Domain 4 - Communication and Network Security Flashcards

1
Q

OSI Layer 7

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

OSI Layer 6

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OSI Layer 5

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OSI Layer 4

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OSI Layer 3

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OSI Layer 2

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OSI Layer 1

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HTTP, FTP, LPD, SMTP, Telnet, TFTP, EDI, POP3, IMAP, SNMP, NNTP, S-RPC, and SET. Which OSI Layer are these protocols found?

A

Application - Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption protocols and format types, such as ASCII, EBCDICM, TIFF, JPEG, MPEG, and MIDI. Which OSI Layer are these protocols found?

A

Presentation - Layer 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NFS, SQL, and RPC. Which OSI Layer are these protocols found?

A

Session - Layer 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SPX, SSL, TLS, TCP, and UDP. Which OSI Layer are these protocols found?

A

Transport - Layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ICMP, RIP, OSPF, BGP, IGMP, IP, IPSec, IPX, NAT, and SKIP. Which OSI Layer are these protocols found?

A

Network - Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SLIP, PPP, ARP, RARP, L2F, L2TP, PPTP, FDDI, ISDN. Which OSI Layer are these protocols found?

A

Data Link - Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

EIA/TIA-232, EIA/TIA-449, X.21, HSSI, SONET, V.24, and V.35. Which OSI Layer are these protocols found?

A

Physical - Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which layer of the OSI Model is ARP and RARP found?

A

Data Link - Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which layer of the OSI Model is ICMP and NAT found?

A

Network Layer - Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which layer of the OSI Model is RPC found?

A

Session Layer - Layer 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which layer of the OSI Model is HTTP and TFTP found?

A

Application Layer - Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which layer of the OSI Model is Encryption protocols and JPEG found?

A

Presentation Layer - Layer 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which layer of the OSI Model is SSL and TLS found?

A

Transport Layer - Layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the four TCP/IP layers?

A

Application, Transport, Internet and Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Application model in TCP/IP is equivalent to what layers in OSI?

A

Application, Presentation and Session (layers 7-5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Transport layer in TCP/IP is equivalent to what layers in OSI?

A

Transport - Layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Internet layer in TCP/IP is equivalent to what layers in OSI?

A

Network - Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Link layer in TCP/IP is equivalent to what layers in OSI?

A

Data Link and Physical - Layers 2 and 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

An open network architecture guide for network product vendors. This standard, or guide, provides a common foundation for the development of new protocols, networking services, and even hardware devices.

A

The OSI Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Data name at Application, Presentation and Session layers

A

Data stream (or just data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Data name at Transport layer

A

Segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Data name at Network layer

A

Packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Data name at Data Link layer

A

Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Data name at Physical layer

A

Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are the OSI model data names in order (top to bottom)?

A

Data, Segment, Packet, Frame, Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which TCP/IP layer would the protocols FTP and Telnet be found?

A

Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which TCP/IP layer would the protocols TCP and UDP be found?

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which TCP/IP layer would the protocols ICMP and IP be found?

A

Internet Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which TCP/IP layer would the protocol Ethernet be found?

A

Link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Transport layer protocol of TCP/IP that is a full duplex connection-oriented protocol?

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Transport layer protocol of TCP/IP that is a simplex connectionless protocol?

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

This can be used to manage traffic, improve performance, and enforce security. Examples include intranet, extranet, and DMZ.

A

Network segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A form of network data storage solution (i.e.,

SAN (storage area network) or NAS (network-attached storage)) that allows for high-speed file transfers.

A

Fibre Channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

This is used to encapsulate Fibre Channel communications over Ethernet networks.

A

FCoE (Fibre Channel over Ethernet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A networking storage standard based on IP.

A

iSCSI (Internet Small Computer System Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

The IEEE standard for wireless network communications.

A

802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

The process of investigating the presence, strength, and reach of wireless access points deployed in an environment. This task usually involves walking around with a portable wireless device, taking note of the wireless signal strength, and mapping this on a plot or schematic of the building.

