Domain 4 - Networking Security Flashcards

1
Q

What is a simplex communication?

A

A one way communication. The direction cannot be changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a half-duplex connection?

A

it can only send or receive at a one time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a full-duplex connection?

A

It can send and receive simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a baseband connection?

A

It can only send one signal at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an Extranet?

A

A connection between private intranets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the downside of a circuit switching network?

A

Cost.. It always guarantees full bandwidth though.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a packet switching network?

A

Data is sent in packets but take multiple paths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the UDP protocol best used for?

A

Close to real-time communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Does UDP care if the packets made it?

A

No. It is connectionless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a personal area network?

A

It is a network for devices that are close to the person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a metropolitan area network?

A

It spans a large area like a city or campus?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a wide area network?

A

A network that covers large geographic areas like a city, country, or intercontinental distances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a global area network?

A

A network that supports users across multiple wireless lans. Think cell phone network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is layer one of the OSI Model?

A

The physical layer.

Ethernet, Fibers, cables, radio waves, hubs, etc…

Networking topologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the least secure cable type?

A

Copper twisted pair. It is prone to eavesdropping and interference. Cheap though.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is fiber optic cable prone to eavesdropping?

A

No. It is secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the threats at the physical layer?

A

Theft, eavesdropping, sniffing, interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is layer two of the OSI model?

A

The data link layer.

Transports data between 2 nodes connected to the same network.

This is where MAC addresses live.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the threats at the data link layer?

A

Mac spoofing and flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How large are MAC addresses

A

48 or 64bit hexadecimal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is layer three of the OSI model?

A

The network layer. It expands to many different nodes.

Protocols like IPSEC, IP, IGMP, IKE, etc..

All protocols start with an “I” except IMAP which is layer 7.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the threats at the network level?

A

Ping of death, smurf, ip modifications, dhcp hacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is layer four of the OSI model?

A

The transport layer. TCP and UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the threats at the transport layer?

