Deck Name Test Flashcards

1
Q

__ topology e.g. Ethernet, ATM defines the rules of communication across the __ topology.

A

Logical topology (layer 2), Physical topology (layer 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

__ applies labels to packets, is commonly used to privately control international networks and is much cheaper than dedicated lines.

A

MPLS (Multi Protocol Label Switching)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

__ are asynchronous devices that provide dial-in and dial-out connections.

A

Access servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

__ are distributed series of caching web servers, designed to improve performance and availability by bring data closer to the end user.

A

CDN (Content Distribution Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

__ are the signaling protocols and __ is the packetization of your voice.

A

SIP and H.323 (which is wrapped around SIP for security), RTP (Real-time protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__ checks a system’s patches, antivirus and local firewall. If the client passes, access is granted, otherwise it is placed on an isolated VLAN where patches and antivirus updates may be provided.

A

NAC (Network Access Control). It builds on top of 802.1X.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

__ communications is where data is just sent with no need for start and stop bits. It is more efficient since there is no overhead (start/stop bits) but trasmitting and receiving stations need to be synchronized.

A

Synchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

__ communications is where data is sent by changes in levels of voltage or current in a sequential fashion. There are start and stop sequence bits.

A

Asynchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

__ DSL has the same upload and download rates.

A

SDSL (symmetric)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

__ DSL is higher download than upload. __ is much higher download than upload rates.

A

ADSL (Asymmetric), VDSL (very-high-data-rate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

__ DSL is used to provide the last mile of T1 service and uses two copper twisted pairs.

A

HDSL (high-rate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

__ extends Fibre channel to Ethernet networks.

A

FCoE (Fibre Channel over Ethernet) since FC was designed for high-performance directly attached storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__ integration is a common and phased approach for VoIP. The more long-term solution is __ integration.

A

PSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes callsPSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes callsPSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes callsPSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes callsPSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes callsPSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes callsPSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes callsPSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes callsPSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes callsPSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes callsPSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes callsPSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes callsPSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes callsPSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes callsPSTN PBX/VoIP integration: combines traditional and VoIP networks IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

__ is a helpful network path troubleshooting tool that shows each of the nodes from a local machine to a destination.

A

traceroute, part of ICMP and built on ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

__ is a layer 2 error correction for serial connections.

A

HDLC (High-Level Data Link Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

__ is a layer 2 polling method for serial connections

A

SDLC (Synchronous Data Link Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

__ is a TCP-based logon system with robust AAA, which is why Diameter came out.

A

TACACS (Terminal Access Controller Access Control System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

__ is a UDP-based logon system mostly focused on authentication and doesn’t focus much on authorization and accounting.

A

RADIUS (Remote Authentication Dial In User Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

__ is a vast improvement over WEP, requires NIC replacement and AP replacement or firmware upgrade (AES-CCMP).

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

__ is an authentication mechanism that uses challenge/response authentication and is not vulnerable to a replay attack.

A

CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

__ is an authentication mechanism, an extension to PPP and supports a variety of authentication protocols.

A

EAP (Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

__ is an IETF standard (RFC 2401) for establishing encrypted communication between users and devices. It offers sophisticated replay attack prevention and was issued as an open standard thus promoting multivendor interoperability.

A

IPsec VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

__ is an improved version of RADIUS which focuses on all three areas of AAA.

A

Diameter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

__ is an improvement over WEP (Wired Equivalent Privacy) and compatible with WEP hardware (TKIP).

A

WPA (Wi-Fi Protected Access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

__ is built on ping and used to plot the path a packet took through the network.

A

traceroute, part of ICMP and built on ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

__ is layer 2 network level authentication to authenticate a device, using MAC addresses (can be spoofed) and/or certificates.