A

Site survey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

An early alternative to WEP. This technique was an improvement but was itself not fully secure. It is based on the LEAP and TKIP cryptosystem and employs a secret passphrase.

A

Wi-Fi Protected Access (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

a new encryption scheme known as the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP), which is based on the AES encryption scheme.

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

is defined by the IEEE 802.11 standard. It was designed to provide the same level of security and encryption on wireless networks as is found on wired or cabled networks. It provides protection from packet sniffing and eavesdropping against wireless transmissions. A secondary benefit is that it can be configured to prevent unauthorized access to the wireless network. It uses a predefined shared secret key.

A

Wired Equivalent Privacy (WEP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

An authentication framework that allows for new

authentication technologies to be compatible with existing wireless or point-to-point connection technologies.

A

EAP (Extensible Authentication Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

encapsulates EAP methods within a TLS tunnel that provides authentication and potentially encryption.

A

PEAP (Protected Extensible Authentication Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

a Cisco proprietary alternative to TKIP for WPA. This was developed to address defi ciencies in TKIP before the 802.11i/WPA2 system was ratified as a standard.

A

LEAP (Lightweight Extensible Authentication Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A list of authorized wireless client interface

MAC addresses that is used by a wireless access point to block access to all non-authorized devices.

A

MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

This was designed as the replacement for WEP without requiring replacement of legacy wireless hardware. It was implemented into 802.11 wireless networking under the name WPA (Wi-Fi Protected Access).

A

TKIP (Temporal Key Integrity Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

This was created to replace WEP and TKIP/WPA. It uses AES (Advanced Encryption Standard) with a 128-bit key.

A

CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

An authentication technique that redirects

a newly connected wireless web client to a portal access control page.

A

captive portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What the are the standard network topologies

A

Ring, bus, star and mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Name the four basic types of firewalls

A

static packet filtering, application-level gateway, circuit-level gateway, and stateful inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Examples of protocol services used to connect LAN and WAN communication technologies

A

Frame Relay, SMDS, X.25, ATM, HSSI, SDLC, HDLC, and ISDN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

The addition of a header, and possibly a footer, to the data received by each layer from the layer above before it’s handed off to the layer below.

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is the range of well-known or the service ports?

A

0-1023 (first 1,024)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Name the steps of the TCP handshake process.

A

Client sends a SYN (synchronize) flagged packet to the server. The server responds with a SYN/ACK (synchronize and acknowledge) flagged packet
back to the client. The client responds with an ACK (acknowledge) flagged packet back to the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Name the two methods to disconnect a TCP session

A

FIN (finish) flagged packets and RST (reset) flagged packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Is used to to resolve IP addresses (32-bit binary number for logical addressing) into Media Access Control (MAC) addresses.

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Is used to resolve MAC addresses into IP addresses.

A

Reverse Address Resolution Protocol (RARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

TCP port 23

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

TCP Ports 20 and 21

A

File Transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

UDP Port 69

A

Trivial File Transfer Protocol (TFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

TCP Port 25

A

Simple Mail Transfer Protocol (SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

TCP Port 110

A

Post Office Protocol (POP3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

TCP Port 143

A

Internet Message Access Protocol (IMAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

This is a terminal emulation network application that supports remote connectivity for executing commands and running applications but does not support transfer of files.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

This is a network application that supports an exchange of files that requires anonymous or specific authentication.

A

File Transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

This is a network application that supports an exchange of files that does not require authentication.

A

Trivial File Transfer Protocol (TFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

This is a protocol used to transmit email messages from a client to an email server and from one email server to another.

A

Simple Mail Transfer Protocol (SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

This is a protocol used to pull email messages from an inbox on an email server down to an email client.

A

Post Office Protocol (POP3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

This is a protocol used to pull email messages from an inbox on an email server down to an email client. It is more secure than POP3 and offers the ability to pull headers down from the email server as well as to delete messages directly off the email server without having to download to the local client first.

