Network Flashcards

1
Q

Used to explain network communications between a host and remote device over LAN or WAN

A

OSI Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Layer of OSI Model represent the actual network cables and radio waves used to carry date over network

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A data carried over a network to Physical layer

A

Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describes how a connection is established, maintained and transferred over the physical layer and uses physical addressing

MAC Addresses

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Its a group of bits in the data link layer

A

Frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Uses logical address to route or switch information and between host, the network and the internetworks

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

At network layer the frames are taken and group. An example of this are the IP addresses.

A

Packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Manages and ensures transmission of the packets occurs from a host to a designation using either TCP or UDP

A

Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Manages the establishment, termination and synchronization of a session over the network

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Translate the information into a format that the sender and receiver both understand

A

Presentaion Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layer from which the message is created, formed and originated. It consist of high level protocols like HTTP, SMTP and FTP

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It is the combine evolution of hubs and bridges. It improves the data transfer and security through the intelligent use of MAC Addresses being able to figure out where a device is and only sending information out that particular port of the switch and ignoring the rest.

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attempt to overwhelmed the limited switch memory set aside to store the MAC address for each port and this is known as the content addressable memory or CAM table

A

MAC Flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Occurs when an attacker masks their own MAC address to pretend they have the MAC address of another device

A

MAC Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is a man in the middle (MitM) attack that allows the attacker to intercept the communication between network devices. The forge the responses advertise that the correct MAC address for both IP addressess, belongin to the router and workstation, is the attacker’s MAC address ( MAC Spoofing). Mac spoofing is often combine with this attack.

A

ARP Spoofing/ ARP Poinsoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Occurs when an attacker attempts to gain physical access.

A

Physical tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It operates at layer lll
Used to connect two or more networks to form an internetwork
It rely on a packets IP Addresses to determine the proper destination
Once on the network, it conducts an ARP request to find final destination

A

Routers

18
Q

It can be configure on router’s interface to control the flow of traffic into or put of a
Certain part of the network.

It is an ordered set of rules that a router uses to decide where to permit or deny traffic based upon given characteristics like its source or destination IP address the ports associated with it and the application.

A

Access Control List

19
Q

It is used to trick a router’s ACL

A

IP Spoofing

20
Q

Focuses on providing controlled access to publicly available servers that are hosted within your organization network

A

De-Militarized Zone DMZ

21
Q

Can be created to provide addtional protection for some servers

A

Sub zones

22
Q

Specialized type of DMZ that is created for your partner organization to access overa wide area network

A

Extranet

23
Q

Used when only one company is involved

A

Intranet

24
Q

Any host that accepts inbound connections from the internet

A

Internet-facing host

25
Q

A segment isolated from the rest of a private network by one or more firewalls that accepts connections from the internet over designated ports

A

Demilitarized Zone DMZ

26
Q

Host or services in the DMZ which are not configured with any services that run on the local network

A

Bastion Host

27
Q

Used to configure device in the DMZ. A hardened server that provides access to other host within the DMZ. Administrator connects to it and it connects to the hose in the DMZ

A

Jumpbox

28
Q

Security technique in which a devices are scanned to determine its current state prior to being allowed access onto given network

A

Network Access Control

29
Q

A NAC solution piece of software that is installed on the device requesting access to the network

A

Persistent Agents

30
Q

A NAC solution that uses a piece of software that scans the device remotely or is installed and subsequently removed after the scan

A

Non-Persistent Agents

31
Q

Standard Access control mechanism used in port-based NAC

A

IEEE 802.1x

32
Q

This adds a layer of separation to networks without requiring to purchase additional switches that have to be configured and installed on the network. It is implemented to segment the network, reduce collisions, organize the network,boost performance and increase security

A

Vlans Virtual Local Area Network

33
Q

Attacker configures their device to pretend it is a switch and uses it to negotiate a trunk link to break out of a VLAN

A

Switch spoofing

34
Q

Attacker adds an additional VLAN tag to create an outer and inner tag

A

Double Tagging

35
Q

Acts of creating subnetworks logically through the manipulation of IP addresses. It compartmentalized networks to more efficiently use the IP address space that is given.

A

Subnetting

36
Q

Process of changing an IP address while it. Transits acrooss a router. It helps hide network IP from attackers.

A

Network Address Translation

37
Q

Router Keeps track of request from internal host by assigning them random high number ports for each request.

A

Port Address Translation

38
Q

Term used to describe drvices that provide voice communication to users

A

Telephony

39
Q

A device that could modulate digital information into an analog signal for transmission over a standard dial-up phone line.

A

Modem

40
Q

An attacker starts dialing random phone numbers to see if any modem would answer on the other side

A

War dialing

41
Q

Internal phone system used in large organization

A

Public Branch Exchange PBX

42
Q

Digital phone service provided by software or hardware devices over a data network

A

(Voice Over Internet Protocol) VoIP