NETWORKING Flashcards

1
Q

HTTP is a protocol that operates at what layer of the OSI model?

  • Layer 3
  • Layer 4
  • Layer 6
  • Layer 7
A

• Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In which layer do switches operate?

  • Layer 1
  • Layer 2
  • Layer 3
  • Layer 4
A

• Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following devices operates ONLY at the Physical Layer?

  • Router
  • Network Firewall
  • Network Hub
  • Network Switch
A

• Network Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following describes a star topology network?

  • All devices are connected to a central device, such as a network switch
  • Each device is directly connected to every other device
  • All devices are connected to a single cable Each device is directly connected to two other devices, such that data can
  • flow through a series of devices to get between two points
A

• All devices are connected to a central device, such as a network switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 4 steps followed by a DHCP Client to obtain an IP Address?

  • DHCPDiscover, DHCPOffer, DHCPRequest, DHCPAck
  • DHCPDiscover, DHCPOffer, DHCPAssign, DHCPAccept
  • DHCPRequest, DHCPReply, DHCPAssign, DHCPAccept
  • DHCPRequest, DHCPResponse, DHCPAssign, DHCPAccept
A

DHCPDiscover, DHCPOffer, DHCPRequest, DHCPAck

(Remember DORA!)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Several computers on your network are being assigned the wrong DNS server IP address. You visit them and verify that they are using DHCP. What might be a possible cause?

  • The DHCP server has issued all of the DNS server IP addresses in its pool
  • The DHCP server lease pool is exhausted
  • The DNS server is offline, so the DHCP server is redirecting traffic
  • Someone has setup another DHCP server
A

Someone has setup another DHCP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To communicate with the IP address 192.168.200.100, what gateway will your computer use?

  • It will use 192.168.200.15
  • It will use the Default Route
  • 192.168.200.25, which is a static route in the computer routing table
A

• It will use 192.168.200.15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To communicate with the IP address 192.168.100.6, what gateway will your computer use?

  • 192.168.100.1, which is its default gateway
  • 192.168.100.5, which is a static route
  • None. It is on the same LAN as your computer.*
A

• None. It is on the same LAN as your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What would the default subnet mask be for the IP range 172.16.0.0/16?

  1. 0.0.0
  2. 255.0.0
  3. 255.248.0
  4. 255.255.0
A

255.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

There are two devices with the IP addresses 10.10.5.5 and 10.10.10.10. Which of the following subnet masks will logically place both devices on the same network?

  1. 255.0.0
  2. 255.255.0
  3. 255.255.128
  4. 255.255.248
A

255.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: In order to communicate with devices on the same subnet, a computer must communicate with its Default Gateway.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Host 1 (192.168.6.10/24) wants to send a packet to Host 2 (192.168.47.35/24). Which path will this packet take to reach its destination, assuming that both 192.168.6.0 and 192.168.47.0 are in the gateway’s routing table?

Host 1 -> Internet -> Host 2
Host 1 -> default gateway -> Host 2
Host 1 -> default gateway -> Internet -> Host 2
Host 1 -> Host 2

A

Host 1 -> default gateway -> Host 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 4 steps followed by a DHCP Client to obtain an IP Address?

DHCPDiscover, DHCPOffer, DHCPRequest, DHCPAck

DHCPDiscover, DHCPOffer, DHCPAssign, DHCPAccept

DHCPRequest, DHCPReply, DHCPAssign, DHCPAccept

DHCPRequest, DHCPResponse, DHCPAssign, DHCPAccept

A

DHCPDiscover, DHCPOffer, DHCPRequest, DHCPAck

Remember DORA!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Several computers on your network are being assigned the wrong DNS server IP address. You visit them and verify that they are using DHCP. What might be a possible cause?

The DHCP server has issued all of the DNS server IP addresses in its pool

The DHCP server lease pool is exhausted

The DNS server is offline, so the DHCP server is redirecting traffic

Someone has setup another DHCP server

A

Someone has setup another DHCP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To communicate with the IP address 192.168.200.100, what gateway will your computer use?

It will use 192.168.200.15

It will use the Default Route

192.168.200.25, which is a static route in the computer routing table

A

It will use 192.168.200.15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To communicate with the IP address 192.168.100.6, what gateway will your computer use?

192.168.100.1, which is its default gateway
192.168.100.5, which is a static route
None. It is on the same LAN as your computer.
A

None. It is on the same LAN as your computer

17
Q

Which of the following is true about the types of routes a router can support?

Routers can support direct routes or static routes

Routers can support static routes , direct connected routes and dynamic routes

Routers can support static routes or dynamic routes but not both

Routers only support direct connected routes

A

Routers can support static routes , direct connected routes and dynamic routes

18
Q

Which of the following methods does RIP Version 1 support for authenticating route updates?

MD5 Passwords
SHA1 Passwords
Cisco Secret 7 passwords
No Authentication is supported

A

No Authentication is supported

19
Q

Fragmentation occurs at which layer(s) of the OSI model?

