) but trasmitting and receiving stations need to be synchronized.
Synchronous
480
__ communications is where data is sent by changes in levels of voltage or current in a sequential fashion. There are start and stop sequence bits.
Asynchronous
481
__ DSL has the same upload and download rates.
SDSL (symmetric)
482
__ DSL is higher download than upload. __ is much higher download than upload rates.
ADSL (Asymmetric), VDSL (very-high-data-rate)
483
__ DSL is used to provide the last mile of T1 service and uses two copper twisted pairs.
HDSL (high-rate)
484
__ extends Fibre channel to Ethernet networks.
FCoE (Fibre Channel over Ethernet) since FC was designed for high-performance directly attached storage.
485
__ integration is a common and phased approach for VoIP. The more long-term solution is __ integration.
PSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes calls
486
__ is a helpful network path troubleshooting tool that shows each of the nodes from a local machine to a destination.
traceroute, part of ICMP and built on ping
487
__ is a layer 2 error correction for serial connections.
HDLC (High-Level Data Link Control)
488
__ is a layer 2 polling method for serial connections
SDLC (Synchronous Data Link Control)
489
__ is a simple, weak authentication mechanism that sends the password in plaintext. This can be mitigated by sending a hash of the password but this is still vulnerable to a replay attack.
PAP (Password Authentication Protocol)
490
__ is a TCP-based logon system with robust AAA, which is why Diameter came out.
TACACS (Terminal Access Controller Access Control System)
491
__ is a UDP-based logon system mostly focused on authentication and doesn't focus much on authorization and accounting.
RADIUS (Remote Authentication Dial In User Service)
492
__ is a vast improvement over WEP, requires NIC replacement and AP replacement or firmware upgrade (AES-CCMP).
WPA2
493
__ is an authentication mechanism that uses challenge/response authentication and is not vulnerable to a replay attack.
CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.
494
__ is an authentication mechanism, an extension to PPP and supports a variety of authentication protocols.
EAP (Extensible Authentication Protocol
495
__ is an IETF standard (RFC 2401) for establishing encrypted communication between users and devices. It offers sophisticated replay attack prevention and was issued as an open standard thus promoting multivendor interoperability.
IPsec VPN
496
__ is an improved version of RADIUS which focuses on all three areas of AAA.
Diameter
497
__ is an improvement over WEP (Wired Equivalent Privacy) and compatible with WEP hardware (TKIP).
WPA (Wi-Fi Protected Access)
498
__ is built on ping and used to plot the path a packet took through the network.
traceroute, part of ICMP and built on ping
499
__ is layer 2 network level authentication to authenticate a device, using MAC addresses (can be spoofed) and/or certificates.
802.1X. Using both would be ideal.
500
__ is used to find whether a given Internet host is reachable or not.
Ping, part of ICMP
501
__ layer convers bits into electrical signals or light impulses for transmission.
Physical Layer 1
502
__ of the OSI model connects the physical part of the network with the abstract part?
Data link layer 2
503
__ offers SCSI disk access via TCP/IP and is routed via IP.
iSCSI (Internet Small Computer System Interface)
504
__ or __ which are forms of __ should be used for wireless networks where we should have mutual authentication. Otherwise if just using CHAP, the server authenticates the client but the client does not authenticate the server.
LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), forms of EAP
505
__ topology (layer 1) describes how systems are connected together e.g. bus ring, star.
Physical topology (layer 1)
506
__ VPN is also known as Transport Mode.
Client-to-site VPN: provide remote access from a remote client such as a traveling sales rep or telecommuting employee.
507
__ VPN is also known as Tunnel Mode.
Site-to-site VPN: provide connectivity to networks such as headquarters and a remote office. Gateway devices are located in front of both networks.
508
__, given a MAC address, will find out what the corresponding IP address is.
RARP (Reverse Address Resolution Protocol)
509
__, given an IP address, will find out what the corresponding MAC address is.
ARP (Address Resolution Protocol), so computer can determine the next hop
510
105.255.255.255 is a Class __ __ broadcast address.
Class A directed broadcast
511
150.5.255.255 is a Class __ __ broadcast address.
Class B directed broadcast
512
802.11 supports which frequencies and speeds?
BAGN: 11,54,54,144+Mbps. 2.4,5,2.4,2.4/5
513
802.11 supports which two physical layers?
IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that's all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)
514
A __ broadcast goes to every system on the LAN
limited broadcast. Will not get routed to any other networks
515
A __ broadcast is where the entire address is set to all 1's or 255.255.255.255.
limited broadcast
516
A __ broadcast is where the host portion is set to all 1's
directed broadcast
517
A __ broadcast would be routed to every computer on the destination network.
directed broadcast
518
A __ determines the path a packet will take.
IP address
519
A __ firewall operates at layer 3.
packet filtering
520
A __ firewall operates at layer 4.
stateful filtering
521
A __ identifies a device by vendor code (first 3 bytes) and a unique identifier (last 3 bytes).
MAC address
522
A __ is a layer 3 device that connects two different networks together and moves packets between networks.
Router
523
A __ is a mapping of FCoE over the network.
vSAN
524
A __ is a path through intermediate devices and bridges where there are multiple physical connections but virtually makes a single connection.
VC (Virtual Circuit)
525
A __ is a physical topology that is not very scalable or fault tolerant since a single wire connects all of them together. If one goes down they all do.
bus. legacy Ethernet uses a bus
526
A __ is a router (inline device connecting two devices together) with a filtering capability (ruleset)
firewall
527
A __ is a single broadcast domain and defines LANs logically.
VLAN
528
A __ is always at layer 1 of the OSI model.
Bit
529
A __ is always at layer 2 of the OSI model.
Frame e.g. an Ethernet Frame
530
A __ is always at layer 4 of the OSI model.
Segment
531
A __ is information at layer 3 of the OSI model.
