Chapter 11- Network Design Flashcards

1
Q

Used to explain network communications between a host and remote device over a LAN or WAN.

A

OSI Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the seven layers of the OSI model going bottom to top?

A
  • Physical
  • Data Link
  • Network
  • Transport
  • Session
  • Presentation
  • Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Repsresents the actual network cables and radio waves used to carry data over a network.

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describes how a connection is established, maintained, and transferred over the physical layer and uses physical addressing (MAC addresses).

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Uses logical address to route or switch information between hosts, the network, and the internetworks.

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Manages and ensures transmission of the packets occurs from a host to a destination using either TCP or UDP.

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Manages the establishment termination, and synchronization of a session over the network.

A

Session Layer 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Translates the information into a format that the sender and receiver both understand.

A

Presentation Layer 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Layer from which the message is created, formed, and originated.

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attempt to overwhelm the limited switch memory set aside to store the Mac addresses for each port.

A

MAC Flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Occiurs when an attacker masks their own MAC address to pretend they have the MAC address of another device.

A

MAc Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used to connect two or more networks to form an internetwork

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An ordered set of rules that a router uses to decide whether to permit or deny traffic based upon given characteristics.

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Focused on providing controlled access to publicly available servers that are hosted within your organizational network.

A

DE-Militarized Zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Specialized type of DMZ that is created for your partner organizations to access over a wide area network

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Any host that accepts inbound connections from the internet.

A

Internet-facing Host

17
Q

Hosts or servers in the DMZ which are not configured with any services that run on the local network.

A

Bastion Hosts

18
Q

A hardened server that provides access to other hosts within the DMZ.

A

Jumpbox

19
Q

Security technique in which devices are scanned to determine its current state prior to being allowed access onto a given network.

A

Network Access Control (NAC)

20
Q

A piece of software that is installed on the device requesting access to the network.

A

Persistent Agents

21
Q

Uses a piece of software that scans the device remotely or is installed and subsequently removed after the scan.

A

Non-Persistent Agents

22
Q

Attacker configures their device to pretend it is a switch and uses it to negotiate a trunk link to break out of a VLAN.

A

Switch Spoofing

23
Q

Attacker adds an additional VLAN tag to create an outer and inner tag.

A

Double Tagging

24
Q

Act of creating subnetworks logically through the manipulation of IP addresses.

A

Subnetting

25
Q

Proccess of changing an IP address while it transits across a router.

A

Netwrok Address Translation (NAT)

26
Q

Router keeps track of requests from internal hosts by assigning them random high number ports for each request.

A

Port Address Translation (PAT)

27
Q

Term used to describe devices that provide voice communication to users.

A

Telephony

28
Q

A device that could modulate digital information into an analog signal for transmission over a standard dial-up phone line.

A

Modem

29
Q

Internal phone system used in large organizations.

A

Public Branch Exchange (PBX)

30
Q

Digital phone sevice provided by software or hardware devices over a data network.

A

Voice Over Internet Protocal (VOIP)