Chapter 3: Exploring Network Technologies andTools Flashcards

1
Q

A ________ typically describes an organizational goal and administrators enable specific protocols to meet organizational goals.

A

use case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protocols used for voice and video include _____ and ______.

A

Real-time Transport Protocol (RTP) and Secure Real-time Transport Protocol (SRTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

______ provides encryption, message authentication, and integrity for RTP.

A

Secure Real-time Transport Protocol (SRTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

______ is commonly used to transfer files over networks, but does not encrypt the transmission.

A

File Transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Several encryption protocols encrypt data-in-transit to protect its confidentiality. They include: File Transfer Protocol Secure (FTPS), Secure File Transfer Protocol (SFTP), Secure Shell (SSH), Secure Sockets Layer (SSL), and Transport Layer Security (TLS).

A
File Transfer Protocol Secure (FTPS)
Secure File Transfer Protocol (SFTP)
Secure Shell (SSH)
Secure Sockets Layer (SSL)
Transport Layer Security (TLS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which ports do these protocols use?
SMTP 
POP3
IMAP4
Secure POP
Secure IMAP
A

SMTP sends email using TCP port 25.
POP3 receives email using TCP port 110.
IMAP4 uses TCP port 143.
Secure POP uses TLS on port 995 (legacy) or with STARTTLS on port
110.
Secure IMAP uses TLS on port 993 (legacy) or with STARTTLS on port 143.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which ports do these protocols use?
HTTP
HTTPS

A

HTTP uses port 80 for web traffic. HTTPS encrypts HTTP traffic in transit and uses port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Directory services solutions implement _________ as the authentication protocol. They also use ______ over TCP port 389 and _______ over TCP port 636.

A

Directory services solutions implement Kerberos as the authentication protocol. They also use Lightweight Directory Access Protocol (LDAP) over TCP port 389 and LDAP Secure (LDAPS) over TCP port 636.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Administrators commonly connect to remote systems using SSH instead of Telnet because

A

SSH encrypts the connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Administrators use Remote Desktop Protocol (RDP) to connect to remote systems using TCP port

A

3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Network Time Protocol (NTP) provides

A

time synchronization services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Domain Name System (DNS) provides

A

domain name resolution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS zones include ____ records for IPv4 addresses and _____ records for IPv6 addresses.

A

DNS zones include A records for IPv4 addresses and AAAA records for IPv6 addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DNS uses ____ port 53 for zone transfers and ____ port 53 for DNS client queries.

A

DNS uses TCP port 53 for zone transfers and UDP port 53 for DNS client queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Domain Name System Security Extensions (DNSSEC) provides

A

validation for DNS responses and helps prevent DNS poisoning attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two command-line tools used to query DNS are

A

nslookup and dig. Both support the axfr switch, allowing them to download all zone data from a DNS server, unless the DNS server blocks the attempt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Switches are used for

A

network connectivity and they map media access control (MAC) addresses to physical ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How to secure ports on a switch

A

Port security limits access to switch ports. It includes limiting the number of MAC addresses per port and disabling unused ports. You can also manually map each port to a specific MAC address or group of addresses.

19
Q

An aggregation switch does what?

A

connects multiple switches together in a network.

20
Q

Routers do what?

A

connect networks and direct traffic based on the destination IP address. Routers (and firewalls) use rules within access control lists (ACLs) to allow or block traffic.

21
Q

Implicit deny indicates

A

that unless something is explicitly allowed, it is denied. It is the last rule in an ACL.

22
Q

Host-based firewalls

A

(sometimes called application-based) filter traffic in and out of individual hosts. Some Linux systems use iptables or xtables for firewall capabilities.

23
Q

Network-based firewalls

A

filter traffic in and out of a network. They are placed on the border of the network, such as between the Internet and an internal network.

24
Q

A stateless firewall

A

controls traffic between networks using rules within an ACL. The ACL can block traffic based on ports, IP addresses, subnets, and some protocols.

25
Q

Stateful firewalls

A

filter traffic based on the state of a packet within a session.

26
Q

A web application firewall (WAF)

A

protects a web server against web application attacks. It is typically placed in the demilitarized zone (DMZ) and will alert administrators of suspicious events.

27
Q

A DMZ provides

A

a layer of protection for servers that are accessible from the Internet.

28
Q

An intranet is

A

an internal network. People use the intranet to communicate and share content with each other.

29
Q

An extranet is

A

part of a network that can be accessed by authorized entities from outside of the network.

30
Q

NAT

A

translates public IP addresses to private IP addresses, private back to public, and hides IP addresses on the internal network from users on the Internet.

31
Q

An airgap is

A

a metaphor for physical isolation, indicating a system or network is completely isolated from another system or network.

32
Q

Routers provide

A

logical separation and segmentation using ACLs to control traffic.

33
Q

Forward proxy servers

A

forward requests for services from a client. It can cache content and record users’ Internet activity.

34
Q

A transparent proxy

A

accepts and forwards requests without modifying them.

35
Q

A nontransparent proxy

A

can modify or filter requests, such as filtering traffic based on destination URLs.

36
Q

Reverse proxy servers

A

accept traffic from the Internet and forward it to one or more internal web servers. The reverse proxy server is placed in the DMZ and the web servers can be in the internal network.

37
Q

A unified threat management (UTM) security appliance includes multiple layers of protection, such as

A

URL filters, content inspection, malware inspection, and a distributed denial-of-service (DDoS) mitigator. UTMs typically raise alerts and send them to administrators to interpret.

38
Q

Mail gateways are

A

logically placed between an email server and the Internet. They examine and analyze all traffic and can block unsolicited email with a spam filter. Many include data loss prevention (DLP) and encryption capabilities.

39
Q

Loop protection protects against

A

switching loop problems, such as when a user

connects two switch ports together with a cable.

40
Q

Spanning Tree Protocols protect against

A

switching loops.

41
Q

Flood guards prevent

A

MAC flood attacks on switches.

42
Q

VLANs can

A

logically separate computers or logically group computers regardless of their physical location. You create them with Layer 3 switches.

43
Q

Routers use rules within ACLs as an

A

antispoofing method. Border firewalls block all traffic coming from private IP addresses.

44
Q

SNMPv3 is used to

A

monitor and configure network devices and uses notification messages known as traps. It uses strong authentication mechanisms and is preferred over earlier versions. SNMP uses UDP ports 161 and 162.