Chapter 11 Flashcards
Network hardware devices that function at the ____ layer, are network interface cards (NICs), hubs, repeaters, concentrators, and amplifiers.
Physical
Switches function at the ___ layer.
Data Link
___ is used to resolve IP addresses into MAC addresses.
Address Resolution Protocol (ARP)
____ used to resolve MAC addresses into
IP addresses.
Reverse Address Resolution Protocol (RARP)
The routing protocols are located at the _____ layer and include the following:
Internet Control Message Protocol (ICMP) Routing Information Protocol (RIP) Open Shortest Path First (OSPF) Border Gateway Protocol (BGP) Internet Group Management Protocol (IGMP) Internet Protocol (IP) Internet Protocol Security (IPSec) Internetwork Packet Exchange (IPX) Network Address Translation (NAT) Simple Key Management for Internet Protocols (SKIP)
Network layer
_______ determine the best logical path for the transmission of packets based on speed, hops, preference, and so on.
Routers
__________ use the destination IP address to guide the transmission of packets.
Routers
_______ routing protocols maintain a list of destination networks along with metrics of direction and distance as measured in hops (in other words, the number of routers to cross to reach the destination).
Distance vector
________ routing protocols maintain a topography map of all connected networks and use this map to determine the shortest path to the destination.
Link state
Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Sequenced Packet Exchange (SPX), Secure Sockets Layer (SSL), Transport Layer Security (TLS) operate within the ________ layer
Transport layer:
\_\_\_\_\_\_\_\_\_\_ manages dialogue discipline or dialogue control (simplex, half-duplex, full-duplex), establishes checkpoints for grouping and recovery, and retransmits PDUs that have failed or been lost since the last verified checkpoint.
The Session layer
The _________ is responsible for establishing, maintaining, and terminating communication sessions between two computers.
Session layer
_________ layer is also responsible for encryption and compression.
Presentation
_______ is a simplex connectionless protocol.
UDP
- The client sends a ____ flagged packet to the server.
- The server responds with a ______ flagged packet
back to the client. - The client responds with an ___________ flagged packet back to the server.
SYN
SYN/ACK
ACK
Each side of a conversation will transmit a ___ flagged packet once all of its data is transmitted, triggering the opposing side to confirm with an ___ flagged packet.
FIN
ACK
Data flow is controlled through a mechanism called _______ .
sliding windows
A TCP header is ___ bytes long.
20 to 60
________ offers no error detection or correction, does not use sequencing, does not use flow control mechanisms, does not use a preestablished session, and is considered unreliable.
User Datagram Protocol (UDP)
A UDP header is ______ long.
8 bytes (64 bits)
________ provides route addressing for data
packets. It is this route addressing that is the foundation of global Internet communications because it provides a means of identity and prescribes transmission paths.
Internet Protocol (IP).
Decimal Range of First Octet of Class A
0 - 126
Decimal Range of First Octet of Class B
128 - 191
Decimal Range of First Octet of Class C
192 - 223
Decimal Range of First Octet of Class D
224 - 239
Decimal Range of First Octet of Class E
240 - 255
_____ allows systems to support multicasting.
Internet Group Management Protocol (IGMP)
Telnet, TCP port ____
Port 23
File Transfer Protocol (FTP), port____
TCP Ports 20 and 21
Trivial File Transfer Protocol (TFTP)
UDP Port 69
Simple Mail Transfer Protocol (SMTP)
TCP Port 25
Post Office Protocol (POP3)
TCP Port 110
Internet Message Access Protocol (IMAP),
Port 143
Dynamic Host Configuration Protocol (DHCP)
Ports 67 and 68
Line Print Daemon (LPD)
TCP Port 515
X Window
Ports 6000–6063
Bootstrap Protocol (BootP)/Dynamic Host Connfiguration Protocol (DHCP)
UDP Ports 67 and 68
Network File System (NFS)
TCP Port 2049
Simple Network Management Protocol (SNMP)
UDP Port 161 (UDP Port 162
for Trap Messages)
____________ is a form of network datastorage
solution (storage area network [SAN]) or network-attached storage [NAS]) that allows for high-speed file transfers at upward of 16 Gbps.
Fibre Channel over Ethernet (FCoE)
______ is a high-throughput high-performance network technology that directs data across a network
based on short path labels rather than longer network addresses.
MPLS (Multiprotocol Label Switching)
___________ can be used to enable location-independent file storage, transmission, and retrieval over LAN, WAN, or public Internet connections.
Internet Small Computer System Interface (iSCSI)
___________ is the IEEE standard for wireless network communications.
802.11
Two mthods that wireless clients can use to
authenticate to WAPs before normal network communications can occur across the wireless link are
open system authentication (OSA) and shared key
authentication (SKA).
______ encapsulates EAP methods within a
TLS tunnel that provides authentication and potentially encryption.
PEAP (Protected Extensible Authentication Protocol)
_______ is a Cisco proprietary alternative
to TKIP for WPA.
LEAP (Lightweight Extensible Authentication Protocol)
_______ improvements include a key-mixing function that combines the initialization vector (IV)
(i.e., a random number) with the secret root key before using that key with RC4 to perform encryption
TKIP (Temporal Key Integrity Protocol)
_______ the preferred standard security protocol
of 802.11 wireless networking,the preferred standard security protocol of 802.11 wireless networking uses (Advanced Encryption Standard) with a 128-bit key.
CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code
Protocol)
_____ are crafted from a straight bar with cross
sections to catch specific radio frequencies in the direction of the main bar.