Packet
532
A __ is like a bus where you connect the two endpoints together
ring
533
A __ is often used to connect multiple bus networks.
tree
534
A __ is the most common physical topology. It is very fault tolerant since there are multiple paths, scalable since easy to add more connections without interrupting others and easy to troulbeshoot.
star
535
A __ is used to directly connect two similar devices (e.g. two computers, two switches, etc), otherwise there will be constant collisions.
crossover
536
A __ is used to get to the next hop.
MAC address
537
A __ is where two locations may be 20 miles apart which is good for a very local disaster (building fire). A __ is where two locations may be 200 miles apart which is best for large scale disasters.
MAN: Metropolitan Area Network, WAN: Wide Area network
538
A __ line is great because it is reserved for use however when not in use you're paying for bandwidth no one is utilizing. A __ line means you don't need to know bandwith.
Dedicated line, leased line
539
A __ NAT formally referred to as PAT.
Many to one NAT aka PAT (Port address translation)
540
A __ NAT is a set of public addresses that are mapped and is not as scalable today since computers have many connections.
pool NAT
541
A __ operates at layer 2 and can connect multiple LANs. It is useful in breaking up a large LAN into smaller LANs.
bridge
542
A __ provides block-level network file system access and is equivalent to directly attached storage (such as an IDE, SATA or SCSI drive) via a network.
SAN (Storage Area Network)
543
A __ provides file and directory access via Ethernet but there is no direct access to blocks or clusters.
NAS (Network Attached Storage)
544
A __ virtual circuit is better for small data transfers or infrequent transfers. A __ virtual circuit is better for large or frequent data transfers.
SVC (Switched Virtual Circuit), PVC (Permanent Virtual Circuit, permanently keeps connection up rather than constantly creating and tearing down connections like SVC)
545
A bridge is a layer __ device that breaks up an Ethernet domain into two different collission domains to increase performance.
Data link layer 2
546
A computer will only use DNS if a __ is not present
static host file. Every OS supports a static host file which is where the computer goes first to translate a domain to IP address.
547
A firewall without a ruleset, a firewall with an any-any ruleset, or a firewall with a default allow is a __.
Router
548
A hub operates at layer __.
Physical layer 1 since it is just re-transmitting raw data.
549
A layer __ switch can do load balancing because it is __ aware.
Layer 7, Application-aware
550
A MAC address operates at layer __.
layer 2
551
A modulator/demodulator that converts digital signals to analog signals, transmits over conventional telephone lines and then converts analog back to digital signals.
modem
552
A packet filtering firewall operates at layer __.
3
553
A proxy firewall or next gen firewall operates at layer __.
7
554
A stateful firewall operates at layer __.
4
555
A switch is a layer __ device that acts like a hub except that it probes each system and stores it's MAC address so it can send communications directly from one computer to another which increases performance and security.
Layer 2
556
A type of network that could be used by an electrical company to read meters at multiple locations in a small area without going to each location.
NAN (Neighborhood Area Network) e.g. so don't have to worry about dogs/guns when he reads the meter at a house.
557
All DSL requires a __ in the neighborhood.
POP (Point of Presence)
558
An __ is connecting from your organization to only another organization (e.g. via T1, MPLS, VPN). What can be a problem with this?
Extranet. Your security is only as good as the other organization's security e.g. Target's extranet with HVAC vendor is how the adversary go to their POS systems.
559
An example of a distance vector routing protocol where hop count is used as the metric is __
RIP (Routing Information Protocol)
560
An example of a link state routing protocol which is not subject to routing loops, is more efficient, uses multiple parameters to determine the best route and only sends an update if there's a change is __
OSPF (Open Shortest Path First)
561
An IPv6 is __ bits or __ bytes.
128-bit or 16 bytes
562
An unmanaged switch has no __ capability while a managed switch does. Both are layer __.
VLAN, Layer 2
563
Any time you enter in a domain name you need to do a __ before you get to layer 3 in the protocol stack, otherwise you won't get the IP so you won't get routing.
forward lookup or gethostbyname
564
As you go down a stack you __ a header. As you go up the stack you __ a header.
Add,Remove e.g. layer 1 processes layer 1 and then takes the header off and passes it up to layer 2
565
ATM is designed for high speed networks sending small amounts of information, using 48 byte box plus 5 byte header so it's very optimized and minimal chance of collisions. It uses layers __ and __.
Layers 2 & 3
566
Autoconfiguration embeds the __ byte __ address into the __ portion of IPv6.
6 byte MAC address into the host portion of IPv6
567
Client-to-site VPN which provides access from a remote client such as a traveling sales rep or telecommuting employee is also known as __.
Transport Mode
568
Common __ solutions are iSCSI, Fibre Channel and FCoE.
SAN
569
Convert the nibble 1101 to decimal.
13. Write each digit separate 1 1 0 1. Label number from right to left 0,1,2,3. Then put base (in this case 2) on bottom left of those numbers, multiply down, add across. 'Binary,Hex to Decimal conversion - Drawing 4A'
570
CSMA with __ is a one way link and not typically used. CSMA with __ is typically used and is where the computer monitors the line to see if another computer is transmitting, if not the computer transmits.
CSMA/CA (collision avoidance), CSMA/CD (collision detection)
571
Draw the OSI and TCP/IP models
OSI vs TCP-IP - Domain 4 pg 15' Also add hub/repeater, switch/bridge, router, firewall so I know the layers for those
572
Ethernet is a baseband or shared media where data is transmitted using __
CSMA/CD
573
__ topology e.g. Ethernet, ATM defines the rules of communication across the __ topology.
Logical topology (layer 2), Physical topology (layer 1)
574
__ applies labels to packets, is commonly used to privately control international networks and is much cheaper than dedicated lines.
MPLS (Multi Protocol Label Switching)
575
__ are asynchronous devices that provide dial-in and dial-out connections.
Access servers
576
__ are distributed series of caching web servers, designed to improve performance and availability by bring data closer to the end user.
CDN (Content Distribution Network)
577
__ are the signaling protocols and __ is the packetization of your voice.
SIP and H.323 (which is wrapped around SIP for security), RTP (Real-time protocol)
578
__ checks a system's patches, antivirus and local firewall. If the client passes, access is granted, otherwise it is placed on an isolated VLAN where patches and antivirus updates may be provided.
