Chapter 8: Routing Flashcards

1
Q

Router

A

Any piece of hardware or software that forwards packets based on their destination IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Routing Table

A

A list of paths to various networks required by routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What two fields of a routing table are used to determine the route needed?

A

Destination LAN IP and Subnet Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What two fields of a routing table tell the router what to do with the packet?

A

Gateway (for IP of next hop)
and
Interface (for port to use)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If the network ID is directly connected, then the gateway field of the routing table gets set to _________

A

0.0.0.0
or
IP address of port you’re sending to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Command to see your routing table in Linux/OSX

A

netstat -r

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Metric

A

A relative value that defines the cost of using this route. (Lowest routes win)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network Address Translation (NAT)

A

A means of translating a system’s IP address into another IP address before sending it out to a larger network.
Gives individual systems private IPs, and hides them behind the public IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Port Address Translation (PAT)

A

Form of NAT that uses port numbers to map traffic from specific machines in the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NAT Translation Table

A

Special database in a NAT router that stores destination IP addresses and ephemeral source ports from outgoing packets and compares them against returning packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Static NAT (SNAT)

A

Maps a single routable (public) IP address to a single machine, allowing you to access that machine from outside the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Port Forwarding

A

Preventing the passage of any IP packets through any ports other than the ones prescribed by the system administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Dynamic NAT (DNAT)

A

Type of NAT in which many computers can share a pool of routable IP addresses that number fewer than the computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Static Route

A

An entry in a router’s routing table that is not updated by any automatic route discovery protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hop

A

Each time a packet goes through a router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Possible Criteria for Determining a Metric

A

1) Hop
2) Bandwidth
3) Latency
4) Cost
5) Maximum Transmission Unit (MTU)
6) Shortest Path Bridging (SPB)
7) Administrative Distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fragmentation

A

When a packet is too big and it’s broken into pieces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Distance Vector

A

Routing protocols that calculate the total cost to get to a particular network ID and compare that cost to the total cost of all other routes to get to that same network. It chooses the route with the lowest cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Convergence

A

When routers using distance vector protocols continue sending their routing tables to each other, but the routing tables don’t change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What size of network is distance vector good for?

A

Smaller networks with less than 10 routers or so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Routing Information Protocol (RIP)

A

Distance vector routing protocol that dates from the 1980s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Autonomous System (AS)

A

One or more networks that are governed by a single dynamic routing protocol, which provides routing for the Internet backbone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

AS Number

A

32 bit number displayed as two 16 bit numbers separated by a dot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Exterior Gateway Protocols (EGP)

A

The protocols AS’s use to communicate with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Interior Gateway Protocols (IGP)

A

The protocols that networks within an AS use to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Border Gateway Protocol (BGP)

A
  • An exterior gateway routing protocol that enables groups of routers to share routing information so that efficient, loop-free routes can be established.
  • Hybrid or path vector routing protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Edge-routers

A

The routers that handle AS-to-AS routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Route Aggregation

A

A way to simplify routing tables into manageable levels. Basically a tiering system, like a tree.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Link State

A

Type of dynamic routing protocol that announces only changes to routing tables, as opposed to the entire routing tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Open Shortest Path First (OSPF)

A

An interior gateway routing protocol developed for IP networks based on the link state algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

When you first launch OSPF-capable routers, they send out _________ called Hello packets looking for other OSPF routers

A

Link State Advertisements (LSAs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the routing protocol of choice for most large enterprise networks?

A

OSPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Flooding

A

When a new router is sending a lot of LSAs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Formula for hop cost in OSPF

A

100,000,000/(bandwidth in bps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Area

A

A group of logically associated OSPF routers designed to maximize routing efficiency while keeping the amount of broadcast traffic well managed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Area ID

A

Address assigned to routers in an OSPF network to prevent flooding beyond the routers in that particular network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

When you interconnect multiple areas, what is the area id of the backbone?

A

0 or 0.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Route Redistribution

A

When a multiprotocol router learns route info using on protocol and announces that info using another routing protocol.

