01 - Flash Cards

1
Q

OSI Model

A
  • The Open Systems Interconnection (OSI) model is a suggested standard for communication.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Seven OSI Layers

A
  • Layer 7: The application layer
  • Layer 6: The presentation layer
  • Layer 5: The session layer
  • Layer 4: The transport layer
  • Layer 3: The network layer
  • Layer 2: The data-link layer
  • Layer 1: The physical layer

“All people seem to need data processing.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encapsulation

A
  • Adding header and footer to data as it goes through one OSI layer to the next. Therefore, data is encapsulated at each layer as it moves from application to physical layer.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Deencapsulation

A
  • This is a process in OSI when an incoming transmission received by the destination computer is unpacked as it moves up the protocol stack from physical layer to application.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Physical Layer (Layer 1)

A
  • Layer that conveys the bits across the network over a physical connection medium, either by electricity or by mechanical or radio waves.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Link Layer (Layer 2)

A
  • This layer formats packets from the physical layer into physical frames for transmission.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network Layer (Layer 3)

A
  • This layer is in charge of assigning address information to the data as well as routing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Transport Layer (Layer 4)

A
  • This layer manages integrity of a connection. It essentially controls packetization of data and delivery of the packets, including checking for errors in the data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Session Layer (Layer 5)

A
  • This layer establishes, maintains and ends communication sessions among two computers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Simplex

A
  • One way communication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Half-Duplex

A
  • Two way communication (only one direction can be sending information at a given time)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Full Duplex

A
  • Two way communication (information can be sent in both ways at the same time)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Presentation Layer (Layer 6)

A
  • This layer converts incoming and outgoing information from one format to another – for example, from clear text to encrypted text and vice versa.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application Layer (Layer 7)

A
  • This layer is the layer at which user application, networks services and operating systems are combined with the protocol stack so that applications can communicate with the protocol stack.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List Two Categories of Routing Protocol

A
  • Distance vector routing
  • Link state routing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP/IP Model

A
  • It is communications protocols used in computer networks. It is founded on Transmission Control Protocol and the
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Internet Protocol - TCP/IP Layers

A
  • Application
  • Transport
  • Internet
  • Link
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TCP/IP Protocol

A
  • Consists of a great number of individual protocols rather than a sole protocol.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Transport Layer Protocols

A
  • Transmission Control Protocol (TCP)
  • User Data Protocol (UDP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Transmission Control Protocol (TCP)

A
  • Full duplex protocol
  • User Data Protocol (UDP)
  • Simplex
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IANA Port Number Recommendations

A
  • Ports 49152 to 655535 to be used as dynamic/private ports.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IP Classes

A

First binary digit Decimal range

Class A 0 1-126

Class B 10 128-191

Class C 110 192-223

Class D 1110 224-239

Class E 1111 240-255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a Loopback Address?

A
  • Class A network 127
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ICMP

A
  • Internet Control Measure Protocol Used for establishing health of a link or a network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Common ICMP Type Field Values

A
  • 0 Echo reply
  • 3 Destination unreachable
  • 5 Redirect
  • 8 Echo request
  • 9 Router advertisement
  • 10 Router solicitation
  • 11 Time exceeded
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

IGMP

A
  • Internet Group Management Protocol allows systems to achieve dynamic multicasting.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

ARP

A
  • Address Resolution Protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

TCP/IP Vulnerabilities

A
  • Buffer overflows, DoS attacks, fragment attack, hijack attacks and passive attacks via monitoring or sniffing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Domain Name System

A
  • It is hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

DNS Poisoning

A
  • It is an attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from real servers and towards fake ones.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Domain Hijacking

A
  • Malicious action of changing a registration of a domain registration without authorization.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Converged Protocols

A
  • Protocols combining specialty or proprietary protocols with standard protocols.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Fibre Channel

A
  • High-speed networking technology primarily used for transmitting data among data centers, computer servers, switches and storage at data rates of up to 128 Gbps.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

MPLS

A
  • Multiprotocol Label Switching (MPLS) is a routing technique in telecommunications networks that directs data from one node to the next based on short path labels thus reducing complexity of the process and increasing speed of traffic.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Small Computer System Interface

A
  • Networking storage standard based on IP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Voice Over IP

A
  • It is technology that allows for to making of voice calls using a broadband Internet connection instead of a regular phone line.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Software Define Networking

A
  • It is approach to cloud computing that aims to make networks flexible and improve network configuration in order to ameliorate performance and network monitoring.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Content Distribution Networks

A
  • Group of network resources access the internet that improve availability and lower the latency of the hosted content.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Securing Wireless Access Points

A
  • For each wireless access point it is essential to ensure its security. i802.11 is the IEEE standard for wireless network communications.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Wireless Channels

A
  • WiFi channel is the medium of a certain frequency through which our wireless networks can send and receive data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What Does SSID Stand For?

