Domain 4 Communications and Network Security Flashcards

1
Q

Devices

A

Network devices are essential for routing, managing, securing, and providing services within a network. For the CISSP exam, understanding the specific functions and applications of routers, switches, firewalls, and servers is crucial.

Example:
Routers (inter-network communication), switches (intra-network traffic), firewalls (security), servers (services)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Media:

A

The choice of network media can significantly impact a network’s speed, reliability, and security. Exam candidates should be familiar with physical and wireless media characteristics, as detailed.

Example:
Physical: twisted pair, coaxial, fiber optic; wireless: radio frequency (RrF) signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protocols:

A

Protocols are the glue that holds networks together, defining how devices communicate and interact. Understanding protocols like IP, TCP, and UDP is vital for the exam, including their roles in addressing, error handling, and data delivery.

Example:
IP(addressing), (reliable data delivery), UDP (connectionless protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Topologies:

A

Network topologies shape the structure and behavior of a network. Knowledge of common topologies like star, ring, bus, and mesh, including their advantages and disadvantages, is essential for the exam.

Example:
Star (central hub), ring (closed loop), bus (single central cable), mesh (multiple connections)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OSI-Model

A

The open system interconnection (OSI) model is a seven-layer conceptual
framework that standardizes network functions to enable interoperability between different systems and technologies. This model plays a vital role in understanding how data is processed and transmitted across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Physical (Layer 1)

A

The Physical Layer, as described in Table 6-2, is concerned with transmitting raw data bits over the physical medium. This includes aspects such as signaling, encoding, and synchronization. For example, the choice of copper cables or fiber-optic connections would be determined at this layer.

Examples:
Signaling, encoding, synchronization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Link (Layer 2)

A

The Data Link Layer ensures that data frames are transmitted without errors between devices on a network. It manages Media Access Control (MAC) addresses and error detection, as outlined in Table 6-2.

Example:
Data frames, MAC addresses, error detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network (Layer 3)

A

The Network Layer is responsible for routing data packets between different networks. It uses IP addressing and routing protocols like OSPF (Open Shortest Path First) and BGP (Border Gateway Protocol) to find the best path for data, as detailed in Table 6-2.

Example:
IP addressing, routing protocols (OSPospF, BGp)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Transport (Layer 4)

A

The Transport Layer focuses on reliable data delivery, segmentation, and flow control. Protocols like TCP and UDP operate at this layer, ensuring that data is delivered in the correct sequence and without errors (see Table 6-2).

Example:
TCP (reliable), UDP
(unreliable), segmentation, sequencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Session (Layer 5)

A

The Session Layer manages the connections between devices, including the establishment, maintenance, and termination of sessions. This layer handles authentication and synchronization, as summarized in Table 6-2.

Example:
Authentication, authorization, synchronization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Application (Layer 7)

A

The Application Layer is the interface between the network and user applications. It supports specific protocols and services like HTTP, FTP, DNS, and DHCP, as detailed in Table 6-2.

Example:
Application-specific protocols (HTTPhttp, Ftp), services (DNSdns, dhCp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Presentation (Layer 6)

A

The Presentation Layer translates and formats data for different applications and systems. It deals with data compression, encryption, and character encoding, as described in Table 6-2.

Example:
Data compression, encryption, character encoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hub

A

Connects multiple devices on a network by repeating incoming data packets to all connected devices.

OSI-Layer => Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Repeater

A

Regenerates and amplifies signal strength in a network segment to extend its reach

OSI-Layer => Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Switch

A

Connects multiple devices on a network and forwards data packets only to the intended recipient

OSI-Layer => Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bridge

A

Connects and filters traffic between two network segments at the Data Link Layer.

OSI-Layer => Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Network Interface Card (NIC)

A

Enables a device to connect to a network by providing a Physical and Data Link Layer connection.

OSI-Layer => Physical & Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Router

A

Connects and routes traffic between different networks, often using the IP protocol

OSI-Layer => Network

19
Q

Firewall

A

Monitors and filters incoming and outgoing network traffic based on predefined security rules.

OSI-Layer => Network, 4. Transport and higher

20
Q

Wireless Access Point (WAP)

A

Connects wireless devices to a wired network, converting between wired and wireless signals

OSI-Layer => Data Link

21
Q

Load Balancer

A

Distributes network traffic across multiple servers to optimize resource utilization and performance

OSI-Layer: Transport, 7. Application

22
Q

Proxy Server

A

Acts as an intermediary between a client and a server, forwarding client requests and server responses

OSI-Layer: Application

23
Q

The TCP/IP Model

A

The TCP/IP model also known as the internet protocol suite is a four-layer model that simplifies and standardizes network communication. It serves as the foundation for the Internet and aligns closely with the OSI model.

24
Q

Network Access Layer

A

The Network Access Layer corresponds to the OSI model’s Physical and Data Link layers, as described in Table 6-5. It is responsible for the physical transmission of data, including framing, addressing, and media access. This layer ensures data is appropriately formatted and transmitted over the chosen network medium.

