325 Flashcards

1
Q

Client Server network

A

Form of internet network that consists of a single central computer functioning as a server and directing several other computers, referred to as clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Peer-to-peer network

A

a group of computers or devices that share resources and access shared resources without centralized control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Local Area Network types

A

Home/Residential, Soho Network, SME Network, Enterprise, Datacenter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wide area network

A

a computer network in which the computers connected may be far apart, generally having a radius of half a mile or more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Topology

A

The physical or logical structure of the network in terms of nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of network topology

A

Star, Mesh, Full Mesh, Partial Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Star Topology

A

Each endpoint node is connected to a central forwarding appliance, such as a switch or router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mesh Topology

A

Requires that each device has a point to point link with every other device on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Full Mesh Network

A

Commonly used in WANs especially public networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Partial Mesh Network

A

Only most important devices interconnected in the mesh, perhaps with extra links for fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Simplex

A

Sender can send the data but the sender unable receive the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Full-duplex

A

Data is sent and received simultaneously. It is dual way communication where both directions of communication will happen at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Half-duplex

A

Data is sequentially sent and received. It is a bidirectional communication that is limited to only one sender or reciever at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Logical topology

A

How data travels between nodes on a network. This topology emphasizes the data path that a message takes from one device to another, irrespective of the physical connections between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Addressing

A

Unique identifier for a network node, such as a MAC address, IPv4 address, or IPv6 address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encapsulation

A

A method by which protocols build data packets by adding headers and trailers to existing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Ethernet

A

System for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Media access control

A

Layer that controls the hardware responsible for interaction with the wired (electrical or optical) or wireless transmission medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Collision domain

A

Network segment where simultaneous data transmissions collide with one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Carrier-sense multiple access with collision detection (CSMA/CD)

A

Ethernet protocol that uses carrier sensing to defer transmissions when a collision is detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The Protocol field in the IPv4 header

A

specifies the type of data encapsulated in the payload, allowing the receiving host to know how to process it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Three tier architecture

A

The core Server, distribution switches, and access switches which server users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Spine and leaf architechture

A

Two-layer architecture. Every leaf switch is connected to a spine switch in a full mesh topology. The leaf layer contains the access switches that connects to the servers and provide a connection for end users. Overcomes the limitations of three-layer hierarchical architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A hop

A

A packet passing through a router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Hop limit

A

“Time to live” for ipv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

default route

A

A route when no other route matches. Destination: 0.0.0.0/0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

OSI Model

A

the Seven layers defined by the open systems interconnection reference model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

OSI Layers

A

“All People Seem To Need Data Processing” - Application, Presentation, Session, Transport, Network, Data Link, Physical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Protocol Data Unit

A

Chunk of data with protocol-specific headers added at each OSI layer. The basic unit of exchange between entities that communicate using a specified networking protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Physical Layer

A

Responsible for transmission and reciept of signals that represent bits of data. Can be cabled or wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Data Link layer

A

Responsible for transferring data between nodes on the same logical segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Network Layer

A

Responsible for logical network addressing and forwarding, move data around an internetwork.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Transport Layer

A

Responsible for breaking upper-layer data into segments and ensuring reliable data control, error detection, and error correction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Session Layer

A

Provides services for applications that need to exchange multiple messages (dialog control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Presentation Layer

A

Transforms and translates data between the formats used by the network and applications, including data compression and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Application Layer

A

Provides support to applications requiring network services (file transfer, printing, email, databases, and so on).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Bridge

A

Appliance or application that connects different networks as if they were one network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Router

A

Intermediate system working at the Network layer capable of forwarding packets around logical networks of different layer 1 and layer 2 types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Firewall

A

Software or hardware device that protects a network segment or individual host by filtering packets to an access control list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Access Control List

A

Collection of ACEs that determines which subjects are allowed or denied access to the object or privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Access Control Entry

A

A particular security identifier that is associated with Access rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Physical layer devices

A

Tranciever, Repeater, Hub, media converter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Data Link layer devices

A

NIC, Bridge, Switch, Wireless Access Point, VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Header fields added by the Data Link layer