A

Internet Message Access Protocol (IMAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

UDP Ports 67 and 68

A

Dynamic Host Configuration Protocol (DHCP)

77
Q

This uses port 67 for server point-to-point response and port 68 for client request broadcasts. It is used to
assign TCP/IP confi guration settings to systems upon bootup. It enables centralized control of network addressing.

A

Dynamic Host Configuration Protocol (DHCP)

78
Q

TCP Port 80

A

Hypertext Transport Protocol (HTTP)

79
Q

This is the protocol used to transmit web page elements from a web server to web browsers.

A

Hypertext Transport Protocol (HTTP)

80
Q

TCP Port 443 (for HTTP Encryption)

A

Secure Sockets Layer (SSL)

81
Q

This is a VPN-like security protocol that operates at the Transport layer. SSL was originally designed to support
secured web communications (HTTPS) but is capable of securing any Application layer protocol communications.

A

Secure Sockets Layer (SSL)

82
Q

This is a network service that is used to spool print jobs and to send print jobs to printers.

A

Line Print Daemon (LPD)

83
Q

This is a network service used to support file sharing between dissimilar systems.

A

Network File System (NFS)

84
Q

This is a network service used to collect network health and status information by polling monitoring devices from a central monitoring station.

A

Simple Network Management Protocol (SNMP)

85
Q

The act of capturing packets from the network in hopes

of extracting useful information from the packet contents.

A

Packet sniffing

86
Q

The merging of specialty or proprietary protocols with standard protocols, such as those from the TCP/IP suite.

A

Converged protocols

87
Q

What is the primary benefit of converged protocols?

A

the ability to use existing TCP/IP supporting network infrastructure to host special or proprietary services without the need for unique deployments of alternate networking hardware.

88
Q

This can be used to support Fiber Channel over
the existing network infrastructure. It typically requires 10 Gbps Ethernet in order to support the Fibre Channel protocol.

A

Fibre Channel over Ethernet (FCoE)

89
Q

A high-throughput high-performance network technology that directs data across a network based on short path labels rather than longer network addresses.

A

MPLS (Multiprotocol Label Switching)

90
Q

a networking storage standard based on IP. This technology can be used to enable location-independent file storage, transmission, and retrieval over LAN, WAN, or public Internet connections. It is often viewed as a low-cost alternative to Fibre Channel.

A

Internet Small Computer System Interface (iSCSI)

91
Q

a tunneling mechanism used to transport

voice and/or data over a TCP/IP network.

A

Voice over IP (VoIP)

92
Q

a unique approach to network operation, design, and management. The concept is based on the theory that the complexities of a traditional network with on-device configuration (i.e., routers and switches) often force an organization to stick with a single device vendor, such as Cisco, and limit the flexibility of the network to respond to changing physical and business conditions.

A

Software-Defined Networking (SDN)

93
Q

a collection of resource services deployed in numerous data centers across the Internet in order to provide low latency, high performance, and high availability of the hosted content.

A

content distribution network (CDN)

94
Q

the transmission of data across electromagnetic signals.

A

Data emanation

95
Q

the IEEE standard for wireless network communications.

A

802.11

96
Q

Mode that allows any two wireless networking devices, including two wireless network interface cards (NICs), to communicate without a centralized control authority.

A

Ad hoc mode

97
Q

Wireless mode that requires an access point and wireless NICs on systems can’t interact directly. The restrictions of the wireless access point for wireless network access are enforced.

A

infrastructure mode

98
Q

A standard port-based network access control that ensures clients cannot communicate with a resource until proper authentication has taken place. Effectively, it is a hand-off system that allows the wireless network to leverage the existing network infrastructure’s authentication services.

A

802.1x/EAP

99
Q

This is not a specific mechanism of authentication; rather it is an authentication framework.

A

EAP (Extensible Authentication Protocol)

100
Q

encapsulates EAP methods within a

TLS tunnel that provides authentication and potentially encryption.