NAC (Network Access Control). It builds on top of 802.1X.
579
__ communications is where data is just sent with no need for start and stop bits. It is more efficient since there is no overhead (start/stop bits) but trasmitting and receiving stations need to be synchronized.
Synchronous
580
__ communications is where data is sent by changes in levels of voltage or current in a sequential fashion. There are start and stop sequence bits.
Asynchronous
581
__ DSL has the same upload and download rates.
SDSL (symmetric)
582
__ DSL is higher download than upload. __ is much higher download than upload rates.
ADSL (Asymmetric), VDSL (very-high-data-rate)
583
__ DSL is used to provide the last mile of T1 service and uses two copper twisted pairs.
HDSL (high-rate)
584
__ extends Fibre channel to Ethernet networks.
FCoE (Fibre Channel over Ethernet) since FC was designed for high-performance directly attached storage.
585
__ integration is a common and phased approach for VoIP. The more long-term solution is __ integration.
PSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes calls
586
__ is a helpful network path troubleshooting tool that shows each of the nodes from a local machine to a destination.
traceroute, part of ICMP and built on ping
587
__ is a layer 2 error correction for serial connections.
HDLC (High-Level Data Link Control)
588
__ is a layer 2 polling method for serial connections
SDLC (Synchronous Data Link Control)
589
__ is a simple, weak authentication mechanism that sends the password in plaintext. This can be mitigated by sending a hash of the password but this is still vulnerable to a replay attack.
PAP (Password Authentication Protocol)
590
__ is a TCP-based logon system with robust AAA, which is why Diameter came out.
TACACS (Terminal Access Controller Access Control System)
591
__ is a UDP-based logon system mostly focused on authentication and doesn't focus much on authorization and accounting.
RADIUS (Remote Authentication Dial In User Service)
592
__ is a vast improvement over WEP, requires NIC replacement and AP replacement or firmware upgrade (AES-CCMP).
WPA2
593
__ is an authentication mechanism that uses challenge/response authentication and is not vulnerable to a replay attack.
CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.
594
__ is an authentication mechanism, an extension to PPP and supports a variety of authentication protocols.
EAP (Extensible Authentication Protocol
595
__ is an IETF standard (RFC 2401) for establishing encrypted communication between users and devices. It offers sophisticated replay attack prevention and was issued as an open standard thus promoting multivendor interoperability.
IPsec VPN
596
__ is an improved version of RADIUS which focuses on all three areas of AAA.
Diameter
597
__ is an improvement over WEP (Wired Equivalent Privacy) and compatible with WEP hardware (TKIP).
WPA (Wi-Fi Protected Access)
598
__ is built on ping and used to plot the path a packet took through the network.
traceroute, part of ICMP and built on ping
599
__ is layer 2 network level authentication to authenticate a device, using MAC addresses (can be spoofed) and/or certificates.
802.1X. Using both would be ideal.
600
__ is used to find whether a given Internet host is reachable or not.
Ping, part of ICMP
601
__ layer convers bits into electrical signals or light impulses for transmission.
Physical Layer 1
602
__ of the OSI model connects the physical part of the network with the abstract part?
Data link layer 2
603
__ offers SCSI disk access via TCP/IP and is routed via IP.
iSCSI (Internet Small Computer System Interface)
604
__ or __ which are forms of __ should be used for wireless networks where we should have mutual authentication. Otherwise if just using CHAP, the server authenticates the client but the client does not authenticate the server.
LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), forms of EAP
605
__ topology (layer 1) describes how systems are connected together e.g. bus ring, star.
Physical topology (layer 1)
606
__ VPN is also known as Transport Mode.
Client-to-site VPN: provide remote access from a remote client such as a traveling sales rep or telecommuting employee.
607
__ VPN is also known as Tunnel Mode.
Site-to-site VPN: provide connectivity to networks such as headquarters and a remote office. Gateway devices are located in front of both networks.
608
__, given a MAC address, will find out what the corresponding IP address is.
RARP (Reverse Address Resolution Protocol)
609
__, given an IP address, will find out what the corresponding MAC address is.
ARP (Address Resolution Protocol), so computer can determine the next hop
610
105.255.255.255 is a Class __ __ broadcast address.
Class A directed broadcast
611
150.5.255.255 is a Class __ __ broadcast address.
Class B directed broadcast
612
802.11 supports which frequencies and speeds?
BAGN: 11,54,54,144+Mbps. 2.4,5,2.4,2.4/5
613
802.11 supports which two physical layers?
IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that's all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)
614
A __ broadcast goes to every system on the LAN
limited broadcast. Will not get routed to any other networks
615
A __ broadcast is where the entire address is set to all 1's or 255.255.255.255.
limited broadcast
616
A __ broadcast is where the host portion is set to all 1's
directed broadcast
617
A __ broadcast would be routed to every computer on the destination network.
directed broadcast
618
A __ determines the path a packet will take.
IP address
619
A __ firewall operates at layer 3.
packet filtering
620
A __ firewall operates at layer 4.
stateful filtering
621
A __ identifies a device by vendor code (first 3 bytes) and a unique identifier (last 3 bytes).
MAC address
622
A __ is a layer 3 device that connects two different networks together and moves packets between networks.
Router
623
A __ is a mapping of FCoE over the network.
vSAN
624
A __ is a path through intermediate devices and bridges where there are multiple physical connections but virtually makes a single connection.
VC (Virtual Circuit)
625
A __ is a physical topology that is not very scalable or fault tolerant since a single wire connects all of them together. If one goes down they all do.
bus. legacy Ethernet uses a bus
626
A __ is a router (inline device connecting two devices together) with a filtering capability (ruleset)
firewall
627
A __ is a single broadcast domain and defines LANs logically.
VLAN
628
A __ is always at layer 1 of the OSI model.
Bit
629
A __ is always at layer 2 of the OSI model.
Frame e.g. an Ethernet Frame
630
A __ is always at layer 4 of the OSI model.
