Network Flashcards
Layer 1
Physical
Layer 2
Data Link
Layer 3
Network
Layer 4
Transport
Layer 5
Session
Layer 6
Presentation
Layer 7
Application
Physical
Layer 1
Data Link
Layer 2
Network
Layer 3
Transport
Layer 4
Session
Layer 5
Presentation
Layer 6
Application
Layer 7
Usually, layer 6 (______) and 7 (_____) are _____ together.
Usually, layer 6 (presentation) and 7 (application) are joined together.
At layer 2, devices are identified by
MAC addresses
At layer 3, devices are identified by
IP addresses
Protocol that translates L3 addresses to L2 addresses
ARP, from IP to MAC
Security in depth is also called
layered security
A server that manages several VPN tunnels is called
A VPN Concentrator
A general vulnerability of having a UTM appliance is…
It’s Single Point of Failure (SPoF)
A Web Security Gateway can be used as a _____ ______ prevention measure.
data loss
A Web Security Gateway’s main role is
applying corporate policies to internet traffic
A WAF operates on layer…
7 (application)
MOU
Memorandum of Understanding
BPA
Blanket Purchase Agreement
ISA
Internet Service Agreement
To prevent access to the network through exposed ports you can use
MAC Filtering
A control that detects a DoS attack and halt its traffic is called
Flood guards
To authenticate to wired and wireless networks to a central database using EAP you can use…
802.1x
802.1x encapsulates…
EAP
A supplicant is a…
client device trying to access a network
A DMZ creates an area
between the public internet and the internal network whereby the internal network can access outside resources, and only some resources can access the inside network
NAT allows
using two sets of IP addresses, internal and external, and translate between them
NAC
Network Access Control
In zero-trust, NAC is implemented with
Credentials and Posture Assessment
Segmentation of resources in a network creates
VLANs
IPv4 and IPv6 operate at the ____ layer
network (layer 3)
IPv6 is ____-bits
128 bits (16 bytes). It uses hex!
SAN
Storage Area Network
FC/FCP
Fiber Channel (Protocol)
SCSI
Small Computer System Interface
SCSI is used to control _____ devices
storage
FCP is used alongside with SCSI to control ______
storage devices
FCoE
Fiber Channel over Ethernet
iSCSI
Internet SCSI, L3 protocol between datacenters.
NetBIOS operates on layer
layer 5 (session)
NetBIOS is often used to access
printers and NAS
SNMP
Simple Network Management Protocol
IPsec modes
transport (host-to-host), tunnel (site-to-site)
Common attack to MAC filtering
MAC spoofing