Networks and Telecommunications Flashcards

1
Q

What is the 7th Layer of the OSI (Open Systems Interconnection Model?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does is the Application layers function in the OSI Model?

A

User Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the 6th Layer in the OSI model?

A

Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the function of the Presentation layer in the OSI model?

A

Data format; encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the 5th Layer in the OSI Model?

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the function of the Session Layer of the OSI Model?

A

Process-to-process communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the 4th Layer of the OSI Model?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the function of the transport layer in the OSI model?

A

End-to-end communcation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the 3rd Layer in the OSI Model?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the function of the network layer in the OSI model?

A

Routing data; logical addressing; WAN delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the 2nd Layer in the OSI Model?

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the function of the data link layer in the OSI Model?

A

Physical addressing; LAN delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the 1st layer in the OSI Model?

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the function of the physical layer in the OSI Model?

A

Signaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of network connects systems over a large geographic area?

A

Wide area networks (WANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of networks provide network connectivity for computers located in the same geographic area?

A

Local area networks (LANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Is the internet open or closed network?

A

Open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Can the internet guarantee safety?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What allows you to be able to hide data in transit?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Can you develop your own private WAN?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What can you create over a WAN for extra secuirty/privacy?

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the WAN connectivity options?

A

Cable modem, Digital subscriber line (DSL), Fiber optics, Satellite, Dialup, Cellular 3G/4G/5G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Do systems on the same LAN protect themselves from each other?

A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the step between a computer and the router in a LAN?

A

A switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the most common LAN technology to use?

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What governs both the Physical and Data Link layers of the OSI Reference Model?

A

The Ethernet Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the Ethernet standard?

A

Defines how computers use Media Access Control (MAC) addresses to communicate with each other on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What contains a number of plugs, or ports, where you can connect Ethernet cables of different network systems?

A

Hubs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What governs the first and second layer of the OSI Reference Model?

A

The Ethernet Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What echos incoming packets to all ports?

A

Hubs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What device performs intelligent filtering?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What device knows the MAC address of the system connected to each port?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

When a switch receives a pack on the network what does it do with it?

A

Looks at the destination MAC address and send the packet only to the port where the destination is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are a collection of logically related network devices that are viewed as partitioned network segment?

A

Virtual LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What give administrators the ability to separate network segments without having to physically separate the network cabling?

A

Virtual LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What can be used to isolate logical groups of devices to reduce network traffic and increase security?

A

Virtual LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a four-byte (32-bit) address that uniquely identify every device on the network?

A

Internet Protocol V. 4 (IPv4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are 128 bits long, provide more unique device addresses and are more secure?

A

Internet Protocol v. 6 (IPv6) addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What allows each computer to get its configuration information dynamically from the network instead of manually?

A

Dynamic Host Configuration Protocol (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What provides a computer with an IPv4 address, subnet mask, and other essential communication information?

A

Dynamic Host Configuration Protocol (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What port is the File Transfer Protocol (FTP) Data transfer?

A

20

40
Q

What is Port 20?

A

The File Transfer Protocol (FTP) data transfer

41
Q

What is the port number for FTP control?

A

21

42
Q

What does port 21 represent?

A

FTP control

43
Q

What is the port number for Secure Shell (SSH)?

A

22

44
Q

What is port 22?

A

Secure Shell (SSH)

45
Q

What is the port number for Simple Mail Transfer Protocol (SMTP)?

A

25

46
Q

What does port 25 stand for?

A

Simple Mail Transfer Protocol (SMTP)

47
Q

What is the port number for the Domain Name System (DNS)?

A

53

48
Q

What is port 53?

A

DNS - Domain Name System

49
Q

What is port 80?

A

Hypertext Transport Protocol (HTTP)

50
Q

What is the port number for Hypertext Transport Protocol (HTTP)?

A

80

51
Q

What is the port number for the Post Office Protocol v3 (POP3)?

A

110

52
Q

What is port 110 used for?

A

Post Office Protocol v3 (POP3)

53
Q

What is the port number for Network Basic Input/Output System Session Service?

A

139

54
Q

What is port 139 used for?

A

Network Basic Input/Output System Session Service

55
Q

What port number is used for the Internet Message Access Protocol?

A

143

56
Q

What is port 143?

A

Internet Message Access Protocol

57
Q

What is the port number for HTTP over Secure Sockets Layer?

A

443

58
Q

What is port 443 used for?

A

HTTP over Secure Socket Layer

59
Q

What does Port 53 do?

A

It is how computers figure out what each other’s ID addresses are.

60
Q

What is port 989 (data), 990 (control) used for?

A

FTP over SSL/Transport Layer Security (TLS):(FTPS)

61
Q

What is Port 161?