39
Q

Intermediate System to Intermediate System (IS-IS)

A

A protocol similar to OSPF, but with support for IPv6 since inception.

40
Q

Enhanced Interior Gateway Routing Protocol (EIGRP)

A

Cisco’s proprietary hybrid protocol that has elements of both distance vector and link state routing.

41
Q

Yost Cable

A

A cable used to interface with a Cisco device

42
Q

Managed Device

A

Networking devices, such as routers and advanced switches, that must be configured to use.

43
Q

Network Management Software (NMS)

A

Tools that enable you to describe, visualize, and configure an entire network.

44
Q

Basic Router Configuration Process

A

1) Set up the WAN side
2) Set up the LAN
3) Establish Routes
4) Configure a Dynamic Protocol

45
Q

When packets aren’t getting to the places you expect them, check the __________.

A

routing table

46
Q

If multiple honeypots are connected to form a larger network, what term is used to describe the network?

a. ​combolure
b. ​lurenet
c. ​honeycomb
d. ​honeynet
A

d. ​honeynet

47
Q

What feature on some network switches can be used to detect faked arp messages?

a. ​session monitoring
b. ​dynamic ARP inspection 
c. ​DHCP snooping
d. ​dynamic packet inspection
A

d. ​dynamic packet inspection

48
Q
  1. A type of intrusion detection that protects an entire network and is situated at the edge of the network or in 2. a network’s protective perimeter, known as the DMZ (demilitarized zone). Here, it can detect many types of suspicious traffic patterns.
  2. A program that runs independently and travels between computers and across networks. Although worms do not alter other programs as viruses do, they can carry viruses.
  3. ​A software security flaw that can allow unauthorized users to gain access to a system. Legacy systems are particularly notorious for leaving these kinds of gaps in a network’s overall security net.
    ​5. A type of intrusion prevention that runs on a single computer, such as a client or server, to intercept and help prevent attacks against that one host.
    ​6. A portion of the security policy that explains to users what they can and cannot do, and penalties for violations. It might also describe how these measures protect the network’s security.
  4. ​A type of intrusion detection that runs on a single computer, such as a client or server, to alert about attacks against that one host.
    ​8. A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic and providing one address to the outside world, instead of revealing the addresses of internal LAN devices.
  5. A program that replicates itself to infect more computers, either through network connections when it piggybacks on other files or through exchange of external storage devices, such as USB drives, passed among users.​
  6. ​A specification created by the NSA to define protection standards against RF emanation, which when implemented are called EmSec (emission security).
    ​11. A threat to networked hosts in which the host is flooded with broadcast ping messages. A smurf attack is a type of denial-of-service attack.
A

a. ​ acceptable use policy (AUP)
b. ​ backdoor
c. ​ HIDS (host-based intrusion detection system)
d. ​ HIPS (host-based intrusion prevention system)
e. ​ NIDS (network-based intrusion detection system)
f. ​ proxy service
g. ​ smurf attack
h. ​ TEMPEST​
i. ​ virus
j. worm

49
Q

The simplest type of firewall is a content filtering firewall.​

True

False

A

False

Packet Filtering Firewall

50
Q

A firewall typically involves a combination of hardware and software.​

True
False

A

True

51
Q

At what layer of the OSI model do firewalls operate?​

a. ​Network
b. ​Transport
c. ​Application
d. ​Data link
A

a. ​Network

52
Q

Programs that run independently and travel between computers and across networks, such as by e-mail attachment or virtually any kind of file transfer, are known as which option below?​

a. ​network viruses
b. ​file-infector viruses
c. ​worms
d. ​macro viruses
A

c. ​worms

53
Q

A SOHO wireless router typically acts as a firewall and may include packet filtering options.​
True
False

A

True

54
Q

A system that is capable of collecting and analyzing information generated by firewalls, IDS, and IPS systems is known as which term below?