A

Source Hardware address, Destination hardware Address, checksum for basic error checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Network Layer Devices

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Functions of the Transport Layer

A

Data segmentation and reassembly, reliable message delivery, end to end flow control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Transport Layer Devices

A

Multilayer Switches, Security Appliances, IDSs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Function of the Session Layer

A

The exchange of multiple messages between the client and server. This exchange is called a session or dialog.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Registered Jack

A

Series of jack/plug types used with twisted pair cabling, such as RJ45 and RJ11.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Shielded Twisted Pair

A

Copper twisted pair cabling with screening and shielding elements for individual wire pairs and/or the whole cable to reduce interference. Also referred to as a screened, shielded, or foiled twisted pair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Digital Certificate

A

Identification and authentication information presented in the X.509 format and issued by a Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Certificate Authority

A

A server that guarantees subject identities by issuing signed digital certificate wrappers for their public keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Public Key

A

For Asymmetric encryption, is freely distributed and can be used to perform the reverse encryption ore decryption operation of the linked private key in the pair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Network Time Protocol

A

Networking protocol for clock synchronization over packet-switched variable latency networks. Uses port 123.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Three types of Precision Time Protocols

A

Grandmaster is authoritative. Boundary has interfaces in PTP segments. Ordinary has a single interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Trunking

A

Connecting switches together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Port Bonding

A

Multiple ports are connected and perceived as a single whole by the switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Port mirroring

A

Copies traffic from one interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

SPAN

A

Switch Port Analyzing Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Ethernet frames payload

A

Frames support more than 1,500 bytes, up to 9216 in a jumbo frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Jumbo Frames

A

Larger payload of an ethernet frame, and must be supported by the switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Ethernet flow control

A

As a non- deterministic form of communication, control is maintained by speed or IEEE.802.3x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Port Security

A

Prevents unauthorized use from a switch interface. Uses MAC addresses. Keeps a list of confirmed MAC sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Straight-through cables

A

Used for patch cables, and to connect workstations to network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

MDI

A

Media Dependant Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

MDI-X

A

Media Dependant Crossover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

10BASE-T and 100BASETX Straight Through cables

A

Won’t use pins 4,5,7,8. From the MDI, 1,2 are Transmitting. And 3,5 are receiving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

1000Base-T

A

For gigabyte cables, all four sets are transmitting and receiving data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Ethernet crossover cables

A

For MDI to MDI, or MDI-X to MDI-X. Connects 1-3, 2-6, 3-1, 4-7, 5-8, 6-2, 7-4, 8-5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Auto-MDI-X

A

Automatically performs crossover on modern ethernet devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

MIMO

A

Multiple Input Multiple Output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

MU-MIMO

A

Multiple User MIMO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

802.11A

A

5GHz MTT PS and total is 54 Mbit/s. No MIMO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

802.11B

A

2.4GHz MTT PS and total is 11 Mbit/s. No MIMO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

802.11G

A

2.4 GHz MTT PS and total is 54 MBits. No MIMO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

802.11n

A

5GHz / 2.4 GHz and MTT PS is 150 MBits. Total is 600 MBits. 4xMIMO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

802.11ac

A

5GHz and MTT PS is 867 MBits, Total is 6.9 GBits. 8xDL MU-MIMO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

802.11ax

A

5/2.4 GHz MTT PS is 1,201 MBits and total is 9.6 GBits. 8xDL and UL-MU-MIMO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Orthogonal Frequency-division multiple access

A

Similar to cellular communication, and improves high-density installations (OFDMA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Channels

A

Groups of non overlapping frequencies numbered by the IEEE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Bandwidth

A

the width of a frequency defined in MHz. Defined by 802.11 standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

IBSS

A

Independent basic service set, ad hoc connection for temporary or long term communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Physical network map

A

follows the physical wire and devices to simplify troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Distribution frames

A

Passive cable termination, a series of punch down blocks or patch panels that can simplify network extensions or troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Main Distribution Frame

A

central hub of a network. Located at the primary entry point for internet connection, houses key equipment like routers, switches, and patch panels that manage and route the data to and from the external world to the internal network. Termination point for WAN links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Patch Panel