Panel antennas
Parabolic antennas
Cantennas
Yagi antennas
Yagi antennas
________ are flat devices that focus from only one side of the panel.
Panel antennas
Parabolic antennas
Cantennas
Yagi antennas
Panel antennas
________ are constructed from tubes with one sealed end. They focus along the direction of the open end of the tube.
Panel antennas
Parabolic antennas
Cantennas
Yagi antennas
Cantennas
________ are used to focus signals from very long distances or weak sources.
Panel antennas
Parabolic antennas
Cantennas
Yagi antennas
Parabolic antennas
An ________ is a section of an
organization’s network that has been sectioned off so that it acts as an intranet for the
private network but also serves information to the public Internet.
extranet
networks are segmented or subdivided into smaller organizational units to :
Boosting Performance
Reducing Communication Problems
Providing Security
____________ filters traffic by
examining data from a message header. Usually, the rules are concerned with source, destination, and port addresses. Also known as first- generation firewalls.
stateful inspection firewalls
Application-Level Gateway Firewalls
Static Packet-Filtering Firewalls
Circuit-level gateway firewalls
Static Packet-Filtering Firewalls
____________ filters traffic based on the Internet service (in other words, the application) used to transmit or receive the data. This type of firewall negatively affects network performance because each packet must be examined and processed as it passes through the firewall. Also known as second-generation firewalls.
stateful inspection firewalls
Application-Level Gateway Firewalls
Static Packet-Filtering Firewalls
Circuit-level gateway firewalls
Application-Level Gateway Firewalls
____________ permit or deny forwarding decisions based solely on the endpoint designations of the communication circuit (in other words, the source and destination addresses and service port numbers).
stateful inspection firewalls
Application-Level Gateway Firewalls
Static Packet-Filtering Firewalls
Circuit-level gateway firewalls
Circuit-level gateway firewalls
By examining source and destination addresses, application usage, source of origin, and
relationship between current packets and the previous packets of the same session, ________ are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities.users and activities and actively watch for and block unauthorized users and activities.
stateful inspection firewalls
Application-Level Gateway Firewalls
Static Packet-Filtering Firewalls
Circuit-level gateway firewalls
stateful inspection firewalls
______ are used to control traffic flow on networks and are often used to connect similar networks and control traffic flow between the two.
Routers
10Base2 Max Speed ______ Distance ______
10 Mbps 185 meters
10Base5 Max Speed ______ Distance ______
10 Mbps 500 meters
10Base-T (UTP) Max Speed ______ Distance ______
10 Mbps 100 meters
STP Max Speed ______ Distance ______
155 Mbps 100meters
100Base- T/100Base-TX Max Speed ______ Distance ______
100 Mbps
100 meters
1000Base-T Max Speed ______ Distance ______
1 Gbps 100 meters
Fiber-optic Max Speed ______ Distance ______
2+ Gbps 2+ kilometers
________ transmits data
in a series while constantly changing the frequency in use. The entire range of available
frequencies is employed, but only one frequency at a time is used. As the sender changes
from one frequency to the next, the receiver has to follow the same hopping pattern to
pick up the signal.
Direct Sequence Spread Spectrum (DSSS)
Orthogonal Frequency-Division Multiplexing (OFDM)
Frequency Hopping Spread Spectrum (FHSS)
Frequency Hopping Spread Spectrum (FHSS)
_________ employs all the available frequencies
simultaneously in parallel and also uses a special encoding mechanism known as chipping code to allow a receiver to reconstruct data even if parts of the signal were distorted because of interference.
Direct Sequence Spread Spectrum (DSSS)
Orthogonal Frequency-Division Multiplexing (OFDM)
Frequency Hopping Spread Spectrum (FHSS)
Direct Sequence Spread Spectrum (DSSS)
_________ employs a digital multicarrier modulation scheme that allows for a more tightly compacted transmission. The modulated signals are perpendicular (orthogonal) and thus do not cause interference with each other.
Direct Sequence Spread Spectrum (DSSS)
Orthogonal Frequency-Division Multiplexing (OFDM)
Frequency Hopping Spread Spectrum (FHSS)
Orthogonal Frequency-Division Multiplexing (OFDM)
IEEE 802.15
Bluetooth
_______ allows an attacker to transmit SMS-like
messages to your device.
Bluebugging
bluejacking
Bluesnarfing
bluejacking
______ allows hackers to connect with your Bluetooth
devices without your knowledge and extract information from them.
Bluebugging
bluejacking
Bluesnarfing
Bluesnarfing
_______ is an attack that grants hackers remote control over the feature and functions of a Bluetooth device.
Bluebugging
bluejacking
Bluesnarfing
Bluebugging
IEEE 802.3
Ethernet
Token Ring
Fiber Distributed Data Interface
Ethernet
______ can be deployed as a physical star using a multistation access unit (MAU).
Token Ring
_________ is a high-speed token-passing technology that employs two rings with traffic flowing in opposite directions.
Fiber Distributed Data Interface
_________ communications occur through the use of a discontinuous electrical signal and a state change or on-off pulses.
Analog
Digital
Digital
__________ communications occur with a continuous signal that varies in frequency, amplitude, phase, voltage, and so on. The variances in the continuous signal produce a wave shape (as opposed to the square shape of a digital signal). The actual
communication occurs by variances in the constant signal.
Analog
Digital
Analog
There are two broad categories of routing protocols: ______ and ____ .
link state distance vector
What are the two broad categories of routing protocols ?
distance vector and link state
a tunneling mechanism used to transport voice and/or data over a TCP/IP network.
Voice over IP (VoIP)
______ allows data transmission paths, communication decision trees, and flow control to be
virtualized rather than being handled on the hardware on a per device basis.
Software-Defined Networking (SDN)