Chapter 5 - Networks and Telecommunications Flashcards

1
Q

Open Systems Interconnection Reference Model (OSI) Layers

A

Layer 1: Physical
Layer 2: Data link
Layer 3: Network
Layer 4: Transport
Layer 5: Session
Layer 6: Presentation
Layer 7: Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Function of Layer 1 of the OSI

A

Establishes and manages the physical transmission of data between network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Function of Layer 2 of the OSI

A

Responsible for the transfer of data between adjacent nodes on a network segment using MAC addresses to identify devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Function of Layer 3 of the OSI

A

Routing and forwarding data packets between different networks, using IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Function of Layer 4 of the OSI

A

Responsible for ensuring reliable end-to-end communications and maintenance between applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Function of Layer 5 of the OSI

A

Opens, closes, and manages sessions between end-user application processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Function of Layer 6 of the OSI

A

Ensures that data is formatted and encoded in a way that the application can understand. Includes tasks like data translation and encryption/decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Function of Layer 7 of the OSI

A

Provides the protocols that end-user applications use to interact with the network. For example: HTTP for browsing the web and FTP for file transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WAN

A

Wide-area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Example of a WAN

A

The internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Disadvantage of WANs

A

Data security cannot be guaranteed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can we make data more secure as it travels across a WAN

A

Encrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

LAN

A

Local-area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Function of a LAN

A

Provide network connectivity for computers that are in the same geographic area and are typically connected with hubs and switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hubs

A

devices that contain plugs and ports to connect ethernet cables for different network systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Switches

A

Receive packets of information, look at the destination MAC address, and then send the packet there. (perform intelligent filtering)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Disadvantage of a LAN

A

Oftentimes, they do not protect themselves from each other. So if one becomes infected, malware can quickly spread to all the devices on the network

18
Q

Example of a LAN

A

Ethernet networks (the most common LAN)

19
Q

The ethernet standard

A

Defines how computers use media access control (MAC) addresses to communicate with each other

20
Q

The ethernet standard governs which layers of the OSI?

A

Physical (layer 1) and data link (layer 2)

21
Q

Virtual LANs

A

A collection of logically related network devices that are viewed as a network segment. Allows administrators the ability to separate network segments without physically separating the cabling

22
Q

Transmission control protocol (TCP) and internet protocol (IP) are apart of which layers of the OSI reference model?

A

Network and transport

23
Q

TCP and IP

A

a suite of protocols that govern all activity across the internet and through most corporate and home networks

24
Q

Network port

A

A number that tells a receiving device where to send messages it receives

25
Q

IPv4 addresses

A

4-byte, 32-bit; still the most common

26
Q

IPv6 addresses

A

128-bits long; more complex and secure

27
Q

Dynamic Host Configuration Protocol (DHCP)

A

Provides a computer with an IPv4 address, a subnet mask, and other essential communication information

28
Q

Internet Control Message Protocol (ICMP)

A

A management and control protocol for IP that delivers messages about the health of the network

29
Q

Vulnerability of ICMP

A

Attackers can use it to create a DoS attack

30
Q

Reconnaissance

A

Gathering information about a network for use in a future attack

31
Q

Eavesdropping

A

When an attacker taps a data cable to see all the data passing through it

32
Q

Denial-of-service (DoS)

A

Flooding a network with traffic and shutting down a single point of failure

33
Q

Distributed denial-of-service (DDoS)

A

Uses multiple compromised systems to flood the network from many different directions

34
Q

Telephony denial-of-service (TDoS)

A

Attempts to prevent telephone calls from being successfully initiated or received by some person or organization

35
Q

Firewalls

A

Controls the flow of traffic by preventing unauthorized network traffic from entering or leaving a particular portion of the network

36
Q

Border firewalls

A

Separate the protected network from the internet

37
Q

Three parts of Unified Threat Management

A
  1. URL filter - filters web traffic by examining the URL instead of the IP
  2. Content inspection - looks at network packet content to determine if the packet should be allowed to pass
  3. Malware inspection - looks at packet content for signs of malware
38
Q

Network Access Control (NAC)

A

Enables you to add more security requirements before allowing a device to connect to the network

39
Q

Wireless access points (WAPs)

A

A radio that sends and receives networking information over the air between wireless devices and the wired network

40
Q

Who can attempt to connect to wireless access points?

A

Anyone who is in radio range

41
Q

Examples of wireless network security controls

A
  • VPNs
  • Wireless encryption (such as WEP, CCMP, WPA)
  • MAC address filtering
  • SSID broadcast