A
  • It is the 32 alphanumeric character service set identifier (SSID) that is a case sensitive.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Beacon Frame

A
  • It is a management frame in IEEE 802.11 based WLANs that contains all the information about the network and it is transmitted periodically.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Site Survey

A
  • Site Survey softwares use signal strength data gathered by your computer’s wireless card to map the signal strength of every access point.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

WEP

A
  • Wired Equivalent Privacy is a security algorithm for IEEE 802.11 wireless networks designed to provide data confidentiality.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

WPA

A
  • Wi-Fi Protected Access (WPA) is a security standard for users of computing devices equipped with wireless internet connections.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

WPA2

A
  • Type of encryption used to secure the vast majority of Wi-Fi networks by providing unique encryption keys for each wireless client.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

802.1X/EAP

A
  • Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

PEAP

A
  • Protected Extensible Authentication Protocol is an authentication protocol used in wireless networks and Point-to-Point connections.
  • It is designed to provide more secure authentication for 802.11 WLANs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

LEAP

A
  • Lightweight Extensible Authentication Protocol is a proprietary wireless LAN authentication method developed by Cisco Systems in order to address deficiencies in TKIP before 802.11i/WPA2 was ratified.
50
Q

MAC Filter

A
  • Security access control method whereby the MAC address assigned to each network card is used to determine access to the network.
51
Q

TKIP

A
  • Temporal Key Integrity Protocol is a security protocol used in the IEEE 802.11 wireless networking standard and designed as replacement for WEP.
52
Q

CCMP

A
  • Counter-Mode/CBC-Mac Protocol (IEEE 802.11I encryption algorithm) created to replace WEP and TKIP. Uses AES with 128-bit key.
53
Q

WPS

A
  • Wi-Fi Protected Setup is a network security standard to create a secure wireless home network.
54
Q

Antenna Types

A
  • Omnidirectional antennas and directional antennas
55
Q

Captive Portal

A
  • Web page that is displayed to newly connected users before they are granted broader access to network resources.
56
Q

Wireless Attacks

A
  • A malicious action against wireless system information or wireless networks.
57
Q

War Driving

A
  • Act of searching for wireless networks by a person usually in a moving vehicle, using a laptop or smartphone.
58
Q

Warchalking

A
  • Term that refers drawing of symbols in public places to advertise an open Wi-Fi network.
59
Q

Replay Attack

A
  • An attack in which a valid data transmission is fraudulently repeated in order to gain access to a system.
60
Q

IV

A
  • Term that stands for initialization vector, another term for a random number. In security context IV is used to reduce predictability and augment security.
61
Q

Rogue Access Points

A
  • It is a wireless access point installed on a wired enterprise network without authorization from the network administrator.
62
Q

Evil Twin Attack

A
  • It is an attack that sets a fraudulent internet access point that seems legitimate but is set up to eavesdrop on wireless communications.
63
Q

Intranet

A
  • Intranet is a private network accessible only to an organization’s staff.
64
Q

Extranet

A
  • It is private network that in addition to organization’s staff allows access to authorized partners or authorized customers.
65
Q

Network Segmentation

A
  • Networks are divided into smaller units.
  • This feature leads to boosting performance, reducing communication problems, providing security.
66
Q

Network Access Control

A
  • Control of access by strictly following the security policy.
67
Q

Define NAC Goals

A
  • Prevent/reduce attack
  • Implement security policy
  • Used identities for access control
68
Q

Firewalls

A
  • Network device that filters the traffic.
69
Q

Static Packet Filtering Firewalls

A
  • Traffic filtering based on a message header.
70
Q

Application Level Gateway Firewalls

A
  • Also known as proxy firewall where packets are filtered based on the service for which they are intended.
  • For additional security this firewall changes source and destination addresses.
71
Q

Circuit Level Gateway Firewalls

A
  • Traffic filtering based on a circuit and not content of traffic.
72
Q

Stateful Inspection Firewalls

A
  • Firewalls that examine each packet but they keep track of whether or not that packet is part of an established TCP session.
73
Q

Deep Packet Inspection Firewalls

A
  • Traffic filtering based on a payload content rather than just the message heather.
74
Q

Next Gen Firewalls

A
  • It combines packet inspection with stateful inspection and deep pocket inspection.
75
Q

Multi-homed Firewalls

A
  • Traffic filtering based on a more than one interface.
76
Q

Bastion Computer

A
  • It is computer on a network specifically designed and configured to withstand attacks.
  • It hosts a single application and all other services are removed or limited to reduce the threat to the computer.
77
Q

Firewall Deployment Architectures

A
  • Single tier
  • Two tier
  • Three tier
78
Q

Security Endpoint

A
  • Each individual device is to maintain local security regardless of network security.
79
Q

Collision Domain

A
  • It is a network segment connected by a shared medium or through repeaters where simultaneous data transmissions collide with one another.
80
Q

Broadcast Domain

A
  • It is a group of network systems where each member of the group receives broadcast signal once it is emitted from one of the members.
81
Q

What Do Repeaters, Concentrators, and Amplifiers Do?