A

Simple Network Management Protocol (SNMP)

62
Q

What is the management and control for IP?

A

ICMP

63
Q

What delivers messages between hosts about the health of the network?

A

ICMP

64
Q

What are the tools associated with (ICMP) Internet Control Message Protocol?

A

Ping sends a single packet to a target IP address (ICMP echo request). Traceroute uses ICMP echo request packets to identify the path that packets travel through a network.

65
Q

What can attackers use to create a denial of service (DoS) attack against a network

A

ICMP

66
Q

What is the act of gathering information about a network for use in a future attack?

A

Reconnaissance

67
Q

When an attacker taps the data cable to see all data passing through it.

A

Eavesdropping

68
Q

Flooding a network with traffic and shutting down a single point of failure.

A

DoS

69
Q

Uses multiple compromised systems to flood the network from many different directions

A

Distributed DoS (DDoS)

70
Q

Attempts to prevent telephone calls from being successfully initiated from some person or organization.

A

Telephony denial of service (TDoS)

71
Q

What are three basic security defense tools?

A

Firewalls. VPNs and remote access. Network access control (NAC)

72
Q

What contains the flow of traffic by preventing unauthorized network traffic from entering or leaving a particular portion of the network?

A

Firewall

73
Q

Rules that can limit traffic bandwidth from hosts, reducing the ability for any one host to flood a network.

A

Flood guard

74
Q

Firewalls can look at message addresses to determine whether a message is being sent around an unending loop (for example, from another form of flooding)

A

Loop protection

75
Q

Filtering rules enforce divisions between networks, keeping traffic from moving from one network to another

A

Network segmentation - VLANs

76
Q

Three firewall types?

A

Packet filtering, stateful inspection, application proxy.

77
Q

What are first firewalls that protect the internal network?

A

Border firewalls

78
Q

What is a server that is public facing to the internet, public server/web server, then place them in this place:

A

Screened subnet (or demilitarized zone (DMZ)) firewalls.

79
Q

Having border firewall, another firewalls and so on is known as

A

Multilayered firewalls

80
Q

Encompassing a variety of security tools into one solution is known as:

A

Unified threat management

81
Q

What filters web traffic by examining the Uniform Resource Locator (URL) as opposed to the IP address?

A

URL filter - Unified Threat Management

82
Q

The device looks at some or all network packet content to determine if the packet should be allowed to pass through

A

Content inspection - Unified Threat Management

83
Q

A specialized form of content inspection, the device looks at packet content for signs of malware

A

Malware inspection - Unified Threat Management

84
Q

Major VPN Technologies

A

Point-to-point Tunneling Protocol (PPTP), Secure Sockets Layer (SSL)/Transport Layer Security (TLS), Secure Socket Tunneling Protocol (SSTP), Internet Protocol Security (IPSec), Open VN

85
Q

What enables you to add more security requirements before allowing a device to connect to your network?

A

NAC

86
Q

What performs authentication and posture checking?

A

NAC

87
Q

What is the IEEE 802.1x standard governing how clients may interact with a NAC device to gain entry to the network.

A

NAC

88
Q

Securing Session Initiation Protocol (SIP) and Voice over IP (VoIP).

A

Patch all SIP/VoIP software and network component firmware, use virtual LANs (VLANs) to separate voice and video from other network use (i.e., workstations and printers), Enforce encrypted VPN use for all remote access (including SIP/VoIP), Require encrypted VPN for all voice or video calls using TLS or Secure Real-Time Transport Protocol (SRTP), Enforce strong authentication for all network users, Use firewalls to protect all SIP/VoIP devices and services, Harden all SIP/VoIP devices and software.

89
Q

What is a radio that sends and receives networking information over the air between wireless devices and the wired network?

A

Wireless access points (WAPs)

90
Q

Who can communicate with and attempt to connect to the network via the device?

A

Anyone with a wireless device who is within radio range

91
Q

Who can capture all data sent on that network if not encrypted?

A

Anyone within radio range of wireless network

92
Q

What are the wireless network security controls?

A

VPN over wireless, Wireless encryption, Service set identifier (SSID) broadcast, MAC address filtering.

93
Q

What is an insecure and flawed type of wireless encryption?

A

WEP

94
Q

When managing your own network what encryption level should you use?

A

WPA2, WPA3

95
Q

What can you not broadcast to anonymize yourself?

A

Service set identifier (SSID) broadcast

96
Q

What would you put in case someone broke into your wireless network to stop them from using it.

A

MAC address filtering

97
Q

Hardware techniques for security:

A

Antenna types, placement, power-level controls, captive portals, site surveys.

98
Q
A