Chapter 11- Secure Network Architecture and Securing Network Components Flashcards

1
Q
  1. What is protocol
A

Protocol is a set of rules and restrictions that determine how data is transmitted over a network medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. OSI Model divides networking into 7 distinct layers, name them:
A

Please do Not Throw Sausage Pizza Away
Application 7
Presentation 6
Session 5
Transport 4
Network 3
Data 2
Physical 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. What is encapsulation
A

encapsulation occurs as data moves down through OSI Model Layers from Application to Physical. It is the addition of a header and possibly a footer to the data received by each layer from the layer above before it is handed to the layer below

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What is de-encapsulation
A

De-encapsulation occurs when data moves up through OSI model layers from Physical to Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What happens at the presentation layer during encapsulation
A

The presentation layer encapsulates the message by adding information to it, information is added at the beginning of the message i.e. a header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. How do ISO Layers change data
A

D3SPFB
Application Data Stream
Presentation Data Stream
Session Data Stream
Transport Segment (TCP)/Datagram (UDP)
Network Packet
Data Frame (Link)
Physical Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What is physical layer:
A

accepts frame from the data link layer and converts frame into bits for transmission over the physical connection medium. It also receives bits from the physical connection medium and converts them into frame to be used by the data link layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Through device drivers and standards list the things that physical layer controls:
A

Throughput rates
It handles synchronisation
Manages line noise and medium access
Determines whether to use analogue or digital signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. List network hardware devices that function at layer 1:
A

(NHRCA) Network Interface Cards (NICs), hubs, repeaters, concentrators and amplifiers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What is data layer
A

Data Layer is responsible for formatting the packet from the Network layer into the proper format for transmission. data link layer includes adding the hardware source and destination addresses to the frame. The hardware address is the Media Access Control Address (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. List protocols found in the data link layer:
A

SPALLPI
Serial Line Internet Protocol (SLIP)
Point to Point Protocol (PPP)
Address Resolution Protocol (ARP)
Layer 2 Forwarding (L2F)
Layer 2 Tunnelling Protocol (L2TP)
Point to Point Tunnelling Protocol (PPTP)
Integrated Services Digital Network (ISDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. What is ARP?
A

Address Resolution Protocol (ARP) is a protocol the datalink Layer. It can be viewed as operating in layer 2 or 3 of the OSI model. It depends on the ethernet’s source and destination MAC addresses. ARP is used to resolve IP addresses into MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. ARP is carried as a _____ of the ______:
A

Payload, the Ethernet Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. ARP operates in what layer?
A

Tricky question! some think it operates on Layer 2,anyway choose 2. Layer 2

Layer 3 – Network layer but it does not operate as a true layer 3 protocol as it does not use a source destination addressing scheme to direct communications. It depends on the Ethernet source and the destination MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Hardware technology used in data layer
A

Ethernet (IEEE802.3), Token Ring (IEEE 802.5), Asynchronous Transfer Mode (ATM), Fibre Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Data link layer contains 2 sublayers they are
A

Logical Link Control and Media Access Control (MAC) Sublayer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. List Network Hardware that function at layer 2
A

at datalink layer… switches and bridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. Explain Network Layer
A

Network layer is responsible for adding routing and addressing information to data. Packet includes source and destination addresses. The Network layer is responsible for providing routing or delivery information, but it is not responsible for verifying guaranteed delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. List routing protocols under network layer:
A

BORI5NS
Internet Control Message Protocol (ICMP)
Routing Information Protocol (RIP)
Open Shortest Path First (OSPF)
Border Gateway Protocol (BGP)
Internet Group Management Protocol (IGMP)
Internet Protocol (IP)
Internet Protocol Security (IPSec)
Internetwork Packet Exchange (IPX)
Network Address Translation (NAT)
Simple Key Management for Internet Protocols (SKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. What are routers
A

routers determine the best logical paths for the transmission of packets based on speed, hops, preference and so on.

routers use destination IP addresses to guide the transmission of packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. List some network hardware devices that function at layer 3:
A

Routers and bridge routers (brouters)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

a

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. What are brouters:
A

Bridge routers (brouters) works primarily in layer 3 but in layer 2 when necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. What is the transport layer
A

. Transport layer is responsible for managing the integrity of a connection and controlling the session. A PDU Payload Data Unit from the session layer is converted into segment. This layer includes mechanisms for segmentation, sequencing, error checking, controlling the flow of data, error correction, multiplexing and network service optimisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. PDU acronym means
A

Payload Data Unit, Protocol Data Unit, Packet Data Unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  1. List Protocols that operate on the transport layer:
A

the following operate on the transport layer, Transport Control Protocol (TCP),
User Datagram Protocol (UDP),
Sequenced Packet Exchange (SPX),
Secure Socket Layer (SSL),
Transport Layer Security (TLS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  1. What is PDU
A

means Payload Data Unit, Protocol Data Unit, Packet Data Unit. PDU is a container of information or data passed btw network layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  1. Explain Session Layer:
A

Session Layer (Layer 5) is responsible for establishing, maintaining and terminating communication sessions between 2 computers. It manages dialogue discipline or dialogue control (simplex, half duplex, full duplex).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  1. List Protocols that operate within the session Layer:
A

Network File System (NFS), Structured Query Language (SQL), Remote Procedure Call (RPC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  1. Communication sessions can operate in one of three diff control modes in the session layer, list them:
A

Simplex- one way communication, half-duplex- 2 way communications; but only one direction can send data at a time, full-duplex- 2 way communication, in which data can be sent in both directions simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  1. What is presentation layer
A

presentation layer is responsible for transforming data received from application layer into a format that any system following the OSI model can understand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
  1. Which layer is responsible for encryption and compression:
A

Presentation Layer (Layer 6).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  1. What is application layer:
A

it is responsible for interfacing user applications, network services, or operating system with protocol stack. The application is not located in this layer rather protocols and services required to transmit files, exchange messages, connect to remote terminals are found here

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
  1. Protocols found in the presentation layer are?
A

