Section 1 Flashcards

1
Q

Network protocol

A

Set of rules used to exchange information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Topology

A

architecture used to connect the network equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

explain token ring vs a ring or star network

A

token ring passes a “token” back and forth from one network device to the next ensuring an opportunity for each device to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are disadvantages of a token ring network

A

token pattern changes or device failure or disconnection will stop the token from circulating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what topology is most common in today’s LANs

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is one difference between a hub and a switch

A

hub broadcasts data to all devices on network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the OSI model

A

Developed by ISO in 1984, contains 7 layers as a guide for connecting different types of networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the three basic steps in isolating a network problem

A
  • is the connection to the machine down?
  • is the network down?
  • is a service on a specific machine down?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

which OSI layer uses binary transmission

A

physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

which OSI layer conains the MAC address

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

which OSI layer defines where routing occurs and uses IP addresses

A

networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

which OSI layer provides flow control and enables TCP/UDP connections

A

tranpsort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

which OSI layer controls establishment management and termination of sessions

A

session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

which OSI layer handles formatting and structuring of data

A

presentation layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

which OSI layer presents networking services to end users

A

application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is encapuslation

A

the adding of data as it moves across OSI layers (i.e. header information)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

bits are what OSI layer

A

physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

frames are what OSI layer

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

packets are what OSI layer

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

segments are what OSI layer

A

transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

in what format is information on an ethernet network exchanged

A

frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what cmd command would you use to get the mac address of a machine

A

ipconfig/all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

difference between a router and a switch

A

router moves network traffic, switch connects devices on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what is stateful packet inspection

A

a firewall process that inspects incoming packets to ensure they correspond to an outgoing request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what is the process that assigns private IP addresses to individual devices on a private network

A

Network Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what is the process by which NAT translates the home network’s private IP to the single public address provided by the ISP

A

overloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what ethernet protocol verifies communication between two ethernet devices have been 3established

A

link integrity test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what is a cross connected port

A

allows transmit and receive pairs in a RJ-45 connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

which command uses Internet control message protocol to verify networking devices are communicating

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

what cmd command allows you to see devices on the network, see your own information, share, and stop network services

A

net

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which OSI layer combines messages or segments into packets

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which OSI layer is considered the media access control layer?

A

data layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which OSI layer is responsible for adding a header that includes routing information?

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which OSI layer is responsible for data compression and encryption?

A

presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Expand the acronym OUI. Where is the OUI used?

A

OUI stands for organizationally unique identifier. The OUI is found in the first 3 bytes of the MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Expand the acronym CSMA/CD. What protocol uses CSMA/CD

A

CSMA/CD stands for carrier sense multiple access with collision detection, and Ethernet uses CSMA/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What does the OUI represent?

A

The OUI identifies the manufacturer of the network device. First 3 bytes of mac address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

a port on a hub or switch that can be used as either a cross-connected or straight-through input. It is used to connect multiple hubs/switches together.

A

uplink port

39
Q

What do the link lights on a hub indicate

A

whether the transmit and receive pairs of the cable are properly aligned

40
Q

What command would you use to ping 10.3.9.42 indefinitely

A

ping -t 10.3.9.42

41
Q

OSI layer that handles error recovery, flow control (synchronization), and sequencing

A

data layer

42
Q

OSI layer accepts outgoing messages and combines messages or segments into packets, adding a header that includes routing information

A

network layer

43
Q

OSI layer that is concerned with message integrity between source and destination

A

transport

44
Q

OSI Layer provides the control functions necessary to establish, manage, and terminate the connections

A

session

45
Q

OSI Layer accepts and structures the messages for the application

A

presentation

46
Q

IEEE

A

Institute of Electrical and Electronics Engineers - standards setting body

47
Q

phsyical input/output interfaces to networking hardware

A

ports

48
Q

OSI

A

Open Systems Interconnection

49
Q

format that provides grouping of information for transmission

A

frame

50
Q

the portion of an IP address that defines which network an IP packet is originating from or being delivered to

A

network number

51
Q

The portion of an IP address that defines the location of a networking device connected to the network;

A

host number/address

52
Q

verifies that messages are being delivered

A

ICMP internet control message protocol

53
Q

a way of providing access to a network by giving each network device a fixed time interval to access the network.