A

PEAP (Protected Extensible Authentication Protocol)

101
Q

a Cisco proprietary alternative to TKIP for WPA. This was developed to address deficiencies in TKIP before the 802.11i/WPA2 system was ratified as a standard.

A

LEAP (Lightweight Extensible Authentication Protocol)

102
Q

A concept of controlling access to a network environment through strict adherence to and implementation of security policy.

A

Network Access Control (NAC)

103
Q

A type of firewall that filters traffic by examining data from a message header. Usually, the rules are concerned with source, destination, and port addresses.

A

Static Packet-Filtering Firewalls

104
Q

A type of firewall that are used to establish communication sessions between trusted partners. They operate at the Session layer (layer 5) of the OSI model. They permit or deny forwarding decisions based solely on the endpoint designations of the communication circuit (in other words, the source and destination addresses and service port numbers).

A

Circuit-Level Gateway Firewalls

105
Q

A type of firewall that evaluate the state or the context of network traffic. By examining source and destination addresses, application usage, source of origin, and relationship between current packets and the previous packets of the same session, they are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities. They are known as third-generation firewalls, and they operate at the Network and Transport layers (layers 3 and 4) of the OSI model.

A

Stateful Inspection Firewalls

106
Q

Also called a proxy firewall. This type of firewall filters traffic based on the Internet service (in other words, the application) used to transmit or receive the data.
Each type of application must have its own unique proxy server. Thus, these firewalls comprises numerous individual proxy servers. This type of firewall negatively
affects network performance because each packet must be examined and processed as it passes through the firewall. They are known as second-generation
firewalls, and they operate at the Application layer (layer 7) of the OSI model.

A

Application-Level Gateway Firewalls

107
Q

This occurs when two systems transmit data at the same time onto a connection medium that supports only a single transmission path.

A

Collision

108
Q

This occurs when a single system transmits data to all possible recipients.

A

Broadcast

109
Q

a group of networked systems that could cause a collision if any two (or more) of the systems in that group transmitted simultaneously.

A

collision domain

110
Q

a group of networked systems in which all other members receive a broadcast signal when one of the members of the group transmits it.

A

broadcast domain

111
Q

These are used to strengthen the communication signal over a cable segment as well as connect network segments that use the same protocol.

A

Repeaters, Concentrators, and Amplifiers

112
Q

Are used to connect multiple systems and connect network segments that use the same protocol. They repeat inbound traffic over all outbound ports. This ensures that the traffic will reach its intended host. It is a multiport repeater. They operate at OSI layer 1.

A

Hubs

113
Q

a communications device that covers or modulates between an analog carrier signal and digital information in order to support computer communications of public switched telephone network (PSTN) lines.

A

Modems

114
Q

is used to connect two networks together—even networks of different topologies, cabling types, and speeds—in order to connect network segments that use the same protocol. It forwards traffic from one network to another.

A

Bridges

115
Q

connects networks that are using different network protocols.

A

gateway

116
Q

What are the two main types of coaxial cable?

A

thinnet and thicknet

117
Q

Also known as 10Base2, this commonly used to connect systems to backbone trunks of thicknet cabling. It can span distances of 185 meters and provide throughput up to 10 Mbps.

A

Thinnet

118
Q

Also known as 10Base5, this can span 500 meters and provide throughput up to 10 Mbps (megabits per second).

A

Thicknet

119
Q

The physical layout and organization of computers and networking devices

A

Network topology

120
Q

What are four basic topologies of the physical layout of a network

A

ring, bus, star, and mesh

121
Q

Wireless communication occurs over multiples frequencies at the same time.

A

spread spectrum

122
Q

An early implementation of the spread spectrum concept. However, instead of sending data in a parallel fashion, it transmits data in a series while constantly changing the frequency in use.