A

802.1X. Using both would be ideal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

__ is used to find whether a given Internet host is reachable or not.

A

Ping, part of ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

__ layer convers bits into electrical signals or light impulses for transmission.

A

Physical Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

__ of the OSI model connects the physical part of the network with the abstract part?

A

Data link layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

__ offers SCSI disk access via TCP/IP and is routed via IP.

A

iSCSI (Internet Small Computer System Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

__ or __ which are forms of __ should be used for wireless networks where we should have mutual authentication. Otherwise if just using CHAP, the server authenticates the client but the client does not authenticate the server.

A

LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), forms of EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

__ topology (layer 1) describes how systems are connected together e.g. bus ring, star.

A

Physical topology (layer 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

__ VPN is also known as Transport Mode.

A

Client-to-site VPN: provide remote access from a remote client such as a traveling sales rep or telecommuting employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

__ VPN is also known as Tunnel Mode.

A

Site-to-site VPN: provide connectivity to networks such as headquarters and a remote office. Gateway devices are located in front of both networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

__, given a MAC address, will find out what the corresponding IP address is.

A

RARP (Reverse Address Resolution Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

__, given an IP address, will find out what the corresponding MAC address is.

A

ARP (Address Resolution Protocol), so computer can determine the next hop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

105.255.255.255 is a Class __ __ broadcast address.

A

Class A directed broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

150.5.255.255 is a Class __ __ broadcast address.

A

Class B directed broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

802.11 supports which frequencies and speeds?

A

BAGN: 11,54,54,144+Mbps. 2.4,5,2.4,2.4/5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

802.11 supports which two physical layers?

A

IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)IR: Infrared, requires line of sight RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A __ broadcast goes to every system on the LAN

A

limited broadcast. Will not get routed to any other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A __ broadcast is where the entire address is set to all 1’s or 255.255.255.255.

A

limited broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A __ broadcast is where the host portion is set to all 1’s

A

directed broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A __ broadcast would be routed to every computer on the destination network.

A

directed broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A __ determines the path a packet will take.

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A __ firewall operates at layer 3.

A

packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

A __ firewall operates at layer 4.

A

stateful filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A __ identifies a device by vendor code (first 3 bytes) and a unique identifier (last 3 bytes).

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A __ is a layer 3 device that connects two different networks together and moves packets between networks.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A __ is a mapping of FCoE over the network.

A

vSAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A __ is a path through intermediate devices and bridges where there are multiple physical connections but virtually makes a single connection.

A

VC (Virtual Circuit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A __ is a physical topology that is not very scalable or fault tolerant since a single wire connects all of them together. If one goes down they all do.

A

bus. legacy Ethernet uses a bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A __ is a router (inline device connecting two devices together) with a filtering capability (ruleset)

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A __ is a single broadcast domain and defines LANs logically.

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A __ is always at layer 1 of the OSI model.

A

Bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

A __ is always at layer 2 of the OSI model.

A

Frame e.g. an Ethernet Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

A __ is always at layer 4 of the OSI model.

A

Segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

A __ is information at layer 3 of the OSI model.

A

Packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

A __ is like a bus where you connect the two endpoints together

A

ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A __ is often used to connect multiple bus networks.

A

tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

A __ is the most common physical topology. It is very fault tolerant since there are multiple paths, scalable since easy to add more connections without interrupting others and easy to troulbeshoot.

A

star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

A __ is used to directly connect two similar devices (e.g. two computers, two switches, etc), otherwise there will be constant collisions.

A

crossover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

A __ is used to get to the next hop.

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

A __ is where two locations may be 20 miles apart which is good for a very local disaster (building fire). A __ is where two locations may be 200 miles apart which is best for large scale disasters.

A

MAN: Metropolitan Area Network, WAN: Wide Area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

A __ line is great because it is reserved for use however when not in use you’re paying for bandwidth no one is utilizing. A __ line means you don’t need to know bandwith.

A

Dedicated line, leased line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

A __ NAT formally referred to as PAT.

A

Many to one NAT aka PAT (Port address translation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

A __ NAT is a set of public addresses that are mapped and is not as scalable today since computers have many connections.

A

pool NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

A __ operates at layer 2 and can connect multiple LANs. It is useful in breaking up a large LAN into smaller LANs.

