Network+ basics Flashcards

1
Q

Hub

A

Traffic going in one port is repeated to every other port.

Osi layer 1

Everything is half duplex.

10mb/100mb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Switch

A

ASIC

OSI layer 2 device

Fowards traffic based on data link address

may provide power over ehternet

many ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Router

A

OSI layer 3 device

often connects wan,lan,fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Firewall

A

Filters traffic by port number

OSI layer 4, come can filter through layer 7

Can encrypt traffic into/out of the network

Can proxy traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WAP

A

Wireless access point

Not a router, is a single device.

OSI layer 2 device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Intrusions

A

Exploits against operating systems,applications

Buffer overflows,cross-site scripting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Signature-based

A

Look for a perfect match

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Anomaly-based

A

Build a baseline of what;s normal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Behavior-based

A

Observe and report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Heuristics

A

Use artificial intelligence to identify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Content filtering

A

Control traffic based on data within the content

Coporate control of outbound and inbound data

Control of inappropriate content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

URL Filtering

A

Allow or restrict based on uniform resource locator

Managed by catefory

Can have limited control

Often invisble to encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Site-to-Site VPNs

A

Encrypt traffic between sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Host-to-Site VPNs

A

Also called “remote access VPN”

Requires software on the user device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Host-to-Host VPNs

A

User to user encryption

Software-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PPP

(Point-to-Point Protocol)

A

Authentication,compression,error detection

no encryption

Layer 2 Protocol

17
Q

PPTP

A

Controls the tunnel

GRE is the tunnel

Sends multi-protocol traffic through the GRE tunnel

Authentication and encryption

MS-Chapv2

EAP-TLS

Encrypts the data with MPPE

18
Q

SSL VPN

A

Uses tcp/443

usually client-to-site communication

Authenticate users

Can br run from a browser or vpn client

19
Q

IPSec

A

Security for OSI layer 3

Authentication and encryption for every packet

Ecvryption and packet signing

Ah and ESP