American Standard for Code Information Interchange (ASCII)
Extended Binary Coded Decimal Interchange Mode (EBCDICM)
Tagged Image File Format (TIFF)
Joint Photographic Experts Group (JPEG)
Moving Picture Experts Group (MPEG)
Musical Instrument Digital Interface (MIDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
  1. Protocols found in the application layer are:
A
  1. Protocols found in the application layer are: Hypertext Transfer Protocol (HTTP)
    File Transfer Protocol (FTP), Line Print Daemon (LPD), Simple Mail Transfer Protocol (SMTP), Telnet, Trivial File Transfer Protocol (TFTP),Electronic Data Interchange (EDI), Post Office Protocol version 3 (POP3),Internet Message Access Protocol (IMAP), Simple Network Management Protocol (SNMP), Network News Transport Protocol (NNTP), Secure Remote Procedure Call (S-RPC),Secure Electronic Transaction (SET
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
  1. Name the network device that works at the application layer:
A

Gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
  1. TCP/IP Acronym
A

Transmission Control Protocol/ Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
  1. List the layers of TCP/IP:
A

Application, Transport, Internet and Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
  1. Compare the OSI model to TCP/IP Model
A

Application Application
Presentation Application
Session Application
Transport Transport
Network Internet
Data Link Link
Physical Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
  1. Compare the Application mode of the TCP/IP model to OSI:
A

Application Mode is also known as the process. The application mode of the TCP/IP Model is synonymous to the Application, Presentation and Session modes of the OSI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
  1. Compare the transport mode of the TCP/IP to OSI model:
A

The transport mode is also known as host to host and it is likened to the transport mode of the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q
  1. Compare the Network mode of the OSI model to TCP/IP:
A

this model is known as the internet or internetworking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q
  1. Compare Data Link and Physical Mode of the OSI model to the TCP/IP Model:
A

the data link and physical layers of the OSI model are likened to the link model of the TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q
  1. TCP/IP can be secured using……:
A

Virtual Private Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q
  1. Advantages of VPN:
A

VPN links are encrypted to add privacy, confidentiality and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q
  1. List Protocols used to establish VPNs:
A

Point to Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), Secure Shell (SSH), Open VPN (SSL/TLS VPNs) and Internet Protocol Security (IPSec).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q
  1. List Protocol in Application state of TCP/IP:
A

: File Transfer Protocol FTP, Telnet, Simple Network Management Protocol SNMP, Line Print Daemon LPD, Trivial File Transfer Protocol TFTP, Simple Mail Transfer Protocol SMTP, NFS, X Window

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q
  1. What are TCP wrappers?
A

TCP wrappers is an application that can serve as a basic firewall by restricting access to ports and resources based on user IDs or system IDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q
  1. List 2 TCP/IP Transport Layer Protocols:
A

Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q
  1. Explain TCP (TCP/IP) Protocol:
A

Transmission Control Protocol (TCP) Internet Protocol is a full duplex connection oriented protocol. Operates at transport layer of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q
  1. Explain UDP (TCP/IP) Protocol:
A

User Datagram Protocol (UDP) is a simplex connectionless protocol. It operates at transport layer of the OSI model, it offers no error detection or correction, does not use sequencing, does not use flow control mechanism, does not use preestablished session and is considered unreliable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q
  1. What is a port?
A

Port is a little more than an address number that both ends of the communication link agree to use when transferring data within the transport layer. Ports allow a single IP address to be able to support multiple simultaneous communications each using a different port no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q
  1. What is socket?
A

A combination of IP address and port number is known as socket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q
  1. Ports 0 -1023 are known as:
A

Well known ports or service ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q
  1. Ports 1024 to 19151 are known as:
A

registered software ports
These are ports that have one or more networking software products specifically registered with International Assigned Numbers Authority (IANA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q
  1. Ports 49152 to 65535 are known as
A

Random, Dynamic Ephemeral Ports as they are randomly and temporarily used by clients as a source port. The IANA recommends that ports 49152 to 65535 be used as dynamic and/or private ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q
  1. Explain the TCP three-way handshake:
A

1 the client sends a SYN (synchronise) flagged packet to the client. 2. The server responds with a SYN/ACK (synchronise and acknowledge) flagged packet back to the client. 3. The client responds with an ACK (acknowledge) flagged packet back to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q
  1. List TCP headers flag field:
A

Unskilled Attackers Pester Real Security Folk. CWR, ECE, URG, ACK, PSH,RST,SYN,FIN) i.e. Congestion Window Reduced, Explicit Congestion Notification-Echo, Urgent, Acknowledgement, Push, Reset, Synchronize, Finish.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q
  1. What is UDP used for:
A

UDP is often employed by real time or streaming communications for audio and video.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q
  1. Describe UDP Header
A

: UDP header is 8bytes (64 bits) long. The header is divided into 4 sections or fields (each 16 bits long). Source Port, Destination Port, message length and checksum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q
  1. Describe TCP/IP Internet Protocol:
A

it operates at the Network Layer of the OSI model and is known as the Internet Protocol (IP). IP provides route address for data packets.it provides means of identity and prescribes transmission paths. It is similar to UDP, IP is connectionless and unreliable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q
  1. Compare IPv4 to IPv6:
A

IPv4 IPV6
32bits addressing 128bits addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q
  1. List some IPv6 features that are not present in \IPv4:
A

Scoped Addresses, autoconfiguration and Quality of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q
  1. Describe advantage of IPv6 scoped addressing:
A

IPv6 scoped addresses give the administrators the ability to group and then block or allow access to network services such as file servers or printing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q
  1. What is IPv6 autoconfiguration?
A

IPv6 Autoconfiguration removes the need for both Dynamic Host Configuration Protocol (DHCP) and Network Address Translation (NAT).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q
  1. List the layers of TCP/IP
A

Application, Transport, Internet and Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q
  1. Compare the OSI model to TCP/IP Model
A

Application Application
Presentation Application
Session Application
Transport Transport
Network Internet
Data Link Link
Physical Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q
  1. Compare the Application mode of the TCP/IP model to OSI:
A

Application Mode is also known as the process. The application mode of the TCP/IP Model is synonymous to the Application, Presentation and Session modes of the OSI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q
  1. Compare the transport mode of the TCP/IP to OSI model:
A

The transport mode is also known as host to host and it is likened to the transport mode of the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q
  1. Compare the Network mode of the OSI model to TCP/IP:
A

: this model is known as the internet or internetworking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q
  1. Compare Data Link and Physical Mode of the OSI model to the TCP/IP Model:
A

the data link and physical layers of the OSI model are likened to the link model of the TCP/IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q
  1. TCP/IP can be secured using……:
A