A

bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A __ provides block-level network file system access and is equivalent to directly attached storage (such as an IDE, SATA or SCSI drive) via a network.

A

SAN (Storage Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

A __ provides file and directory access via Ethernet but there is no direct access to blocks or clusters.

A

NAS (Network Attached Storage)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

A __ virtual circuit is better for small data transfers or infrequent transfers. A __ virtual circuit is better for large or frequent data transfers.

A

SVC (Switched Virtual Circuit), PVC (Permanent Virtual Circuit, permanently keeps connection up rather than constantly creating and tearing down connections like SVC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

A bridge is a layer __ device that breaks up an Ethernet domain into two different collission domains to increase performance.

A

Data link layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

A computer will only use DNS if a __ is not present

A

static host file. Every OS supports a static host file which is where the computer goes first to translate a domain to IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

A firewall without a ruleset, a firewall with an any-any ruleset, or a firewall with a default allow is a __.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

A hub operates at layer __.

A

Physical layer 1 since it is just re-transmitting raw data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

A layer __ switch can do load balancing because it is __ aware.

A

Layer 7, Application-aware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

A MAC address operates at layer __.

A

layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

A modulator/demodulator that converts digital signals to analog signals, transmits over conventional telephone lines and then converts analog back to digital signals.

A

modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

A packet filtering firewall operates at layer __.

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

A proxy firewall or next gen firewall operates at layer __.

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

A stateful firewall operates at layer __.

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

A switch is a layer __ device that acts like a hub except that it probes each system and stores it’s MAC address so it can send communications directly from one computer to another which increases performance and security.

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

A type of network that could be used by an electrical company to read meters at multiple locations in a small area without going to each location.

A

NAN (Neighborhood Area Network) e.g. so don’t have to worry about dogs/guns when he reads the meter at a house.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

All DSL requires a __ in the neighborhood.

A

POP (Point of Presence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

An __ is connecting from your organization to only another organization (e.g. via T1, MPLS, VPN). What can be a problem with this?

A

Extranet. Your security is only as good as the other organization’s security e.g. Target’s extranet with HVAC vendor is how the adversary go to their POS systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

An example of a distance vector routing protocol where hop count is used as the metric is __

A

RIP (Routing Information Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

An example of a link state routing protocol which is not subject to routing loops, is more efficient, uses multiple parameters to determine the best route and only sends an update if there’s a change is __

A

OSPF (Open Shortest Path First)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

An IPv6 is __ bits or __ bytes.

A

128-bit or 16 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

An unmanaged switch has no __ capability while a managed switch does. Both are layer __.

A

VLAN, Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Any time you enter in a domain name you need to do a __ before you get to layer 3 in the protocol stack, otherwise you won’t get the IP so you won’t get routing.

A

forward lookup or gethostbyname

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

As you go down a stack you __ a header. As you go up the stack you __ a header.

A

Add,Remove e.g. layer 1 processes layer 1 and then takes the header off and passes it up to layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

ATM is designed for high speed networks sending small amounts of information, using 48 byte box plus 5 byte header so it’s very optimized and minimal chance of collisions. It uses layers __ and __.

A

Layers 2 & 3

93
Q

Autoconfiguration embeds the __ byte __ address into the __ portion of IPv6.

A

6 byte MAC address into the host portion of IPv6

94
Q

Client-to-site VPN which provides access from a remote client such as a traveling sales rep or telecommuting employee is also known as __.

A

Transport Mode

95
Q

Common __ solutions are iSCSI, Fibre Channel and FCoE.

A

SAN

96
Q

Convert the nibble 1101 to decimal.

A
  1. Write each digit separate 1 1 0 1. Label number from right to left 0,1,2,3. Then put base (in this case 2) on bottom left of those numbers, multiply down, add across. β€˜Binary,Hex to Decimal conversion - Drawing 4A’
97
Q

CSMA with __ is a one way link and not typically used. CSMA with __ is typically used and is where the computer monitors the line to see if another computer is transmitting, if not the computer transmits.

