Chapter 11 Flashcards
What is the addition of a header, and possibly a footer, to the data received by each layer from the layer above before it’s handed off to the layer below.
Encapsulation
What is the container name for OSI layers 5-7?
PDU
What is the container name for OSI layer 4?
Segment/Datagram
What is the container name for OSI layer 3?
Packet
What is the container name for OSI layer 2?
Frame
What is the container name for OSI layer 1?
Bits
What are the protocols for interior routing ?
RIP
IGRP
OSPF
IS-IS
What are the protocols for exterior routing?
BGP
What are attacks related to DNS poisoning ?
Rouge DNS Server
Pharming
Altering host file
Corrupting IP configuration
DNS query spoofing
Proxy Falsification
What attack is the act of changing the registration of the domain name without the authorization of the owner ?
Domain Hijacking
What are the drawbacks of using multilayer protocols ?
Covert Channels
Filter bypass
Violation of network segmentation boundaries
What are the benefits of multilayer protocols?
Can be used at higher OSI layers
Encryptions
Flexibility
Resiliency
What are some examples of network segmentation?
Intranet
Extranet
Screened Subnets
What are the benefits of network segmentation?
Manage traffic
Improve performance
Enforce security
What is the act of dividing up an internal network into numerous sub zones ?
Micro segmentation
How are micro-segmentated zones separated ?
ISFWs
Subnets
VLANs
What are some converged protocols ?
FCoE
MPLS
iSCSI
VPN
SDN
IaC
What are the two authentication options supported by WPA2?
PSK/PER and 802.1x/ENT
What encryption standard does WPA3 use ?
192-bit AES-CCMP
What encryption standard does WPA3-PER use?
128-bit AES CCMP
Which WPA3 method uses SAE?
WPA3 128-bit AES CCMP
What performs a zero knowledge proof process known as dragonfly key exchange which is a derivative of Diffie-Hellman?
SAW
What are some wireless attacks ?
Evil Twin
Rouge Access Points
Disassociation
Jamming
IV Abuse
War Driving
Replay
What security mechanism seeks to detect, record, evaluate, and respond to suspicious activities?
EDR