Virtual Private Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q
  1. Advantages of VPN:
A

VPN links are encrypted to add privacy, confidentiality and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q
  1. List Protocols used to establish VPNs:
A

Point to Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), Secure Shell (SSH), Open VPN (SSL/TLS VPNs) and Internet Protocol Security (IPSec).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q
  1. List Protocol in Application state of TCP/IP
A

: File Transfer Protocol FTP, Telnet, Simple Network Management Protocol SNMP, Line Print Daemon LPD, Trivial File Transfer Protocol TFTP, Simple Mail Transfer Protocol SMTP, NFS, X Window

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q
  1. What are TCP wrappers?
A

TCP wrappers is an application that can serve as a basic firewall by restricting access to ports and resources based on user IDs or system IDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q
  1. List 2 TCP/IP Transport Layer Protocols:
A

Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q
  1. Explain TCP (TCP/IP) Protocol:
A

Transmission Control Protocol (TCP) Internet Protocol is a full duplex connection oriented protocol. Operates at transport layer of the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q
  1. Explain UDP (TCP/IP) Protocol:
A

User Datagram Protocol (UDP) is a simplex connectionless protocol. It operates at transport layer of the OSI model, it offers no error detection or correction, does not use sequencing, does not use flow control mechanism, does not use preestablished session and is considered unreliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q
  1. What is a port?
A

Port is a little more than an address number that both ends of the communication link agree to use when transferring data within the transport layer. Ports allow a single IP address to be able to support multiple simultaneous communications each using a different port no.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q
  1. What is socket?
A

A combination of IP address and port number is known as socket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q
  1. Ports 0 -1023 are known as:
A

registered software ports

These are ports that have one or more networking software products specifically registered with International Assigned Numbers Authority (IANA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q
  1. Ports 1024 to 19151 are known as: registered software ports
A

These are ports that have one or more networking software products specifically registered with International Assigned Numbers Authority (IANA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q
  1. Ports 49152 to 65535 are known as
A

Random, Dynamic Ephemeral Ports as they are randomly and temporarily used by clients as a source port. The IANA recommends that ports 49152 to 65535 be used as dynamic and/or private ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q
  1. Explain the TCP three-way handshake
A

1 the client sends a SYN (synchronise) flagged packet to the client. 2. The server responds with a SYN/ACK (synchronise and acknowledge) flagged packet back to the client. 3. The client responds with an ACK (acknowledge) flagged packet back to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q
  1. List TCP headers flag field
A

Unskilled Attackers Pester Real Security Folk. CWR, ECE, URG, ACK, PSH,RST,SYN,FIN) i.e. Congestion Window Reduced, Explicit Congestion Notification-Echo, Urgent Acknowledgement, Push, Rest, Synchronize, Finish.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q
  1. What is UDP used for
A

UDP is often employed by real time or streaming communications for audio and video.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q
  1. Describe UDP Header
A

UDP header is 8bytes (64 bits) long. The header is divided into 4 sections or fields (each 16 bits long). Source Port, Destination Port, message length and checksum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q
  1. Describe TCP/IP Internet Protocol
A

: it operates at the Network Layer of the OSI model and is known as the Internet Protocol (IP). IP provides route address for data packets.it provides means of identity and prescribes transmission paths. It is similar to UDP, IP is connectionless and unreliable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q
  1. Compare IPv4 to IPv6:
A

IPv4 IPV6
32bits addressing 128bits addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q
  1. List some IPv6 features that are not present in IPv4:
A

Scoped Addresses, autoconfiguration and Quality of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q
  1. Describe advantage of IPv6 scoped addressing
A

IPv6 scoped addresses give the administrators the ability to group and then block or allow access to network services such as file servers or printing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q
  1. What is IPv6 autoconfiguration?
A

IPv6 Autoconfiguration removes the need for both Dynamic Host Configuration Protocol (DHCP) and Network Address Translation (NAT).
66. What is IPv6 Quality of Service? IPv6 Quality of Service (QoS) priority values allow for traffic management based on prioritized content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q
  1. What is IPv6 Quality of Service
A

IPv6 Quality of Service (QoS) priority values allow for traffic management based on prioritized content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q
  1. Describe Internet Control Message Protocol (ICMP):
A

Internet Control Message Protocol is used to determine the health of a network or a specific link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q
  1. ICMP Acronym means:
A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q
  1. Internet Control Message Protocol (ICMP) is utilised by:
A

Ping, traceroute, pathping and any other network management tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q
  1. Describe ping in Internet Control Message Protocol (ICMP):
A

ping utility employs ICMP echo packets and bounces them off remote systems. Ping can be used to check is a remote system is online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q
  1. Internet Control Message Protocol (ICMP) are exploited by
A

Denial of Service (DoS), ping of death, smurf attacks and ping floods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q
  1. Explain Ping of Death
A

Ping of Death sends a malfunctioned ping larger than 65,535 bytes to a computer in order to crash it.
Note: Malfunctioned ping is an IP packet that lacks order or contains a code that is expected to confuse or disrupt computers, firewalls, routers or any service present on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q
  1. Explain Smurf Attacks
A

Smurf attacks generate enormous amounts of traffic on a target network by spoofing broadcast pings. It is a Distributed Denial of Service attack (DDoS)
Wiki: It is a distributed denial of service attack in which large numbers of internet control message protocol (ICMP) packets with the intended victim’s spoofed source IP are broadcast to a computer network using an IP broadcast address.
Spoofing involves creating of an IP packet with false IP address for the purpose of impersonating another computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q
  1. Describe Internet Group Management Protocol
A

Internet Group Management Protocol (IGMP) allows systems to support multicasting. it is used by hosts to register their dynamic multicast group membership. Multicasting is the transmission of data to multiple specific recipients. It is also used by connected routers to discover these groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q
  1. What is multicasting
A

multicasting is the transmission of data to multiple specific recipients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q
  1. What is Address Resolution Protocol (ARP):
A

Address Resolution Protocol is essential to the interoperability of logical and physical addressing schemes. ARP uses caching and broadcasting to perform its operations. The basis of ARP is Media Access control.
ARP should:
Accept Request: A new device asks to join the LAN, providing and IP address
Translate: Devices on the LAN don’t communicate via IP address
Send Requests:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q
  1. Term for Address Resolution Protocol abuse is
A