Segment
631
A __ is information at layer 3 of the OSI model.
Packet
632
A __ is like a bus where you connect the two endpoints together
ring
633
A __ is often used to connect multiple bus networks.
tree
634
A __ is the most common physical topology. It is very fault tolerant since there are multiple paths, scalable since easy to add more connections without interrupting others and easy to troulbeshoot.
star
635
A __ is used to directly connect two similar devices (e.g. two computers, two switches, etc), otherwise there will be constant collisions.
crossover
636
A __ is used to get to the next hop.
MAC address
637
A __ is where two locations may be 20 miles apart which is good for a very local disaster (building fire). A __ is where two locations may be 200 miles apart which is best for large scale disasters.
MAN: Metropolitan Area Network, WAN: Wide Area network
638
A __ line is great because it is reserved for use however when not in use you're paying for bandwidth no one is utilizing. A __ line means you don't need to know bandwith.
Dedicated line, leased line
639
A __ NAT formally referred to as PAT.
Many to one NAT aka PAT (Port address translation)
640
A __ NAT is a set of public addresses that are mapped and is not as scalable today since computers have many connections.
pool NAT
641
A __ operates at layer 2 and can connect multiple LANs. It is useful in breaking up a large LAN into smaller LANs.
bridge
642
A __ provides block-level network file system access and is equivalent to directly attached storage (such as an IDE, SATA or SCSI drive) via a network.
SAN (Storage Area Network)
643
A __ provides file and directory access via Ethernet but there is no direct access to blocks or clusters.
NAS (Network Attached Storage)
644
A __ virtual circuit is better for small data transfers or infrequent transfers. A __ virtual circuit is better for large or frequent data transfers.
SVC (Switched Virtual Circuit), PVC (Permanent Virtual Circuit, permanently keeps connection up rather than constantly creating and tearing down connections like SVC)
645
A bridge is a layer __ device that breaks up an Ethernet domain into two different collission domains to increase performance.
Data link layer 2
646
A computer will only use DNS if a __ is not present
static host file. Every OS supports a static host file which is where the computer goes first to translate a domain to IP address.
647
A firewall without a ruleset, a firewall with an any-any ruleset, or a firewall with a default allow is a __.
Router
648
A hub operates at layer __.
Physical layer 1 since it is just re-transmitting raw data.
649
A layer __ switch can do load balancing because it is __ aware.
Layer 7, Application-aware
650
A MAC address operates at layer __.
layer 2
651
A modulator/demodulator that converts digital signals to analog signals, transmits over conventional telephone lines and then converts analog back to digital signals.
modem
652
A packet filtering firewall operates at layer __.
3
653
A proxy firewall or next gen firewall operates at layer __.
7
654
A stateful firewall operates at layer __.
4
655
A switch is a layer __ device that acts like a hub except that it probes each system and stores it's MAC address so it can send communications directly from one computer to another which increases performance and security.
Layer 2
656
A type of network that could be used by an electrical company to read meters at multiple locations in a small area without going to each location.
NAN (Neighborhood Area Network) e.g. so don't have to worry about dogs/guns when he reads the meter at a house.
657
All DSL requires a __ in the neighborhood.
POP (Point of Presence)
658
An __ is connecting from your organization to only another organization (e.g. via T1, MPLS, VPN). What can be a problem with this?
Extranet. Your security is only as good as the other organization's security e.g. Target's extranet with HVAC vendor is how the adversary go to their POS systems.
659
An example of a distance vector routing protocol where hop count is used as the metric is __
RIP (Routing Information Protocol)
660
An example of a link state routing protocol which is not subject to routing loops, is more efficient, uses multiple parameters to determine the best route and only sends an update if there's a change is __
OSPF (Open Shortest Path First)
661
An IPv6 is __ bits or __ bytes.
128-bit or 16 bytes
662
An unmanaged switch has no __ capability while a managed switch does. Both are layer __.
VLAN, Layer 2
663
Any time you enter in a domain name you need to do a __ before you get to layer 3 in the protocol stack, otherwise you won't get the IP so you won't get routing.
forward lookup or gethostbyname
664
As you go down a stack you __ a header. As you go up the stack you __ a header.
Add,Remove e.g. layer 1 processes layer 1 and then takes the header off and passes it up to layer 2
665
ATM is designed for high speed networks sending small amounts of information, using 48 byte box plus 5 byte header so it's very optimized and minimal chance of collisions. It uses layers __ and __.
Layers 2 & 3
666
Autoconfiguration embeds the __ byte __ address into the __ portion of IPv6.
6 byte MAC address into the host portion of IPv6
667
Client-to-site VPN which provides access from a remote client such as a traveling sales rep or telecommuting employee is also known as __.
Transport Mode
668
Common __ solutions are iSCSI, Fibre Channel and FCoE.
SAN
669
Convert the nibble 1101 to decimal.
13. Write each digit separate 1 1 0 1. Label number from right to left 0,1,2,3. Then put base (in this case 2) on bottom left of those numbers, multiply down, add across. 'Binary,Hex to Decimal conversion - Drawing 4A'
670
CSMA with __ is a one way link and not typically used. CSMA with __ is typically used and is where the computer monitors the line to see if another computer is transmitting, if not the computer transmits.
CSMA/CA (collision avoidance), CSMA/CD (collision detection)
671
Draw the OSI and TCP/IP models
OSI vs TCP-IP - Domain 4 pg 15' Also add hub/repeater, switch/bridge, router, firewall so I know the layers for those
672
Ethernet is a baseband or shared media where data is transmitted using __
CSMA/CD
673
__ topology e.g. Ethernet, ATM defines the rules of communication across the __ topology.
Logical topology (layer 2), Physical topology (layer 1)
674
__ applies labels to packets, is commonly used to privately control international networks and is much cheaper than dedicated lines.
MPLS (Multi Protocol Label Switching)
675
__ are asynchronous devices that provide dial-in and dial-out connections.
Access servers
676
__ are distributed series of caching web servers, designed to improve performance and availability by bring data closer to the end user.
