Chapter 3 Flashcards
- Name the layers of the OSI model and their numbers from top to bottom.
Application (7), Presentation (6), Session (5) Transport (4) Network (3) Data Link (2) Physical (1).
Name three problems with cabling and the methods to counteract those issues.
Problems with cabling and their countermeasures include - Attenuation (use repeaters or don’t violate distance recommendations)
- Using the wrong CAT cable (check the cable specifications against throughput requirements, and err on the side of caution)
- Crosstalk (use shielded cables, place cables in separate conduits, or use cables of different twists per inch)
- Cable breaks (avoid running cables in locations where movement occurs)
- Interference (use cable shielding, use cables with higher twists per inch, or switch to fiber-optic cables)
- Eavesdropping (maintain physical security over all cable runs or switch to fiber-optic cables)
What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies?
Some of the frequency spectrum-use technologies are spread spectrum
Frequency Hopping Spread Spectrum (FHSS),
Direct Sequence Spread Spectrum (DSSS)
Orthogonal Frequency-Division Multiplexing (OFDM).
Discuss methods used to secure 802.11 wireless networking.
Methods to secure 802.11 wireless networking include
- disabling the SSID broadcast;
- changing the SSID to something unique;
- enabling MAC filtering;
- considering the use of static IPs or using DHCP with reservations;
- turning on the highest form of encryption offered (such as WEP, WPA, or WPA2/802.11i);
- treating wireless as remote access and employing 802.1X, RADIUS, or TACACS;
- separating wireless access points from the LAN with firewalls;
- monitoring all wireless client activity with an IDS;
- and considering requiring wireless clients to connect with a VPN to gain LAN access.
1. What is layer 4 of the OSI model? A. Presentation B. Network C. Data Link D. Transport
D. The Transport layer is layer 4
- What is encapsulation?
A. Changing the source and destination addresses of a packet
B. Adding a header and footer to data as it moves down the OSI stack
C. Verifying a person’s identity
D. Protecting evidence until it has been properly collected
B. Encapsulation is adding a header and footer to data as it moves down the OSI stack.
3. Which OSI model layer manages communications in simplex, half-duplex, and full-duplex modes? A. Application B. Session C. Transport D. Physical
B. Layer 5, Session, manages simplex (one-direction), half-duplex (two-way, but only one direction can send data at a time), and full-duplex (two-way, in which data can be sent in both directions simultaneously) communications.
4. Which of the following is the least resistant to EMI? A. Thinnet B. 10Base-T UTP C. 10Base5 D. Coaxial cable
B. 10Base-T UTP is the least resistant to EMI because it is unshielded.
5. Which of the following is not an example of network segmentation? A. Intranet B. DMZ C. Extranet D. VPN
D. A VPN is a secure tunnel used to establish connections across a potentially insecure intermediary network.
6. Which of the following is not considered a non-IP protocol? A. IPX B. UDP C. AppleTalk D. NetBEUI
B. UDP is a transport layer protocol that operates as the payload of an IP packet. While it is not IP itself, it depends upon IP.
7. If you are the victim of a bluejacking attack, what was compromised? A. Your car B. Your switch C. Your cell phone D. Your web cookies
C. A bluejacking attack is a wireless attack on Bluetooth, and the most common device compromised in a bluejacking attack is a cell phone.
8. Which networking technology is based on the IEEE 802.3 standard? A. Ethernet B. Token Ring C. FDDI D. HDLC
A. Ethernet is based on the IEEE 802.3 standard.
- What is a TCP wrapper?
A. An encapsulation protocol used by switches
B. An application that can serve as a basic firewall by restricting access based on user IDs or system IDs
C. A security protocol used to protect TCP/IP traffic over WAN links
D. A mechanism to tunnel TCP/IP through non-IP networks
B. A TCP wrapper is an application that can serve as a basic firewall by restricting access based on user IDs or system IDs.
What is both a benefit and a potentially harmful implication of multilayer protocols? A. Throughput B. Encapsulation C. Hash integrity checking D. Logical addressing
B. Encapsulation is both a benefit and a potentially harmful implication of multilayer protocols
11. By examining the source and destination addresses, the application usage, the source of origin, and the relationship between current packets with the previous packets of the same session,\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ firewalls are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities. A. Static packet-filtering B. Application-level gateway C. Stateful inspection D. Circuit-level gateway
C. Stateful inspection firewalls are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities.
12. \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ firewalls are known as third-generation firewalls. A. Application-level gateway B. Stateful inspection C. Circuit-level gateway D. Static packet-filtering
B. Stateful inspection firewalls are known as third-generation firewalls.
- Which of the following is not true regarding firewalls?
A. They are able to log traffic information.
B. They are able to block viruses.
C. They are able to issue alarms based on suspected attacks.
D. They are unable to prevent internal attacks.
B. Most firewalls offer extensive logging, auditing, and monitoring capabilities as well as alarms and even basic IDS functions. Firewalls are unable to block viruses or malicious code transmitted through otherwise authorized communication channels, prevent unauthorized but accidental or intended disclosure of information by users, prevent attacks by malicious users already behind the firewall, or protect data after it passed out of or into the private network.
14. Which of the following is not a routing protocol? A. OSPF B. BGP C. RPC D. RIP
C. There are numerous dynamic routing protocols, including RIP, OSPF, and BGP, but RPC is not a routing protocol.