Ch. 2 - System Fundamentals Flashcards
At which level of the OSI model does a proxy operate?
Application
If a device is using node MAC addresses to funnel traffic, what layer of the OSI model is this device working on?
Layer 2
Which OS holds 90% of the desktop market an dis one of our largest attack surfaces?
Windows
What port uses SSL to secure web traffic?
443
What kind of domain resides on a single switch port?
Collission domain
Which network topology uses a token-based access methodology?
Ring
Hubs operate at what level of the OSI model?
Layer 1
What is the proper sequence of the TCP 3-way handshake?
Syn, Syn-Ack, Ack
Is TCP a connection oriented or connectionless protocol?
TCP is a connection oriented protocol.
A scan of a network client shows that port 21 is open. What protocol is this aligned with?
Telnet
What port range is an obscure third-party application likely to use?
49152 to 65535
Which category of firewall filters is based on packet header data only?
Packet
An administrator has just been notified of irregular network activity; what appliance functions in this manner?
IDS
Which topology has built-in redundancy because of its many client connections?
Hybrid
What device acts as an intermediary between an internal client and a web resource?
Proxy
When scanning a network via a hardline connection to a wired-switched NIC in promiscuous mode, what would be the extent of network traffic you would expect to see?
All nodes attached to the same port
Which technology allows the use of a single public address, to support many internal clients while also preventing exposure of internal IP addresses to the outside world?
NAT
What network appliance senses irregularities and plays an active role in stopping the irregular activity from continuing?
IPS
Choosing a protective network appliance, you want a device that will inspect packets at the most granular level possible while providing improved traffic efficiency. What appliance would satisfy these requirements?
Application Firewall
You have selected the option in your IDS to notify you via email if it senses any network irregularities. Checking the logs you notice a few incidents but you didn’t receive any alerts. What protocol needs to be configured on the IDS?
SMTP