A

deterministic

54
Q

The minimum size of the data payload in an Ethernet frame is

A

46 bytes

55
Q

what are RX and TX in ifconfig

A

Packets and errors received and Packets and errors transmitted

56
Q

what network command used on linux and is used to configure the kernel network interfaces

A

ifconfig

57
Q

which network command displays current route tables on a host

A

route

58
Q

which network command displays current route tables on a host

A

route

59
Q

which network command displays packets being transmitted over the network

A

tcpdump

60
Q

which network command scans networks to find hosts and open ports, and helps determine what is deployed on a network

A

nmap

61
Q

which network command displays information about a user or users on a remote system

A

finger

62
Q

Which command should be run in Linux to ping an IP address 192.168.0.15 eight times before it automatically terminates the process?

A

ping -c 8

63
Q

what is the difference between a ping flood and a smurf attack`

A

ping flood is forged source packets from one computer, smurf specifies the victim’s computer as source address on network

64
Q

at what OSI layer/s does a packet filter operate on

A

Transport and Network

65
Q

a device that operates as a middleman between two or more systems to help conceal the true identity of the client and server

A

circuit-level gateway

66
Q

allows a firewall to identify traffic as conversational and automatically create temporary firewall rules to permit the response traffic to flow back to the sender

A

stateful inspection

67
Q

what layer/s does a stateful firewall operate at

A

Session, Transport, Network

68
Q

what is tap mode

A

attach to a network in listening mode only

69
Q

802.3 Ethernet and 802.11 Wi-Fi are at what OSI layer

A

Data link

70
Q

a radio jammer attack occurs at which OSI layer

A

1

71
Q

ARP poisoning is on which OSI layer

A

2

72
Q

this attack sends special ethernet frames over the network to overwhelm the switch’s internal traffic handling database

A

ARP Poisoning

73
Q

attack which sends pings to a arge number of IP addresses to detect which computers are online and may, therefore, be susceptible to other attacks.

A

ping sweep

74
Q

attack which impersonates a computer’s IP or MAC address

A

spoofing

75
Q

which OSI layer allows computers to differentiate between the connections within a service on the same host

A

Session

76
Q

remote procedure call (RPC) operates at what layer

A

Session

77
Q

encoding and decryption of end user data occurs at which layer

A

Presentation

78
Q

TLS and SSL operate at which layer

A

Presentation

79
Q

man in the middle attacks occur at which layer

A

Presentation

80
Q

http is at which layer

A

application

81
Q

vulnerability scanners work best at what level

A

application

82
Q

vlan hopping is a vulnerability at which layer

A

data link

83
Q

AES-256 is a common example of what kind of encryption

A

symmetric encryption

84
Q

https/TLS is a common example of what kind of encryption

A

asymmetric encryption

85
Q

creates a secure channel over the internet between a client computer and a server by exchanging a public key in the form of a certificate.

A

TLS

86
Q

gives WPA a significant security boost by generating a new 128-bit encryption key for every packet sent on the network.

A

temporal key integrity protocol (TKIP)

87
Q

provides network access control at the port level, whether physical or wireless, and it provides an authentication standard based on the Extensible Authentication Protocol (EAP)

A

802.1x security standard

88
Q

what is AAA

A

authetnication, authorization, and accounting

89
Q

which command defines the path a data packet takes in a network

A

route

90
Q

which command lets you find an ip from a domain name

A

nslookup

91
Q

which command displays info about active ports

A

netstat

92
Q

a switch operates at what OSI layer

A

Data link and network

93
Q

a modem operates at what OSI layer/s

A

physical and data link