A

Allows for easy access and cable Identification,for troubleshooting and fault isolation in a server room.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Intermediate Distribution Frame

A

the IDF plays a supporting role to the MDF, acting as a relay point that extends the connectivity from the MDF to specific areas, floors, or sections of a building that the main distribution frame cannot reach directly due to distance limitations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Severity levels

A

defined levels of events to force priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Runt

A

frames that are less than 64 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Giant frame

A

frames that are more than 1518

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

CRC error

A

failed the Frame Check sequence resulting from failed cable or port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Netflow

A

Gathers traffic statistics from all traffic flows, that is exported to a collector program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

continuity of operations planning

A

The planing and coordination of performing essential functions during a range of emergencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

System Life Cycle

A

managing asset disposal, information disposal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Standard operating procedures

A

Backup procedures that are planned for event outages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Password policy

A

Company policies regarding password setup, age, size, and lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Remote access policy

A

External communications is difficult to control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Onboarding procedures

A

The process of integrating employees into an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Offboarding procedures

A

The process of separating employees out of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Data Loss Prevention

A

involves multiple technologies that can catch sensitive data before it leaves the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Fault Tolerance

A

Maintain uptime in the case of failure. It adds complexity. Single device fault tolerance is built on RAID, UPS, and NICs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

redundant array of inexpensive disks

A

data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Load balancer

A

a device with a Virtual IP, and connects users to servers as they are online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Port Aggregation

A

Multiple links to a single switch to use 2gigs from the connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Fire suppression

A

The amount of electronics used in a data center complicate fire suppression which uses and prefers modern liquids and gasses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Cold Site

A

no hardware, no data, no people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Hot Site

A

Duplicate site, architecture, and hardware meant to speed

108
Q

Warm Site

A

Might have hardware, racks, or HVAC. Not hot or cold.

109
Q

Cloud site

A

use an established cloud provider

110
Q

Active-Passive

A

two devices are installed and configured, only one operating at a single time.

111
Q

Active-Active devices

A

two devices are installed and configured, with both cooperating at the same time.

112
Q

Diverse paths

A

multiple redundant paths across a network, from ISPS, firewalls, routers, switches, load balancers, and web servers. To maintain redundancy and fault tolerance

113
Q

FHRP - First hop redundancy protocol

A

A computer setting to use a different gateway should the default gateway fail.

114
Q

CIA Triad

A

Confidentiality, Availability, Integrity. The fundamentals of security.

115
Q

Confidentiality

A

Certain information should be limited. Encryption and access controls help restrict access to resources.

116
Q

Integrity

A

That the data is stored and transferred as intended and that any modification is authorized

117
Q

Availability

A

That information is accessible to those authorized to view or modify it.

118
Q

Vulnerability

A

A weakness that could be accidentally triggered or intentionally exploited to cause a security breach.

119
Q

Threat

A

The potential for someone or something to exploit a vulnerability and breach security. A threat may be intentional or unintentional. The person or

120
Q

Risk

A

The likelihood and impact of a threat actor exercising a vulnerability. Assessing Risk helps you decide which vulnerabilities to prioritize patching and what additional security measures to implement.

121
Q

Data At rest

A

The state in which data is in some sort of persistent storage media.

122
Q

Data in use

A

The state in which data is present in volatile memory such as system ram, cpu registers, and cache.

123
Q

Data In Transit

A

The state in which data is transmitted over a network.

124
Q

Encryption

A

Encoded messages so only proper recipients can read them.

125
Q

Access controls

A

Programs that specify roles to limit access or controls to users.

126
Q

Steganography

A

Conceal information within another piece of information. Associated with hiding information within an image.

127
Q

Hashing

A

mapped data of an arbitrary length to a fixed length. If it’s modified it will be a different hash.

128
Q

Digital Signature

A

Mathematical scheme to verify the integrity of data.

129
Q

Non-Repudiation

A

Authentication that with high assurance can be asserted to be genuine, and that can not subsequently be refuted.

130
Q

Zero day attacks

A

vulnerability that has never been identified or published in a new or unreleased product or application.