A

CSMA/CA (collision avoidance), CSMA/CD (collision detection)

98
Q

Draw the OSI and TCP/IP models

A

OSI vs TCP-IP - Domain 4 pg 15’ Also add hub/repeater, switch/bridge, router, firewall so I know the layers for those

99
Q

Ethernet is a baseband or shared media where data is transmitted using __

A

CSMA/CD

100
Q

Ethernet, ATM (Asynchronous Transfer Mode), HDLC (High-level data link control), ISDN (Integrated Services Digital Network) and X.25 and examples of __ which are the rules for sending signals to each other.

A

Logical topology

101
Q

Even though networks are packet-based this OSI layer sets up a virtual session to make it look like we’re on a circuit-switched network.

A

Layer 5 Session

102
Q

Every single piece of information must have a readable unencrypted __ which routers use to determine the path.

A

IP header. This is why the IP protocol is often called the workhorse of the internet

103
Q

Examples of leased lines in the US are __ and in Europe are __.

A

T’s e.g. T1, T3 vs E’s in Europe e.g. E1, E3

104
Q

Explain the 3 way handshake

A

A synchronizes with B (1), B acknowledges (2), B synchronizes with A (3), A acknowledges. Syn (1), Syn/Ack (2,3), Ack (4). So it’s a 4 step process but since Steps 2 & 3 are done over one packet it’s a three-way handshake. β€˜3 way handshake - drawing 4C’

105
Q

For IPsec VPN you would primarily want to use __ for confidentiality.

A

ESP (Encapsulating Security Payload): protects the payload only; provides confidentiality

106
Q

For IPsec VPN you would primarily want to use __ for integrity and authentication.

A

AH (Authentication Header): protects entire packet including headers; provides authentication and integrity but no confidentiality. AH used for internal tunnels.

107
Q

For LAN transmission methods, a __ is one-to-one, a __ is one-to-many but not all, a __ is one-to-all.

A

Unicast, Multicast (Multi=Many), Broadcast

108
Q

For TCP every single packet has __ bytes more than UDP.

A

12 bytes. TCP header is 20 bytes, UDP has 8 bytes.

109
Q

gethostbyaddr is also known as __.

A

reverse lookup

110
Q

gethostbyname is also known as __.

A

forward lookup

111
Q

How do we uniquely identify a connection?

A

Socket pair which consists of the source/destination IPs and ports.

112
Q

How does the Network layer know which protocol at layer 4 to hand off to?

A

That’s the 9th byte (protocol field) in the IP header.

113
Q

How many more bytes does IPv4 use for overhead than IPv6?

A

4 bytes since IPv6 header has 8 bytes overhead as opposed to 12 for IPv4. β€˜IPv4 vs IPv6 header overhead - Drawing 4B’

114
Q

Hubs and switches connect computers together to create a network. __ connect hubs and switches together to move packets between those networks.

A

Routers

115
Q

ICMP is a layer __ protocol.

A

Layer 3 Network

116
Q

If an attacker wants to bypass DNS completely, she can modify the __.

A

host table aka static host file

117
Q

If an organization is using wireless and wants mutual authentication, which could be used?

A

LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), EAP

118
Q

If the sender compresses the data prior to transmission the __ layer on the receiving end would have to decompress it before the receiver could use it.

A

Presentation Layer 6

119
Q

If you add security directly into the protocol stack, it would be the __ layer in OSI.

A

Presentation Layer 6

120
Q

If you are running a sniffer in a switch, which traffic will you see, if any?

A

Anything coming from your computer, anything going to your computer and any broadcast traffic. It is INCORRECT to say that you will not see any traffic.

121
Q

If you are using ESP with data transport mode, does that effect security?

A

Yes, you can only do layer 3 filtering, not higher level filtering since IPsec data is encrypted at layer 4 and higher so all you can see is the IP header.

122
Q

If you have the address and are looking for the FQDC or local name you would perform the __ command.