A

Frequency Hopping Spread Spectrum (FHSS)

123
Q

This employs all the available frequencies simultaneously in parallel. This provides a higher rate of data throughput

A

Direct Sequence Spread Spectrum (DSSS)

124
Q

What is the protocol used when portable devices use a cell phone carrier’s network to establish communication links with the Internet.

A

Wireless Application Protocol (WAP)

125
Q

Provides security connectivity services similar to those of SSL or TLS for cell phones.

A

Wireless Transport Layer Security (WTLS)

126
Q

a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.

A

Ethernet

127
Q

Employs a token-passing mechanism to control which systems can transmit data over the network medium. The token travels in a logical loop among all members
of the LAN.

A

Toke Ring

128
Q

A high-speed token-passing technology that employs two rings with traffic flowing in opposite directions. It is often used as a backbone for large enterprise networks.

A

Fiber Distributed Data Interface

129
Q
communications occur with a continuous signal that varies in frequency, amplitude, phase, voltage, and so on. The variances in the continuous signal produce a
wave shape (as opposed to the square shape of a digital signal). The actual communication occurs by variances in the constant signal.
A

Analog

130
Q

communications occur through the use of a discontinuous electrical signal and a state change or on-off pulses.

A

Digital

131
Q

This technology can support only a single communication channel. It uses a direct current applied to the cable. A current that is at a higher level represents the binary signal of 1, and a current that is at a lower level represents the binary signal of 0. Ethernet is an example of this technology.

A

Baseband

132
Q

This technology can support multiple simultaneous signals. It uses frequency modulation to support numerous channels, each supporting a distinct communication session. It is suitable for high throughput rates, especially when several channels are multiplexed. It is a form of analog signal. Cable television and cable modems, ISDN, DSL, T1, and T3 are examples of this technology.

A

Broadband

133
Q

This is the LAN media access technology that
performs communications using the following steps:
1. The host listens to the LAN media to determine whether it is in use.
2. If the LAN media is not being used, the host transmits its communication.
3. The host waits for an acknowledgment.
4. If no acknowledgment is received after a time-out period, the host starts over at step 1.
It does not directly address collisions.

A

Carrier-Sense Multiple Access (CSMA)

134
Q

This is the LAN media access technology that performs communications using the following steps:
1. The host has two connections to the LAN media: inbound and outbound. The host
listens on the inbound connection to determine whether the LAN media is in use.
2. If the LAN media is not being used, the host requests permission to transmit.
3. If permission is not granted after a time-out period, the host starts over at step 1.
4. If permission is granted, the host transmits its communication over the outbound connection.
5. The host waits for an acknowledgment.
6. If no acknowledgment is received after a time-out period, the host starts over at step 1.

AppleTalk and 802.11 wireless networking are examples of networks that employ this technology.

A

Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA)

135
Q

This is the LAN media access technology that performs communications using the following steps:
1. The host listens to the LAN media to determine whether it is in use.
2. If the LAN media is not being used, the host transmits its communication.
3. While transmitting, the host listens for collisions (in other words, two or more hosts
transmitting simultaneously).
4. If a collision is detected, the host transmits a jam signal.
5. If a jam signal is received, all hosts stop transmitting. Each host waits a random period
of time and then starts over at step 1.

Ethernet networks employ this technology.

A

Carrier-Sense Multiple Access with Collision Detection (CSMA/CD)

136
Q

the encapsulation of a protocol-deliverable message

within a second protocol. The second protocol often performs encryption to protect the message contents.

A

Tunneling

137
Q

This technology is based on encrypted tunneling. They can offer authentication and data protection as a point-to-point solution. Common examples are PPTP, SSL, L2TP, and IPSec. They can be site to site or client to site.

A

VPNs

138
Q

This protects the addressing scheme of a private network, allows the use of the private IP addresses, and enables multiple internal clients to obtain Internet
access through a few public IP addresses. It is supported by many security border devices, such as firewalls, routers, gateways, and proxies.

A

NAT

139
Q

This type of line is always on and is reserved for a specific customer. Examples include T1, T3, E1, E3, and cable modems.

