Chapter 10 Flashcards

1
Q
Layer 7
Layer 6
Layer 5
Layer 4
Layer 3
Layer 2
Layer 1
A

7 Application-user interface
6 Presentation-Data format; encryption
5 Session-Process to process communication
4 Transport-End to end communication
3 Network-Routing data; logical addressing; WAN delivery
2 Data link-Physical Addressing, LAN delivery
1 Physical-Signaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wide area networks

A

Connect systems over a large geographic area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Local Area Networks

A

Provide network connectivity for computers located in the same geographic area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WAN connectivity options

A

Cable modem, DSL, fiber optics, satellite, dial up, cellular 3G and 4G networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Ethernet standard:

A

Defines the way that computers communicate on the network

Governs both the Physical and Data Link layers
Defines how computers use MAC addresses to communicate with each other on the network

Ethernet has become the most common LAN technology in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hubs

A

a network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Switches

A

Perform intelligent filtering
“Know” the MAC address of the system connected to each port

When they receive a packet on the network, they look at the destination MAC address and send the packet only to the port where the destination system resides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virtual LANs (VLANs)

A

is a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire, when in fact they are located on a number of different LAN segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPv4 addresses

A

Four-byte (32-bit) addresses that uniquely identify every device on the network
Still the most common

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPv6 addresses

A

Are 128 bits long
Provide more unique device addresses
Are more secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Dynamic Host Configuration Protocol (DHCP)

A

is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope) configured for a given network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network port

A

a number that tells a receiving device where to send messages it receives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Internet Control Message Protocol (ICMP)

A

A management and control protocol for IP

Delivers messages between hosts about the health of the network

ICMP tools:
Ping sends a single packet to a target IP address (ICMP echo request)

Traceroute uses ICMP echo request packets to identify the path that packets travel through a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network Security Risks

A

Reconnaissance-
The act of gathering information about a network for use in a future attack

Eavesdropping-
When an attacker an attacker taps the data cable to see all data passing through it

Denial of service (DoS)-
Flooding a network with traffic and shutting down a single point of failure

Distributed DoS (DDoS)
Uses multiple compromised systems to flood the network from many different directions

Telephony denial of service (TDoS)
Attempts to prevent telephone calls from being successfully initiated or received by some person or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Basic Network Security Defense Tools

A

Firewalls

Virtual private networks and remote access

Network access control (NAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

firewall

A

controls the flow of traffic by preventing unauthorized network traffic from entering or leaving a particular portion of the network

17
Q

Firewall Security Features:
Flood Guard-
Loop protection-
Network separation-

A

Flood guard-Rules can limit traffic bandwidth from hosts, reducing the ability for any one host to flood a network

Loop protection-Firewalls can look at message addresses to determine whether a message is being sent around an unending loop (for example, from another form of flooding)

Network Separation-Filtering rules enforce divisions between networks, keeping traffic from moving from one network to another

18
Q

Firewall types (3)

A

Packet filtering, application proxy, stateful inspection

19
Q

packet filtering

A

A packet-filtering firewall is very basic. It compares received traffic with a set of rules that define which traffic it will permit to pass through the firewall. It makes this decision for each packet that reaches the firewall and has no memory of packets it has encountered in the past.

20
Q

stateful inspection

A

• Stateful inspection: A stateful inspection firewall remembers information about the status of a network communication. Once the firewall receives the first packet in a communication, the firewall remembers that communication session until it is closed. This type of firewall does not have to check its rules each time it receives a packet. It only needs to check rules when a new communication session starts.

21
Q

application proxy

A

Application proxy: An application proxy firewall goes further than a stateful inspection firewall. It doesn’t actually allow packets to travel directly between systems on opposite sides of the firewall. The firewall opens separate connections with each of the two communicating systems and then acts as a broker (or proxy) between the two. This allows for an added degree of protection, because the firewall can analyze information about the application in use when making the decision to allow or deny traffic.

22
Q

Border Firewall

A

Separates the protected network from the Internet

23
Q

URL filter

A

Filters web traffic by examining the URL as opposed to the IP address

24
Q

Content inspection

A

The device looks at some or all network packet content to determine if the packet should be allowed to pass

25
Q

Malware inspection

A

A specialized form of content inspection, the device looks at packet content for signs of malware

26
Q

The three major VPN technologies in use today

A

Point-to-Point Tunneling Protocol (PPTP)

Secure Sockets Layer (SSL)

and Transport Layer Security (TLS)
Internet Protocol Security (IPSec)

27
Q

Point-to-Point Tunneling Protocol (PPTP):

A

PPTP was once the predominant VPN protocol. For many years, almost all VPNs used PPTP. It is easy to set up on client computers because most operating systems include PPTP support.

28
Q

Secure Sockets Layer (SSL):

A

SSL encrypts web communications, and many VPNs use SSL to provide encrypted communication. Users connect to an SSL-protected webpage and log on. Their web browser then downloads software that connects them to the VPN. Due to recent security issues, use TLS whenever possible.

29
Q

Internet Protocol Security (IPSec):

A

IPSec is a suite of protocols designed to connect sites securely. Although some IPSec VPNs are available for end users, they often require the installation of third-party software on the user’s system and are not popular. Many organizations use IPSec to connect one site to another securely over the Internet. The required IPSec VPN functionality is built into many routers and firewalls, allowing for easy configuration.