Address Resolution Protocol cache (ARP) Poisoning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q
  1. Define ARP cache poisoning:
A

ARP cache poisoning is where an attacker inserts bogus information into the ARP cache. It is also known as ARP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q
  1. Describe Telnet
A

this is a terminal emulation network application that supports remote connectivity for executing commands and running applications but not support transfer of files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q
  1. What is port for Telnet:
A

TCP Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q
  1. Describe File Transfer Protocol (FTP
A

File Transfer Protocol: This is a network application that supports an exchange of files that requires anonymous or specific authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q
  1. Acronym for FTP means:
A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q
  1. File Transfer Protocol Port:
A

TCP Port 20 for passive data or active (ephemeral) data and data transfer and Port 21 for control connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q
  1. Acronym for TFTP means:
A

Trivial File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q
  1. Describe Trivial File Transfer Protocol (TFTP):
A

Trivial File Transfer Protocol is a network application that supports the exchange of files that does not require authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q
  1. Trivial File Transfer Protocol (TFTP) Port
A

UDP Port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q
  1. Describe Simple Mail Transfer Protocol (SMTP)
A

this is a protocol used to transmit email messages from a client to an email server and from one email server to another.
88. SMTP acronym means- Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q
  1. SMTP acronym means
A

Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q
  1. SMTP_ Simple Mail Transfer Protocol operates from which port
A

TCP Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q
  1. ICMP and IGMP operate in which layer of the OSI model?
A

Network Layer- Layer 3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q
  1. POP3 Means
A

Post Office Protocol

  1. POP3 Port- TCP Port 110
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q
  1. Describe POP3:
A

This is a protocol used to pull email messages from inbox on an email server down to an email client. TCP Port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q
  1. IMAP Means
A

Internet Message Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

POP3 Port

A

TCP Port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q
  1. IMAP (Internet Message Access Protocol) Port-
A

TCP Port 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q
  1. Describe Internet Message Access Protocol
A

This is a protocol used to pull messages from an inbox on an email server down to an email client. IMAP is more secure than POP3

125
Q
  1. DHCP means
A

Dynamic Host Configuration Protocol (DHCP

126
Q
  1. Dynamic Host Configuration Protocol (DHCP) uses ports
A

UDP ports 67 and 68. Port 67- as destination port on server to receive client communications and port 68 as source for client requests. It is used to assign TCP/IP configuration settings to systems upon bootup.

127
Q
  1. HTTP means
A

Hypertext Transfer Protocol

128
Q
  1. HTTP uses port-
A

TCP Port 80

129
Q
  1. SSL means
A

Secure Socket Layer

130
Q
  1. SSL Port
A

TCP Port 443 (for HHP encryption)

131
Q
  1. Describe SSL
A

Secure Socket Layer (SSL) is a VPN like security protocol that operates in the transport layer. It was originally designed to support web communications (HTTPS) but is capable of securing any Application later protocol communications

132
Q
  1. LPD means
A

Line Print Daemon (LPD)

133
Q
  1. Line Print Daemon (LPD) Port-
A

TCP Port 515

134
Q
  1. Define Line Print Daemon (LPD)-
A

Line Print Daemon (LPD)This is a network service that is used to spool print jobs to and send print jobs to printers.

135
Q

X window uses port

A

TCP Ports 6000-6063

136
Q
  1. Describe X Window-
A

This a GUI API for command line operating systems

137
Q
  1. Network File System (NFS) uses Port-
A

TCP Port 2049

138
Q
  1. NFS- means
A

Network File System

139
Q
  1. Describe NFS
A

This is a network service used to support file sharing between dissimilar systems.

140
Q
  1. Simple Network Management Protocol (SNMP) Port is? Also Explain
A
  1. Simple Network Management Protocol (SNMP) UDP Port 161 (UDP Port 162 for trap messages) this is a network used to collect network health and status information by polling monitoring devices from the polling station.
141
Q
  1. Uses Of SNMP
A

SNMP Means Simple Network Management Protocol
SNMP is a standard network supported by most network devices and TCP/IP compliant hosts.

142
Q
  1. SNMP port-
A

UDP Ports 161 and 162

143
Q
  1. Uses of SNMP Ports are:
A

UDP 161 is used by SNMP agent to receive requests and UDP Port 162 is used by the management console to receive responses and notifications

144
Q
  1. What are trap messages:
A

Simple Network Management Protocol (SNMP) trap messages inform the management console when an event or threshold violation occurs on a monitored system. UDP Port 162 is used for this.

145
Q
  1. Explain Multilayer Protocol with an example:
A

TCP/IP is a protocol suite that comprises of individual protocols spread across various protocol stack layers

146
Q
  1. Benefits of Multilayer Protocol
A

TCP/IP benefits from its mechanism of encapsulation e.g.
• A wide range of protocol can be used at higher layers
• Encryption can be incorporated at various layers
• Flexibility and resilience in complex network structures is supported

147
Q
  1. Disadvantage of Multilayer Protocol:
A

covert channels are allowed, filters can be bypassed

148
Q
  1. DNP means
A

Distributed Network Protocol

149
Q
  1. Explain DNP
A

Distributed Network Protocol is used in electric and water utility management industries. It is used to support communications between data acquisition systems and system control equipment.

150
Q
  1. List some TCP/IP Vulnerabilities:
A

to buffer overflows,
SYN flood attacks, various
denial-of-service (DoS) attacks,
fragment attacks, o
versized packet attacks,
spoofing attacks,
man-in-the-middle attacks,
hijack attacks,
and coding error attacks

151
Q
  1. DNS means
A

Domain Name System

152
Q
  1. Explain DNS:
A

DNS is made up of 3 layer:
• Third layer or bottom layer is the MAC address. MAC address or hardware address is a permanent physical address
• Middle layer is the IP address. IP address is a temporary logical address
• The top layer is the domain name: domain name is the computer name and it is a temporary human friendly convention assigned over or onto the IP address.