A

gethostbyaddr aka forward lookup to find the FQDN (eric.sans.org) or local name (eric)

123
Q

If you have the FQDN or local name and need the address you would perform the __ command.

A

gethostbyname aka forward lookup if you have the FQDN (eric.sans.org) or local name (eric)

124
Q

If you want your IPv4 network to communicate with the v6 internet you need __.

A

translation: IPv4 over IPv6

125
Q

If your network is IPv6 and the Internet is IPv4, what must you do with your gateways?

A

tunneling: IPv6 over IPv4

126
Q

In __ mode, the IPsec header is after the IP header and before the TCP/UDP header.

A

Transport mode: between two hosts, pg 160

127
Q

In __, a server generates a new challenge every time and combines the client’s response with the password so if it is sniffed, it’s a new password every time.

A

CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.

128
Q

In __, the same password is used every time you authenticate so it sould be sniffed and used in a replay attack.

A

PAP (Password Authentication Protocol)

129
Q

In 802.1X the __ is responsible for forwarding authentication credentials supplied by a user or a digital certificate to an authenticating entity.

A

Supplicant

130
Q

In a __-switched network you get dedicated bandwidth but bandwidth is limited and can be wasted e.g. telephone network. In a __-switched network there is no dedicated bandwidth so there could be performance issues and delays but it can handle an unlimited number of connections and bandwidth.

A

circuit-switched, packet-switched

131
Q

In IPsec __ mode, the outer IP header specifies IPsec processing destination and the inner IP header specifies the ultimate packet destination.

A

Tunnel mode pg 160

132
Q

In OSI the __ layer defines how applications can enter the network.

A

Presentation Layer 6

133
Q

In OSI the layer __ interacts with data and ensures it arrives.

A

Transport layer 4

134
Q

In TCP/IP __ is a connectionless protocol which means that there is no established connection between the endpoints that are communicating. The reason the packets do get put in the right order is because of __, the connection-oriented protocol that keeps track of the packet sequence in a message.

A

IP, TCP

135
Q

In the OSI model, the __ layer handles the establishment and maintenance of connections between systems.

A

Session Layer 5

136
Q

In the TCP/IP model, the __ layer delivers packets which may arrive in a different order than the order they were sent in, and the __ layer puts them back in the right order.

A

IP, TCP

137
Q

IPsec data is encrypted at layer __ and higher.

A

Layer 4 and higher so you can only do layer 3 filtering and no higher.

138
Q

IPv4 address field includes a __ byte source address and a __ byte destination address.

A

4,4

139
Q

IPv4 has a default header size of __ bytes.

A

20

140
Q

Layer __ ensures reliable connectivity from end to end.

A

Layer 4 Transport

141
Q

OSI layer __ actually interacts with your information and prepares it to be transmitted across the network.

A

Layer 4 Transport

142
Q

OSI layer __ describes how systems on different network segments find and communicate with each other.

A

Layer 3 Network handles interaction with the network address scheme an dconnectivity orver multiple network segments.

143
Q

OSI layer __ determines the path for the data.

A

Network layer 3

144
Q

OSI layer __ ensures everything is in a unified format.

A

Presentation Layer 6

145
Q

Protocol that credit card vendors use for web transactions. They create a one-time cc number to use.

A

SET (Secure Electronic Transmission)

146
Q

Refer to β€˜802.1X authentication 1 - Quiz 4 Drawing’ and identify the Authenticator, Server processing the request and the Supplicant.

A

Answer is β€˜802.1X authentication 2 - D4 pg 174’: From left to right it’s Supplicant, Authenticator (piece of networking hardware such as a WAP that disables access to a given physical or logical port by default), Authentication Server (usually based on RADIUS).

147
Q

Repeaters are layer __ devices that amplify a signal.

A

Physical layer 1

148
Q

Routers use the __ layer in TCP/IP to determine the path that a packet will take.