25
Q

Internet Layer (Network Layer)

A

The Internet Layer, equivalent to the OSI model’s Network Layer, handles the routing and forwarding of data packets. It uses Internet Protocol (IP) addressing and routing protocols like OSPF and BGP, as detailed in Table 6-5. This layer is essential for directing data across interconnected networks.

26
Q

The Transport Layer

A

The Transport Layer aligns with the OSI model’s Transport Layer, managing end-to-end data delivery and flow control. As discussed in the previous section, it uses protocols such as TCP for reliable communication and UDP for connectionless communication. This layer ensures data segmentation, sequencing, and error recovery, as summarized in Table 6-5.

27
Q

Application Layer

A

The Application Layer in the TCP/IP model combines the functions of the OSI model’s Session, Presentation, and Application Layers. It supports application-specific protocols like HTTP and FTP and handles user applications and high-level protocols, as described in Table 6-5.

28
Q

Local Area Networks (LANs)

A

LAN technologies connect devices within a small geographical area, such as an office building. Ethernet, a widely used LAN technology, operates at the Data Link Layer, using MAC addresses for device identification. For example, switches manage network data traffic by directing frames to their intended destinations based on MAC addresses. Virtual LANs (VLANs) enhance security by logically separating devices within a network, allowing different departments in a company to communicate as if they were on separate physical networks.

29
Q

Wide Area Networks (WANs):

A

WAN technologies connect devices across large geographical areas, such as between cities or countries. T1/E1 lines, specific to North America and Europe, are high-speed communication lines for voice and data transmission. Multiprotocol Label Switching (MPLS) efficiently routes data in large networks by using labels to direct data packets along predetermined paths. Asynchronous Transfer Mode (ATM) provides high-speed data transfer using fixed-size cells suitable for multimedia applications.

30
Q

Wireless Local Area Networks (WLANs)

A

Wireless Local Area Networks (WLANs): WLANs enable wireless communication within a limited area. Wi-Fi, adhering to the IEEE 802.11 standard, operates in frequency bands like 2.4 and 5 GHz. Wireless access points (WAPs) bridge wired and wireless networks, allowing smartphones and laptops to connect to the network. Security techniques such as WEP and WPA2 encryption protect WLANs from unauthorized access.

31
Q

Converged protocols

A

Converged protocols: Converged protocols integrate multiple communication methods. Voice over IP (VoIP) allows communication over IP networks, replacing traditional phone lines. IP Multimedia Subsystem (IMS) delivers multimedia services like video conferencing, and Unified Communications (UC) integrates tools like voice, video, and messaging for seamless collaboration.

32
Q

Software-Defined Networking (SDN)

A

Software-Defined Networking (SDN): SDN is a revolutionary network architecture that separates control from data, enabling dynamic networking. It simplifies deployment and management through software-based controllers, allowing network administrators to allocate, deallocate, and shift resources quickly.

33
Q

Radio Frequency Identification (RFID)

A

Radio Frequency Identification (RFID): RFID uses electromagnetic fields to identify and track tags on objects. In retail, RFID tags on products enable automated inventory management. Security measures like encryption and authentication protect RFID systems from unauthorized access.

34
Q

Operation of hardware

A

Operation of hardware: Proper hardware operation is the cornerstone of network reliability. Implementing redundant power systems, such as uninterruptible power supplies (UPS) and backup generators, ensures continuous power and minimizes downtime. Warranty and support agreements with manufacturers safeguard the network’s health and functionality.

35
Q

Transmission media

A

Transmission media: The choice of transmission media, including copper cables, fiber-optic cables, and wireless connections, significantly impacts the network’s speed, distance capabilities, and reliability. Understanding different media properties helps select the right option for specific network requirements.

36
Q

Network access control (NAC) devices

A

Network access control (NAC) devices: NAC devices play a crucial role in network security by authenticating users, authorizing access based on roles, and continuously monitoring network activity. They form the first line of defense against unauthorized access and potential threats.

37
Q

Endpoint security

A

Endpoint security: Protecting endpoint devices like desktops and laptops is vital as they can be entry points for attackers. Implementing antivirus software, firewalls, and regular updates helps maintain overall network security.

38
Q

Voice communication security

A

Voice communication security: Encrypting voice calls using protocols like Secure Real-time Transport Protocol (SRTP) prevents unauthorized access and interception, safeguarding privacy in voice communications.

39
Q

Multimedia collaboration security

A

Multimedia collaboration security: Tools for video conferencing and instant messaging often employ end-to-end encryption, user authentication, and access control to secure data and prevent unauthorized access.

40
Q

Remote access security

A

Remote access security: Security measures for remote access, such as Virtual Private Networks (VPNs) and multifactor authentication (MFA), ensure that remote connections to the organization’s network are secure and verified.

41
Q

Data communications security

A

Data communications security: Protocols like HTTPS and TLS are essential for securing data in transit, providing encrypted channels for sensitive information.

42
Q

Virtualized network security

A

Virtualized network security: The dynamic nature of virtualized networks like Software-Defined Networking (SDN) requires specialized security measures, including granular access control, micro-segmentation, and continuous monitoring.

43
Q

Third-party connectivity security

A

Third-party connectivity security: Integrating external services or partners requires robust security policies, regular assessments, and strict access control measures to ensure secure and compliant connectivity.