Cyber Transport Block 4 Flashcards
What are the three basic network configurations?
Centralized
Peer to peer
Server base
A system of independent computers that are interconnected together to share data and resources is called______________.
Network
Which basic network configuration uses “dumb terminals” along with a mainframe computer?
Centralized computing
_______ is the standard for optical transport and is capable of transmitting data in excess 1Gbps
Sonet
The most popular physical network architecture in use today Is called________.
Eithernet
The ________ topology uses cable segments from each computer that are connected to a centralized component such as a hub.
Star
A system of rules and procedures that govern communications between two or more devices on a network is called a ___________.
Protocol
The _________ layer in protocol stack ensures that packets are delivered error free and in sequence.
Transport
Which transport protocol category establishes, maintains and breaks a connection with the receiving system?
Connection -oriented
The user datagram protocol (UDP) falls under the ________ ________ classification.
Connectionless oriented
What concept of TCP/IP prevent network congestion by ensuring transmitting devices do not overwhelm receiving device with data?
Flow control
A______ is the combination of an IP address and a port number.
Socket
An example of an exterior routing protocol used to link several LAN/MANs together is the _________ _________ __________.
Border gateway protocol
What protocol layer transmits the unstructured, raw bit stream over a physical medium?
Physical layer
The______ __________ ___________ is the United States representative to the international organization of standardization.
American national standards institute (ANSI)
What is the term for a standard development by a company for that company’s products only?
Propriety
The ___________ is a standard that has been officially approved by a recognized standards committee.
De Jure standard
List the three specifications for the 802 series of standards.
- type of network interface card
- components for LAN, MAN, WAN
- layout of connection pins
What IEEE 802 category defines standards for broadband wireless?
802.16
What IEEE 802 category defines standards for wireless LAN networks?
802.11
What device is designed to establish, maintain, and terminate a connection and transfer data without regards to the contents?
DCE
A ________ is a device that is added to a network to extend the length of a cable.
Repeater
A ______ is a device that can connect two or more LAN segments together and uses software to preform switching functions.
Bridge
Which device function as a translator between systems using different protocols on the same network?
Gateway
A______ creates a virtual private network through a process called “tunneling”
VPN connection
What type of clock uses an atomic resonance frequency standard as it’s time keeping element?
Atomic clock
_________ is the process by which a subject professes an identity and accountability is initiated.
Identification
What are the six methods of identification and authentication?
Knowledge base (password) Poisson-based (token) Biometric- base( fingerprint) Combining method Ticket authentication Sign on
Which I&A method that uses a token that the system can recognize by the host is called________.
Possession based
_________ methods provide a high level of security because authentication is directly related to a “users behavior or physiological characteristic.
Biometric
The use of prescribed safeguard and controls to prevent reconstruction of sensitive or classified information is called__________.
Remanence security
Which method of destruction removes classified and sensitive information from media to render the information unrecoverable by technical means?
Sanitizing media
_____________ is the DOD’s practical strategy for achieving information assurance in today’s network-dependent environments.
Defense in depth.
What are the three elements that make up the defense in depth strategy?
People
Operation
Technology
What is the second element of the defense in depth strategy that focuses on all the activities required to sustain an organizations security on a day-to-day basis?
Operations
_____________ is a network architectural concept design for network security as established by the Air Force
Barrier reef
___________ is what protects the bases “network perimeter” in accordance to Air Force security policies
Boundary protection
The ______________ router is controlled by the integrated network operations and security center (INOSC) and is the first line of defense for Air Force bases.
Air Force SDP
A pice of hardware or software program that examines data passing into your computer or network is called a _____________.
Firewall
An__________ system scans, audits and monitors the security infrastructure for signs of unauthorized access or abuse in progress.
Intrusion detection
The ability to identify and report vulnerabilities at the host and network level to protect resources directly managed by NCC is called _____________.
Internal control
___________ limits access to base systems based on roles or identification that reflects the degree of the users need-to-know and privileges.
Access control
What is the procedural method that provides the capability to prioritize and guarantee network access to traffic at various levels of mission criticality?
Access preservation
What are the three sanctioned tools that from the foundation of combat information transport system (CITS)?
Internet security system(ISS)
Intruder alert
Enterprise security manger (ESM)
The __________ performs automated, distributed or event-driven probes of geographically dispersed network services and prioritized scan results and remediation information in clear reports that allow users to respond quickly to critical vulnerabilities.
Internet security system
___________ is an agent based intrusion detection tool used by INOSC and NCC operations to detect unauthorized activity on selected network hosts, key servers, and critical workstations.
Intruder alert
Which Air Force approved tool runs on a management server and has agents installed on hosts to run checks based on vulnerabilities of a particular operating system.
Enterprise security manger
The two primary goals of anti-virus software are______ and _______.
Prevention
Detection
Automated security incident measurement system (ASIMS) logs all connections and looks for suspicious events that enter a _______ network.
Base
A network__________ policy focuses on controlling the network traffic and usage.