DNS links IP address and human friend Fully qualified Domain Names (FQDN): FQDN contains 3 parts i.e.
• Top Level Domain (TLD) the .com, org, edu, mil, gov
• Registered Domain name the google
• Subdomains or host name the www

153
Q
  1. DNS operates in which ports:
A

Domain Name System operates over TCP and UDP Port 53

154
Q
  1. DNSSEC means
A

Domain Name System Security Extensions

155
Q
  1. What is the primary function of DNSSEC
A

Domain Name System Security Extensions primary function is to provide reliable authentication between devices during DNS operations.

156
Q
  1. Explain DNS Poisoning:
A

Domain Name System (DNS) Poisoning is the act of falsifying the DNS information used by a client to reach a desired system.

157
Q
  1. The act of deploying a rogue DNS server is known
A

as DNS Spoofing or DNS Pharming

158
Q
  1. Explain DNS Spoofing or DNS Pharming
A

DNS Spoofing or DNS Pharming occurs when A rogue DNS server can listen in on network traffic for any DNS query or specific DNS queries related to a target site. Then the rogue DNS server sends a DNS response to the client with false IP information. This attack requires that the rogue DNS server get its response back to the client before the real DNS server responds. Once the client receives the response from the rogue DNS server, the client closes the DNS query session, which causes the response from the real DNS server to be dropped and ignored as an out-of-session packet.

159
Q
  1. Explain DNS Poisoning:
A

DNS Poisoning involves attacking the real DNS server and placing incorrect information into its file zone

160
Q
  1. List some ways to attack or exploit DNS
A

DNS Poisoning, DNS Pharming or Spoofing, Alter host files, corrupt IP configuration.

161
Q
  1. How can DNS threats be reduced:
A

Limit zone transfers from internal DNS servers to external DNS Severs.
• Deploy Network intrusion Detection Systems (NIDS) to watch for abnormal DNS traffic
• Harden all DNS Servers
• Use DNSSEC to secure your DNS infrastructure
• Require internal clients to resolve all domain names through internal DNS.

162
Q
  1. What is pharming?
A

Pharming is the malicious redirection of a valid website’s URL or IP address to a fake website that holds a false version of the original valid site.

163
Q
  1. Explain Domain Hijacking:
A

Domain Hijacking or Domain Theft is the malicious action of changing the registration of a domain name without the authorization of the valid user. Sometimes when another person registers a domain name immediately after the original owner’s registration expires, it is called domain hijacking.

164
Q
  1. What is converged protocols:
A

converged protocols is the merging of specialty or proprietary protocols with standard protocols e.g. those from TCP/IP suite.

165
Q
  1. List some converged protocols:
A

• Fibre Channel over Ethernet (FCoE)
• Multiprotocol Label Switching (MPLS)
• Internet Small Computer System Interface (iSCSI)
• Voice over IP (VoIP)

166
Q
  1. Advantages of Multiprotocol Labelling Switches (MPLS
A

Saves time
• Designed to handle a wide range of protocols through encapsulation

167
Q
  1. What is Multiprotocol Labelling Switches (MPSL):
A

Multiprotocol Labelling Switches (MPSL) is a high throughput high performance network technology that directs data across a network based on short path labels rather than longer network addresses.

168
Q
  1. What is internet Small Computer System Interface (iSCSI)?
A

Internet Small Computer System Interface (iSCSI) is a networking storage standard based on IP.

169
Q
  1. Advantage of internet Small Computer Systems Interface:
A

it can be used to enable location independent storage, transmission and retrieval over LAN etc.
• It is viewed as a low cost alternative to Fibre Channel

170
Q
  1. Explain VoIP:
A

Voice over IP is a tunnelling mechanism used to transmit voice and or data over TCP/IP.

171
Q
  1. Advantages of VoIP:
A

: it is cheap
• Can be used as phone replacement
• Supports video and data transmission
• Available in commercial and open source options e.g. skype

172
Q
  1. What is Software Defined Networking (SDN):
A

): Software Defined Networking (SDN) is a unique approach to network operation, design and management. It is based on the theory that complexities in the traditional network device configuration often force an organisation to stick with a single device.

173
Q
  1. Advantages of Software Defined Networking (SDN):
A

Software Defined Networking (SDN) is network Neutral.
• Cost effective as it is vendor neutral.
• It is effectively Network Virtualization.

174
Q
  1. What is Content Distribution Network:
A

Content Distribution Network or Content Delivery Network is a collection of resource services deployed in numerous data centers across the internet in order to provide low latency, high performance and high availability of hosted content example of CDN Service providers are Akamai, Amazon etc.

175
Q
  1. What are Wireless Networks:
A

: this is a popular method of connecting corporate and home systems because of the ease of deployment and relatively low costs

176
Q
  1. List wireless vulnerabilities
A

distance eavesdropping, packet sniffing, DoS, Intrusion

177
Q
  1. What is data emanation?
A

Data emanation is a form of electronic eavesdropping. When data travels within a computer or through the network wires, an electromagnetic field is generated. By reading the magnetic field, unauthorized users can get the confidential data. This act is known as data emanation.

178
Q
  1. What are wireless cells?
A

Wireless cells are areas within a physical environment where a wireless device can connect to a wireless access point

179
Q
  1. Wireless Access Points should be deplored to use_______ rather than _____________.
A

Infrastructure MODE, Ad hoc mode

180
Q
  1. Wireless systems configured in ad hoc mode means:
A

Ad hoc mode means that any 2 networking devices including 2 NICs can communicate without a central control authority.

181
Q
  1. List the variations of Infrastructure mode:
A

stand alone mode, wired extension, enterprise extended, bridge.

182
Q
  1. Explain stand alone infrastructure mode
A

Stand alone infrastructure mode is when a wireless access point connecting wireless clients to each other but not to any wired resources

183
Q
  1. Explain wired extension mode infrastructure
A

Wired extension mode occurs when the wireless access points act as a connection point to link the wireless clients to a wired network.

184
Q
  1. Explain Enterprise Extended mode infrastructure:
A

Enterprise Extended mode infrastructure occurs when multiple wireless access point (WAPs) are used to connect a large physical area to the same wired network.

185
Q
  1. ESSID means
A

Extended Service Set Identifiers

186
Q
  1. What is Bridge Mode Infrastructure
A

Bridge Mode Infrastructure occurs when a wireless connection is used to link 2 wired networks.

