A Protocol Layer Survey of Network Security Flashcards
_____ is the lowest layer in the TCP/IP hierarchy.
link layer
_____ is the term applied to the basic unit of data that passes through the link layer.
frames
_____ is the second lowest layer in the TCP/IP hierarchy.
network layer
(T/F) TCP is a connectionless protocol
false
(T/F) IP is a connection-oriented protocol.
true
_____ is the transport layer protocol within TCP/IP.
TCP
_____ enables the receiving TCP/IP stack to reconstruct the data stream at the destination in the correct order.
the sequence number
_____ and _____ are two transport layer protocols within TCP/IP.
hypertext transport protocol (HTTP) and (FTP)
_____ is the top layer of the TCP/IP stack.
application layer
List three physical layer protocols.
ethernet, token ring, and DSL
If a network interface is placed in _____ mode, it will receive all network traffic irrespective of source or destination.
promiscuous
_____ and _____ are the two address types that correspond to a networked computer.
Media Access Control (MAC) and Internet Protocol (IP)
_____ is the protocol that resolves IP addresses into MAC ID’s.
Address Resolution Protocol (ARP)
Explain how the following Teardrop attack works.
hacker. net 22 > target.org 33: UDP (frag 123:64@0++)
hacker. net > target.org(frag 123:20@24)
Two UDP packets are sent where the second overwrites bytes 21-45 in the original packet to camouflage the packet signatures.
_____ is the goal of a Teardrop attack.
avoid static firewalls and older intrusion detection systems