CDN (Content Distribution Network)
677
__ are the signaling protocols and __ is the packetization of your voice.
SIP and H.323 (which is wrapped around SIP for security), RTP (Real-time protocol)
678
__ checks a system's patches, antivirus and local firewall. If the client passes, access is granted, otherwise it is placed on an isolated VLAN where patches and antivirus updates may be provided.
NAC (Network Access Control). It builds on top of 802.1X.
679
__ communications is where data is just sent with no need for start and stop bits. It is more efficient since there is no overhead (start/stop bits) but trasmitting and receiving stations need to be synchronized.
Synchronous
680
__ communications is where data is sent by changes in levels of voltage or current in a sequential fashion. There are start and stop sequence bits.
Asynchronous
681
__ DSL has the same upload and download rates.
SDSL (symmetric)
682
__ DSL is higher download than upload. __ is much higher download than upload rates.
ADSL (Asymmetric), VDSL (very-high-data-rate)
683
__ DSL is used to provide the last mile of T1 service and uses two copper twisted pairs.
HDSL (high-rate)
684
__ extends Fibre channel to Ethernet networks.
FCoE (Fibre Channel over Ethernet) since FC was designed for high-performance directly attached storage.
685
__ integration is a common and phased approach for VoIP. The more long-term solution is __ integration.
PSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes calls
686
__ is a helpful network path troubleshooting tool that shows each of the nodes from a local machine to a destination.
traceroute, part of ICMP and built on ping
687
__ is a layer 2 error correction for serial connections.
HDLC (High-Level Data Link Control)
688
__ is a layer 2 polling method for serial connections
SDLC (Synchronous Data Link Control)
689
__ is a simple, weak authentication mechanism that sends the password in plaintext. This can be mitigated by sending a hash of the password but this is still vulnerable to a replay attack.
PAP (Password Authentication Protocol)
690
__ is a TCP-based logon system with robust AAA, which is why Diameter came out.
TACACS (Terminal Access Controller Access Control System)
691
__ is a UDP-based logon system mostly focused on authentication and doesn't focus much on authorization and accounting.
RADIUS (Remote Authentication Dial In User Service)
692
__ is a vast improvement over WEP, requires NIC replacement and AP replacement or firmware upgrade (AES-CCMP).
WPA2
693
__ is an authentication mechanism that uses challenge/response authentication and is not vulnerable to a replay attack.
CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.
694
__ is an authentication mechanism, an extension to PPP and supports a variety of authentication protocols.
EAP (Extensible Authentication Protocol
695
__ is an IETF standard (RFC 2401) for establishing encrypted communication between users and devices. It offers sophisticated replay attack prevention and was issued as an open standard thus promoting multivendor interoperability.
IPsec VPN
696
__ is an improved version of RADIUS which focuses on all three areas of AAA.
Diameter
697
__ is an improvement over WEP (Wired Equivalent Privacy) and compatible with WEP hardware (TKIP).
WPA (Wi-Fi Protected Access)
698
__ is built on ping and used to plot the path a packet took through the network.
traceroute, part of ICMP and built on ping
699
__ is layer 2 network level authentication to authenticate a device, using MAC addresses (can be spoofed) and/or certificates.
802.1X. Using both would be ideal.
700
__ is used to find whether a given Internet host is reachable or not.
Ping, part of ICMP
701
__ layer convers bits into electrical signals or light impulses for transmission.
Physical Layer 1
702
__ of the OSI model connects the physical part of the network with the abstract part?
Data link layer 2
703
__ offers SCSI disk access via TCP/IP and is routed via IP.
iSCSI (Internet Small Computer System Interface)
704
__ or __ which are forms of __ should be used for wireless networks where we should have mutual authentication. Otherwise if just using CHAP, the server authenticates the client but the client does not authenticate the server.
LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), forms of EAP
705
__ topology (layer 1) describes how systems are connected together e.g. bus ring, star.
Physical topology (layer 1)
706
__ VPN is also known as Transport Mode.
Client-to-site VPN: provide remote access from a remote client such as a traveling sales rep or telecommuting employee.
707
__ VPN is also known as Tunnel Mode.
Site-to-site VPN: provide connectivity to networks such as headquarters and a remote office. Gateway devices are located in front of both networks.
708
__, given a MAC address, will find out what the corresponding IP address is.
RARP (Reverse Address Resolution Protocol)
709
__, given an IP address, will find out what the corresponding MAC address is.
ARP (Address Resolution Protocol), so computer can determine the next hop
710
105.255.255.255 is a Class __ __ broadcast address.
Class A directed broadcast
711
150.5.255.255 is a Class __ __ broadcast address.
Class B directed broadcast
712
802.11 supports which frequencies and speeds?
BAGN: 11,54,54,144+Mbps. 2.4,5,2.4,2.4/5
713
802.11 supports which two physical layers?
IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that's all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)
714
A __ broadcast goes to every system on the LAN
limited broadcast. Will not get routed to any other networks
715
A __ broadcast is where the entire address is set to all 1's or 255.255.255.255.
limited broadcast
716
A __ broadcast is where the host portion is set to all 1's
directed broadcast
717
A __ broadcast would be routed to every computer on the destination network.
directed broadcast
718
A __ determines the path a packet will take.
IP address
719
A __ firewall operates at layer 3.
packet filtering
720
A __ firewall operates at layer 4.
stateful filtering
721
A __ identifies a device by vendor code (first 3 bytes) and a unique identifier (last 3 bytes).
MAC address
722
A __ is a layer 3 device that connects two different networks together and moves packets between networks.
Router
723
A __ is a mapping of FCoE over the network.
vSAN
724
A __ is a path through intermediate devices and bridges where there are multiple physical connections but virtually makes a single connection.
VC (Virtual Circuit)
725
A __ is a physical topology that is not very scalable or fault tolerant since a single wire connects all of them together. If one goes down they all do.
bus. legacy Ethernet uses a bus
726
A __ is a router (inline device connecting two devices together) with a filtering capability (ruleset)
firewall
727
A __ is a single broadcast domain and defines LANs logically.
