Chapter 11 Flashcards

1
Q

What is the addition of a header, and possibly a footer, to the data received by each layer from the layer above before it’s handed off to the layer below.

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the container name for OSI layers 5-7?

A

PDU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the container name for OSI layer 4?

A

Segment/Datagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the container name for OSI layer 3?

A

Packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the container name for OSI layer 2?

A

Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the container name for OSI layer 1?

A

Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the protocols for interior routing ?

A

RIP
IGRP
OSPF
IS-IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the protocols for exterior routing?

A

BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are attacks related to DNS poisoning ?

A

Rouge DNS Server
Pharming
Altering host file
Corrupting IP configuration
DNS query spoofing
Proxy Falsification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What attack is the act of changing the registration of the domain name without the authorization of the owner ?

A

Domain Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the drawbacks of using multilayer protocols ?

A

Covert Channels
Filter bypass
Violation of network segmentation boundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the benefits of multilayer protocols?

A

Can be used at higher OSI layers
Encryptions
Flexibility
Resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some examples of network segmentation?

A

Intranet
Extranet
Screened Subnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the benefits of network segmentation?

A

Manage traffic
Improve performance
Enforce security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the act of dividing up an internal network into numerous sub zones ?

A

Micro segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How are micro-segmentated zones separated ?

A

ISFWs
Subnets
VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some converged protocols ?

A

FCoE
MPLS
iSCSI
VPN
SDN
IaC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the two authentication options supported by WPA2?

A

PSK/PER and 802.1x/ENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What encryption standard does WPA3 use ?

A

192-bit AES-CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What encryption standard does WPA3-PER use?

A

128-bit AES CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which WPA3 method uses SAE?

A

WPA3 128-bit AES CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What performs a zero knowledge proof process known as dragonfly key exchange which is a derivative of Diffie-Hellman?

A

SAW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are some wireless attacks ?

A

Evil Twin
Rouge Access Points
Disassociation
Jamming
IV Abuse
War Driving
Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What security mechanism seeks to detect, record, evaluate, and respond to suspicious activities?