131
Q

Threat

A

A vulnerability that can be exploited. Could be intentional or accidental. Most are external to the organization

132
Q

Insider threat

A

A threat actor that has access to the internal processes or procedures. Ameliorated by Least Privilege.

133
Q

Physical Controls

A

Keep people away from technology. Door locks, fences, rack locks, cameras

134
Q

Technical controls

A

Hardware and software safety measures. Firewalls, AD authentication, Disk encryption.

135
Q

Vulnerability assessment

A

an evaluation of a system’s security and ability to meet compliance requirements based on the configuration state of the system.

136
Q

Honeypot

A

A host, network, or file set up with the purpose of luring attackers away from assets of actual value and/or discovering attack strategies and weaknesses in the security configuration. Also called a honeynet or honeyfile.

137
Q

Cybersecurity audit

A

Ensure a security posture aligns with established standards

138
Q

Data Locality

A

Establishing policies and tools that ensure data is stored within a specific national or state border.This is often required to comply with data sovereignty and protect data privacy.

139
Q

Physical segmentation

A

separate devices to prevent users from accessing another customer’s resources.

140
Q

Logical segmentation

A

VLANs to force a customer to only be able to interact with their own resources

141
Q

Screened Subnet/demilitarized zone

A

Public access to resources, but no access to the org’s internal network. A physical or logical subnetwork that contains and exposes an organization’s external-facing (public-facing) services to an untrusted, usually larger, network such as the Internet.

142
Q

Separation of Duties

A

Split knowledge, no individual has complete knowledge of a function or resource.

143
Q

Network Access Control

A

Security solutions that support network visibility and access management through policy enforcement on devices and users of corporate networks.

144
Q

IEE 802.1x

A

port based NAC. Physical interface authentication. Individual ports can be disabled. Addresses communication between a supplicant to an authenticator, and the auth server.

145
Q

Supplicant

A

A user who is trying to log into a IEE 802.1x server

146
Q

Authenticator

A

Passes a supplicant’s credentials against an authentication server

147
Q

Local Authentication

A

A manual process where passwords are kept on the local device. Not impacted by server downtime.

148
Q

Multi-factor authentication

A

Can be expensive. More than one factor, could be a token, biometric, codes, or smartphone application

149
Q

Remote authentication Dial-in User Service

A

AAA protocol that is widely supported and offers centralized authentication for users.

150
Q

Terminal Access Controller Access-Control System

A

Created to control dialup lines in ARPANET. TACACS+ released in 1993.

151
Q

Lightweight Directory access protocol

A

protocol for reading and writing directories over an IP network.

152
Q

Kerberos

A

Network authentication protocol, no need to reauth for subsystems. Manual and protected against on-path or replay attacks.

153
Q

SSO with Kerberos

A

single auth without username or password using backend ticketing. Complicated as a result of its cryptography

154
Q

Address Resolution Protocol

A

Communication protocol used for discovering the link layer addresses, such as MAC address, or IPv4 address. Critical function in TCP/IP.

155
Q

On-path network attack

A

Man in the middle attack, traffic redirection, ARP poisoning.

156
Q

Wireless evil twins

A

looks legitimate

157
Q

Malware

A

Software of many forms that are malicious in purpose.

158
Q

Types of malware

A

Virus, ransomware, worm, trojan horse, rootkit, keylogger.

159
Q

Ransomware

A

Your data is unavailable until the hijackers are paid and release the files.

160
Q

Hashing a password

A

Hashes as fixed length strings are not convertible, and will not have collisions

161
Q

VLAN Hopping

A

An attack where the attacker is able to send traffic from one VLAN to another by either double tagging the traffic, or conducting switch spoofing.

162
Q

DNS poisoning

A

Corrupting the DNS cache to redirect users to malicious websites.

163
Q

ARP spoofing

A

Targets the local network to redirect traffic to malicious websites.

164
Q

SSL stripping

A

Downgrades HTTPS connections to HTTP.

165
Q

DNS spoofing

A

Typically involves creating fake DNS records rather than corrupting the DNS cache.

166
Q

Dictionary attack

A

Use a dictionary to find common words within a password.