VLAN
728
A __ is always at layer 1 of the OSI model.
Bit
729
A __ is always at layer 2 of the OSI model.
Frame e.g. an Ethernet Frame
730
A __ is always at layer 4 of the OSI model.
Segment
731
A __ is information at layer 3 of the OSI model.
Packet
732
A __ is like a bus where you connect the two endpoints together
ring
733
A __ is often used to connect multiple bus networks.
tree
734
A __ is the most common physical topology. It is very fault tolerant since there are multiple paths, scalable since easy to add more connections without interrupting others and easy to troulbeshoot.
star
735
A __ is used to directly connect two similar devices (e.g. two computers, two switches, etc), otherwise there will be constant collisions.
crossover
736
A __ is used to get to the next hop.
MAC address
737
A __ is where two locations may be 20 miles apart which is good for a very local disaster (building fire). A __ is where two locations may be 200 miles apart which is best for large scale disasters.
MAN: Metropolitan Area Network, WAN: Wide Area network
738
A __ line is great because it is reserved for use however when not in use you're paying for bandwidth no one is utilizing. A __ line means you don't need to know bandwith.
Dedicated line, leased line
739
A __ NAT formally referred to as PAT.
Many to one NAT aka PAT (Port address translation)
740
A __ NAT is a set of public addresses that are mapped and is not as scalable today since computers have many connections.
pool NAT
741
A __ operates at layer 2 and can connect multiple LANs. It is useful in breaking up a large LAN into smaller LANs.
bridge
742
A __ provides block-level network file system access and is equivalent to directly attached storage (such as an IDE, SATA or SCSI drive) via a network.
SAN (Storage Area Network)
743
A __ provides file and directory access via Ethernet but there is no direct access to blocks or clusters.
NAS (Network Attached Storage)
744
A __ virtual circuit is better for small data transfers or infrequent transfers. A __ virtual circuit is better for large or frequent data transfers.
SVC (Switched Virtual Circuit), PVC (Permanent Virtual Circuit, permanently keeps connection up rather than constantly creating and tearing down connections like SVC)
745
A bridge is a layer __ device that breaks up an Ethernet domain into two different collission domains to increase performance.
Data link layer 2
746
A computer will only use DNS if a __ is not present
static host file. Every OS supports a static host file which is where the computer goes first to translate a domain to IP address.
747
A firewall without a ruleset, a firewall with an any-any ruleset, or a firewall with a default allow is a __.
Router
748
A hub operates at layer __.
Physical layer 1 since it is just re-transmitting raw data.
749
A layer __ switch can do load balancing because it is __ aware.
Layer 7, Application-aware
750
A MAC address operates at layer __.
layer 2
751
A modulator/demodulator that converts digital signals to analog signals, transmits over conventional telephone lines and then converts analog back to digital signals.
modem
752
A packet filtering firewall operates at layer __.
3
753
A proxy firewall or next gen firewall operates at layer __.
7
754
A stateful firewall operates at layer __.
4
755
A switch is a layer __ device that acts like a hub except that it probes each system and stores it's MAC address so it can send communications directly from one computer to another which increases performance and security.
Layer 2
756
A type of network that could be used by an electrical company to read meters at multiple locations in a small area without going to each location.
NAN (Neighborhood Area Network) e.g. so don't have to worry about dogs/guns when he reads the meter at a house.
757
All DSL requires a __ in the neighborhood.
POP (Point of Presence)
758
An __ is connecting from your organization to only another organization (e.g. via T1, MPLS, VPN). What can be a problem with this?
Extranet. Your security is only as good as the other organization's security e.g. Target's extranet with HVAC vendor is how the adversary go to their POS systems.
759
An example of a distance vector routing protocol where hop count is used as the metric is __
RIP (Routing Information Protocol)
760
An example of a link state routing protocol which is not subject to routing loops, is more efficient, uses multiple parameters to determine the best route and only sends an update if there's a change is __
OSPF (Open Shortest Path First)
761
An IPv6 is __ bits or __ bytes.
128-bit or 16 bytes
762
An unmanaged switch has no __ capability while a managed switch does. Both are layer __.
VLAN, Layer 2
763
Any time you enter in a domain name you need to do a __ before you get to layer 3 in the protocol stack, otherwise you won't get the IP so you won't get routing.
forward lookup or gethostbyname
764
As you go down a stack you __ a header. As you go up the stack you __ a header.
Add,Remove e.g. layer 1 processes layer 1 and then takes the header off and passes it up to layer 2
765
ATM is designed for high speed networks sending small amounts of information, using 48 byte box plus 5 byte header so it's very optimized and minimal chance of collisions. It uses layers __ and __.
Layers 2 & 3
766
Autoconfiguration embeds the __ byte __ address into the __ portion of IPv6.
6 byte MAC address into the host portion of IPv6
767
Client-to-site VPN which provides access from a remote client such as a traveling sales rep or telecommuting employee is also known as __.
Transport Mode
768
Common __ solutions are iSCSI, Fibre Channel and FCoE.
SAN
769
Convert the nibble 1101 to decimal.
13. Write each digit separate 1 1 0 1. Label number from right to left 0,1,2,3. Then put base (in this case 2) on bottom left of those numbers, multiply down, add across. 'Binary,Hex to Decimal conversion - Drawing 4A'
770
CSMA with __ is a one way link and not typically used. CSMA with __ is typically used and is where the computer monitors the line to see if another computer is transmitting, if not the computer transmits.
CSMA/CA (collision avoidance), CSMA/CD (collision detection)
771
Draw the OSI and TCP/IP models
OSI vs TCP-IP - Domain 4 pg 15' Also add hub/repeater, switch/bridge, router, firewall so I know the layers for those
772
Ethernet is a baseband or shared media where data is transmitted using __
CSMA/CD
773
__ topology e.g. Ethernet, ATM defines the rules of communication across the __ topology.
Logical topology (layer 2), Physical topology (layer 1)
774
__ applies labels to packets, is commonly used to privately control international networks and is much cheaper than dedicated lines.