a. ​event collector architecture
b. ​log organizer 
c. SIEM system​
d. ​syslog system
A

c. SIEM system​

55
Q

What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it’s just part of the wire?​

a. ​pass-thru mode
b. ​virtual access mode
c. ​virtual wire mode
d. ​transparent wire mode
A

a. ​pass-thru mode

56
Q

What feature on some network switches can be used to detect faked arp messages?

a. ​DHCP snooping
b. ​session monitoring
c. ​dynamic ARP inspection 
d. ​dynamic packet inspection
A

c. ​dynamic ARP inspection

57
Q

Different types of organizations have similar levels of network security risks.
(A) True
(B) False

A

(B) False

58
Q

A firewall typically involves a combination of hardware and software.​
(A) True
(B) False

A

Answer : (A)

59
Q

The simplest type of firewall is a content filtering firewall.​
(A) True
(B) False

A

Answer : (B)

60
Q

A SOHO wireless router typically acts as a firewall and may include packet filtering options.​
(A) True
(B) False

A

Answer : (A)

61
Q

The term malware is derived from a combination of the words malicious and software.​
(A) True
(B) False

A

Answer : (A)

62
Q
Which software below combines known scanning techniques and exploits to allow for hybrid
exploits?​ 
(A) ​Nessus 
(B) ​metasploit 
(C) ​nmap 
(D) ​Sub7
A

Answer : (B)

63
Q
What kind of attack involves a flood of broadcast ping messages, with the originating source address being spoofed to appear as a host on the network?​ 
(A) ​amplification attack 
(B) smurf attack​ 
(C) ​zombie attack 
(D) ​SYN attack
A

Answer : (B)

64
Q
Botnets often make use of what chat protocol in order to receive commands?​ 
(A) ​XMPP 
(B) ​AIM 
(C) ​IRC 
(D) ​Skype
A

Answer : (C)

65
Q
​Which virus below combines polymorphism and stealth techniques to create a very destructive virus? 
(A) ​Natas 
(B) ​Macro 
(C) ​Michelangelo 
(D) ​Stoned
A

Answer : (A)

66
Q

​What characteristic of viruses make it possible for a virus to potentially change its
characteristics (such as file size, and internal instructions) to avoid detection?
(A) ​encryption
(B) stealth​
(C) ​polymorphism
(D) ​time dependence

A

Answer : (C)

67
Q
What type of virus are dormant until a specific condition is met, such as the changing of a file or a match of the current date?​ 
(A) ​encrypted virus 
(B) logic bomb​ 
(C) ​boot sector virus
(D) ​worm
A

Answer : (B)

68
Q
Programs that run independently and travel between computers and across networks, such as by e-mail attachment or virtually any kind of file transfer, are known as which option below?​ 
(A) ​file-infector viruses 
(B) ​worms 
(C) ​network viruses
 (D) ​macro viruses
A

Answer : (B)

69
Q
​If multiple honeypots are connected to form a larger network, what term is used to describe the network? 
(A) ​combolure 
(B) ​lurenet 
(C) ​honeycomb 
(D) ​honeynet
A

Answer : (D)

70
Q
A system that is capable of collecting and analyzing information generated by firewalls, IDS, and IPS systems is known as which term below? 
(A) ​event collector architecture 
(B) ​syslog system 
(C) SIEM system​ 
D) ​log organizer
A

Answer : (C)

71
Q
A proxy that provides Internet clients access to services on its own network is known as what type of proxy?​ 
(A) ​reverse proxy 
(B) ​cache proxy 
(C) ​service proxy
(D) ​inverse proxy
A

Answer : (A)

72
Q
At what layer of the OSI model do firewalls operate?​ 
(A) ​Transport 
(B) ​Data link
(C) ​Network
 (D) ​Application
A

Answer : (C)

73
Q
Which software below serves as the firewall for Linux systems?​ 
(A) ​ZoneAlarm 
(B) ​Comodo 
C) ​iptables 
D) ​ipf
A

Answer : (C)

74
Q
​A reflective attack can be increased in intensity by combining it with what type of attack?
(A) ​smurf attack 
(B) ​SYN attack 
(C) ​amplification attack 
D) ​friendly attack
A

Answer : (C)