187
Q
  1. SSID means
A

Service Set Identifier

188
Q
  1. List the 2 types of Service Set Identifiers (SSID):
A

Extended Service Set Identifiers (ESSID) and Basic Service Set Identifier (BSSID)

189
Q
  1. What is Extended Service Set Identifier (ESSID):
A

Extended Service Set ID is the name of the wireless network when a wireless base station or WAP is used (Infrastructure Mode).

190
Q
  1. What is ISSID:
A

Independent Service Set Identifier is the name of the wireless network when in ad hoc peer to peer mode (i.e., when Wireless Access Point WAP is not used)

191
Q
  1. Securing Service Set Identifiers (SSIDs):
A

SSIDs should be changed to something unique before deployment.
• SSID broadcast by WAP via a special transmission called beacon frame should be disabled. (not effective though! WPA2 should be used)

192
Q
  1. What is site survey?
A

Site Survey is the process of investigating the presence, strength and reach of wireless access point deployed in an area.

193
Q
  1. List 2 IEEE 802.11 ways of authenticating wireless clients to WAPs:
A

Open System Authentication (OSA) and Shared Key Authentication (SKA)

194
Q
  1. Explain Open System Authentication (OSA):
A

Open Systems Authentication (OSA) means no real authentication is needed. As long as radio system is transmitted from the client and WAP, communications is allowed.

195
Q
  1. Wireless Equivalent Privacy is defined by ________:
A

IEEE 802.11 standard

196
Q
  1. Advantages of WEP are:
A

Wireless Equivalent Privacy (WEP) provides protection from packet sniffing and eavesdropping
• Can be configured to prevent unauthorised access.
• A hash value is used to verify that received packets weren’t modified or corrupted while in transit; thus WEP also provides integrity protection.

197
Q
  1. WEP means
A

Wireless Equivalent Privacy (WEP)

198
Q
  1. WEP encryption uses _________ Cipher:
A

Rivest Cipher 4 (RC4 cipher)

199
Q
  1. Describe Wi-Fi Protected Access (WPA
A

Wi-Fi Protected Access was designed as the replacement for WEP.

200
Q
  1. LEAP means
A

Lightweight Extensible Authentication Protocol (LEAP).

201
Q
  1. Wi-Fi Protected Access (WPA) is based on _____ and _______:
A

Lightweight Extensible Authentication Protocol (LEAP) and Temporal Key Integrity Protocol (TKIP)

202
Q
  1. _____ often requires a single passphrase for authentication.
A

Wifi Protected Access (WPA

203
Q
  1. Name 1 Wi-Fi Protected Access (WPA) vulnerability:
A

Brute Force Attack

204
Q
  1. WPA means
A

Wi-Fi Protected Access

205
Q
  1. Another name for Wifi Protected Access 2 (WPA2)
A

802.11i

206
Q
  1. What is Wifi Protected Access 2:
A

WPA2 is a new encryption scheme known as the Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP), which is based on the AES encryption scheme.

207
Q
  1. EAP means
A

Extensible Authentication Protocol

208
Q
  1. PEAP means
A

Protected Extensible Authentication Protocol

209
Q
  1. Explain 802.1X/EAP
A

WPA and WPA2 support the enterprise authentication known as 802.1X/EAP, a standard port- based network access control that ensures that the clients cannot communicate with a resource until proper authentication has taken place.

210
Q
  1. Advantage of Extensible Authentication Protocol (EAP):
A

Extensible Authentication Protocol (EAP) allows for new authentication technologies to be compatible with existing wireless point to point connection.

211
Q
  1. Explain Protected Extensible Authentication Protocols (PEAP):
A

PEAP encapsulates EAP methods within a TLS tunnel that provides authentication and potentially encryption.
• Used for securing communications over 802.11
• Can be emploted by WPA or WPA2

212
Q
  1. What is Lightweight Extensible Authentication Protocol (LEAP)?
A

Lightweight Extensible Authentication Protocol (LEAP) is a Cisco proprietary alternative to Temporary Key Integrity Protocol (TKIP) for WPA. It was developed to address deficiencies in TKIP before 802.11i/WPA2 was ratified as a standard.

213
Q

What is MAC filter

A

MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists

214
Q
  1. What is Temporal Key Integrity Protocol (TKIP)?
A

Temporal Key Integrity Protocol (TKIP) improvements include key mixing function that combines Initialization Vector (IV) with the secret root key before using that key with RC4 to perform encryption

215
Q
  1. What is Counter Mode with Cipher Block Chaining Message Authentication Code Protocol CCMP?
A

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) uses AES (Advanced Encryption Standard) with 128-bit key. It is a preferred standard security protocol and no attacks have been successful yet against CCMP/AES.

216
Q
  1. What is Captive Portal?
A

Captive Portal is an authentication technique that redirects a newly connected wireless web client to a portal access control page. E.g. redirection to acceptable use policy, privacy policy etc.

217
Q
  1. List some wireless attacks that you know
A

• War driving
• War chalking
• Replay Attack
• Initialization Vector (IV)
• Rogue Access Points
• Evil Twin

218
Q
  1. What is War Driving?
A

War Driving is the act of using a detection tool to look for wireless networking signals by someone who does not have authorized access to such networks.

219
Q
  1. What is war chalking?
A

War chalking is the act of physically marking an area with information about the presence of a wireless network. closed circle indicated a closed or secured wireless network, and two back-to-back half circles indicated an open network.

220
Q
  1. What is Replay Attack?
A

A Replay Attack is the act of retransmission of captured communications in the hope of gaining access to the targeted system.

221
Q
  1. How to mitigate replay attack:
A

Use Network Intrusion Detection Systems

222
Q
  1. What is Initialization Vector?
A

Initialization Vector is a term for a random number.

223
Q
  1. What is Initialization Vector Attack?
A

Initialization Vector attack is an exploitation of how Initialization Vector is handled.

224
Q
  1. What are rogue access points?
A

A rogue access point is a wireless access point that has been installed on a secure network without explicit authorization from network owner, whether added by a well-meaning employee or by a malicious attacker.

225
Q
  1. What is Evil Twin?
A

An evil twin is a fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications

226
Q
  1. Vulnerability attack of evil twin are:
A

spoofing attack, man in the middle. Man in The Middle (MITM) attacks can lead to session hijacking, data manipulation and credential theft and identity theft.

227
Q
  1. What is Intranet
A

Intranet is a private network that is designed to host the same information services found on the internet.

228
Q
  1. What is extranet?
A

An extranet is a cross between the internet an intranet. An extranet is a section of an organisation’s network that has been sectioned off so that it acts as an intranet for the private network but also serves information to the public internet. An extranet for public consumption is typically labelled a demilitarized zone (DMZ) or perimeter network

229
Q
  1. To boost performance on a network use………….:
A

Network Segmentation

230
Q
  1. List some advantages of network segmentation
A

boost performance.
• Reduce communication problems
• Providing security

231
Q
  1. What is Network Access Control:
A

Network Access Control is a concept of controlling access to an environment through strict adherence to implementation of security policy

232
Q
  1. Goals of NAC are:
A

• Prevent zero day attacks
• Enforce security policy throughout the network
• Use identities to perform access control

233
Q
  1. What are firewalls?
A

Firewalls are essential tools for controlling and managing network traffic. It is typically deployed between a private network and link to the internet.

234
Q
  1. List some types of firewalls:
A

SACS
Static Packet Filtering Firewalls,
• Application- Level Gateway Firewalls,
• Circuit Level Gateway Firewalls
• Stateful Inspection Firewalls
• Deep Packet Inspection Firewalls

235
Q
  1. What is Static Packet Filtering Firewalls
A

Static Packet filtering firewalls filters traffic by examining data from the message header.
• Unable to provide user authentication
• Known as fist generation firewalls
• Operate at Network Layer (Layer 3)

236
Q
  1. What is Application Level Gateway Firewall?
A

An Application level gateway firewall is called proxy firewall. A Proxy is a mechanism that copies packets from one network into another.
• Copy process also changes the source and destination addresses to protect the identity of internal or private network.
• They are known as second generation firewalls
• They operate at Application layer (Layer 7)

237
Q
  1. What are Circuit-Level Gateway Firewalls?
A

Circuit-level Gateway Firewalls are used to establish communication sessions between trusted partners.
• They operate in Session Layer (Layer 5)
• They manage communications based on the circuit

238
Q
  1. What are stateful Inspection Firewalls?
A

Stateful Inspection firewalls evaluate the state and the context of network traffic. They are also known as dynamic state firewalls.
• stateful inspection firewalls are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities.
• They are known as third generation firewalls
• Operate in Network and transport layers (Layer 3 and 4)

239
Q
  1. What are deep packet inspection firewalls?
A

Deep Packet Inspection Firewalls is a filtering mechanism that operates typically at the application layer in order to filter payload contents of a communication rather than only on the header values.
• DPI is often integrated with application layer firewalls or stateful inspection firewalls

240
Q
  1. What are Next Gen Firewalls?
A

Next Gen Firewalls are multifunction device (MFD) composed of several security features in addition to firewall e.g. IDS, IPS, TLS/SSL proxy, VPN anchoring.

241
Q
  1. What are Multihomed firewalls?
A

Multihomed firewalls (aka dual homed firewalls) must have 2 interfaces to filter traffic.

242
Q
  1. What are bastion hosts
A

Bastion Hosts is a computer or appliance that is exposed on the internet and has been hardened by removing all the unnecessary elements.

243
Q
  1. What is screened host?
A

Screened host is a firewall protected system logically positioned just inside a private network.

244
Q
  1. What is a screened subnet?
A

A screened subnet is a firewall protected system logically positioned inside a private network with a subnet placed between the 2 routers or firewalls and the bastion hosts is located within the subnet. This is the concept of a DMZ.

245
Q
  1. List Firewall Deployment Architectures:
A

single tier, two tier, and three tier (multiplier)

246
Q
  1. What is endpoint security?
A

End Point Security is the concept that each individual device

247
Q
  1. Collision occurs when:
A

2 systems transmit data at the same time onto a connection medium that supports only a single transmission path.

248
Q
  1. What is broadcast:
A

Broadcast occurs when a single system transmits data to all possible recipients.

249
Q

Describe a collision domain:

A

Collision domain is a group of networked systems that could cause a collision if any 2 (or more) of the systems in that group transmitted simultaneously.

250
Q
  1. Describe a broadcast domain:
A

broadcast domain is a group of networked system in which all other members receive a broadcast signal when one of the members of the group transmits it.

251
Q
  1. List some network devices:
A

hubs, modems, repeaters, amplifiers and concentrators

252
Q
  1. What do repeaters, amplifiers and concentrators do?
A

Repeaters, concentrators, and amplifiers are used to strengthen the communication signal over a cable segment as well as connect network segments that use the same protocol. They operate at the physical layer (layer 1)

253
Q
  1. What do hubs do?
A

Hubs are used to connect multiple systems and connect network segments that use the same protocol. They operate at the physical layer (layer 1)

254
Q
  1. What are bridges?
A

A Bridge is used 2 connect 2 networks together, even network of different topologies, cabling types, speeds, in order to connect network segments that use the same protocol. They operate at Data Layer (layer 2).

255
Q
  1. What are switches?
A

Switches know the addresses of the systems connected on each out bound port. Switches operate on Data Layer (Layer 2). Switches with additional features like routing operate in layer 3.

256
Q
  1. What are routers?
A

Routers are used to control traffic flow on networks and are often used to connect similar networks and control traffic flow between the two. They operate in the network layer (Layer 3)

257
Q
  1. What are brouters?
A

Brouters are combination devices comprising a router and a bridge. A brouter attempts to route first, but if that fails, it defaults to bridging. Thus, a brouter operates primarily at layer 3 but can operate at layer 2 when necessary.

258
Q
  1. What is a gateway?
A

A gateway connects networks that are using different network protocols. It is also known as translators. They operate on the Application layer (Layer 7)

259
Q
  1. What are proxies?
A

A proxy is a form of gateway that does not translate across protocols.

260
Q

What are LAN extenders?

A

A LAN extender is a remote access, multilayer switch used to connect distant networks over WAN link

261
Q
  1. Name the 2 basic types of networks:
A

LAN & WAN

262
Q
  1. What is LAN?
A

Local Area Network (LAN) is a network spanning a single floor or building

263
Q
  1. What is WAN?
A

Wide Area Network (WAN) is assigned to long distance connections between geographically remote networks.