Security
What are the three types of perimeter networks?
Outmost perimeter
Internal perimeter
Innermost perimeter
The_______ network is the most insecure area of your network infrastructure.
Outermost
A ___________ is an access control device, performing perimeter security by determining which packets are allowed or denied into a network.
Firewall
What filtering firewall works by examining packets and comparing them to a list of rules based on source of data, intended destination, and the port number the data was sent from?
Packet filtering firewall
A____________ firewall examines more than just addresses and port information of the data by looking deeper at the actual application data.
Stateful packet inspection
_______ management is the process of detecting, isolating and correcting network problems.
Fault
What are the five network management domains as defined by IOS?
Fault management Configuration management Account management Performance management Security management
Periodically the network management software can send out a message to others devices asking them for their status which is called?
Polling
The final step in fault management is called ______ the problem
Fix
The goal of _______ _________ is to monitor network and system configurations so the effect on network operations of various versions of hardware and software can be tracked and managed.
System configuration
Storing data in a database such as relational database management system (RDMS) to allow quick access to the number of routers in a building falls under _______ management.
Configuration
“Fine tuning” a network operations capabilities fall under__________.
Performance
_________ is combination of protocols, each layer has it own set of rules and defines the rules of each layer in the OSI reference model
Protocol stack
What is the management of network usage, costs, charges and access to resources?
Account management
The goal of _________ management is to ensure all users have adequate network resources and they are regulated and distributed accordingly.
Account
Securing access points to sensitive information on a network is part of _________ management
Security
True/false
Security management under FCAPS deals with physical and operating system security.
False
As part of security management ________ _______ ________ should be used to provide a basic level of security for accessing a network.
Access control lists (ACL)
The final step in security management is _________ the secure access points.
Maintaining
_________________ are another name for communication computer facility records.
Central office records
______ is a datebase designed to proactively manage small, medium, and large scale enterprise network from local, regional, and central locations simultaneously.
CAIRS OSS
Which software was adopted by the Air Force as the standard application to generate and maintain telephone central office records?
Telecommunications management system
TMS
What is another name for the action request system?
Remedy action request system
A central point to receive help on various computer issue is called a__________.
Help desk
The connection protocol that just sends out the packet to the receiving system and does not check to see if it was received?
Connectionless-oriented
TCP/IP uses what connectionless transport protocol?
User Datagram Protocol (UDP)
What is UDP best used for?
To send small amounts of data for which guaranteed delivery is not required and minor packet loss can be tolerated (VOIP, video-confereincing, streaming audio and video, online games)
Does UDP use windowing or acknowledgments?
No
What protocols use UDP?
TFTP, SNMP, DHCP, DNS
What is the 3rd layer of the OSI model?
Network layer (N3twork)
What is the transport layer responsible for?
logical addressing and routing of the data packets from the source to the destination network device
Network Layer protocols are divided into what 2 categories?
Routed and Routing
What are the 2 things a protocol describes?
The format a message must take, and the way computers must exchange a message within the context of a particular activity
What is a Routed Protocol?
A network layer protocol that provides enough information in its header to allow a packet/segment/frame to be forwarded from one host to another based on the addressing through the router
Is Internet Protocol (IP) a routed protocol?
Yes
Define IP
Connectionless, unreliable, best-effort delivery system protocol
What 5 parts make up an IP packet?
Source and destination address, protocol identifier, checksum, time to live (TTL)
What is TTL (Time to live)
It tells each router between source and destination how long the packet has to remain on the network, by counting seconds, hops, or both
What are the 8 protocols that IP uses as its carrier to pass through a router?
DNS, FTP, HTTP, SMTP, SNMP, ICMP, Telnet, SSH
Define DNS
Domain Name System. Translates names of domains and their publicly advertised network nodes on to IP addresses
Define FTP
File Transfer Protocol. Download and upload files from the internet
Define HTTP
Hyper Text Transfer Protocol. Identifies to the browser what protocol should be used
Define SMTP
Simple Mail Transfer Protocol. Email servers use it to send and receive email using TCP
Define SNMP
Simple Network Management Protocol. Facilitates the exchange of management information between network devices. Allows network managers to monitor traffic.
Define ICMP
Internet Control Message Protocol. Sends and recieves status reports about information being transmitted. Often used to control flow between routers.
Define Telnet (aka VTY)
Terminal Emulation. Software to remotely access another device. Often used for remote admin of routers and switches. BANNED by the Air Force on the operational network
Define SSH
Secure Shell. Network protocol allowing data to be exchanged using a secure channel between 2 networked devices. Provides encryption for confidentiality and integrity of data on an unsecure network
What is a Routing Protocol?
Supports a routed protocol by providing mechanisms for sharing routing information. Routing protocol messages move between the routers to update and maintain tables
What are the 2 classes of routing protocols?
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs). Classified by how the operate with regard to an Autonomous System
Interior routing protocols operate where?
Inside a local network