Network Design Flashcards

1
Q

Used to explain network communications between a host and remote
device over a LAN or WAN

A

OSI Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Represents the actual network cables and radio waves used to carry data
over a network

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describes how a connection is established, maintained, and transferred
over the physical layer and uses physical addressing (MAC addresses)
§ Frames

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Uses logical address to route or switch information between hosts, the
network, and the internetworks
§ Packets

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Manages and ensures transmission of the packets occurs from a host to a
destination using either TCP or UDP
§ Segments (TCP) or Datagrams (UDP)

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Manages the establishment, termination, and synchronization of a
session over the network

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Translates the information into a format that the sender and receiver
both understand

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layer from which the message is created, formed, and originated
§ Consists of high-level protocols like HTTP, SMTP, and FTP

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attempt to overwhelm the limited switch memory set aside to store the
MAC addresses for each port

A

MAC Flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Occurs when an attacker masks their own MAC address to pretend they
have the MAC address of another device

A

MAC Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

occurs when an attacker attempts to gain physical
access

A

Physical Tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used to connect two or more networks to form an internetwork

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An ordered set of rules that a router uses to decide whether to permit or
deny traffic based upon given characteristics

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Focused on providing controlled access to publicly available servers that
are hosted within your organizational network

A

De-Militarized Zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Specialized type of DMZ that is created for your partner organizations to
access over a wide area network

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

§ Any host that accepts inbound connections from the internet

A

Internet facing host

17
Q

Hosts or servers in the DMZ which are not configured with any services
that run on the local network

A

Bastion Hosts

18
Q

§ A hardened server that provides access to other hosts within the DMZ

19
Q

Security technique in which devices are scanned to determine its current
state prior to being allowed access onto a given network

A

Network Access Control (NAC)

20
Q

A piece of software that is installed on the device requesting access to
the network

A

Persistent Agents

21
Q

Uses a piece of software that scans the device remotely or is installed and
subsequently removed after the scan

A

Non-persistent Agents

22
Q

Attacker configures their device to pretend it is a switch and uses it to
negotiate a trunk link to break out of a VLAN

A

Switch Spoofing

23
Q

Attacker adds an additional VLAN tag to create an outer and inner tag

A

Double Tagging

24
Q

Act of creating subnetworks logically through the manipulation of IP
addresses

A

Subnetting

25
§ Process of changing an IP address while it transits across a router
Network Address Translation(NAT)
26
Router keeps track of requests from internal hosts by assigning them random high number ports for each request
Port Address Translation(PAT)
27
10.0.0.0 to 10.255.255.255
Class A IP Addresses
28
§ 172.16.0.0 to 172.31.255.255
Class B IP Addresses
29
192.168.0.0 to 192.168.255.255
Class C IP Addresses
30
§ Term used to describe devices that provide voice communication to users
Telephony
31
§ Term used to describe devices that provide voice communication to users
Modem
32
§ Protect dial-up resources by using the callback feature
War Dialing
33
§ Internal phone system used in large organizations
Public Branch Exchange
34
Digital phone service provided by software or hardware devices over a data network
Voice over Internet Protocol(VoIP)