A

Fraggle attacks. Syn floods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does a three way TCP handshake look like?
SYN >> SYN >> ACK >> ACK
26
What is layer five of the OSI model?
The session layer. A connection between two applications
27
What is layer six of the OSI model?
The presentation layer. No protocols.. Formatting, compressing, encryption.
28
What is layer seven of the OSI model?
The application layer. THis is where HTTP, FTP, IMAP, POP, etc.. kive.
29
What are the threats to layers five through seven?
Viruses, Worms, Trojans, etc...
30
What are the protocol data units (PDU) for layer 1?
Bits
31
What are the protocol data units (PDU) for layer 2?
Frames
32
What are the protocol data units (PDU) for layer 3?
Packets
33
What are the protocol data units (PDU) for layer 4?
Segments
34
What are the protocol data units (PDU) for layer 5?
Data
35
Where are network topologies stored in the OSI model?
The physical later, layer one.
36
What layer in the OSI model does encryption happen?
The presentation layer, layer six.
37
How many total layers are in the TCP / IP model and the names?
Four total layers. Link and Physical ( OSI 1 and 2) Internetwork layer (OSI 3) Transport (OSI 4) Application Layer (OSI 5,6,7)
38
Does IPv6 require 64 bit MAC addresses?
Yes
39
What are the first 24 bits of the MAC address
The manufacturer
40
Is IPv4 a connectionless protocol?
Yes.
41
What is the well known port range?
0 - 1023
42
What is the registered port range?
1024 - 4951
43
What is port 23 used for?
Telnet
44
What is port 110 for?
POP3
45
What is port 143 for?
IMAP
46
Is IPSEC built into IPv6
Yes
47
What does the ARP protocol do?
It translates IP addresses to MAC addresses.
48
What does multicast mean?
Everyone on the network gets the request.
49
How do systems respond to a multicast message?
Using unicast.
50
When should you hardcode ARP?
For critical devices
51
What is the DHCP?
Dynamic host configuration protocol. It assigns IP addresses to devices.
52
What is crosstalk in the context of networking cables?
It is the signal crossing from one cable to another and it can be a confidentiality issue.
53
What is attenuation in the context of networking cables?
When the signal gets weaker the further it travels.
54
Does fiber have attenuation problems?
No
55
What is an RJ 11 connector?
Your phone.. Smaller than RJ45
56
What speeds can fiber optic cables obtain?
Petabytes per second.
57
What is single mode fiber?
A single strand of fiber carries a single mode of light used for long distance cables?
58
What is multi-mode fiber
multiple strands of fiber carrying multiple data streams at the same time. This uses wavelength division multiplexing.
59
What is a BUS LAN topology?
A line of nodes. If one breaks, the traffic cannot go past it. Think of it like christmas lights.
60
What is a tree LAN topology?
The base of the tree controls traffic. Also a single point of failure.
61
What is a ring LAN topology?
All nodes are connected in a ring. Always has a path to the requested node.
62
What is the star LAN topology?
All nodes are connected to a central device.
63
What is a Mesh LAN topology?
Nodes are connected in partial or full mesh. Full means all nodes are connected to all other nodes.
64
What attacks target wi-fi?
Jamming, Interference, Rogue endpoints
65
What is a wi-fi evil twin?
It uses the same name as the corporate network, but it is not real.
66
What is the max range of Bluetooth?
Class 1 can go 100 meters. Class 3 under 10 meters.
67
What are the bluetooth attacks?
Bluejacking - Sending unsoliciated messages BlueSnarfing - unauthorized access of information from a bluetooth device Bluebugging - Attacker gains full control of your device.
68
What is Li-fi?
It uses light to transmit data between devices.
69
What is Zigbee?
low power mesh wireless network. Needs close proximity.
70
What is a typical latency for satellite internet?
500ms
71
What is the benefit of 3G cell service?
larger coverage area
72
What is the benefit of 5g cell service?
faster speed, but less coverage area.
73
Where is a VLAN located in the OSI model?
Layer 2
74
What is a VLAN trunk?
A port connecting two switches to span VLANs across them.
75
`What is a VXLAN?
What cloud computing providers use.
76
Where is VXLAN in the OSI model?
Layer 3, the network layer
77
What is an example of a dynamic route?
BGP
78
What is a metric?
Used to determine the best path to a destination.
79
What layer in the OSI model are routers
Layer 3, the networking layer
80
What is SDx?
This means software-defined everything. Storage, networking, etc..
81
What is a boot sector virus?
It runs on the master boot record
82
What is a stealth virus?
It tries to hide from the OS and AV
83
What is a multipart virus?
It spreads across multiple vectors.
84
What are worms?
They are spread through self-propagation and do not need human interaction.
85
What is a RAT?
They give an attacker admin control over the target system.
86
What is a signature based AV?
Looks for known malware signatures
87
What is a heuristic AV?
It is behavior based. It looks for abnormal behavior.
88
What are the two types of IDS / IPS systems
Signature Based Heuristic Based
89
What is the downside of heuristic based systems?
Lots of false positives
90
What is the best practice for IDS / IPS
Having it both at the network and host level
91
Can network IDS / IPS read encrypted traffic?
No. You need a host based system for that.
92
What are hybrid based IDS / IPS systems?
They look at behavioral and signature based anomalies.
93
How can attackers avoid IDS / IPS?
Fragmentation. Sending fragmented packets. Avoiding default attack vectors
94
What is the difference between honey pot and honey net?
A honeypot is a single system and a honey net is a group of systems.
95
What is a big pro of virtualization?
Cost efficiencies and flexibility
96
What is a Type 1 hypervisor?
Known as bare metal. Part of a virtualization OS that runs on top of the host hardware.
97
What is a Type 2 hypervisor?
It runs on top of a regular OS like windows 10. Think Hyper V.
98
What hypervisor type does AWS use?
A type 1 hypervisor
99
What is a VM escape?
Where an attacker jumps from host to host.
100
Who creates a private cloud?
Your organization. It is yours.
101
What is an organization responsible for in a PaaS agreement?
Applications only.
102
Where should smart devices be kept in the network?
A separate VLAN.
103
What is hardware hardening?
We harden it ASAP before provisioning it or connecting to the network. routers, laptops, hardware anything... Should be automated.
104
What is a Power Distribution Unit (PDU) used for?
They make sure that voltage is clean / regulated.
105
What is the difference between an incremental and differential backup?
An incremental backup will backup everything since the last backup A differential backup will backup everything since the last FULL backup.
106
Do incremental backups clear the archive bit?
Yes
107
Do differential backups clear the archive bit?
No
108
Can you can use differential and incremental backups in the same policy?
No
109
What is database shadowing?
Exact real-time copy of the database or files to another location.
110
What is remote journaling backup strategies?
The logs are sent offsite that can be used to rebuild the database later.
111
What does Halon, FM200, and Aron suppression do?
It replaces oxygen in a room where there is a fire.
112
What is a class C fire?
Electrical fire
113
What is a class A fire?
ordinary combustable
114
What kind of control is patching?
A corrective Control
115