Ch11 Flashcards

1
Q

LDAP secure communication occurs over port

A

TCP 636

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

LDAPS secure communication to a global catalog server occurs over port

A

TCP 3269

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

LDAP unsecure port for communication is

A

TCP 389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Layer 1 - Physical

A
EIA/TIA-232
EIA/TIA-449
X.21
HSSI
SONET
V.24
V.35
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Layer 2 - Data Link

A

SLIP, PPP, ARP, RARP, L2F, L2TP, PPTP, FDDI, ISDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Layer 3 - Network

A

ICMP, RIP, OSPF, BGP, IGMP, IP, IPSec, IPX, NAT, SKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Layer 4 - Transport

A

SPX, SSL, TLS, TCP, and UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layer 5 - Session

A

NFS, SQL, and RPC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Layer 6 - Presentation

A

ASCII, EBCDICM, TIFF, JPEG, MPEG, MIDI & SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Layer 7 - Application

A

HTTP, FTP, LPD, SMTP, Telnet, TFTP, EDI, POP3, IMAP, SNMP, NNTP, S-RPC, and SET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

which OSI layer manages the simplex and duplex modes of comunication

A

Layer 5 Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 4 TCP/IP Layers and what layers of the OSI model do they correspond to

A

Application - Layers 5,6,7
Transport - Layer 4
Internet - Layer 3
Link - Layers 1 & 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the name of the wireless attack on bluetooth and what device is most commonly associated with this attack

A

Bluejacking - cell phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the IEEE 802.xx wireless standards

A
Ethernet - 802.3
Token Ring - 802.5
Wireless 802.11
Wireless Personal Area Network 802.15
- 802.15.1 Blutooth
- 802.15.4 Zigbee
Wireless Metropolis Area Network 802.16
Wireless Broadband 802.20
Wireless Regional Area Network 802.22
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

examining data from a message header. Usually, the rules are concerned with source, destination,
and port addresses. firewall is unable to provide user authentication or to tell whether a packet originated from inside or outside the private network, and it is easily fooled with spoofed packets.

A

static packet filtering firewall - works on layer 3 of osi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

type of firewall that filters traffc based on the Internet service used to transmit or receive the data

A

application or proxy firewall - works layer 7 osi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

type of firewall used to establish communication sessions between trusted partners

A

circuit gateway firewall - works on layer 5 of OSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

type of firewall used evaluates the state or the context of network traffic. By examining source and destination addresses, application usage, source of origin, and relationship between current packets and the previous packets of the same session

A

dynamic or stateful inspection firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Coax & UTP Cable Category/Throughput/Length

A

Cat1 voice only usable by modems only
Cat2 4Mbps host to term on mainframes
Cat3 10Mbps 10BaseT Ethernet 300ft
Cat4 16Mbps TokenRing 300ft
Cat5 100Mbps 100BaseTX, FDDI & ATM 300ft
Cat6 1 Gbps on high speed networks
Cat7 10 Gbps on 10 Gb networks

10Base2 10Mbps 550ft
10Base5 10Mbps 1500ft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

rule that defines the number of repeaters/concentrators and segments that can be used in a network design.

A

5-4-3 rule - rule does not apply to switched networks or the use of bridges or routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

you are unlikely to obtain true end-to-end protection from a communications service provider

A

due to CALEA law which allows wiretapping by law enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are the mechanisms used to support TCP/

IP communications between mobile phones and the Internet are based on 3G and 4G technologies

A

WAP, GSM, EDGE, HPDSA, and LTE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what attack allows hackers to connect with your Bluetooth devices without your knowledge and extract information from them

A

blue-snarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what attack that grants hackers remote control over the feature and functions of a Bluetooth device

A

blue bugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what is used to eavesdrop on conversations that are on 900Mhz, 2 & 5Ghz such as baby monitors and codeless phones

A

frequency scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

high-speed token-passing technology that employs

two rings with traffc flowing in opposite directions

A

FDDI Fiber Distributed Data Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

continuous signal that varies in frequency,

amplitude, phase, voltage, and so on. The variances in the continuous signal produce a wave shape

A

Analog Communication signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

use of a discontinuous electrical signal and a state change or on-off pulses

A

Digital Communications signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

rely on a timing or clocking mechanism embedded in the data stream; typically able to support very high rates of data transfer

A

Synchronous communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

rely on a stop and start delimiter bit to manage the
transmission of data; best suited for smaller amounts of
data.

