Ch6 The Basic LAN Flashcards

1
Q

___ filter and forward data based on MAC addresses

A

switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MAC addresses are part of layer ___ of the network

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a ___ involves splitting a Domain and assigning the parts to different ports

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

switches are generally equipped with ___ guarding, which mitigate against the danger of ___

A

flood; bridge loops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ Protocol was developed to prevent bridge loops, but must be enabled in the ___ interface

A

Spanning Tree Protocol (STP); switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ filter and forward data based on IP Addresses

A

routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___ could also be called layer 3 switches

A

routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a router is the interface between different ___

A

network ID’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a router connecting a LAN to the Internet is called a ___

A

Gateway router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

because a router assigns private IP addresses to all the devices on a LAN, it will always be running ___

A

Network Address Translation (NAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

because a gateway router is interfacing with the Internet, it will have a ___

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

in a LAN, computers are connected to create a ___

A

Broadcast Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

two or more LAN’s connected form a ___

A

Wide Area Network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

several LAN’s and WAN’s connected within a city form a ___

A

Metropolitan Area Network (MAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the protocol underlying both the internet and LAN’s is ___

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

when a LAN has two routers, one facing the internet and the other interfacing the rest of the network, the space between them is called a ___

A

Demilitarized Zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a Wireless Access Point (WAP) assigns an ___ to every device (cellphone, laptop, etc.) connected to it

A

Service Set Identifier (SSID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

an ___ network is completely isolated from the outside world

A

Air-Gapped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

the foundation of most protocols, originally designed for Dial-Up connections but still used extensively is ___

A

Point to Point Protocol (PPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

the ___ protocol, originally an extension to PPP that just does authentication and has several versions

A

Extensible Authentication Protocol (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

the EAP protocol ___ hashes passwords, and is identical to Microsoft’s MSCHAP

A

EAP-MD5

22
Q

the EAP protocol ___ uses pre-determined symmetric keys

A

EAP-PSK

23
Q

the EAP protocol ___ requires server and client certificates, allowing it to use more modern encryption

A

EAP-TLS

24
Q

the EAP protocol ___ uses the TLS encryption, but only the Server needs a certificate

A

EAP-TTLS

25
Q

firewall settings can broadly be divided into ___ and ___

A

Stateful; Stateless

26
Q

firewall settings are stored in an ___

A

Access Control List

27
Q

in a ___ Proxy, the proxy forwards requests on behalf of the Client, and more refined filtering and caching of data is achieved

A

Forward

28
Q

a ___ Proxy protects the Client, but requires no setup

A

Transparent

29
Q

a ___ Proxy is situated outside the internet connection but still behind a firewall with a special VPN called an ___ leading back to the Client, allowing the Client to appear to be, for instance, in another country

A

Modern Forward; Encrypted Tunnel

30
Q

a ___ Proxy hides and protects the Server rather than the Client

A

Reverse

31
Q

sometimes when network intrusion is suspected a ___ will be created, emulating the server and logging all keystrokes and ports used

A

Honeypot

32
Q

___ emulates a machine on a LAN, but if you copy a file using it the file never leaves the LAN

A

Remote Desktop

33
Q

using a ___ you can emulate a machine on a remote LAN be assigned a IP address and copy files to your machine as if you were connected via ethernet

A

Virtual Private Network

34
Q

a VPN connects two ___ via a ___

A

Endpoints; VPN Tunnel

35
Q

in order to speed up internet access on a VPN, ___ is used

A

Split Tunneling

36
Q

the earliest VPN Tunnel protocol used, which has no real encryption, was ____, and uses TCP port ___

A

Point to Point Tunneling Protocol (PPTP); 1723

37
Q

a proprietary Cisco VPN Tunnel protocol which uses IPsec encryption is called ___ and uses UDP ports ___

A

Layer 2 Tunneling Protocol (L2TP); 500 & 4500

38
Q

it is possible to use ___ for both VPN Tunneling and encryption, which is very fast and works particularly well with IPv6

A

Ipsec

39
Q

a VPN protocol often used within a web browser that uses TLS encryption is called ___, and uses TCP port ___

A

Secure Sockets Layer/Transport Layer Security (SSL/TLS); 443

40
Q

___ is an open standard protocol for VPN, which uses TCP port ___ but can easily be changed

A

OpenVPN; 1194

41
Q

IPsec can be done either with just an ___ added to the original IP address for integrity checking (“transport mode”), or within an ___ which assignes a whole new IP address (“tunnel mode”)

A

Authentication Header; Encapsulating Security Payload (ESP)

42
Q

IPsec uses the ___ protocol to handle initial authentication, key exchange, certificates, etc…

A

Internet Security Agreement Key Management Protocol (ISAKMP)

43
Q

a NIPS uses 4 criteria to detect intrusions:

A

packet behavior/anomalies; signatures; rule-based; heuristic

44
Q

NID/NIP systems use a ___ to record all network traffic, and ___ to see what’s happening on all the ports

A

network tap; port mirroring

45
Q

when configuring NID/NIP systems, ___ are typically out of band, and ___ in band

A

IDS; IPS

46
Q

NID/NIP systems use ___ to gather data and ___ to look for patterns

A

collectors; correlation engines

47
Q

a ___ system collects and analyzes network traffic data

A

Security Information and Event Management (SIEM)

48
Q

a SIEM system aggregated data using time ___, event ___ and ___ of tables

A

synchronization; de-duplication; normalization

49
Q

data logs are maintained according to the principle of ___

A

Write Once Read Many (WORM)

50
Q

SIEM systems report on correlations through ___ and ___

A

Alerts; Triggers

51
Q

a honeypot would be located in the ___ of the network

A

DMZ