Domain 4 set 2 Flashcards

1
Q

SSL/TLS work at what layer?

A

single Layer = 4 Transport

multiple layer = 4- 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what layer Provides end to end data transport service and establishes a logical connection between 2 system

A

Layer 4 Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SYN floods happen to what protocol and what layer?

A

TCP at layer 4 Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP 3-way Handshake process:

A
  1. SYN
  2. SYN / ACK
  3. ACK
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Media streaming use what protocol?

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fraggle attack happens on what layer

A

layer 4 Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what layer is responsible for establishing connections between applications

A

The session layer (5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What layer handles file-level encryption, compression, and formatting duties.

A

The presentation layer (6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

no protocols exist at what layer ?

A

The presentation layer (6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What layer uses a negotiation procedure or handshake to setup, transfer data (maintenance), and tear down the connection or session.

A

The session layer (5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security threats tapping, data sniffing, equipment and media theft, vandalism, electromagnetic interference, unauthorized access, and data emanation.
Are at what layer

A

Physical (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Content inspection is possible at what layer ?

A

Layer 7 Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Non-Repudiation is at what layer

A

Layer 7 Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Certificates is at what layer

A

Layer 7 Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Directory services (e.g. ActiveDirectory) at what layer

A

Layer 7 Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP/IP Model 4 layer

A
  1. Application
  2. Host to Host or Transport
  3. Internetwork
  4. Network access
17
Q

TCP/IP Model Application layer maps to IOS layers?

A

application
presentation
Session

18
Q

TCP/IP Model Host to Host or Transport layer maps to IOS layers?

A

Transport

19
Q

TCP/IP Model Internetwork maps to IOS layers?

A

Network

20
Q

TCP/IP Model Network access maps to IOS layers?

A

Data link

Physical

21
Q

MPLS

A

Labeling on packet at layer 3

22
Q

greatest threat to VOIP

A

Eavesdropping

23
Q

stop eavesdropping on VOIP

A

enable S/RTP (Secure Real Time Protocol)

24
Q

wireless pc to pc use what mode

A

Ad-hoc

25
Q

AP use what mode

A

Infrastructure Wlan

26
Q

WPA2 use what cipher

A

AES (block cipher) with CCMP

27
Q

WPA use what cipher

A

TKIP with RC-4 (for backwards compatibility)

28
Q

WEP 4 main issues ?

A
  1. Shared Authentication password
  2. Weak IV (24bits)
  3. IV trainsmitted in clear text
  4. RC-4 cipher
29
Q

WPA2 Enterprise

A

use 802.1X (RADUS)

30
Q

Blue Jacking

A

sending SPAM to bluethooth

31
Q

Blue Sarfing

A

copies info off of remote devices

32
Q

how to secure bluetooth device?

A
  1. turn off when not using it
  2. turn off auto-discovery
  3. Turn off auto-pairing