A

dedicated lines

140
Q

This type of line requires a connection to be established before data transmission can occur. It can be used to connect with any remote system that uses the same type of nondedicated line. Standard modems, DSL, and ISDN are examples.

A

nondedicated lines

141
Q

This is a full-duplex encapsulation protocol used for transmitting TCP/IP packets over various non-LAN connections, such as modems, ISDN, VPNs, Frame Relay, and so on. It is widely supported and is the transport protocol of choice for dial-up Internet connections. Its authentication is protected through the use of various protocols, such as CHAP and PAP. It is a replacement for SLIP and can support any LAN protocol, not just TCP/IP.

A

Point-to-Point Protocol (PPP)

142
Q

Protocols that provide security services for application-specific communication channels

A

secure communication protocols

143
Q

This is an encryption tool used to protect sessionless datagram protocols. It was designed to integrate with IPSec; it functions at layer 3. It is able to encrypt any subprotocol of the TCP/IP suite. It was replaced
by Internet Key Exchange (IKE) in 1998.

A

Simple Key Management for Internet Protocol (SKIP)

144
Q

This is an authentication service and is simply a

means to prevent unauthorized execution of code on remote systems.

A

Secure Remote Procedure Call (S-RPC)

145
Q

This is an encryption protocol developed by Netscape to protect the communications between a web server and a web browser. It can be used to secure web, email, FTP, or even Telnet traffic. It is a session-oriented protocol that provides confidentiality and integrity. It is deployed using a 40-bit key or a 128-bit key. It is
superseded by Transport Layer Security (TLS).

A

Secure Sockets Layer (SSL)

146
Q

This functions in the same general manner as SSL, but it uses stronger authentication and encryption protocols.

A

Transport Layer Security (TLS)

147
Q

What two protocols both have the following features:
■ Support secure client-server communications across an insecure network while preventing
tampering, spoofing, and eavesdropping.
■ Support one-way authentication.
■ Support two-way authentication using digital certificates.
■ Often implemented as the initial payload of a TCP package, allowing it to encapsulate
all higher-layer protocol payloads.
■ Can be implemented at lower layers, such as layer 3 (the Network layer) to operate as a
VPN. This implementation is known as OpenVPN.

A

SSL and TLS

148
Q

This is a security protocol for the transmission of
transactions over the Internet. SET is based on Rivest, Shamir, and Adelman (RSA) encryption and Data Encryption Standard (DES). It has the support of major credit card companies, such as Visa and MasterCard. However, it has not been widely accepted by the Internet in general; instead, SSL/TLS encrypted sessions are the preferred mechanism for secure e-commerce.

A

Secure Electronic Transaction (SET)

149
Q

This is one of the authentication protocols used over PPP links. It encrypts usernames and passwords. It performs authentication using a challenge-response dialogue that cannot be replayed. It also periodically reauthenticates the remote system throughout an established communication session to verify a persistent identity of the remote client. This activity is transparent to the user.

A

Challenge Handshake Authentication Protocol (CHAP)

150
Q

This is a standardized authentication protocol for PPP. It transmits usernames and passwords in the clear. It offers no form of encryption; it simply provides a means to transport the logon credentials from the client to the
authentication server.

A

Password Authentication Protocol (PAP)

151
Q

This is a framework for authentication instead
of an actual protocol. It allows customized authentication security solutions, such as supporting smart cards, tokens, and biometrics.

A

Extensible Authentication Protocol (EAP)

152
Q

This encapsulates EAP in a TLS tunnel. It is preferred over EAP because EAP assumes that the channel is already protected but this imposes its own security. It is used for securing communications over 802.11 wireless connections. It can be employed by Wi-Fi Protected Access (WPA) and
WPA-2 connections.

A

Protected Extensible Authentication Protocol (PEAP)

153
Q

This was Cisco’s initial response to insecure WEP.
It supported frequent reauthentication and changing of WEP keys (whereas WEP used single authentication and a static key). However, it is crackable using a variety of tools and techniques, including the exploit tool Asleap.

