(3) Connect and Protect: Networks and Network Security Flashcards
To connect an entire city, the most effective network type would be a local area network (LAN).
True
False
False
To connect an entire city, the proper network type would be a WAN. A LAN is a network that spans a small area; a wide area network (WAN) spans a large geographical area.
A security professional wants to ensure information is being broadcast to every computer on their organization’s network. What device should they investigate?
Modem
Router
Hub
Internet
Hub
They would use a hub. A hub is a network device that broadcasts information like a radio tower.
What are some benefits of switches? Select all that apply.
They can improve network performance.
They control the flow of traffic.
They only pass data to the intended destination.
They automatically install device-protection software.
They can improve network performance.
They control the flow of traffic.
They only pass data to the intended destination.
Fill in the blank: The practice of using servers, applications, and network services that are hosted on the internet is called _____ computing.
cloud
uploadable
connected
website
cloud
The practice of using servers, applications, and network services that are hosted on the internet is called cloud computing.
What type of information is contained within the header of an IP packet?
An explanation of how the port number will be processed by the receiving device
The sender’s IP address, the size of the packet, and the protocol to use
The message that needs to be transmitted to the receiving device
A string of data indicating that the data transmission is complete
The sender’s IP address, the size of the packet, and the protocol to use
What characteristics do the TCP/IP and OSI models share? Select all that apply.
Both models define standards for networking and divide the network communication process into different layers.
Both models include an application and a transport layer.
Both models illustrate network processes and protocols for data transmission between two or more systems.
Both models have 7 layers.
Both models define standards for networking and divide the network communication process into different layers.
Both models include an application and a transport layer.
Both models illustrate network processes and protocols for data transmission between two or more systems.
What is the Transmission Control Protocol (TCP)?
An internet communication convention
A unique address that every device on a network is assigned
A software application that organizes data
Guidelines for proper network operations
An internet communication convention
The TCP is an internet communication convention, or protocol. It allows two devices to form a connection and stream data.
Fill in the blank: A _____ is a software-based location that organizes the sending and receiving of data between devices on a network.
port
packet
channel
segment
port
A port is a software-based location that organizes the sending and receiving of data between devices on a network.
Which layer of the TCP/IP model has protocols that organize file transfers and email services?
Transport layer
Application layer
Network access layer
Internet layer
Application layer
The application layer has protocols that organize file transfers and email services. It does this by determining how data packets will interact with receiving devices. The application layer is the fourth layer in the TCP/IP model.
Fill in the blank: An Internet Protocol (IP) address is a unique string of characters that identifies the _____ of a device on the internet.
location
operating system
speed
size
location
An IP address is a unique string of characters that identifies the location of a device on the internet.
Which of the following is an example of an IPv4 address?
25, 443, 20
00-B1-D0-63-C2-26
172.16.254.1
2001:0db8:85a3:0000:0000:8a2e:0370:7336
172.16.254.1
An example of an IPv4 address is 172.16.254.1. IPv4 addresses are written as four, 1-3-digit numbers separated by decimal points. Each one can contain the values 0-255.
What type of address is assigned by an internet service provider and connected to a geographic location?
WAN address
MAC address
Public IP address
Private IP address
Public IP address
A public IP address is assigned by an internet service provider and shared by all devices on a local area network. It is connected to geographic location. All communications from devices in the same local area have the same public-facing address due to network address translation or a forwarding proxy.
Fill in the blank: A switch uses a MAC _____ to direct data packets to the correct device.
address table
geographic location
home network
public address
address table
A switch uses a MAC address table to direct data packets to the correct device.
What is the term for a group of connected devices?
Hub
Cloud
Protocol
Network
Network
Which network device connects multiple networks together?
A modem
A hub
A router
A switch
A router
Which of the following statements accurately describe switches? Select all that apply.
When a switch receives a data packet, it reads the MAC address of the destination device and maps it to a port.
Some benefits to switches are effective control of traffic flow and improved network performance.
Switches are less secure than hubs.
A switch is a device that makes connections between specific devices on a network by sending and receiving data between them.
When a switch receives a data packet, it reads the MAC address of the destination device and maps it to a port.
Some benefits to switches are effective control of traffic flow and improved network performance.
A switch is a device that makes connections between specific devices on a network by sending and receiving data between them.
Which of the following are benefits for businesses that are considering using a cloud service provider (CSP)? Select all that apply.
CSP remote servers allow online services to be accessed from any location.
CSPs provide business analytics to monitor web traffic and sales.
CSPs offer on-demand storage.