A
  • They strengthen communication signal over a cable segment and connect network segments using the same protocol.
82
Q

Modem

A
  • Hardware device that converts data between transmission media so that it can be transmitted from computer to computer.
83
Q

Hubs

A
  • Multiport repeaters that connect network systems that use the same protocol
84
Q

Bridges

A
  • Connects two networks together.
85
Q

Switches

A
  • Also known as intelligent hub as it repeats traffic only at a port on which destination is known to exist.
86
Q

Routers

A
  • Networking devices that forwards data packets between computer networks.
87
Q

Brouters

A
  • Combination devices consisting of of a bridge and a router.
88
Q

Gateways

A
  • Connects networks using different protocols.
89
Q

Proxies

A
  • Gateway that does not translate across protocols. They serve as mediators and filters for a network.
90
Q

Lan Extenders

A
  • It is a multilayer device used to extend r network segment beyond its inherent distance limitation.
91
Q

Transmission Media

A
  • It is pathway that carries the information from sender to receiver.
92
Q

Coaxial Cable

A
  • Coax, is a type of electrical cable that has an inner conductor surrounded by a tubular insulating layer, surrounded by a tubular conducting shield.
93
Q

Baseband and Broadband Cables

A
  • Baseband cables transmit single signal at one time while broadband cables transmit multiple tables simultaneously.
94
Q

Twisted-pair Cabling

A
  • Type of wiring in which two conductors of a single circuit are twisted together for the purposes of improving electromagnetic compatibility
95
Q

5-4-3 Rule

A
  • Guideline used in the design of shared ethernet networks which promotes optimal traffic flow.
  • It defines number of repeater used in a network design.
96
Q

Network Topology

A
  • Physical layout of computers and networking devices.
97
Q

Network Topology Types

A
  • Ring Topology
  • Bus Topology
  • Star Topology
  • Mesh Topology
98
Q

Ring Topology

A
  • Network topology in which each node connects to exactly two other nodes, forming a single continuous circuit for signals through each node - a ring.
99
Q

Bus Topology

A
  • Local Area Network (LAN) in which all the nodes are connected to a single cable – common linear half-duplex link called a bus.
100
Q

Star Topology

A
  • Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch.
101
Q

Mesh Topology

A
  • Local Area Network (LAN) in which the infrastructure nodes connect directly and non-hierarchically to as many other nodes as possible.
102
Q

Frequency Hopping Spread Spectrum

A
  • Method of transmitting signals by rapidly switching a carrier among many frequency channels.
103
Q

Direct Sequence Spread Spectrum

A
  • It is modulation technique used to reduce overall signal interference by employing all the available frequencies simultaneously in parallel.
104
Q

Orthogonal Frequency Division Multiplexing

A
  • It is a method of encoding digital data on multiple carrier frequencies.
105
Q

Bluetooth

A
  • It is a wireless technology standard for exchanging data over short distances using short-wavelength.
106
Q

RFID

A
  • Radio-frequency identification uses electromagnetic fields to automatically identify and track tags attached to objects.
107
Q

NFC

A
  • Set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other.
108
Q

List Frequency Ranges for Cordless Phones

A
  • 900 MHz
  • 2.4 GHz
  • 5 GHz
109
Q

List LAN Technologies

A
  • Ethernet
  • Token Ring
  • Fiber Distributed Data Interface (FDDI)
110
Q

Ethernet

A
  • Shared media technology used for connecting wired local area networks (LANs), enabling devices to communicate with each other by using a protocol.
111
Q

Token RIng

A
  • Local area network (LAN) in which all computers are connected in a ring or star topology and pass one or more logical tokens from host to host.
112
Q

Fiber Distributed Data Interface

A
  • High speed token-passing technology employing two rings with traffic flowing in opposite direction.
113
Q

Analog Communications

A
  • Data transmitting technique in a format that utilizes continuous signals to transmit data. In analog communication information is translated into electric pulses of varying amplitude.
114
Q

Digital Communications

A
  • Data transmitting technique in a format where information is encoded digitally as discrete signals and then is electronically transferred to the recipients.
115
Q

Synchronous Communications

A
  • Transmission of data relying on a timing based on an independent clock or a timestamp embedded in data.
116
Q

Asynchronous Communications

A
  • Transmission of data without the use of an external clock signal, where data can be transmitted intermittently rather than in a steady stream.
117
Q

Baseband Technology

A
  • Baseband transmissions use digital signaling over a single wire and the transmissions themselves take the form of either electrical pulses or light.
118
Q

Broadband Technology

A
  • Baseband communication is bidirectional, allowing computers to both send and receive data using a single cable – the sending and receiving cannot occur on the same wire at the same time.
119
Q

Define Broadcast, Multicast,Unicast

A
  • Broadcast -communication to all possible recipients
  • Multicast - communication to multiple specific recipients
  • Unicast - communication to a specific recipient
120
Q

LAN Media Access Technologies

A
  • Carrier Sense Multiple Access
  • Carrier Sense Multiple Access with Collision Avoidance
  • Carrier Sense Multiple Access with Collision Detection
  • Token Passing
  • Polling
121
Q

List Protocol Services Used to Connect to LAN and WLAN

A
  • Frame Relay
  • SDMS
  • ATM
  • HSSI
  • HDLC
  • ISDN
122
Q
A