A

Lightweight Extensible Authentication Protocol (LEAP)

154
Q

a technology that encapsulates audio into IP packets to support telephone calls over TCP/IP network connections.

A

VOIP

155
Q

a means by which g an unknown, untrusted, or at least unauthorized person gains the trust of someone inside your organization.

A

Social engineering

156
Q

an email security standard that offers authentication and confidentiality to email through public key encryption and digital signatures. Authentication is provided through X.509 digital certificates. Privacy is provided through the use of Public Key Cryptography Standard (PKCS) encryption. Two types of messages can be formed using this: signed messages and secured enveloped messages. A signed message provides integrity, sender authentication, and nonrepudiation. An enveloped message provides integrity, sender authentication, and confidentiality.

A

Secure Multipurpose Internet Mail Extensions (S/MIME)

157
Q

This can provide authentication, confidentiality, integrity, and nonrepudiation for email messages. It employs Message Digest 2 (MD2) and MD5 algorithms; Rivest, Shamir, and Adelman (RSA) public key; and Data Encryption Standard (DES) to provide authentication and encryption services.

A

MIME Object Security Services (MOSS)

158
Q

an email encryption mechanism that provides authentication, integrity, confidentiality, and nonrepudiation. It uses RSA, DES, and X.509.

A

Privacy Enhanced Mail (PEM)

159
Q

a means to assert that valid mail is sent by an organization through verification of domain name identity.

A

DomainKeys Identified Mail (DKIM)

160
Q

a public-private key system that uses a variety of encryption algorithms to encrypt files and email messages. The first version used RSA, the second version, International Data Encryption Algorithm (IDEA), but later versions offered a spectrum of algorithm options. It is not a standard but rather an independently developed product that has wide Internet grassroots support.

A

Pretty Good Privacy (PGP)

161
Q

an older technology developed to support TCP/IP
communications over asynchronous serial connections, such as serial cables or modem dial-up. It is rarely used but is still supported on many systems. It can support only IP, requires static IP addresses, offers no error detection or correction, and does not support compression.

A

Serial Line Internet Protocol (SLIP)

162
Q

This is used to centralize the authentication of remote dial-up connections. A network that employs this technology is configured so the remote access server passes dial-up user logon credentials to this for authentication. This process is similar to the process used by domain clients sending logon credentials to a domain controller for authentication.

A

Remote Authentication Dial-In User Service (RADIUS)

163
Q

This is an alternative to RADIUS. It is available in three versions: original , extended and plus. The original integrates the authentication and authorization processes. The extended version keeps the authentication, authorization, and accounting processes separate. The plus version improves it by adding two-factor authentication. Plus is the most current and relevant version of this product line.

A

Terminal Access Controller Access-Control System (TACACS+)

164
Q

a communication tunnel that provides point-to-point

transmission of both authentication and data traffic over an intermediary untrusted network.

A

virtual private network (VPN)

165
Q

the network communications process that protects the contents of protocol packets by encapsulating them in packets of another protocol.

A

Tunneling

166
Q

What are the four common VPN protocols?

A

PPTP, L2F, L2TP, and IPSec

167
Q

an encapsulation protocol developed from the
dial-up Point-to-Point Protocol. It operates at the Data Link layer (layer 2) of the OSI model and is used on IP networks. It creates a point-to-point tunnel between two systems and encapsulates PPP packets.

A

Point-to-Point Tunneling Protocol (PPTP)

168
Q

This was derived by combining elements from both PPTP and L2F. It creates a point-to-point tunnel between communication endpoints. It lacks a built-in encryption scheme, but it typically relies on IPSec as its security mechanism.

A

Layer 2 Tunneling Protocol (L2TP)

169
Q

This is the most commonly used VPN protocol now.

A

IP Security (IPSec)

170
Q

This is both a standalone VPN protocol and the security mechanism for L2TP, and it can be used only for IP
traffic. It works only on IP networks and provides for secured authentication as well as encrypted data transmission.