A

Internet layer

149
Q

Separating out a router’s control plane (routing table / decisions for routing such as OSPF/BGP routing protocol updates, centralized and made remotely) from the data plane (data sent through a router such as routed packets) is know as __. This way you just have one configuration pushed out to all routers and the routers just do routing capability (data plane).

A

SDN (Software Defined Networking)

150
Q

SET, S/MIME, SSH, SSL/TLS, SMTP is a __ layer security protocol.

A

Application Layer 7. SET (Secure Electronic Transaction)

151
Q

Shared segment is typical communication where anyone can talk as long as no one else is talking. __ is where each person has 20 seconds which is fine for when you have to get info from everyone but typically not ideal.

A

Time slicing

152
Q

Site-to-site VPN which provides connectivity to networks such as headquarters and a remote office is also known as __. Gateway devices are located in front of both networks.

A

Tunnel Mode

153
Q

SLIP is being replaced by __ which improves on SLIP and incorporates authentication methods of PAP & CHAP.

A

PPP (Point-to-Point Protocol)

154
Q

SSL is an application that traverses level(s) __.

A

5/6/7 Session/Presentation/Application

155
Q

SSL version 3.1 is TLS version __

A

1.0. TLS is an upgrade to SSL 3.0

156
Q

TCP __ are used to setup and establish different forms of communication. They control data flow and signal information to the receiving host.

A

flags

157
Q

The __ created RFC ___ to create a private address space made up of classes __ __ and __.

A

IETF (Internet Engineering Task Force), 1918, Class A B & C

158
Q

The __ layer handles the establishment and maintenance of connections between systems.

A

Session Layer 5

159
Q

The __ layer in TCP/IP is equivalent to the Network layer in the OSI model.

A

Internet (IP) layer

160
Q

The __ layer in TCP/IP maps IP addresses to MAC addresses.

A

Network layer

161
Q

The __ layer in TCP/IP provides for reliable end-to-end communications and maintains the integrity of data.

A

Transport (TCP) layer

162
Q

The __ layer in TCP/IP provides packet sequencing and defines protocols for setting up the level of transmission service.

A

Transport (TCP) layer

163
Q

The __ layer in the OSI model interacts with the user.

A

Application layer 7

164
Q

The __ layer in the OSI model is the logical topology e.g. Ethernet, token ring, 802.11).

A

Data link layer 2

165
Q

The __ layer in the OSI model negotiates the connection, sets it up, maintains it, and makes sure that information exchanged across the connection is in sync on both sides.

A

Session Layer 5

166
Q

The __ layer in the OSI protocol stack makes sure that the data sent from one side of the connection is recevied in a format that is useful to the other side.

A

Presentation Layer 6

167
Q

The __ layer in the TCP/IP model is the fundamental protocol of the Internet.

A

IP (Internet Protocol)

168
Q

The __ layer interacts with the program to determine which network services will be required.

A

Application Layer 7

169
Q

The __ layer provides translation services such as EBCDIC to ASCII.

A

Presentation Layer 6

170
Q

The __ layer sets up communications link between individual devices over a physical link or channel.

A

Data link layer 2

171
Q

The __ protocol provides error messaging and troubleshooting for IP.

A

ICMP

172
Q

The __ topology has the highest level of redundancy because each node is connected to every other node however it is also more expensive.

A

mesh

173
Q

The address reserved for local loopback is __.

A

127.0.0.1, technically a class A address

174
Q

The core routers of the internet use an exterior gateway protocol called __ to interconnect all networks and determine the most optimal routers to use.

A

BGP (Border Gateway Protocol)

175
Q

The header size for UDP is __ bytes.

A

UDP has 8 byte header which is the minimum info you need

176
Q

The layer is responsible for trasmitting electrical signals, fiber optic light signals, microwave, sattelite and cellular signals.

A

Layer 1 Physical

177
Q

The lest common Network Layer protocol in TCP/IP which is only used with IP multicasting is __

A

IGMP (Internet Group Management Protocol); other two more popular TCP/IP protocols are IP and ICMP.

