Ch. 2 - System Fundamentals Flashcards

1
Q

At which level of the OSI model does a proxy operate?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If a device is using node MAC addresses to funnel traffic, what layer of the OSI model is this device working on?

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which OS holds 90% of the desktop market an dis one of our largest attack surfaces?

A

Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What port uses SSL to secure web traffic?

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What kind of domain resides on a single switch port?

A

Collission domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which network topology uses a token-based access methodology?

A

Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hubs operate at what level of the OSI model?

A

Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the proper sequence of the TCP 3-way handshake?

A

Syn, Syn-Ack, Ack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is TCP a connection oriented or connectionless protocol?

A

TCP is a connection oriented protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A scan of a network client shows that port 21 is open. What protocol is this aligned with?

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What port range is an obscure third-party application likely to use?

A

49152 to 65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which category of firewall filters is based on packet header data only?

A

Packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An administrator has just been notified of irregular network activity; what appliance functions in this manner?

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which topology has built-in redundancy because of its many client connections?

A

Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What device acts as an intermediary between an internal client and a web resource?

A

Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When scanning a network via a hardline connection to a wired-switched NIC in promiscuous mode, what would be the extent of network traffic you would expect to see?

A

All nodes attached to the same port

17
Q

Which technology allows the use of a single public address, to support many internal clients while also preventing exposure of internal IP addresses to the outside world?

A

NAT

18
Q

What network appliance senses irregularities and plays an active role in stopping the irregular activity from continuing?

A

IPS

19
Q

Choosing a protective network appliance, you want a device that will inspect packets at the most granular level possible while providing improved traffic efficiency. What appliance would satisfy these requirements?

A

Application Firewall

20
Q

You have selected the option in your IDS to notify you via email if it senses any network irregularities. Checking the logs you notice a few incidents but you didn’t receive any alerts. What protocol needs to be configured on the IDS?

A

SMTP