MPLS (Multi Protocol Label Switching)
775
__ are asynchronous devices that provide dial-in and dial-out connections.
Access servers
776
__ are distributed series of caching web servers, designed to improve performance and availability by bring data closer to the end user.
CDN (Content Distribution Network)
777
__ are the signaling protocols and __ is the packetization of your voice.
SIP and H.323 (which is wrapped around SIP for security), RTP (Real-time protocol)
778
__ checks a system's patches, antivirus and local firewall. If the client passes, access is granted, otherwise it is placed on an isolated VLAN where patches and antivirus updates may be provided.
NAC (Network Access Control). It builds on top of 802.1X.
779
__ communications is where data is just sent with no need for start and stop bits. It is more efficient since there is no overhead (start/stop bits) but trasmitting and receiving stations need to be synchronized.
Synchronous
780
__ communications is where data is sent by changes in levels of voltage or current in a sequential fashion. There are start and stop sequence bits.
Asynchronous
781
__ DSL has the same upload and download rates.
SDSL (symmetric)
782
__ DSL is higher download than upload. __ is much higher download than upload rates.
ADSL (Asymmetric), VDSL (very-high-data-rate)
783
__ DSL is used to provide the last mile of T1 service and uses two copper twisted pairs.
HDSL (high-rate)
784
__ extends Fibre channel to Ethernet networks.
FCoE (Fibre Channel over Ethernet) since FC was designed for high-performance directly attached storage.
785
__ integration is a common and phased approach for VoIP. The more long-term solution is __ integration.
PSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes calls
786
__ is a helpful network path troubleshooting tool that shows each of the nodes from a local machine to a destination.
traceroute, part of ICMP and built on ping
787
__ is a layer 2 error correction for serial connections.
HDLC (High-Level Data Link Control)
788
__ is a layer 2 polling method for serial connections
SDLC (Synchronous Data Link Control)
789
__ is a simple, weak authentication mechanism that sends the password in plaintext. This can be mitigated by sending a hash of the password but this is still vulnerable to a replay attack.
PAP (Password Authentication Protocol)
790
__ is a TCP-based logon system with robust AAA, which is why Diameter came out.
TACACS (Terminal Access Controller Access Control System)
791
__ is a UDP-based logon system mostly focused on authentication and doesn't focus much on authorization and accounting.
RADIUS (Remote Authentication Dial In User Service)
792
__ is a vast improvement over WEP, requires NIC replacement and AP replacement or firmware upgrade (AES-CCMP).
WPA2
793
__ is an authentication mechanism that uses challenge/response authentication and is not vulnerable to a replay attack.
CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.
794
__ is an authentication mechanism, an extension to PPP and supports a variety of authentication protocols.
EAP (Extensible Authentication Protocol
795
__ is an IETF standard (RFC 2401) for establishing encrypted communication between users and devices. It offers sophisticated replay attack prevention and was issued as an open standard thus promoting multivendor interoperability.
IPsec VPN
796
__ is an improved version of RADIUS which focuses on all three areas of AAA.
Diameter
797
__ is an improvement over WEP (Wired Equivalent Privacy) and compatible with WEP hardware (TKIP).
WPA (Wi-Fi Protected Access)
798
__ is built on ping and used to plot the path a packet took through the network.
traceroute, part of ICMP and built on ping
799
__ is layer 2 network level authentication to authenticate a device, using MAC addresses (can be spoofed) and/or certificates.
802.1X. Using both would be ideal.
800
__ is used to find whether a given Internet host is reachable or not.
Ping, part of ICMP
801
__ layer convers bits into electrical signals or light impulses for transmission.
Physical Layer 1
802
__ of the OSI model connects the physical part of the network with the abstract part?
Data link layer 2
803
__ offers SCSI disk access via TCP/IP and is routed via IP.
iSCSI (Internet Small Computer System Interface)
804
__ or __ which are forms of __ should be used for wireless networks where we should have mutual authentication. Otherwise if just using CHAP, the server authenticates the client but the client does not authenticate the server.
LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), forms of EAP
805
__ topology (layer 1) describes how systems are connected together e.g. bus ring, star.
Physical topology (layer 1)
806
__ VPN is also known as Transport Mode.
Client-to-site VPN: provide remote access from a remote client such as a traveling sales rep or telecommuting employee.
807
__ VPN is also known as Tunnel Mode.
Site-to-site VPN: provide connectivity to networks such as headquarters and a remote office. Gateway devices are located in front of both networks.
808
__, given a MAC address, will find out what the corresponding IP address is.
RARP (Reverse Address Resolution Protocol)
809
__, given an IP address, will find out what the corresponding MAC address is.
ARP (Address Resolution Protocol), so computer can determine the next hop
810
105.255.255.255 is a Class __ __ broadcast address.
Class A directed broadcast
811
150.5.255.255 is a Class __ __ broadcast address.
Class B directed broadcast
812
802.11 supports which frequencies and speeds?
BAGN: 11,54,54,144+Mbps. 2.4,5,2.4,2.4/5
813
802.11 supports which two physical layers?
IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that's all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)
814
A __ broadcast goes to every system on the LAN
limited broadcast. Will not get routed to any other networks
815
A __ broadcast is where the entire address is set to all 1's or 255.255.255.255.
limited broadcast
816
A __ broadcast is where the host portion is set to all 1's
directed broadcast
817
A __ broadcast would be routed to every computer on the destination network.
directed broadcast
818
A __ determines the path a packet will take.
IP address
819
A __ firewall operates at layer 3.
packet filtering
820
A __ firewall operates at layer 4.
stateful filtering
821
A __ identifies a device by vendor code (first 3 bytes) and a unique identifier (last 3 bytes).
MAC address
822
A __ is a layer 3 device that connects two different networks together and moves packets between networks.
Router
823
A __ is a mapping of FCoE over the network.
vSAN
824
A __ is a path through intermediate devices and bridges where there are multiple physical connections but virtually makes a single connection.