178
Q

The Network layer of the TCP/IP model comprises the __ layer(s) in the OSI model.

A

Physical and Data Link layers

179
Q

The open source __ protocol is used fro remote management of the data plane in SDN.

A

OpenFlow protocol. Software Defined Networking

180
Q

The OSI layer __ handles sequencing of packets in a transmission.

A

Layer 4 Transport

181
Q

The OSI layer __ sets up a virtual circuit or connection.

A

Session Layer 5

182
Q

The problem with ATM is that it has a very high __ ratio, meaning it is inefficient for sending large files because every 48 bytes requires a 5 byte header.

A

Header to data ratio. We want a small header to data ratio.

183
Q

The process of going down a stack is called __.

A

data encapsulation

184
Q

The standard reference model for protocol stacks is called __ and was developed by the __.

A

OSI (Open Systems Inerconnection) model, ISO (International Standards Organization)

185
Q

The TTL field is the byte __ in the IP header.

A

8th

186
Q

There are __ bytes in the TCP header

A

20

187
Q

There are __ bytes in the UDP header

A

8

188
Q

This is a LAN transmission protocol where the computer continuously monitors the common transmission line (you listen before you speak). Transmits when the line appears to be unused (If no one else is speaking you can speak), otherwise you need to listen and only communicate when they stop.

A

CSMA (carrier sense multiple access)

189
Q

This OSI layer asks what is the next hop.

A

Layer 2 Data Link

190
Q

This OSI layer is responsible for routing and determining the path a packet will take.

A

Layer 3 Network

191
Q

This OSI layer is responsible for transmission of raw binary data.

A

Layer 1 Physical

192
Q

This OSI layer is responsible for verifying whether information was or was not received by the other side.

A

Layer 4 Transport

193
Q

This OSI layer takes the raw binary data from the previous layer and provides meaning to that binary data.

A

Layer 2 Data Link

194
Q

We use __ for discussing networks and __ for implementing on a real live network.

A

OSI, TCP/IP

195
Q

What are examples of TCP flags?

A

URG: urgent to prioritize traffic, FIN: graceful termination, RST: Reset is an abrupt termination Also SYN: synchornize is a connection request, ACK: acknowledgement, PSH: PushURG: urgent to prioritize traffic, FIN: graceful termination, RST: Reset is an abrupt termination Also SYN: synchornize is a connection request, ACK: acknowledgement, PSH: PushURG: urgent to prioritize traffic, FIN: graceful termination, RST: Reset is an abrupt termination Also SYN: synchornize is a connection request, ACK: acknowledgement, PSH: Push

196
Q

What are the 7 layers of the OSI model?

A

Please Do Not Throw Sausage Pizza Away. Physical, Data Link, Network, Transport, Session, Presentation, Application

197
Q

What are the Ethernet speeds for each category rating?

A

Cat 1 and 2 (voice, low speed data), Cat 3 (10Mbps), Cat 4 (16Mbps), Cat 5 (100Mbps), Cat 5E/6 (1000Mbps)

198
Q

What class does 200.5.300.10 fall under?

A

It is an invalid address since third octet is above 255

199
Q

What is a GAN?

A

Global Area Network: Internet

200
Q

What is A3x16 in decimal?

A
  1. A3x16 just means β€˜A3 base 16’ or A3 in hex. Write each digit separate A and 3. Label number from right to left 0,1,2,3. Then put base (in this case 16) on bottom left of those numbers, multiply down, add across. β€˜Binary,Hex to Decimal conversion - Drawing 4A’
201
Q

What is the current, widespread implemented solution to network address congestion and conservation?

A

CIDR (Classless Inter-Domain Routing)

202
Q

What is the difference in Ethernet performance due to?

A

Number of twists. More twists and tighter twisting increases performance.

203
Q

What is the open protocol that supports the Smart Grid and provides interoperability between various vendor’s SCADA systems?

A

DNP3 (Distributed Network Protocol)

204
Q

What technology separates a router’s control plane from the data (forwarding) plane?

