Domain 4 set 2 Flashcards
SSL/TLS work at what layer?
single Layer = 4 Transport
multiple layer = 4- 7
what layer Provides end to end data transport service and establishes a logical connection between 2 system
Layer 4 Transport
SYN floods happen to what protocol and what layer?
TCP at layer 4 Transport
TCP 3-way Handshake process:
- SYN
- SYN / ACK
- ACK
Media streaming use what protocol?
UDP
Fraggle attack happens on what layer
layer 4 Transport
what layer is responsible for establishing connections between applications
The session layer (5)
What layer handles file-level encryption, compression, and formatting duties.
The presentation layer (6)
no protocols exist at what layer ?
The presentation layer (6)
What layer uses a negotiation procedure or handshake to setup, transfer data (maintenance), and tear down the connection or session.
The session layer (5)
Security threats tapping, data sniffing, equipment and media theft, vandalism, electromagnetic interference, unauthorized access, and data emanation.
Are at what layer
Physical (1)
Content inspection is possible at what layer ?
Layer 7 Application
Non-Repudiation is at what layer
Layer 7 Application
Certificates is at what layer
Layer 7 Application
Directory services (e.g. ActiveDirectory) at what layer
Layer 7 Application
TCP/IP Model 4 layer
- Application
- Host to Host or Transport
- Internetwork
- Network access
TCP/IP Model Application layer maps to IOS layers?
application
presentation
Session
TCP/IP Model Host to Host or Transport layer maps to IOS layers?
Transport
TCP/IP Model Internetwork maps to IOS layers?
Network
TCP/IP Model Network access maps to IOS layers?
Data link
Physical
MPLS
Labeling on packet at layer 3
greatest threat to VOIP
Eavesdropping
stop eavesdropping on VOIP
enable S/RTP (Secure Real Time Protocol)
wireless pc to pc use what mode
Ad-hoc
AP use what mode
Infrastructure Wlan
WPA2 use what cipher
AES (block cipher) with CCMP
WPA use what cipher
TKIP with RC-4 (for backwards compatibility)
WEP 4 main issues ?
- Shared Authentication password
- Weak IV (24bits)
- IV trainsmitted in clear text
- RC-4 cipher
WPA2 Enterprise
use 802.1X (RADUS)
Blue Jacking
sending SPAM to bluethooth
Blue Sarfing
copies info off of remote devices
how to secure bluetooth device?
- turn off when not using it
- turn off auto-discovery
- Turn off auto-pairing