A

Asynchronous communication

Public switched telephone network (PSTN) modems are good examples of asynchronous communication devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

can support only a single communication channel; digital signal and give examples

A

Baseband technology

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

can support multiple simultaneous signals; frequency modulation to support numerous channels; high throughput rates; analog signal. and give examples

A

Broadband technology

T1, T3, ISDN, DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

communications to all possible recipients

A

Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

communications to multiple specific recipients

A

Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

communication to a specific recipient

A

Unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
  1. The host listens to the LAN media to determine whether it is in use.
  2. If the LAN media is not being used, the host transmits its communication.
  3. The host waits for an acknowledgment.
  4. If no acknowledgment is received after a time-out period, the host starts over at step 1
A

Carrier-Sense Multiple Access (CSMA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
  1. The host has two connections to the LAN media: inbound and outbound. The host
    listens on the inbound connection to determine whether the LAN media is in use.
  2. If the LAN media is not being used, the host requests permission to transmit.
  3. If permission is not granted after a time-out period, the host starts over at step 1.
  4. If permission is granted, the host transmits its communication over the outbound connection.
  5. The host waits for an acknowledgment.
  6. If no acknowledgment is received after a time-out period, the host starts over at step 1.
A

Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

examples of networks that employ CSMA/CA technologies

A

AppleTalk and 802.11 wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
  1. The host listens to the LAN media to determine whether it is in use.
  2. If the LAN media is not being used, the host transmits its communication.
  3. While transmitting, the host listens for collisions (in other words, two or more hosts transmitting simultaneously).
  4. If a collision is detected, the host transmits a jam signal.
  5. If a jam signal is received, all hosts stop transmitting. Each host waits a random period of time and then starts over at step 1.
A

Carrier-Sense Multiple Access with Collision Detection (CSMA/CD)

40
Q

LAN media access technology that performs communications using a master-slave configuration Synchronous Data Link Control (SDLC) uses this

41
Q

What the four data names within th OSI model and what layers are they at

A
Layer 1 - bit
Layer 2 - frame
Layer 3 - packet
Layer 4 - segment/datagram
Layers 5-7 data stream
42
Q

Windows sharing protocol of Server Message Block (SMB), which
is also known as

A

Common Internet File System (CIFS)

43
Q

non-IP protocols are rare, most firewalls are unable to perform packet header, address, or payload content fltering on those protocols. Thus, when it comes to nonIP protocols, a firewall typically must either block all or allow

44
Q

routing protocols maintain a list of destination networks along with
metrics of direction and distance as measured in hops
Routing Information Protocol (RIP), Interior Gateway Routing Protocol (IGRP), and Border Gateway Protocol (BGP)

A

Distance Vector

45
Q

routing protocols maintain a topography map of all connected networks and use this map to determine the shortest path to the destination example Open Shortest Path First (OSPF).

A

Link State

46
Q

Common ICMP type field values

A
0=Echo Reply
3=Destination unreachable
5=Redirect
8=Echo Request
9=Router Advertisement
10=Router Solicitation
11=Time Exceeded
47
Q

attacker inserts bogus information into the ARP cache

A

ARP Cache poisoning

48
Q

TCP port 23

49
Q

TCP port 20 & 21

50
Q

UDP port 69

51
Q

TCP port 25

52
Q

TCP port 110

53
Q

TCP port 143

54
Q

UDP port 67

A

BootP/DHCP server point to point response

55
Q

UDP port 68

A

BootP/DHCP client request broadcast

56
Q

TCP port 80

57
Q

TCP port 443

58
Q

TCP port 515

A

LPD Line Print Daemon

59
Q

TCP ports 6000-6063

A

X Windows - GUI AP for command line operating systems

60
Q

TCP port 2049

A

NFS - Network File System for file sharing for dissimilar systems

61
Q

UDP port 161

A

SNMP - collect network health information

62
Q

UDP port 162

A

SNMP - trap messages

63
Q

primarily used in the electric and water utility and management industries. It is used to support communications between data
acquisition systems and the system control equipment. This includes substation computers, RTUs (remote terminal units) (devices controlled by an embedded microprocessor), IEDs (Intelligent Electronic Devices), and SCADA master stations (i.e., control centers).

A

DNP3 - Distributed Network Protocol

64
Q

open and public standard, multilayer protocol that functions similarly to that of TCP/IP, in that it has link, transport, and transportation layers.

