Ch6 The Basic LAN Flashcards

1
Q

___ filter and forward data based on MAC addresses

A

switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MAC addresses are part of layer ___ of the network

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a ___ involves splitting a Domain and assigning the parts to different ports

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

switches are generally equipped with ___ guarding, which mitigate against the danger of ___

A

flood; bridge loops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ Protocol was developed to prevent bridge loops, but must be enabled in the ___ interface

A

Spanning Tree Protocol (STP); switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ filter and forward data based on IP Addresses

A

routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___ could also be called layer 3 switches

A

routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a router is the interface between different ___

A

network ID’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a router connecting a LAN to the Internet is called a ___

A

Gateway router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

because a router assigns private IP addresses to all the devices on a LAN, it will always be running ___

A

Network Address Translation (NAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

because a gateway router is interfacing with the Internet, it will have a ___

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

in a LAN, computers are connected to create a ___

A

Broadcast Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

two or more LAN’s connected form a ___

A

Wide Area Network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

several LAN’s and WAN’s connected within a city form a ___

A

Metropolitan Area Network (MAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the protocol underlying both the internet and LAN’s is ___

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

when a LAN has two routers, one facing the internet and the other interfacing the rest of the network, the space between them is called a ___

A

Demilitarized Zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a Wireless Access Point (WAP) assigns an ___ to every device (cellphone, laptop, etc.) connected to it

A

Service Set Identifier (SSID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

an ___ network is completely isolated from the outside world

A

Air-Gapped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

the foundation of most protocols, originally designed for Dial-Up connections but still used extensively is ___

A

Point to Point Protocol (PPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

the ___ protocol, originally an extension to PPP that just does authentication and has several versions

A

Extensible Authentication Protocol (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

the EAP protocol ___ hashes passwords, and is identical to Microsoft’s MSCHAP

22
Q

the EAP protocol ___ uses pre-determined symmetric keys

23
Q

the EAP protocol ___ requires server and client certificates, allowing it to use more modern encryption

24
Q

the EAP protocol ___ uses the TLS encryption, but only the Server needs a certificate

25
firewall settings can broadly be divided into ___ and ___
Stateful; Stateless
26
firewall settings are stored in an ___
Access Control List
27
in a ___ Proxy, the proxy forwards requests on behalf of the Client, and more refined filtering and caching of data is achieved
Forward
28
a ___ Proxy protects the Client, but requires no setup
Transparent
29
a ___ Proxy is situated outside the internet connection but still behind a firewall with a special VPN called an ___ leading back to the Client, allowing the Client to appear to be, for instance, in another country
Modern Forward; Encrypted Tunnel
30
a ___ Proxy hides and protects the Server rather than the Client
Reverse
31
sometimes when network intrusion is suspected a ___ will be created, emulating the server and logging all keystrokes and ports used
Honeypot
32
___ emulates a machine on a LAN, but if you copy a file using it the file never leaves the LAN
Remote Desktop
33
using a ___ you can emulate a machine on a remote LAN be assigned a IP address and copy files to your machine as if you were connected via ethernet
Virtual Private Network
34
a VPN connects two ___ via a ___
Endpoints; VPN Tunnel
35
in order to speed up internet access on a VPN, ___ is used
Split Tunneling
36
the earliest VPN Tunnel protocol used, which has no real encryption, was ____, and uses TCP port ___
Point to Point Tunneling Protocol (PPTP); 1723
37
a proprietary Cisco VPN Tunnel protocol which uses IPsec encryption is called ___ and uses UDP ports ___
Layer 2 Tunneling Protocol (L2TP); 500 & 4500
38
it is possible to use ___ for both VPN Tunneling and encryption, which is very fast and works particularly well with IPv6
Ipsec
39
a VPN protocol often used within a web browser that uses TLS encryption is called ___, and uses TCP port ___
Secure Sockets Layer/Transport Layer Security (SSL/TLS); 443
40
___ is an open standard protocol for VPN, which uses TCP port ___ but can easily be changed
OpenVPN; 1194
41
IPsec can be done either with just an ___ added to the original IP address for integrity checking ("transport mode"), or within an ___ which assignes a whole new IP address ("tunnel mode")
Authentication Header; Encapsulating Security Payload (ESP)
42
IPsec uses the ___ protocol to handle initial authentication, key exchange, certificates, etc...
Internet Security Agreement Key Management Protocol (ISAKMP)
43
a NIPS uses 4 criteria to detect intrusions:
packet behavior/anomalies; signatures; rule-based; heuristic
44
NID/NIP systems use a ___ to record all network traffic, and ___ to see what's happening on all the ports
network tap; port mirroring
45
when configuring NID/NIP systems, ___ are typically out of band, and ___ in band
IDS; IPS
46
NID/NIP systems use ___ to gather data and ___ to look for patterns
collectors; correlation engines
47
a ___ system collects and analyzes network traffic data
Security Information and Event Management (SIEM)
48
a SIEM system aggregated data using time ___, event ___ and ___ of tables
synchronization; de-duplication; normalization
49
data logs are maintained according to the principle of ___
Write Once Read Many (WORM)
50
SIEM systems report on correlations through ___ and ___
Alerts; Triggers
51
a honeypot would be located in the ___ of the network
DMZ