167
Q

Virtual Private Network

A

Encrypted data traversing a private network

168
Q

Concentrator

A

Encryption/decryption access device. Often integrated into a firewall.

169
Q

Client-To-Site VPN

A

ON demand VPN from a remote device.

170
Q

Site-to-site VPN

A

Always-on. Firewalls on both sides act as concentrators.

171
Q

Clientless VPN

A

VPN tunnel within HTML5 browser.

172
Q

Full Tunnel

A

All data is from a user is kept inside the organizations network.

173
Q

Split tunnel

A

Users are able to access sites or resources that are not on the organizations network.

174
Q

RDP

A

Remote Desktop Protocol.

175
Q

Asset tracking tabs

A

Records of every asset within an organisation.

176
Q

Troubleshooting

A

Identify, Establish Theory, Test theory, Evaluate.

177
Q

Speed/bandwidth

A

theoretical maximum data rate. Measured in bits per second.

178
Q

The threat types

A

Footprinting, spoofing, DoS, Botnets

179
Q

Footprinting

A

Enumeration of resources on a network to identify potential targets for further attack, spoofing, DoS

180
Q

The attack types

A

Data theft, insider threat, malware attack, password attack, social engineering

181
Q

Identity Access Management

A

Framework of policies and technologies to ensure correct access to correct users.

182
Q

Identification

A

Creating an account or ID that uniquely represents the user, device, or process on the network.

183
Q

Authentication

A

Proving that a subject is who or what it claims to be when it attempts to access the resource. An authentication factor determines what sort of credential the subject can use.

184
Q

Authorization

A

Determining what rights subjects should have on each resource, and enforcing those rights. An authorization model determines how these rights are granted.

185
Q

Accounting

A

Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted.

186
Q

Six factors used in Authentication

A

Knowledge, Ownership, Biometric, Behavior, Location, Time.

187
Q

Knowledge factor

A

Something you know (such as a password).

188
Q

Ownership factor

A

Something you have (such as a smart card).

189
Q

Route poisoning

A

Prevents a router from sending packets through a route that has become invalid within computer networks.

190
Q

Human factor

A

Something you are (such as a fingerprint).

191
Q

Behavior factor

A

Something you do (such as making a signature).

192
Q

Location factor

A

Somewhere you are, such as only being able to log into an account from a specific location, known as geofencing.

193
Q

Time factor

A

Somewhen you are (such as only being permitted to start a session during work hours or using an access token before it expires).

194
Q

Multifactor

A

Authentication scheme that requires the user to present at least two different factors as credentials. Specifying two factors is known as 2FA.

195
Q

Public Key Infrastructure

A

Framework of certificate authorities, digital certificates, software, services, and other cryptographic components deployed for the purpose of validating subject identities.

196
Q

Five stages of a Key’s Life Cycle

A

Generation, Storage, Revocation, Expiration and Renewal.

197
Q

Key Generation

A

Creates an asymmetric key pair or symmetric secret key of the required strength, using the chosen cipher.

198
Q

Storage

A

Prevents unauthorized access to a private or secret key and protects against loss or damage.

199
Q

Revocation

A

Prevents use of the key if it is compromised. If a key is revoked, any data that was encrypted using it should be re-encrypted using a new key.

200
Q

Expiration and Renewal

A

Gives the certificate that validates the key a “shelf-life” to increase security. Every certificate expires after a certain period. Certificates can be renewed with the same key pair or with a new key pair.

201
Q

Federated Identity

A

The means of linking a person’s electronic identity and attributes, stored across multiple distinct identity management systems.

202
Q

Security Assertion Markup Language

A

An XML-based data format used to exchange authentication information between a client and a service.

203
Q

Supplicant

A

The device requesting access, such as a user’s PC or laptop.

204
Q

AAA Server

A

The authentication server, positioned within the local network. This server either holds a database of accounts and credentials or has access to a directory server that can authenticate requests and issue SSO authorizations.

205
Q

Remote Authentication Dial-In User Service

A

AAA protocol used to manage remote and wireless authentication infrastructures.

206
Q

Terminal Access Controller Access Control System

A

Networking protocol that provides centralized AAA management for users, and admins who connect and use a network service.