A

DNP3 - Distributed Network Protocol

65
Q

merging of specialty or proprietary protocols with standard
protocols, such as those from the TCP/IP suite. the ability to use existing TCP/IP supporting network infrastructure to host special or
proprietary services without the need for unique deployments of alternate networking hardware

A

Converged protocols

66
Q

a form of network data-storage solution (storage area network [SAN]) or network-attached storage [NAS]) that allows for high-speed file transfers at upward of 16 Gbps. requires its own dedicated infrastructure (separate cables)

A

Fibre Channel

67
Q

can be used to support fiber communication over the existing network infrastructure. used to encapsulate communications over Ethernet networks. It typically requires 10 Gbps Ethernet in order to support the fiber channel protocol

A

Fibre Channel over Ethernet (FCoE)

68
Q

high-throughput high-performance network technology that directs data across a network based on short path labels rather than longer network addresses; network is not limited to TCP/IP and compatible protocols. Thisenables the use of many other networking technologies, including T1/E1, ATM, Frame Relay, SONET, and DSL.

A

MPLS (Multiprotocol Label Switching)

69
Q

networking storage standard based on IP; Low cost alternative to Fibre Channel

A

Internet Small Computer System Interface (iSCSI)

70
Q

Another name for network virtualization. It allows
data transmission paths, communication decision trees, and flow control to be virtualized in the control layer rather than being handled on the hardware on a per-device basis; No longer required to have only one vendor for networking equipment

A

SDN - Software Defined Networking

71
Q

a collection of resource services deployed in numerous data centers across the Internet in order to provide low latency, high performance, and high availability of the hosted content

A

CDN - Content Distributed Network

72
Q

most widely recognized P2P CDN

A

BitTorrent

73
Q

802.11 wireless amendments (versions) and speed of each

A
  1. 11 2Mb
  2. 11a 54Mb
  3. 11b 11Mb
  4. 11g 54Mb
  5. 11n 200+Mb
  6. 11ac 1Gbps
74
Q

when the wireless access point acts as a connection point to link the wireless clients to the wired network

A

Wired Extension mode

75
Q

when multiple wireless access points (WAPs) are used to connect a large physical area to the same wired network

A

enterprise extended mode

76
Q

how many wireless channels are in the US? Europe? Japan?

A

11, 13, 17

77
Q

similar in structure to that of traditional roof TV antennas. antennas are crafted from a straight bar with cross sections to catch specifc radio frequencies in the direction of the main bar

A

Yagi antenna

78
Q

constructed from tubes with one sealed end. They focus along the direction of the open end of the tube. Some of the first of these antennas were crafted from Pringles cans.

79
Q

constructed from tubes with one sealed end. They focus along the direction of the open end of the tube. Some of the first of these antennas were crafted from Pringles cans.

A

cantennas antenna

80
Q

used to focus signals from very long distances or weak sources

A

parabolic antenna

81
Q

other names for omni directional antenna

A

base antenna or rubber duck antenna

82
Q

What are three benefits to network segmentation

A
  • boost performance
  • reduce communications problems
  • increase security
83
Q

what technology is associated with cell phones accessing the internet rather than the 802.11 wireless networking

A

Wireless Application Protocol (WAP)

84
Q

alternative to WEP; It is based on the LEAP and TKIP cryptosystem and employs a secret passphrase

A

Wi-Fi Protected Access (WPA)

85
Q

known as the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP), which is based on
the AES encryption scheme.

86
Q

authentication framework allows for new authentication technologies to be compatible with existing wireless or point-to-point connection technologies

A

EAP - Extensible Authentication Protocol

87
Q

encapsulates EAP methods within a TLS tunnel that provides authentication and potentially encryption

A

PEAP (Protected Extensible Authentication Protocol)

88
Q

Cisco proprietary alternative to TKIP for WPA

A

LEAP (Lightweight Extensible Authentication Protocol)

89
Q

designed as the replacement for WEP without requiring replacement of legacy wireless hardware

A

TKIP (Temporal Key Integrity Protocol)

90
Q

authentication technique that redirects a newly connected wireless web client to a access control page

A

captive portal

91
Q

what frequency division multiplexing offers high throughput with the least interference.

A

Orthogonal Frequency‐Division Multiplexing (OFDM)

92
Q

portable devices use a cell phone carrier’s network to establish communication links with the Internet

A

Wireless Application Protocol

93
Q

provides security connectivity services similar to those of SSL or TLS for cell phones

A

Wireless Transport Layer Security

94
Q

What are Common private circuit technologies include dedicated
or leased lines

A

PPP, SLIP, ISDN, and DSL connections.

95
Q

What are packet-switching technologies

A

X.25, Frame Relay, asynchronous transfer mode (ATM), Synchronous Data Link Control (SDLC), and High-Level Data Link Control (HDLC), SMDS & HSSI