Domain 4 - Networking Security Flashcards

1
Q

What is a simplex connection?

A

This is a one way communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a half-duplex connection?

A

Can send or receives, but only one at a time. Not simultaneous.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a full-duplex connection?

A

a connection that can send a receive data simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is baseband?

A

networks have one channel and can only send one signal at a time. Ethernet is baseband.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is broadband?

A

networks that have multiple channels and can receive multiple signals at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an extranet?

A

A connection between private intranets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which is more commonly used, packet switching or circuit switching?

A

packet switching. cost is a major factor, but capacity is not guaranteed. Can support QOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is TCP sequential?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the best use case for UDP?

A

real-time or near real-time applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Personal Area Network (PAN)?

A

Your local network that is in reach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Metropolitan Area Network?

A

Large network, like a college campuses or large city networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Global Area Network (GAN)

A

A network used for supporting mobile users across a number of wireless LAN. Seamless transition from network to network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the seven layers in the OSI model

A
  1. Physical Layer
  2. Data Link Layer
  3. Network Layer
  4. Transport Layer
  5. Session Layer
  6. Presentation Layer
  7. Application Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What sentence can help you remember the layers?

A

Please Do Not Throw Sausage Pizza Away!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are are bits located on in the OSI model?

A

The Physical Layer, Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What layer are frames located on in the OSI model?

A

Layer 2, the data link layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What layer are packets located on?

A

Layer 3, the networking layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What layer are segments located on?

A

Layer 4, the transport layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What layers(s) do data live on?

A

Session, presentation, or application. Also known as layers 5, 6, and 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Where are wires, fibers, radio waves located in the OSI model?

A

The physical layer. Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a downside to copper twisted pairs?

A

They are the least secure and easily eavesdropped on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Where are network topologies in the OSI model?

A

They are in layer 1, the physical layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Where are MAC addresses in the OSI model?

A

On layer 2, the data link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Are Mac Addresses secure?

A

No. They can be easily spoofed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What bit are Mac Addresses

A

48 or 64 bit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What layer is Address Resolution Protocol on?

A

Layer 2, the data link layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What layer is IMAP in the OSI model?

A

Layer 7, the application layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Is TCP connection oriented?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Does UDP care if traffic makes it to the destination?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What layer is TCP on in the OSI model

A

Layer 4, Transportation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What layer does POP, IMAP, and FTP reside on in the OSI model?

A

Layer 7, the application layer

32
Q

What are the four layers for the TCP / IP model?

A
  1. Link and Physical Layer
  2. Internetwork Layer
  3. Transport Layer
  4. Application Layer
33
Q

In the TCP / IP model, where is host addressing and packet routing located?

A

On the internetwork layer. Layer 1

34
Q

In the TCP / IP model, where is TCP and UDP located?

A

In the transport layer. Layer 4

35
Q

What are the first 24 bits of the MAC Address

A

the manufacturer ID

36
Q

What is the port range for well known ports

A

0 - 1023. Mostly used for protocols

37
Q

What is the port range for registered ports?

A

1024 - 49151 - mostly used for vendor specific applications.

38
Q

What is the port for dynamic or ephemeral ports?

A

49152 - 65535 - Can be used by anyone for anything.

39
Q

What is TCP port 20 used for?

A

FTP data transfer

40
Q

What is TCP port 21 used for?

A

FTP control.

41
Q

What is port 23 used for?

A

TCP / Telnet..

42
Q

What is tcp port 25 used for?

A

SMTP

43
Q

What is TCP port 110 used for?

A

POP3

44
Q

What is TCP port 143 used for?

A

IMAP

45
Q

What are TCP UDP ports 137 and 138 for?

A

Net Bios

46
Q

What does the Address Resolution Protocol (ARP) do?

A

It translates IP addresses to MAC addresses

47
Q

What protocol does trace route use?

A

ICMP

48
Q

What is the DHCP server used for?

A

The assignment of IP addresses.

49
Q

What is cross talk with ethernet cables?

A

When the signal crosses from one cable to another.

50
Q

What does Attenuation mean?

A

The signal getting weaker the farther it travels.

51
Q

What does twisting cables do?

A

It makes them less susceptible of of EMI

52
Q

What are key characteristics of shielded twisted pair?

A

Has metal shielding around each of the 4 pair of cables.

53
Q

What is the difference between RJ45 and RJ11?

A

RJ11 is the connector for you phone and RJ45 is the connector for your internet cables at home and in the office.

54
Q

What is a pro of using fiber cables?

A

Speed

55
Q

What are the cons of using fiber cables?

A

Price. They are more difficult to use.

56
Q

What is single mode fiber?

A

A single strand of fiber used for long distance cables.

57
Q

What is Multi-Mode fiber?

A

Uses multiple modes to carry multiple data streams simultaneously.

58
Q

What is a Bus network topology?

A

It is a chain of nodes. The downside is if one breaks the chain stops working. single point of failure.

59
Q

What is a tree network topology?

A

The base of the tree topology controls the traffic. If any node fails, the tree stops working. Single point of failure.

60
Q

What is a ring network topology?

A

If a node breaks it can traverse the opposite way to the destination. Requires every node to have two NICs

61
Q

What is a star network topology?

A

What we use today. Think of a central node that connects all nodes together. An ethernet switch is an example of this.

62
Q

What is the definition of partial mesh?

A

Some nodes are directly connected to other nodes, but not all of them.

63
Q

What is the definition of full mesh?

A

All nodes are connected to all other nodes. used for HA

64
Q

What is a rogue access point?

A

An unauthorized access point that was added to the network.

65
Q

What is an evil twin attack?

A

A rogue access point with the same name as a real access points.

66
Q

Is Bluetooth secure?

A

No.. It assumes a 48bit mac address.

67
Q

What is a bluejacking attack?

A

Sending unsolicited messages over bluetooth

68
Q

what is a bluesnarfing attack?

A

Unauthorized access of information from a bluetooth device.

69
Q

What is a Bluebugging attack?

A

The attacker gains total access and control of your device.

70
Q

What is a Zigbee network?

A

A mesh network with low power, low data rates, and close proximity.

71
Q

What has a higher COVERAGE area, 3G or 5G?

A

3G, but it is slower

72
Q

What is a VLAN?

A

A broadcast domain that is partitioned and isolated at layer 2.

73
Q

What are VLAN Trunks?

A

Ports connecting to switches to span VLANs across them.

74
Q

What is a VXLAN?

A

Used for organizations that have mass tenants. Think AWS.

75
Q

What is the point of using a router?

A

What we use to connect our local network to the WAN

76
Q

What is third party connectivity?

A

A 3rd party app that somehow integrates with your systems. Think SolarWinds.

77
Q
A