Ch. 2 - System Fundamentals Flashcards
At which level of the OSI model does a proxy operate?
Application
If a device is using node MAC addresses to funnel traffic, what layer of the OSI model is this device working on?
Layer 2
Which OS holds 90% of the desktop market an dis one of our largest attack surfaces?
Windows
What port uses SSL to secure web traffic?
443
What kind of domain resides on a single switch port?
Collission domain
Which network topology uses a token-based access methodology?
Ring
Hubs operate at what level of the OSI model?
Layer 1
What is the proper sequence of the TCP 3-way handshake?
Syn, Syn-Ack, Ack
Is TCP a connection oriented or connectionless protocol?
TCP is a connection oriented protocol.
A scan of a network client shows that port 21 is open. What protocol is this aligned with?
Telnet
What port range is an obscure third-party application likely to use?
49152 to 65535
Which category of firewall filters is based on packet header data only?
Packet
An administrator has just been notified of irregular network activity; what appliance functions in this manner?
IDS
Which topology has built-in redundancy because of its many client connections?
Hybrid
What device acts as an intermediary between an internal client and a web resource?
Proxy