Sybex Chp 11 Flashcards

1
Q

This layer of the OSI contains the device drivers that tell the protocol how to employ the hardware for the transmission and reception of bits.

A

Layer 1 - Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ARP resolves __________ into __________

A

ARP resolved IP Addresses into MAC Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the concern with firewalls and non-IP protocols on private networks?

A

Firewalls may not be able to inspect the packet header, address, or payload content of non-IP protocols. The firewalls must be configured to allow all or deny all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List the example(s) of Distant Vector Protocols.

OSPF
RIP
IGRP
BGP

A

The following are Distant Vector Protocols:
RIP
IGRP
BGP

OSPF is a Link State Routing Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This layer of OSI provides segmentation and sequencing.

A

Transport Layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This layer of OSI has half-duplex, full-duplex, and sinplex

A

Session Layer 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In the OSI Layer 7, is the user application (ex: MS Word) loaded into this layer?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the TCP Model and OSI Model mapping?

A

TCP Application Layer has OSI layers 7,6,5

TCP Transport Layer has OSI Layer 4 (Transport)

TCP Internet Layer has OSI Layer 3 (Network)

TCP Link Layer has OSO layers 2,1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protocols used to establish VPNs:

A

PPTP - IP only
L2F - encapsulate any LAN protocol
L2TP - encapsulate any LAN protocol
IPSec - IP only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True / False

UDP is half-duplex

A

False

UDP is Simplex Connectionless

TCP is Full-Duplex Connection-oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True / False

A TCP Wrapper serves as a basic firewall.

A

True

A TCP Wrapper serves as a basic firewall because it restricts access to ports and resources based on USER IDs or SYSTEM IDs.

TCP Wrappers is a form of port-based access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True / False

TCP has sequence numbers

A

True

TCP uses sequence numbers to rebuild original communication by reordering received segments using the sequence number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name the TCP Flags in order

A

“Unskilled Attackers Pester Real Security Folk”

URG
ACK
PSH
RST
SYN
FIN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ping of Death does what?

A

Ping of Death sends a malformed ping larger than 65,535 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Smurf Attack does what?

A

Smurf attack generates generate large amounts of traffic by spoofing broadcast pings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True / False

ARP uses caching while RARP uses broadcasting.

A

False

Both ARP and RARP use caching and broadcasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What OSI layer does Fiber Channel over Ethernet (FCoE) operate?

A

FCoE - Network Layer 3

  • used for network attached storage
  • operates at 10 Gbps
  • used to encapsulate Fiber Channel over Ethernet

iSCSI is considered a low-cost alternative

18
Q

What is Software Defined Networking?

A

SDN aims at separating the infrastructure layer from the control layer

mix and match hardware - centralized administration

-network virtualization

19
Q

What is Content Distribution Networks?

A

Collection of resource services deployed in numerous data centers across the Internet in order to provide low latency, high performance, and high availability of the hosted content.

20
Q

What is the difference between wireless infrastructure mode and wireless ad-hoc mode?

A

Ad hoc Mode means that two wireless devices can communicate without a centralized control authority (w/o an AP)

Infrastructure Mode means that wireless devices require an AP to communicate. This mode has the following:

Stand-alone: APs connected to each other (like a hub) but not to a wired connection.

Wired Extension: AP acts like a connection point to the wired network

Enterprise Extended: allows for wired roaming across multiple APs.

21
Q

Wireless security

A

SSID should be changed to something unique

SSID broadcasting should be disabled

Treat wireless as remote access (802.1X)

Treat wireless as external access (Separate wireless from wired with a firewall)

Treat wireless as an entry point for attackers (use IDS)

Require all wireless communications to be encrypted

22
Q

WPA pass-phrases are recommended to be how long?

A

14 characters or more

23
Q

Wireless omidirectional antennas should point what direction?

A

Up

Directional antennas should point in whatever direction you want.

24
Q

What is a wireless captive portal?

A

Authentication technique that redirects newly connected wireless web clients to a portal page (input logon creds, privacy policy, etc.)

25
Q

Security aspect of Network Access Control

A
  1. 1X is not enough
  2. preadmission philosophy requires clients to be fully patched / AV etc before it is allowed to connect to the network
  3. postadmission philosophy allows or denies access based on user activity, which is a predefined authorization matrix
26
Q

True or False

Firewalls can block viruses or malicious code

A

False

27
Q

True or False

Firewalls can prevent attacks by malicious users already behind the firewall

A

False

28
Q

True or False

Static Packet-Filtering Firewalls filters traffic by examining data from a messag eheader

A

True - these are at OSI Layer 3

29
Q

True or False

Application-level gateway firewalls are known as second-generation firewalls

A

True

These operate at OSI Layer 7

30
Q

True or False

Circuit-level gateway firewalls are known as second-generation firewalls

A

True

These operate at OSI Layer 5

31
Q

True or False

Stateful inspection firewalls are known as second-generation firewalls

A

False

Stateful inspection firewalls are third-generation firewalls

Operate at layer 3 and 4 of OSI

32
Q

Collision domains are divided layer __________

A

Collision Domains are divided by Layer 2

Broadcasts Domains are divided by Layer 3

33
Q

Broadcast domains are divided layer __________

A

Broadcasts Domains are divided by Layer 3

Collision Domains are divided by Layer 2

34
Q

Systems on either side of a repeater, concentrator, or amplifier are part of:

(same / different) Collision Domain
(same / different) Broadcast Domain

A

Same Collision and Broadcast Domains

35
Q

Systems on either side of a hub are part of:

(same / different) Collision Domain
(same / different) Broadcast Domain

A

Same Collision and Broadcast Domains

36
Q

Systems on either side of a bridge are part of:

(same / different) Collision Domain
(same / different) Broadcast Domain

A

same Broadcast Domain

different Collision Domain

37
Q

Systems on either side of a Layer 2 Switch or Brouter are part of:

(same / different) Collision Domain
(same / different) Broadcast Domain

A

same Broadcast Domain

different Collision Domain

38
Q

Systems on either side of a Layer 3 Switch or Brouter are part of:

(same / different) Collision Domain
(same / different) Broadcast Domain

A

different Broadcast Domain

different Collision Domain

39
Q

Systems on either side of a Router are part of:

(same / different) Collision Domain
(same / different) Broadcast Domain

A

different Broadcast Domain

different Collision Domain

40
Q

Systems on either side of a proxy are part of:

(same / different) Collision Domain
(same / different) Broadcast Domain

A

different Broadcast Domain

different Collision Domain

41
Q

True / False

Communications over a cell provider’s network are secure

A

False

Cell Towers can be used for man-in-the-middle attacks

Cell conversations can be sniffed

All traffic is unencrypted at some point to be recorded (by law) - so pre-encrypt your traffic before sending it out on a telcom link.