Chapter 11 Flashcards
What is the addition of a header, and possibly a footer, to the data received by each layer from the layer above before it’s handed off to the layer below.
Encapsulation
What is the container name for OSI layers 5-7?
PDU
What is the container name for OSI layer 4?
Segment/Datagram
What is the container name for OSI layer 3?
Packet
What is the container name for OSI layer 2?
Frame
What is the container name for OSI layer 1?
Bits
What are the protocols for interior routing ?
RIP
IGRP
OSPF
IS-IS
What are the protocols for exterior routing?
BGP
What are attacks related to DNS poisoning ?
Rouge DNS Server
Pharming
Altering host file
Corrupting IP configuration
DNS query spoofing
Proxy Falsification
What attack is the act of changing the registration of the domain name without the authorization of the owner ?
Domain Hijacking
What are the drawbacks of using multilayer protocols ?
Covert Channels
Filter bypass
Violation of network segmentation boundaries
What are the benefits of multilayer protocols?
Can be used at higher OSI layers
Encryptions
Flexibility
Resiliency
What are some examples of network segmentation?
Intranet
Extranet
Screened Subnets
What are the benefits of network segmentation?
Manage traffic
Improve performance
Enforce security
What is the act of dividing up an internal network into numerous sub zones ?
Micro segmentation
How are micro-segmentated zones separated ?
ISFWs
Subnets
VLANs
What are some converged protocols ?
FCoE
MPLS
iSCSI
VPN
SDN
IaC
What are the two authentication options supported by WPA2?
PSK/PER and 802.1x/ENT
What encryption standard does WPA3 use ?
192-bit AES-CCMP
What encryption standard does WPA3-PER use?
128-bit AES CCMP
Which WPA3 method uses SAE?
WPA3 128-bit AES CCMP
What performs a zero knowledge proof process known as dragonfly key exchange which is a derivative of Diffie-Hellman?
SAW
What are some wireless attacks ?
Evil Twin
Rouge Access Points
Disassociation
Jamming
IV Abuse
War Driving
Replay
What security mechanism seeks to detect, record, evaluate, and respond to suspicious activities?
EDR
What is a combination of multiple technologies such as a SIEM, EDR, NTA, and IDS?
MDR
What service monitors an IT environment in real time to quickly detect and resolve threats ?
MDR
What service is not limited to endpoints and focuses on threat detection and mediation ?
MDR
Managed Detection and Response
What is a variation of EDR?
EPP
Endpoint Protection Platform
What are the four main security functions of EPP?
Predict
Prevent
Detect
Respond
What often includes components of EDR, MDR, and EPP?
XDR
Extended Detection and Response
What can be deployed fully on premises, in the cloud, or as a hybrid structure ?
MSSP
Managed Security Service Provider
What can provide XDR solutions that are centrally controlled and managed ?
MSSP
What is a remote access multilayer switch used to connect distant networks over WAN links ?
LAN Extender