A

EDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a combination of multiple technologies such as a SIEM, EDR, NTA, and IDS?
MDR
26
What service monitors an IT environment in real time to quickly detect and resolve threats ?
MDR
27
What service is not limited to endpoints and focuses on threat detection and mediation ?
MDR Managed Detection and Response
28
What is a variation of EDR?
EPP Endpoint Protection Platform
29
What are the four main security functions of EPP?
Predict Prevent Detect Respond
30
What often includes components of EDR, MDR, and EPP?
XDR Extended Detection and Response
31
What can be deployed fully on premises, in the cloud, or as a hybrid structure ?
MSSP Managed Security Service Provider
32
What can provide XDR solutions that are centrally controlled and managed ?
MSSP
33
What is a remote access multilayer switch used to connect distant networks over WAN links ?
LAN Extender
34
What is a remote access system used to make accessing a system or network easier or more securely.
Jumpbox / Jump server
35
What is often deployed in extranets, screened subnets, or cloud networks where standard direct links or private channels is not available.
Jump box / Jump server
36
What is based on SoC and collects and transmits information back to a central system for storage and analysis?
Sensors
37
What enables the leveraging of an existing AAA service like RADIUS or TACACS+ for authentication?
ENT
38
What is a mapping of signal strength measurements over a building’s blueprints?
Heat Map
39
What are the concerns of IPV6?
More addresses for attackers All security products must be upgraded Loss/Lack for NAT
40
What are three ways for IPV4 and IPV6 to coexist on the same network ?
Dual Stack Tunneling NAT-PT
41
What means having the system run both IPV4 and IPV6 and using the correct protocol for each conversation?
Dual stack
42
What allows most systems to operate a single stack of either IPV4 or IPV6 and use an encapsulation tunnel to access systems of the other protocol.
Tunneling
43
What can be used to convert between IPv4 and IPv6 network segments?
NAT-PT
44
What is the default subnet mask of Class A and CIDR equivalent?
255.0.0.0 or /8
45
What is the default subnet mask of Class B and CIDR equivalent?
255.255.0.0 or /16
46
What is the default subnet mask of Class C and CIDR equivalent?
255.255.255.0 or /24
47
What is used to determine the health of a network or specific link?
ICMP
48
What commands utilize ICMP?
Ping Traceroute Pathping
49
What attacks are used against ICMP?
Ping of Death Smurf Ping Flood
50
What protocol allows systems to support multicasting ?
IGMP
51
What protocol is used to convert IP 32 bit addresses into MAC addresses?
ARP
52
What attack is where an attacker send bogus information into the ARP cache?
ARP poisoning/spoofing
53
What is the best defense against ARP poisoning?
Port Security
54
What are all the ways to protect against ARP poisoning ?
Port Security Endpoint security products Static ARP entries
55
What is an authentication service for cross-network service communications and is simply a means to prevent unauthorized execution of code on remote systems.
S-RPC
56
What is a cryptographic protocol that provides end-to-end encryption for voice communications, videoconferencing, and text message services.
Signal protocol
57
What is nonfederated and is a core element in the messaging app named Signal.
Signal Protocol
58
What is an encryption protocol that operates at OSI layer 4 (by encrypting the payload of TCP communications).
TLS
59
What are the drawbacks of multilayered protocols ?
Covert channels are allowed. Filters can be bypassed. Logically imposed network segment boundaries can be overstepped.
60
What operate by encapsulating or converging data storage signals into TCP/IP communications in order to separate storage and proximity.
SAN
61
What are often used to enhance networked storage devices such as hard drives, drive arrays, optical jukeboxes, and tape libraries
SAN
62
What is a high-throughput high-performance network technology that directs data across a network based on short path labels rather than longer network addresses.
MPLS
63
What is a networking storage standard based on IP that operates at layer 3.
ISCSI
64
What technology can be used to enable location-independent file storage, transmission, and retrieval over LAN, WAN, or public internet connections ?
ISCSI
65
What is often viewed as a low-cost alternative to Fibre Channel.
ISCSI
66
What attacks are VOIP vulnerable to?
SPIT Host OS and DoS attacks
67
What aims to minimize the risk of DoS, on-path attacks, and other VoIP exploits through robust encryption and reliable authentication.
SRTP
68
What refers to the traffic flow that occurs within a specific network, data center, or cloud environment.
East-West Traffic
69
What refers to the traffic flow that occurs inbound or outbound between internal systems and external systems.
North-South Traffic
70
What philosophy requires a system to meet all current security requirements (such as patch application and malware scanner updates) before it is allowed to communicate with the network.
Preadmission
71
What philosophy allows and denies access based on user activity, which is based on a predefined authorization matrix.
Postadmission
72
What common ingress filters and egress filters can be used to block spoofed packets that often relate to malware, botnets, and other unwanted activities.
Blocking inbound packets claiming to have an internal source address Blocking outbound packets claiming to have an external source address Blocking packets with source or destination addresses listed on a block list Blocking packets that have source or destination addresses from the local area network (LAN) but haven't been officially assigned to a host
73
What is a standard or common proxy that acts as an intermediary for queries of external resources.
Forward Proxy
74
What handles inbound requests from external systems to internally located services.
Reverse Proxy
75
What is a type of security zone that can be positioned so that it operates as a buffer network between the secured private network and the internet and can host publicly accessible services.
Screened Subnet
76
What is a set of rules and restrictions that define how data is transmitted over a network medium (e.g., twisted-pair cable, wireless transmission).
Protocol
77
What is the addition of a header, and possibly a footer, to the data received by each layer from the layer above before it's handed off to the layer below.
Encapsulation
78
What layer is responsible for interfacing user applications, network services, or the operating system with the protocol stack.
Application Layer
79
What layer is responsible for transforming data into a format that any system following the OSI model can understand.
Presentation
80
What layer is responsible for managing the integrity of a connection and controlling the session.
Transport
81
What protocol is a path vector ?
BGP
82
What protocols make next hop decisions based on the entire remaining path (i.e., vector) to the destination.
Path Vector Protocols
83
What is a 6-byte (48-bit) binary address written in hexadecimal notation?
MAC Address