Network Security Concepts Flashcards

1
Q

Which TCP/IP protocol resolves IP addresses to MAC addresses?
A. UDP
B. ICMP
C. ARP
D. TCP

A

C. ARP.
ARP (Address Resolution Protocol) is the protocol used to map an IP address to a MAC address within a local network. When a device wants to communicate with another device on the same network but only knows its IP address, it sends an ARP request to find out the corresponding MAC address. The device that owns the IP address responds with its MAC address, allowing the communication to proceed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which IPSec configuration provides confidentiality?
A. Encapsulating security payload
B. Authentication headers
C. IPSec does not provide confidentiality
D. Transport mode

A

A. Encapsulating Security Payload (ESP).
ESP is the IPSec protocol that provides confidentiality by encrypting the payload of the IP packets. It ensures that the data transmitted between devices is unreadable to unauthorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which benefits can be derived from creating VLANs? Choose more than one option.
A. Network traffic isolation
B. Improved network throughput
C. Network integrity
D. Network encryption

A

A. Network traffic isolation
A. Network traffic isolation: VLANs (Virtual Local Area Networks) allow you to segment a network into smaller, isolated logical networks. This improves network organization and security by isolating traffic within a VLAN, preventing it from being broadcast to other VLANs. This is one of the primary benefits of using VLANs.
B. Improved network throughput.
B. Improved network throughput: By isolating traffic within VLANs, you can reduce unnecessary broadcast traffic and collisions in the network. This leads to more efficient use of network resources and can improve overall throughput.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of DNS zone record resolves IP addresses to DNS names?
A. A
B. AAAA
C. PTR
D. CNAME

A

C. PTR.
PTR (Pointer) records are used in reverse DNS lookups, where they resolve an IP address to a DNS name. This is the opposite of the typical DNS lookup, where a domain name is resolved to an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You need to add a new network route on a Linux host. Which command syntax should you use?
A. nslookup
B. add route
C. ifconfig route add
D. ip route add

A

D. ip route add.
On a Linux system, you use the ip command to manage network routing. The ip route add command is used to add a new route to the routing table.

Syntax:
ip route add <destination> via <gateway> [options]</gateway></destination>

<destination>: The IP address or network to route to.
<gateway>: The IP address of the next-hop gateway.
</gateway></destination>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How many bits exists in the IPv6 address space?
A. 32
B. 128
C. 64
D. 16

A

B. 128.
An IPv6 address is 128 bits long, which allows for a vastly larger address space compared to IPv4, which is only 32 bits. This large address space enables more unique IP addresses for devices globally.
Breakdown:
IPv4: 32 bits, which provides about 4.3 billion unique addresses.
IPv6: 128 bits, which provides approximately 340 undecillion (3.4 × 10^38) unique addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which Wi-Fi authentication method facilitates central log event monitoring for network authentication?
A. WPA Enterprise
B. WPS
C. WPA PSK
D. WEP

A

A. WPA Enterprise.
WPA Enterprise (Wi-Fi Protected Access Enterprise) facilitates centralized log event monitoring for network authentication. It uses an authentication server (usually RADIUS - Remote Authentication Dial-In User Service) to handle the authentication process, allowing for the logging and monitoring of authentication events and user activity in a central location. This provides better security and oversight compared to other methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have used the ‘chrony’ package to configure an NTP server in Linux. Which command shows connected time consumers?
A. chronyc clients
B. timedatectl
C.chronyc activity
D. date

A

A. chronyc clients.
The chronyc command is used to interact with the chrony NTP (Network Time Protocol) service on Linux. The chronyc clients command specifically shows the list of clients that are connected to the NTP server and consuming time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You have created a new VLAN. The DHCP server exists on a separate network. You need to ensure that clients receive their IP configuration through DHCP. Which solution represents the least amount of administrative effort?
A. Configure a DHCP relay agent on the new VLAN
B. Enable a shorter DHCP lease interval
C. Enable a DNS forwarding
D. Install a new DHCP server on the new VLAN

A

A. Configure a DHCP relay agent on the new VLAN
A DHCP relay agent allows clients on the new VLAN to communicate with the DHCP server on a different network. This is the most efficient solution as it ensures that DHCP requests from clients on the new VLAN are forwarded to the DHCP server without needing to install a new DHCP server or make extensive configuration changes. The relay agent simply forwards the DHCP discover message and relays the DHCP offer back to the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of VPN is considered to be firewall-friendly?
A. IPSec
B. L2TP
C. SSL
D. PPTP

A

SSL (Secure Sockets Layer)
VPNs are generally considered firewall-friendly because they typically use standard HTTP/HTTPS ports (TCP 443), which are usually open on most firewalls. This allows SSL VPNs to bypass strict firewall configurations and provide secure remote access without requiring complex configurations or additional ports to be opened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

To which layer of the OSI model does traffic routing apply?
A. Layer 2 (Data Link)
B. Layer 5 (Session)
C. Layer 3 (Network)
D. Layer 4 (Transport)

A

C. Layer 3 (Network)
Routing operates at Layer 3 (Network layer) of the OSI model. This layer is responsible for determining the best path for data to travel from the source to the destination across multiple networks, using devices like routers. It deals with IP addressing and routing protocols such as RIP, OSPF, and BGP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which port is normally use for NTP communication?
A. 110
B. 123
C. 443
D. 80

A

B. 123
The Network Time Protocol (NTP) uses UDP port 123 for communication. NTP is used to synchronize clocks between computers over a network. It operates using a client-server model where the client requests time from the NTP server, and the server responds with the accurate time.

Explanation of other options:
A. 110: This port is used for POP3 (Post Office Protocol version 3), which is used to retrieve emails from a mail server.
C. 443: This port is used for HTTPS (HyperText Transfer Protocol Secure), which is used for secure web browsing.
D. 80: This port is used for HTTP (HyperText Transfer Protocol), which is used for unencrypted web browsing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly