Chapter 3 Flashcards

1
Q

TCP IP has how many layers?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the layers of TCP/IP?

A

Application
Host to Host or Transport Layer
Internet Layer
Network Access Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Host to host is also known as

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Access Layer is also known as

A

Link layer or Network Interface layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TCP/IP host

A

Any device on network running the TCP IP protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encapsulation

A

Method by which TCP/IP layers communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Application layer provides which protocols?

A

HTTP, HTTPS, FTP, SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Host to host

A

consists of TCP and UDP. UDP is unreliable connectionless protocol, but faster. Responsible for acknowledging receipt of packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Internet Layer is responsible for

A

routing, IP addressing and packaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IP

A

Internet protocol, part of Internet Layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which layer checks accuracy?

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which layer checks if the destination is known?

A

IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If a destination is unknown, where is it sent?

A

to the router, by IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ICMP

A

Internet Control Message Protocol - Ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ICMP is part of which layer?

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Address Resolution Protocol is in which layer?

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ARP does what?

A

Resolves IPs to MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network Access Layer

A

Communicates through network adapters to place packets on the physical network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

FTP port

A

21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

port 21

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Port 22

A

SSH and SCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Port 25

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SMTP port

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

port 110

A

POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

POP3 port

A

110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

DNS names port

A

Port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Port 53

A

Dns Names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Port 139

A

NetBios session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

NetBIOS session port

A

139

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

IMAP port

A

143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Port 143

A

Imap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

TCP Handshake Initiated by

A

client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Client sends sends first message containing

A

ISN - initial sequence number, and window size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

window size

A

buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Server responds to initial TCP message

A

ISN and window size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Third part of TCP handshake

A

Client acknowledges ISN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

UDP

A

Connectionless, used for video and voice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Tracert uses

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Subnetting secures the network by

A

confining traffic, reducing traffic and broadcasts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

vlan does what

A

splits of segments of network, allows grouping of hosts by data sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

PPTP

A

Tunneling protocol, vulnerable to sniffers, negotiating connection in clear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Layer 2 forwarding is a __ protocol

A

Tunnelling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Layer 2 forwarding was created as a protocol for

A

dial up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

L2f should not be used for

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

L2F provides Authentication but not

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Layer 2 tunneling protocol combines

A

L2f and PPTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Layer 2 tunneling is encrypted?

A

No, but it can be

48
Q

SSH was originally designed for

A

Unix

49
Q

IPsec is used by ______ protocols

A

tunneling

50
Q

IPSec has two modes

A

tunnel and transport

51
Q

IPSec encrypts ____ in tunnel mode

A

payload and headers

52
Q

IPSec encrypts ____ in transport mode

A

only the payload

53
Q

NAC stands for

A

Network Access Control

54
Q

NAC defines

A

criteria that a client must fulfill to access the network

55
Q

what is an appliance?

A

A self contained device requiring little configuration

56
Q

packet filter firewall blocks packets based on ____

A

ports

57
Q

a packet filter firewall may authorize specific _____ to access certain ports

A

IP addresses

58
Q

proxy firewalls are used to process requests from an ______ network

A

outside

59
Q

proxy firewalls use _____ to hide IPs

A

NAT

60
Q

Application level proxy firewall reads the actual _______

A

commands

61
Q

stateful packet inspection firewall

A

uses intelligence to monitor sessions, stateless uses no intelligence and just blocks ports

62
Q

what is a border router?

A

it connects wans and lans

63
Q

wans and lans use the same/different protocols

A

different

64
Q

Switches route packets using _____ addresses

A

MAC

65
Q

For security reasons, all user interaction with the internet should be controlled through

A

a proxy server

66
Q

IDS Activity

A

element of a data source that is of interest

67
Q

IDS Alert

A

contains information about suspicious activity

68
Q

IDS Analyzer

A

analyzes data collected by the sensor

69
Q

IDS data source

A

raw information used to detect suspicious activity

70
Q

IDS Event

A

occurrence indicating suspicious activity has occurred

71
Q

IDS manager

A

console

72
Q

IDS notification

A

how the manager tells the operator about an alert

73
Q

IDS operator

A

person responsible for the IDS

74
Q

IDS Sensor

A

Grabs raw material from the data sources

75
Q

Behavior based IDS

A

variations in behavior such as unusually high traffic, policy violations

76
Q

Signature based IDS

A

Misuse, attack signatures and audit trails

77
Q

Anomaly detection IDS

A

spots deviation from a baseline

78
Q

Heuristic IDS

A

uses algorithms to analyze traffic passing through the network

79
Q

IPS

A

Intrusion Prevention System

80
Q

IPS usually responds by

A

blocking offending IP address

81
Q

Problem with IPS is _____

A

false positives

82
Q

Best solution for a secure network is

A

place an IDS in front of AND behind a firewall

83
Q

Network based IDS

A

attaches to a point in the network where it can report on all traffic

84
Q

Logging

A

A passive response allowing administrators to evaluate the threat

85
Q

Notification

A

A passive response relaying information to the IDS operator

86
Q

Shunning

A

A passive response that ignores the threat

87
Q

Terminating processes or sessions

A

an active response to a threat

88
Q

IDS can connect to what devices

A

hub switch or tap

89
Q

Network Configuration changes

A

active response of an IDS, closing ports or instructing a border router or firewall to close traffic

90
Q

deception

A

active response of ids, send to honeypot

91
Q

active responses are the least/most implemented

A

least

92
Q

HIDS

A

Host-based IDS

93
Q

HIDS are typically active/passive

A

passive

94
Q

HIDS monitor network traffic t/f

A

False

95
Q

faillog

A

log in unix that shows failed login attempts

96
Q

lastlog

A

log in unix that shows last successful logins

97
Q

messages log

A

in unix, searched with grep to find login related entries

98
Q

wtmp

A

log in unix that shows authenticated users

99
Q

packet sniffing is also known as

A

protocol analyzing

100
Q

one of the best traffic analyzers is

A

snort

101
Q

UTM

A

Unified Threat Management (appliance)

102
Q

Smartscreen filter

A

phishing url blocker from IE

103
Q

Web application firewall

A

appliance that blocks traffic to and from webservers

104
Q

WAFs operate at the _____ level of the OSI model

A

highest

105
Q

WAFs are similar to

A

IPS

106
Q

WAFs are superior/inferior to IPSs

A

Superior

107
Q

FTP uses TCP/UDP

A

Only TCP

108
Q

SSH and SCP use TCP/UDP

A

both

109
Q

SMTP uses TCP/UDP

A

Only TCP

110
Q

HTTP uses TCP/UDP

A

both

111
Q

POP3 uses TCP/UDP

A

only TCP

112
Q

Netbios uses TCP/UDP

A

both

113
Q

IMAP uses TCP/UDP

A

both

114
Q

HTTPS uses TCP/UDP

A

TCP only

115
Q

DNS name queries use TCP/UDP

A

UDP only

116
Q

Dial up uses

A

PPP