Fragmentation occurs at Layer 3 only
Fragmentation occurs at Layer 2 and Layer 4
Fragmentation occurs at Layer 2, Layer 3 and Layer 4

A

Fragmentation occurs at Layer 3 only

20
Q

If an attacker sent a fragmented packet containing “GET /etc/junker” followed by a packet containing “shadow” such that the word shadow overwrites the word junker when it is reassembled, what type of IDS evasion technique has the attacker employed?

Fragment Overwrite attack
Overlapping Fragment attack
Temporal IDS Evasion
Tiny fragment attack

A

Overlapping Fragment attack

21
Q

True or False: Your computer has an IP address of 192.168.100.5. When you access www.sans.org 192.168.100.5 will be recorded in their web server logs.

A

False

22
Q

Which of the following network IP addresses must use NAT to access resources on the Internet?

10.5.4.2
172.16.52.4
192.168.1.4
All of the above

A

All of the above

23
Q

Which of the following best describe how “TRACERT.EXE” identifies all the hops in a route?

  • It increments TTL values and receives ICMP Echo Responses
  • It increments TTL values and receives ICMP Time Exceeded in Transit messages
  • It increments RouteCount and receives ICMP Echo Responses
  • It increments RouteCount values and receives ICMP Time Exceeded in Transit messages
A

•It increments TTL values and receives ICMP Time Exceeded in Transit messages

24
Q

You want to configure your firewall to allow people inside your network to ping anyone, but not allow anyone outside your network to traceroute anything behind your firewall. How should you configure it?

  • Block all ICMP
  • Block all ICMP Echo Responses
  • Block all outbound ICMP
  • Block all outbound ICMP Time Exceeded in Transit
A

•Block all outbound ICMP Time Exceeded in Transit

25
Q

You are able to reach a website by its IP address, but not by its host name. You check your settings on your Windows 7 host by typing “IPCONFIG /ALL”. Your DNS IP address is correctly assigned. What is a logical thing to check?

  • PING the IP address of the DNS server to see if it is up
  • Temporarily stop your Antivirus software and try again
  • Check your routing table by typing “ROUTE PRINT”
  • Run a TRACERT to the IP address your trying to reach
A

•PING the IP address of the DNS server to see if it is up

26
Q

You are able to ping yourself at 192.168.0.7, your default gateway at 192.168.0.1, and devices on the Internet such as 4.2.2.2. You are also able to ping devices on the Internet by their DNS names such as “ping www.sans.org”. You can browse websites on your internal network, but you cannot browse websites on the Internet. Which of the following is a possible cause of the problem?

  • Your Default Gateway is not set properly
  • Your subnet mask is not set properly
  • Your browser’s proxy settings are not set properly
  • Your DNS server is not set properly
A

•Your browser’s proxy settings are not set properly

27
Q

The three packets (in order) responsible for establishing a connection over TCP are:

  • FIN, FIN-ACK, ACK
  • SYN, ACK, SYN-ACK
  • SYN, SYN-ACK, ACK
  • SYN, FIN, ACK
A

• SYN, SYN-ACK, ACK

28
Q
Valid TCP ports are within the range:
• 1-1024
• 0-65535
• 1-65635
• 0-1048576
A

• 0-65535

29
Q

Which of the following is NOT a good application for the UDP protocol?

  • Watching videos on Youtube.com
  • Listening to a live broadcast of the SecurityWeekly.com podcast
  • Single Packet In, Single Packet out applications like DNS queries & response
  • Managing a server over SSH
A

• Managing a server over SSH

30
Q

Select the following statement that is true:

  • Transferring data over UDP is more reliable than over TCP.
  • Transferring data over UDP is less reliable than over TCP.
  • Transferring data over UDP has the same reliability as over TCP.
  • It is inappropriate to compare the reliability of UDP and TCP regarding data transfer.
A

• Transferring data over UDP is less reliable than over TCP.

31
Q

Assuming nothing is cached anywhere, which of the following accurately describes how we get an answer from our DNS server when we look up the host ISC.SANS.ORG?

A) We ask one of 13 root servers. Then ask .ORG. Then ask SANS.ORG’s DNS. Then ask ISC.SANS.ORG’s DNS who answers the question.

B) We ask one of 13 root servers. Then ask .ORG. Then ask SANS.ORG’s DNS who answers the question.

C) We ask one of 13 root servers. Then ask .ORG who answers the question.

D) We ask the .ORG servers first. Then SANS.ORG who gives us the answer.

A

B) We ask one of 13 root servers. Then ask .ORG. Then ask SANS.ORG’s DNS who answers the question.

32
Q

Which DNS Resource Record type is your computer requesting when it wants to know the IPv4 address for isc.sans.org?

  • A record
  • IP record
  • MX record
  • NS record
A

• A record

33
Q

Your web browser issues a GET request for /example.html. Assuming that a web server is operating properly and it DOES NOT have a file called /example.html how will it respond?

  • A response code of 100
  • A response code of 200
  • A response code of 404
  • The server will not respond
A

• A response code of 404

34
Q

Which of the following status codes indicates that you do not have permission to access the requested URL?

  • 200
  • 403
  • 404
  • 500
A

• 403