Chapter 11- Network Design Flashcards

1
Q

Used to explain network communications between a host and remote device over a LAN or WAN.

A

OSI Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the seven layers of the OSI model going bottom to top?

A
  • Physical
  • Data Link
  • Network
  • Transport
  • Session
  • Presentation
  • Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Repsresents the actual network cables and radio waves used to carry data over a network.

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describes how a connection is established, maintained, and transferred over the physical layer and uses physical addressing (MAC addresses).

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Uses logical address to route or switch information between hosts, the network, and the internetworks.

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Manages and ensures transmission of the packets occurs from a host to a destination using either TCP or UDP.

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Manages the establishment termination, and synchronization of a session over the network.

A

Session Layer 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Translates the information into a format that the sender and receiver both understand.

A

Presentation Layer 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Layer from which the message is created, formed, and originated.

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attempt to overwhelm the limited switch memory set aside to store the Mac addresses for each port.

A

MAC Flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Occiurs when an attacker masks their own MAC address to pretend they have the MAC address of another device.

A

MAc Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used to connect two or more networks to form an internetwork

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An ordered set of rules that a router uses to decide whether to permit or deny traffic based upon given characteristics.

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Focused on providing controlled access to publicly available servers that are hosted within your organizational network.

A

DE-Militarized Zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Specialized type of DMZ that is created for your partner organizations to access over a wide area network

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Any host that accepts inbound connections from the internet.

A

Internet-facing Host

17
Q

Hosts or servers in the DMZ which are not configured with any services that run on the local network.

A

Bastion Hosts

18
Q

A hardened server that provides access to other hosts within the DMZ.

19
Q

Security technique in which devices are scanned to determine its current state prior to being allowed access onto a given network.

A

Network Access Control (NAC)

20
Q

A piece of software that is installed on the device requesting access to the network.

A

Persistent Agents

21
Q

Uses a piece of software that scans the device remotely or is installed and subsequently removed after the scan.

A

Non-Persistent Agents

22
Q

Attacker configures their device to pretend it is a switch and uses it to negotiate a trunk link to break out of a VLAN.

A

Switch Spoofing

23
Q

Attacker adds an additional VLAN tag to create an outer and inner tag.

A

Double Tagging

24
Q

Act of creating subnetworks logically through the manipulation of IP addresses.

A

Subnetting

25
Proccess of changing an IP address while it transits across a router.
Netwrok Address Translation (NAT)
26
Router keeps track of requests from internal hosts by assigning them random high number ports for each request.
Port Address Translation (PAT)
27
Term used to describe devices that provide voice communication to users.
Telephony
28
A device that could modulate digital information into an analog signal for transmission over a standard dial-up phone line.
Modem
29
Internal phone system used in large organizations.
Public Branch Exchange (PBX)
30
Digital phone sevice provided by software or hardware devices over a data network.
Voice Over Internet Protocal (VOIP)