A

IP Security (IPSec)

171
Q

What are the two main components of IPSec

A

Authentication Header (AH) and Encapsulating Security Payload (ESP)

172
Q

What component of IPSec provides authentication, integrity, and nonrepudiation.

A

Authentication Header (AH)

173
Q
What component of IPSec provides encryption to protect the confidentiality of transmitted data, but it can also perform limited authentication. It operates at the
Network layer (layer 3) and can be used in transport mode or tunnel mode. In transport mode, the IP packet data is encrypted but the header of the packet is not. In tunnel mode, the entire IP packet is encrypted and a new header is added to the packet to govern transmission through the tunnel.
A

Encapsulating Security Payload (ESP)

174
Q

In this IPSec mode, the IP packet data is encrypted but the header of the packet is not.

A

transport mode

175
Q

In this IPSec mode, the entire IP packet is encrypted and a new header is added to the packet to govern transmission through the tunnel.

A

tunnel mode

176
Q

These are used to logically segment a network without altering its physical topology. They are created by switches

A

virtual LAN (VLAN)

177
Q

This technology is used to host one or more operating systems within the memory of a single host computer. This mechanism allows virtually any OS to operate on any hardware. Such an OS is also known as a guest operating system.

A

Virtualization

178
Q

This is a unique approach to network operation, design,
and management. It aims at separating
the infrastructure layer (i.e., hardware and hardware-based settings) from the control layer
Network Address Translation 525
(i.e., network services of data transmission management). Furthermore, this also removes
the traditional networking concepts of IP addressing, subnets, routing, and the like from
needing to be programmed into or be deciphered by hosted applications.

A

Software-defined networking (SDN)

179
Q

The goals of hiding the identity of internal clients, masking the design of your private network,
and keeping public IP address leasing costs to a minimum are all simple to achieve
through the use of this technology.

A

network address translation (NAT)

180
Q

a mechanism for converting the internal IP addresses found in packet headers into public IP addresses for transmission over the Internet.

A

network address translation (NAT).

181
Q

What are the 3 private IP addresses

A
  1. 0.0.0–10.255.255.255 (a full Class A range)
  2. 16.0.0–172.31.255.255 (16 Class B ranges)
  3. 168.0.0–192.168.255.255 (256 Class C ranges)
182
Q

This occurs when the message or communication
is broken up into small segments (usually fixed-length packets, depending on the protocols and technologies employed) and sent across the intermediary networks to the destination.

A

Packet switching

183
Q

This is a logical pathway or circuit created over a packet-switched network between two specific endpoints.

A

virtual circuit

184
Q

What are the two types of virtual circuits

A

Permanent virtual circuits (PVCs) and Switched virtual circuits (SVCs)

185
Q

A border connection device that provides provides all the interfacing needed between the network carrier
service and a company’s LAN.

A

channel service unit/data service unit (CSU/DSU)

186
Q

This is an older packet-switching technology that was widely used in Europe. It uses permanent virtual circuits to establish specific point-to-point connections between two systems or networks. It is the predecessor to Frame Relay and operates in much the same fashion.

A

X.25

187
Q

This is a packet-switching technology that also uses PVCs . However, unlike X.25, it supports multiple PVCs over a single WAN carrier service connection. It is a layer 2 connection mechanism that uses packet-switching technology to establish virtual circuits between communication endpoints.

A

Frame Relay

188
Q

This is a cell-switching WAN communication technology, as opposed to a packet-switching technology like Frame Relay. It fragments communications into fi xed-length 53-byte cells. The use of fi xed-length cells allows it to be very efficient and offer high throughputs. It can use either PVCs or SVCs

A

Asynchronous transfer mode (ATM)

189
Q

This is a resource consumption attack that has the primary goal of preventing legitimate activity on a victimized system. It renders the target unable to respond to legitimate traffic.

A

denial-of-service attack