CSP data and devices are more secure because they are stored locally.
CSP remote servers allow online services to be accessed from any location.
CSPs provide business analytics to monitor web traffic and sales.
CSPs offer on-demand storage.
What is the purpose of the protocol number of a data packet?
To contain the IP and MAC addresses
To identify the message to be transmitted to the receiving device
To signal to the receiving device that the packet is finished
To tell the receiving device what to do with the information in the packet
To tell the receiving device what to do with the information in the packet
What are the three main categories of services that CSPs provide? Select all that apply.
Infrastructure as a service (IaaS)
Desktop as a service (DaaS)
Platform as a service (PaaS)
Software as a service (SaaS)
Infrastructure as a service (IaaS)
Platform as a service (PaaS)
Software as a service (SaaS)
Which port is used for secure internet communication?
20
40
443
25
443
Which layer in the TCP/IP model is used to inspect the flow of traffic across a network?
Layer 1, network access
Layer 2, internet
Layer 3, transport
Layer 4, application
Layer 3, transport
Fill in the blank: 127.0.0.1 is an example of an ___ address.
IPv4
MAC
IPv6
Ethernet
IPv4
Which of the following addresses is an accurate IPv6 address?
fda2:7360:1e5b:e8f5:a69f:c8bd:1b3e:2578
a634:b123:cd34:3f56:0023:2345:7890:0000:ffff
fda2::7361:135b::38f5:c8bd:1b3e:2578
a360::abf7:h234:0011:g126:1130::ffj2
fda2:7360:1e5b:e8f5:a69f:c8bd:1b3e:2578
Fill in the blank: Network protocols are rules used by two or more devices on a network to describe the _____ and structure of data.
order of delivery
optimum speed
access level
maximum size
order of delivery
Network protocols are rules used by two or more devices on a network to describe the order of delivery and the structure of data.
Which network protocol provides a secure method of communication between clients and web servers?
DNS
ARP
HTTPS
TCP
HTTPS
Hypertext transfer protocol secure (HTTPS) provides a secure method of communication between clients and web servers. HTTPS uses digital certificates to perform authentication and can operate over TCP ports 443 and 80.
To keep information safe from malicious actors, what security protocol can be used?
Secure sockets layer and transport layer security (SSL/TLS)
Domain name system (DNS)
Address resolution protocol (ARP)
Transmission control protocol (TCP)
Correct
To keep information safe from malicious actors, SSL/TLS can be used. It secures hypertext transfer protocol (HTTP) transactions, which is known as hypertext transfer protocol secure (HTTPS).
Secure sockets layer and transport layer security (SSL/TLS)
To keep information safe from malicious actors, SSL/TLS can be used. It secures hypertext transfer protocol (HTTP) transactions, which is known as hypertext transfer protocol secure (HTTPS).
IEEE 802.11, also known as Wi-Fi, is a set of standards that define communication for wireless LANs.
True
False
True
IEEE 802.11, also known as Wi-Fi, is a set of standards that define communication for wireless LANs.
What monitors and filters traffic coming in and out of a network?
Firewall
Domain name system (DNS)
Forward proxy server
Uncontrolled zone
Firewall
A firewall monitors and filters traffic coming in and out of a network. It either allows or denies traffic based on a defined set of security rules.
Stateless is a class of firewall that keeps track of information passing through it and proactively filters out threats.
True
False
False
Stateful is a class of firewall that keeps track of information passing through it and proactively filters out threats. Stateless operates based on predefined rules and does not keep track of information from data packets.
Fill in the blank: Encapsulation can be performed by a _____ to help protect information by wrapping sensitive data in other data packets.
VPN service
firewall
proxy server
security zone
VPN service
Encapsulation can be performed by a VPN service to help protect information by wrapping sensitive data in other data packets. VPNs change a public IP address and hide a virtual location to keep data private when using a public network.
Which security zone is used to ensure highly confidential information and is only accessible to employees with certain privileges?
Management zone
Uncontrolled zone
Demilitarized zone (DMZ)
Restricted zone
Restricted zone
The restricted zone protects highly confidential information that only people with certain privileges can access. It typically has a separate firewall.
Fill in the blank: A security analyst uses a _____ to regulate and restrict access to an internal server from the internet. This tool works by accepting traffic from external parties, approving it, and forwarding it to internal servers.
port filter
forward proxy server
controlled zone
reverse proxy server
reverse proxy server
A security analyst uses a reverse proxy server to regulate and restrict access to an internal server from the internet. This tool works by accepting traffic from external parties, approving it, and forwarding it to internal servers.