207
Q

Network Segmentation Enforcement

A

Enforcing a security zone by separating a segment of the network from access by the rest of the network. This could be accomplished using firewalls or VPNs or VLANs. A physically separate network or host (with no cabling or wireless links to other networks) is referred to as air-gapped. Also referred to as segmentation or network segmentation enforcement.

208
Q

Private Server Administrative Networks

A

Devices are subject to strict hardening and configuration management policies. Hosts, user accounts, and traffic with permission to operate in the zone are continually monitored to ensure compliance with security policies.

209
Q

Private Client Network

A

Devices are subject to security policies and monitoring, but the diverse range of technologies and permissions to use public networks make the zone less than fully trusted.

210
Q

Guest

A

Unmanaged devices are allowed to connect, subject to some restrictions and monitoring. This zone is typically untrusted and would not be allowed access to trusted networks.

211
Q

Public Server Network

A

Devices are fully managed but accept connections from unmanaged public clients. Consequently, hosts within this zone are only partially trusted.

212
Q

Public

A

The zone is unmanaged and therefore untrusted.

213
Q

Screened Subnet

A

Segment isolated from the rest of a private network by one or more firewalls that accepts connections from the Internet over designated ports. Formerly referred to as a demilitarized zone (DMZ), this usage is now deprecated.

214
Q

Intrusion detection system

A

Security appliance or software that uses passive hardware sensors to monitor traffic on a specific segment of the network. Also called a network intrusion detection system (NIDS).

215
Q

Intrusion prevention system

A

Security appliance or software that combines detection capabilities with functions that can actively block attacks.

216
Q

Multicast

A

A TCP/IP Technology that sends out packets to devices when streaming to multiple workstations from a single media server. It only sends those to devices that specifically requested the stream rather than the entire network.

217
Q

AAAA records

A

Maps a domain name to IPv6.

218
Q

Cable Certifier

A

Tests the continuity of a cable and verify that a cable meets its specifications such as the bandwidth, frequency, and length.

219
Q

SYN flag

A

Synchronization: The first packet sent from the sender to a receiver as a means of establishing a TCP connection and initiating a three-way handshake.

220
Q

Simple Mail Transfer Protocol

A

Internet standard communication protocol for electronic mail transmission.

221
Q

Simple Mail Transport Protocol Secure

A

a method for securing the SMTP using transport layer security.

222
Q

Link Aggregation Control Protocol

A

allows the user to combine numerous physical Ethernet links into one logical link, which helps create load balancing in the interfaces

223
Q

Digital Subscriber Line

A

technology for transferring data over voice-grade telephone lines, often referred to as the local loop.

224
Q

Cable Internet

A

usually available along with Cable Access TV (CATV). These networks are sometimes described as hybrid fiber coax (HFC) because they combine a fiber optic core network with coax links to CPE, but are more simply just described as cable broadband.

225
Q

Asymmetric digital subscriber line

A

Enables faster data transmission over coper than conventional modems.

226
Q

Very high-speed digital subscriber line

A

Provides faster transmission over a single copper line.

227
Q

Customer Edge

A

The router that interfaces a WAN. From a customer to the provider’s network.

228
Q

At which OSI layer do WANs use simpler protocols than LANs

A

At the Data Link Layer Wan’s use simpler protocols due to their point-to-point connections.

229
Q

Why use public networks for WAN services?

A

The cost is less than implementing a private solution.

230
Q

Cable Modem Termination System

A

connects all the premises in a street via coaxial cables and routes data traffic through the fiber optic backbone to the Internet Service Provider’s (ISP’s) Point of Presence (PoP), facilitating internet access.

231
Q

Filter in a DSL setup

A

Prevents Noise from affecting voice calls.

232
Q

the primary function of a T-carrier system

A

To enable voice traffic digitization

233
Q

primary advantage of TDM in T-carrier systems

A

It enables the simultaneous transmission of multiple signals over a single transmission path.

234
Q

Very High-Speed DSL2

A

100 MBPS bi-directional

235
Q

Fiber To the curb

A

Service providers use VDSL to achieve higher bit rates at the expense of range, to achieve FTTC.