A

SDN (Software Defined Networking)

205
Q

When a program requires access to the network, the __ layer will manage requests from the program to the other layers down the stack.

A

Application Layer 7

206
Q

When it comes to VoIP, a __ phone is more secure and easier to roll out than a __ phone since the latter mostly just has firmware installed, meaning you cannot patch it, add VPN and endpoint security like you can a computer.

A

soft, hard

207
Q

When you call someone and there is a 3 second delay while dialing that is fine and uses the __ protocol(s). When someone picks up the other line, the __ protocol(s) kick in.

A

SIP and H.323 (which is wrapped around SIP for security), RTP (Real-time protocol)

208
Q

Which authentication mechanism exposes the password in plaintext?

A

PAP (Password Authentication Protocol)

209
Q

Which is the better routing protocol: distance vector or link state?

A

Link state e.g. OSPF (Open Shortest Path First), has full knowledge of all routers, uses SPF algorithm whereas distance vector (e.g. RIP) uses hop count, is prone to routing loops and is inefficient sending routing updates every 30 seconds.

210
Q

Which layer of the OSI model converts bits into electrical signals or light impulses for transmission?

A

Physical

211
Q

Which layer of the OSI model interacts with your information and prepares it to be transmitted across the network?

A

Transport layer 4

212
Q

Which layer of the OSI model takes information and converts it to a machine-independent format?

A

Layer 6 Presentation

213
Q

Which network component should be used when you are concerned with internal network sniffing?

A

A network switch

214
Q

Which network device would block IP limited broadcast traffic by default?

A

Router; switches do not block broadcasts

215
Q

Which OSI layer connects the physical part of the network with the abstract part?

A

Layer 2 Data Link connects the physical part of the network (e.g. cables and electrical signals) with the abstract part (packets and data streams).

216
Q

Which OSI layer handles connection specifications between the interface hardware and the network cable and voltage regulation.

A

Layer 1 Physical

217
Q

Which OSI layer handles the establishment and maintenance of connections between systems?

A

Session Layer 5

218
Q

Which OSI layer would decompression take place in?

A

Layer 6 Presentation is responsible for encryption, compression, decompression

219
Q

Which OSI layer would encryption take place in?

A

Layer 6 Presentation

220
Q

Which plaintext VoIP IP protocol is frequently used to transfer audio or video data?

A

RTP (Real-time Protocol)

221
Q

Which VoIP protocol is an application layer protocol used for communication signaling?

A

SIP (Session Initiation Protocol)

222
Q

Write out the different classes of IP address.

A

Class A 1-127.x.x.x/8, Class B 128-191.x.x.x/16, Class C 192-223.x.x.x, Class D & E are not for routable addresses, they are multicast/experimental use IPv4 address classes - Domain 4 pg 22Class A 1-127.x.x.x/8, Class B 128-191.x.x.x/16, Class C 192-223.x.x.x, Class D & E are not for routable addresses, they are multicast/experimental use IPv4 address classes - Domain 4 pg 22

223
Q

X.25 is used for __

A

CHU/CSU (data channel service unit) pg 109

224
Q

You can have a __ topology without a __ topology but not vice versa.

A

Physical topology (layer 1), Logical topology (layer 2)

225
Q

You should use __ for repetitive data, one-way transfer, real-time communication or in cases where you are trying to limit overhead.

A

UDP: repetitive data (if sending same info over and over every 10 seconds and one gets dropped just wait another 10 seconds e.g. NTP), one-way transfer (e.g. nuclear powerplant has one-way connection towards internet-connected business network so it’s not exposed to incoming traffic), real-time (voice/video)

226
Q

You would use a __ NAT for DMZs with public accessible systems.

A

one-to-one

227
Q
A
228
Q

πŸ˜πŸ˜¬πŸ˜€πŸ˜„πŸ˜„

A

πŸ‘πŸ˜³πŸ˜πŸ˜†πŸ€—πŸ€—πŸ™πŸ€‘πŸ€”

229
Q
A