264
Q
  1. Types of coaxial cables
A

thinnet and thicknet

265
Q

what is network topology?

A

Network topology refers to the physical layout and organisation of computers and networking devices

266
Q
  1. What is logical topology
A

logical topology refers to the grouping of networked systems into trusted collectives.

267
Q
  1. List 4 typical network topologies:
A

ring, bus, star, mesh

268
Q
  1. Ring topology means:
A

Ring topology connects each system points in a circle. The connection acts as a unidirectional transmission loop.
• Only one system can transmit at a time
• Traffic management is performed by a token

269
Q
  1. Explain bus topology:
A

bus topology connects each system to a trunk or backbone cable.
• All systems on the bus can transmit data at a time
• It is collision prone
• To avoid collision, buses listen for other currently occurring traffic

270
Q
  1. There are 2 types of bus topologies:
A

linear and tree

271
Q
  1. What is linear (bus) topology:
A

Linear topology employs a single trunk line with all systems directly connected to it.

272
Q
  1. What is tree (bus) topology
A

tree topology employs a single trunk line with all branches that can support multiple systems

273
Q
  1. What is star topology:
A

Star topology employs a centralized connection device. This can be a hub or switch.
• The central point is a single point of failure

274
Q
  1. What is mesh topology?
A

Mesh topology connects systems to other systems using numerous paths.
• It adds redundancy to the systems.

275
Q
  1. What is Frequency Hopping Spread Spectrum (FHSS)?
A

Frequency Hopping Spread Spectrum (FHSS) transmits data in a series while constantly changing the frequency in use.

276
Q
  1. What is Direct Sequence Spread Spectrum
A

Direct Sequence Spread Spectrum employs all the available frequencies simultaneously in parallel.

277
Q
  1. What is Orthogonal Frequency-Division Multiplexing?
A

Orthogonal Frequency-Division Multiplexing (OFDM) employs a digital multicarrier modulation scheme that allows for a more tightly compacted transmission.

278
Q
  1. What is IEEE 802.15?
A

IEEE 802.15 refers to Bluetooth.

279
Q
  1. What are Personal Area Networks (PAN)?
A

Personal Area Networks (PAN) connects electronic devices within the user’s immediate area e.g. Bluetooth

280
Q
  1. List some Bluetooth vulnerabilities:
A

Bluejacking, Bluesnarfing, Bluebugging

281
Q
  1. What is bluejacking:
A

Bluejacking allows the attacker to transmit Short Message Service (SMS) like messages to your device using Bluetooth.

282
Q

What is bluesnarfing?

A

Bluesnarfing allows hackers to connect to your Bluetooth devices without your knowledge and extract information.
• This attack offer hackers access to your contact list, data and conversations

283
Q
  1. What is bluebugging?
A

Bluebugging offer attackers remote control over features and function of a Bluetooth device.

284
Q
  1. What is the range of Bluetooth?
A

30feet but some devices can function more than 100 meters away.

285
Q
  1. RFID means
A

Radio Frequency Identification (RFID)

286
Q
  1. What is Radio Frequency Identification?
A

Radio Frequency Identification (RFID) is a tracking technology based on the ability to power a radio transmitter using current generated in an antenna when placed in a magnetic field.
• RFID can be attached to devices or integrated into their structure
• There is some concern that RFID can be a privacy-violating technology

287
Q
  1. What is Near Field Communications (NFC)?
A

Near Field Communications (NFC) is a standard that establishes radio communications between devices in close proximity.

288
Q
  1. List some Near Field Communications (NFC) Vulnerabilities
A

Man in the middle, eavesdropping, data manipulation and replay attacks.

289
Q

POD means

A

Personal Owned Device

290
Q
  1. PED means
A

Personal Electronic Device

291
Q
  1. PMD means
A

Personal Mobile Device

292
Q
  1. 2 Points about coaxial cables:
A

Coaxial cables have a centre core of copper wire surrounded by a layer of insulation, which is surrounded by a conducive braided shielding and encased in final shielding.
• The design makes it fairly resistant to electromagnetic interference (EMI)

293
Q
  1. List the 2 types of coaxial cables:
A

thinnet and thicknet

294
Q
  1. Use of thinnet coaxial cable:
A

Thinnet coaxial cable (aka base 5) is used to connect systems to backbone trunks of thicknet cabling and can span 185meters.

295
Q
  1. Use of thicknet cable:
A

span 500meters

296
Q
  1. Problems of coaxial cables:
A

bending can break the centre conductor
• Deploying cable in length greater than the recommended length.
• Not properly terminating the ends of the coaxial cable
• Not grounding at least one end of a terminated coaxial cable.

297
Q
  1. What is twisted pair cable:
A

twisted pair cable is thinner than the coaxial cable and more flexible. It consists of four pairs of wires that are twisted around each other and then sheathed in a PVC insulator.

298
Q
  1. List the 3 main LAN technologies:
A

Ethernet, token and Federated Distributed Data Interfaces (FDDI)

299
Q
  1. Describe Ethernet:
A

Ethernet is a shared LAN technology. It allows numerous devices to communicate over the same medium but requires that the device take turns communicating and performing collision detection and avoidance.
• Ethernet can support full duplex communications i.e. (full 2 way).
• It is employed in star and bus topologies

300
Q
  1. Describe Token Ring:
A

Token Ring employs a token passing mechanism to control which system can pass over a network medium.
• Token travels in a logical loop among all members
• Can be employed in star or ring topology
• Higher cost than ethernet
• Difficult to manage and deploy.

301
Q
  1. Difference between analogue and digital communications:
A

analogue communications occur with a continuous signal that varies in voltage etc
• Digital communications occur through the use of discontinuous electrical signal.

302
Q
  1. What is baseband?
A

Baseband support a single communication channel. It uses a direct current applied to the cable

303
Q
  1. What is broadband?
A

Broadband support multiple simultaneous signals.
• Broadband uses multiple simultaneous signals

304
Q
  1. Describe multicast, unicast and broadcast:
A

• Broadcast technology supports communications to all possible recipients.
• Multicast technology supports communications to multiple specific recipients.
• Unicast technology supports only a single communication to a specific recipient.

305
Q

A

A

A

306
Q

A

A

A

307
Q

A

A

A

308
Q

A

A

A