236
Q

Point to Point Protocol

A

Encapsulation protocol at the Data Link Layer. Encapsulates IP packets for transmission over serial digital lines. Has no security mechanisms, uses other protocols to provision a secure tunnel.

237
Q

Internet Protocol Security

A

Used to secure IPv4 and/or IPv6 communications on local networks and as a remote access VPN protocol. IPSec operates at the Network layer.

238
Q

Transport Mode

A

Mode of IPSec. used to secure communications between hosts on a private network.

239
Q

Tunnel Mode

A

Mode of IPSec. used for communications between VPN gateways across an insecure network. Router configuration.

240
Q

Authentification Header

A

IPSec protocol that provides authentication for the origin of transmitted data as well as integrity and protection against replay attacks.

241
Q

Encapsulating SEcurity Payload

A

IPSec sub-protocol that enables encryption and authentication of the header and payload of a data packet.

242
Q

Integrity Check Value

A

Small piece of data from a larger set, often a packet or frame, can verify that the data has not been tampered with.

243
Q

Internet Key Exchange

A

Framework for creating a security association (SA) used with IPSec. An SA establishes that two hosts trust one another (authenticate) and agree on secure protocols and cipher suites to use to exchange data.

244
Q

Digital Certificates

A

Are issued to each peer by a mutually trusted certificate authority to identify one another.

245
Q

Pre-shared key

A

when the same passphrase is configured on both peers.

246
Q

Split Tunnel

A

VPN configuration where only traffic for the private network is routed via the VPN gateway.

247
Q

Full Tunnel

A

VPN configuration where all traffic is routed via the VPN gateway

248
Q

TCP flags

A

SYN, PSH, RST, FIN

249
Q

Maximum Transmission Unit

A

Maximum IP Packet to transmit. Not a fragment

250
Q

media converter

A

Layer 1 device that changes one type of connection to another.

251
Q

Jitter

A

network condition that occurs when a time delay in the sending of data packets over a network connection occurs. A variation in the delay of the packets, and can cause some strange side effects, especially for voice and video calls

252
Q

UDP scan

A

is activated with the -sU option on Nmap. Shows A list of open UDP ports on the target device.

253
Q

End systems

A

also referred to as hosts, are the nodes that send and receive data traffic in a network.

254
Q

Emergency Severity levels

A

range from zero to seven, with zero being the most severe and seven being the least severe.

255
Q

Level 0 Emergency

A

is used for an emergency and is considered the most severe condition because the system has become unstable.

256
Q

Level 1 Emergency

A

is used for an alert condition and means that there is a condition that should be corrected immediately.

257
Q

Level 2 Emergency

A

is used for a critical condition, and it means that there is a failure in the system’s primary application and it requires immediate attention.

258
Q

Level 3 Emergency

A

is used for an error condition, and it means that something is happening to the system that is preventing the proper function.

259
Q

Level 4 Emergency

A

is used for warning conditions and it may indicate that an error will occur if action is not taken soon.

260
Q

Level 5 Emergency

A

is used for notice conditions and it means that the events are unusual, but they are not error conditions.

261
Q

Level 6 Emergency

A

is used for information conditions and it is a normal operational message that requires no action.

262
Q

Level 7 Emergency

A

is used for debugging conditions and is just information that is useful to developers as they are debugging their networks and applications.

263
Q

Data Center Interconnect (DCI)

A

best utilizes VXLAN technology between dispersed data centers

264
Q

Ad Hoc networks

A

Enable devices to connect directly, promoting peer-to-peer communication without relying on a centralized access point

265
Q

End systems

A

Also referred to as hosts, are the nodes that send and receive data traffic in a network. They consume the services provided by servers in a client-server network

266
Q

Precision Time Protocol

A

Protocol for clock synchronization throughout a computer network with relatively high precision and therefore potentially high accuracy

267
Q

Autonegotiation

A

Allows devices to automatically select the highest supported connection parameters, including speed, and mode, ensuring compatibility between devices with different Ethernet capabilities. This feature is crucial for maintaining compatibility with older devices that only support 10 Mbps Ethernet interfaces.