Section 11 Network Design Flashcards

1
Q

Used to explain network communications between a host and remote device over a LAN or Wan.

A

OSI Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Represents the actual network cables and radio waves used to carry data over a network.

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describes how a connection is established, maintained, and transferred over the physical layer and uses physical addressing (MAC addresses).

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Uses logical address to route or switch information between hosts, the network, and the internet works.

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Manages and ensures transmission of the packets occurs from a host to a destination using either TCP or UDP.

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Manages the establishment, termination, and synchronization of a session over the network.

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Translates the information into a format that the sender and receiver both understand.

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layer from which the message is created, formed, and originated.

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attempt to overwhelm the limited switch memory set aside to store the MAC addresses for each part.

A

MAC Flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Occurs when an attacker masks their own MAC address to pretend they have the MAC address of another device.

A

MAC Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Occurs when an attacker attempts to gain physical access.

A

Physical Tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used to connect two or more networks to form as internetowrks.

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An ordered set of rules that a router uses to decide whether to permit or deny traffic based upon given characteristics.

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Focused on providing controlled access to publicly available servers that are hosted within your organizational networks.

A

De-Militarized Zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Specialized type of DMZ that is created for your partner organizations to access over a wide area network.

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Any host that accepts inbound connections from the internet.

A

Internet-facing Host

17
Q

Hosts or servers in the DMZ which are not configured with any services that run on the local network.

A

Bastion Hosts

18
Q

A hardened server that provides access to other hosts within the DMZ.

A

Jumpbox

19
Q

Security technique in which devices are scanned to determine its current state prior to being allowed access onto a given network.

A

Network Access Control (NAC)

20
Q

A piece of software that is installed on the device requesting access to the network.

A

Persistent Agents

21
Q

Uses a piece of software that scan the device remotely or is installed and subsequently removed after the scan.

A

Non-Persistent Agents

22
Q

Attacker configures their device to pretend it is a switch and uses it to negotiate a trunk link to break out of a VLAN.

A

Switch Spoofing

23
Q

Attacker adds on additional VLAN tag to create an outer and inner tag

A

Double Tagging

24
Q

Act of creating subnetworks logically through the manipulation of IP addresses

A

Subnetting

25
Q

Process of changing an IP address while it transmits across a router.

A

Network Address Translation

26
Q

Router keeps track of requests from internal hosts by assigning them random high number ports for each request.

A

Port Address Translation (PAT)

27
Q

Term used to describe devices that provide voice communications to users.

A

Telephony

28
Q

A device that could modulate digital information into an analog signal for transmission over a standard dial up phone line.

A

Modem

29
Q

Internal phone system used in large orgnaizaitons.

A

Public Branch Exchange (PBX)

30
Q

Digital phone service provided by software or hardware devices over a digital network.

A

Voice Over Internet Protocol (VOIP)