VC (Virtual Circuit)
825
A __ is a physical topology that is not very scalable or fault tolerant since a single wire connects all of them together. If one goes down they all do.
bus. legacy Ethernet uses a bus
826
A __ is a router (inline device connecting two devices together) with a filtering capability (ruleset)
firewall
827
A __ is a single broadcast domain and defines LANs logically.
VLAN
828
A __ is always at layer 1 of the OSI model.
Bit
829
A __ is always at layer 2 of the OSI model.
Frame e.g. an Ethernet Frame
830
A __ is always at layer 4 of the OSI model.
Segment
831
A __ is information at layer 3 of the OSI model.
Packet
832
A __ is like a bus where you connect the two endpoints together
ring
833
A __ is often used to connect multiple bus networks.
tree
834
A __ is the most common physical topology. It is very fault tolerant since there are multiple paths, scalable since easy to add more connections without interrupting others and easy to troulbeshoot.
star
835
A __ is used to directly connect two similar devices (e.g. two computers, two switches, etc), otherwise there will be constant collisions.
crossover
836
A __ is used to get to the next hop.
MAC address
837
A __ is where two locations may be 20 miles apart which is good for a very local disaster (building fire). A __ is where two locations may be 200 miles apart which is best for large scale disasters.
MAN: Metropolitan Area Network, WAN: Wide Area network
838
A __ line is great because it is reserved for use however when not in use you're paying for bandwidth no one is utilizing. A __ line means you don't need to know bandwith.
Dedicated line, leased line
839
A __ NAT formally referred to as PAT.
Many to one NAT aka PAT (Port address translation)
840
A __ NAT is a set of public addresses that are mapped and is not as scalable today since computers have many connections.
pool NAT
841
A __ operates at layer 2 and can connect multiple LANs. It is useful in breaking up a large LAN into smaller LANs.
bridge
842
A __ provides block-level network file system access and is equivalent to directly attached storage (such as an IDE, SATA or SCSI drive) via a network.
SAN (Storage Area Network)
843
A __ provides file and directory access via Ethernet but there is no direct access to blocks or clusters.
NAS (Network Attached Storage)
844
A __ virtual circuit is better for small data transfers or infrequent transfers. A __ virtual circuit is better for large or frequent data transfers.
SVC (Switched Virtual Circuit), PVC (Permanent Virtual Circuit, permanently keeps connection up rather than constantly creating and tearing down connections like SVC)
845
A bridge is a layer __ device that breaks up an Ethernet domain into two different collission domains to increase performance.
Data link layer 2
846
A computer will only use DNS if a __ is not present
static host file. Every OS supports a static host file which is where the computer goes first to translate a domain to IP address.
847
A firewall without a ruleset, a firewall with an any-any ruleset, or a firewall with a default allow is a __.
Router
848
A hub operates at layer __.
Physical layer 1 since it is just re-transmitting raw data.
849
A layer __ switch can do load balancing because it is __ aware.
Layer 7, Application-aware
850
A MAC address operates at layer __.
layer 2
851
A modulator/demodulator that converts digital signals to analog signals, transmits over conventional telephone lines and then converts analog back to digital signals.
modem
852
A packet filtering firewall operates at layer __.
3
853
A proxy firewall or next gen firewall operates at layer __.
7
854
A stateful firewall operates at layer __.
4
855
A switch is a layer __ device that acts like a hub except that it probes each system and stores it's MAC address so it can send communications directly from one computer to another which increases performance and security.
Layer 2
856
A type of network that could be used by an electrical company to read meters at multiple locations in a small area without going to each location.
NAN (Neighborhood Area Network) e.g. so don't have to worry about dogs/guns when he reads the meter at a house.
857
All DSL requires a __ in the neighborhood.
POP (Point of Presence)
858
An __ is connecting from your organization to only another organization (e.g. via T1, MPLS, VPN). What can be a problem with this?
Extranet. Your security is only as good as the other organization's security e.g. Target's extranet with HVAC vendor is how the adversary go to their POS systems.
859
An example of a distance vector routing protocol where hop count is used as the metric is __
RIP (Routing Information Protocol)
860
An example of a link state routing protocol which is not subject to routing loops, is more efficient, uses multiple parameters to determine the best route and only sends an update if there's a change is __
OSPF (Open Shortest Path First)
861
An IPv6 is __ bits or __ bytes.
128-bit or 16 bytes
862
An unmanaged switch has no __ capability while a managed switch does. Both are layer __.
VLAN, Layer 2
863
Any time you enter in a domain name you need to do a __ before you get to layer 3 in the protocol stack, otherwise you won't get the IP so you won't get routing.
forward lookup or gethostbyname
864
As you go down a stack you __ a header. As you go up the stack you __ a header.
Add,Remove e.g. layer 1 processes layer 1 and then takes the header off and passes it up to layer 2
865
ATM is designed for high speed networks sending small amounts of information, using 48 byte box plus 5 byte header so it's very optimized and minimal chance of collisions. It uses layers __ and __.
Layers 2 & 3
866
Autoconfiguration embeds the __ byte __ address into the __ portion of IPv6.
6 byte MAC address into the host portion of IPv6
867
Client-to-site VPN which provides access from a remote client such as a traveling sales rep or telecommuting employee is also known as __.
Transport Mode
868
Common __ solutions are iSCSI, Fibre Channel and FCoE.
SAN
869
Convert the nibble 1101 to decimal.
13. Write each digit separate 1 1 0 1. Label number from right to left 0,1,2,3. Then put base (in this case 2) on bottom left of those numbers, multiply down, add across. 'Binary,Hex to Decimal conversion - Drawing 4A'
870
CSMA with __ is a one way link and not typically used. CSMA with __ is typically used and is where the computer monitors the line to see if another computer is transmitting, if not the computer transmits.
CSMA/CA (collision avoidance), CSMA/CD (collision detection)
871
Draw the OSI and TCP/IP models
OSI vs TCP-IP - Domain 4 pg 15' Also add hub/repeater, switch/bridge, router, firewall so I know the layers for those
872
Ethernet is a baseband or shared media where data is transmitted using __
CSMA/CD