75
Q
An attack in which hackers transmit bogus requests for connection to servers or applications in order to harvest useful information to guide their attack efforts is known as what option below?​ 
A) ​banner-grabbing attack 
B) ​reflective attack 
C) ​friendly attack 
D) ​IP spoofing attack
A

Answer : (A)

76
Q
​An attack that involves a person redirecting or capturing secure transmissions as they occur is known as what type of attack? 
(A) ​buffer overflow 
(B) ​session hijacking attack 
(C) ​man-in-the-middle attack
(D) ​banner-grabbing attack
A

Answer : (C)

77
Q
​Which option below is a standard created by the NSA that defines protections against radio frequency emanations? 
(A) ​EmSec 
(B) ​TEMPEST 
(C) RFGUARD​ 
(D) BlockSec
A

Answer : (B)

78
Q

The process in which a person attempts to glean access for authentication information by posing
as someone who needs that information is known as what option below?​
(A) ​mining
B) ​phishing
C) ​hunting
D) ​doxing

A

Answer : (B)

79
Q
​What feature on some network switches can be used to detect faked arp messages? 
(A) ​DHCP snooping 
(B) ​session monitoring 
(C) ​dynamic packet inspection 
(D) ​dynamic ARP inspection ​
A

Answer : (D)

80
Q
​In ACL statements, the any keyword is equivalent to using which wildcard mask? 
(A) ​255.255.255.255
 (B) 0.0.0.0​ 
C) ​0.0.255.255 
(D) ​255.255.0.0
A

(B) 0.0.0.0​

81
Q
What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire?​ 
(A) ​transparent wire mode 
(B) ​virtual access mode 
(C) ​pass-thru mode
(D) ​virtual wire mode
A

Answer : (D)

82
Q
What two types of agents are used to check compliance with network security policies?​
(A) ​dissolvable agent 
(B) ​temporary agent 
(C) ​persistent agent 
(D) ​permanent agent
A

Answer :

83
Q
What two options below are IDS implementations used to provide additional security on a network? 
(A) ​IIDS
 (B) ​PIDS
(C) ​HIDS 
(D) ​NIDS
A

Answer :

84
Q
What two terms describe a network of compromised computers that are then used to perform coordinated DDoS attacks without their owners' knowledge or consent?​ 
(A) ​reflectors 
(B) ​botnet 
(C) ​zombie army
 (D) ​repeaters
A

Answer :

85
Q
​Which two viruses below are examples of boot sector viruses? (
A) ​Michelangelo 
(B) ​Stoned 
(C) ​Natas 
(D) ​Klez
A

Answer :

86
Q
Which two terms can be used to describe a decoy system that is purposely vulnerable for the sake of attracting attackers?​
(A) ​honeypot 
(B) ​pandora box
(C) ​trap 
(D) ​lure
A

Answer :

87
Q

The _____________ proxy server software is available for use on the UNIX / Linux platform.​

A

Answer : SQUID

88
Q

The ________________ utility is a Windows console that is used to control what users do and how the system can be used.​

A

Answer : gpedit.msc

89
Q

Networks that use ________________, such as T-1 or DSL connections to the Internet, are vulnerable to eavesdropping at a building’ s demarc (demarcation point), at a remote switching facility, or in a central office.

A

Answer : leased public lines

90
Q

A ______________ on a device attempts to alter management interfaces within the hardware to the point where the device is irreparable.

A

Answer : physical attack

91
Q

A _________________ form is a document that is used to ensure that employees are aware of the fact that their use of company equipment and accounts will be monitored and reviewed as needed for security purposes.

A

​Answer : consent to monitoring

92
Q

The act of taking advantage of a vulnerability is known as which of the following? a. hacker b. poisoning c. snooping d. exploit

A

Answer: D

93
Q

____________________ occurs when a person attempts to glean access or authentication information by posing as someone who needs that information.

A

Answer: Phishing

94
Q

Which of the following describes an attack where high volumes of traffic overwhelm a wireless network? a. port scanning b. jamming c. phishing d. man-in-the-middle

A

Answer: B