Technology & Tools . Flashcards

1
Q

What are the 7 layers of the OSI Model?

A
  1. Application
  2. Presentation
  3. Session
  4. Transport
  5. Network
  6. Data Link
  7. Physical

Verbiage To Remember (Going Down)
- All People Seem To Need Data Processing.

Verbiage To Remember (Going Up)
- Please Do Not Transport Santa’s Presentation Appliances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This layer of the OSI Model…

Encodes data into bits for transmission over wire, fiber, or radio.

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This layer of the OSI Model…

Formats packets for transmission; Ethernet, ARP, MAC addresses

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This layer of the OSI Model…

Routes packets over the network; IP, ICMP, BGP, IPSec, NAT.

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This layer of the OSI Model…

Managed Connection integrity; TCP, UDP, SSL, TLS.

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This layer of the OSI Model…

Establishes, maintains, and terminates sessions.

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This layer of the OSI Model…

Transforms user-friendly data into machine-friendly data; encryption.

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This layer of the OSI Model…

Serves as the point of integration for user applications with the network.

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

______ is a connection-oriented protocol, while ______ is a connectionless protocol that does not guarantee delivery.

A
  • TCP

- UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_______ converts between IP addresses and domain names.

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_______ converts between MAC addresses and IP addresses.

A

ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

______ converts between public and private IP addresses.

A

NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Wireless networks should be secured using WPA or WPA2 encryption, not WEP (T/F)?

A

True!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ _______ distribute connection requests among many identical servers.

A

Load balancers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_______ ________ generally work at layer 2 and connect directly to endpoints or other switches.

A

Network Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Switches can create _________ to further segment internal networks at layer 2.

A

Virtual LANs (VLANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PORT(S)…

20, 21

A

FTP

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

PORT(S)…

22

A

SSH

SECURE SHELL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

PORT(S)…

23

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

PORT(S)…

25

A

SMTP

Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

PORT(S)…

53

A

DNS

Domain Name Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

PORT(S)…

80

A

HTTP

Hypertext Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PORT(S)…

110

A

POP3

Post Office Protocol 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

PORT(S)…

123

A

NTP

Network Time Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
PORT(S)... 135, 137-139, 445
Windows File Sharing
26
PORT(S)... 143
IMAP | Internet Message Access Protocol
27
PORT(S)... 161/162
SNMP | Simple Network Management Protocol
28
PORT(S)... 443
HTTPS Hypertext Transfer Protocol Secure
29
PORT(S)... 1433/1434
SQL Server | Structured Query Language Server
30
PORT(S)... 1521
Oracle
31
PORT(S)... 1720
H.323
32
PORT(S)... 1723
PPTP Point-to-Point Tunneling Protocol
33
PORT(S)... 3389
RDP | Remote Desktop Protocol
34
PORT(S)... 9100
HP JetDirrect Printing
35
______ generally work at layer 3 and connect networks to each other.
Routers
36
_______ are the primary network security control used to separate networks of differing security levels.
Firewalls
37
TLS should be used to secure network communications because SSL is not secure (T/F) ?
True!
38
Most Virtual Private Networks (VPNs) use either ______ or _______ .
TLS or IPsec
39
IPsec uses Authentication ________ to provide authentication, integrity, and nonrepudiation and _________ Security _________ to provide confidentiality.
- Headers | - Encapsulating Security Payload
40
______ tunnel VPNs only send traffic destined for the corporate network through VPN while _____ tunnel VPNs send all traffic through the VPN.
- Split | - Full
41
Network admission Control (NAC) systems screen devices before allowing them to connect to the network (T/F)?
True! * This screening may include both user authentication and device health checking.
42
This tool... Monitors a host or network for signs of intrusion and report to administrators.
Intrusion Detection System
43
This tool... Monitor a host or network for signs of intrusion and attempt to block malicious traffic automatically.
Intrusion Prevention Systems
44
This tool... Aggregates and correlates security information received from other systems.
Security Information & Event Management System
45
This tool... Restricts network traffic to authorized connections.
Firewall
46
This tool... Limits applications to those on an approved list.
Application Whitelisting
47
This tool... Blocks applications on an unapproved list.
Application Blacklisting
48
This tool... Provides a safe space to run potentially malicious code.
Sandbox
49
This tool... Is a system that serves as a decoy to attract attackers.
Honeypot
50
This tool... Is unused networks designed to capture probing traffic.
Honeynet
51
This tool... Provides a central aggregation point for VPN connections.
VPN Concentrator
52
This tool... Makes requests to other servers on behalf of an end user, providing anonymization and performance enhancement.
Proxy Server
53
This tool... Blocks the exfiltration of sensitive information from an organization.
Data Loss Prevention
54
This tool... Screens inbound messages for malicious content.
Mail Gateway
55
Security professionals use a variety of command-line tools to assist in their work (T/F)?
True!
56
This command-line tool... Verifies connectivity to a remote networked system and is Windows based.
Ping
57
This command-line tool... Lists open network connections and listening ports on a system.
Netstat
58
This command-line tool... Determined the network path between two systems.
Tracert
59
This command-line tool... Performs DNS queries.
nslookup
60
This command-line tool... Performs MAC address queries.
arp
61
This command-line tool... Queries network configuration information on a Linux/Mac system.
ifconfig
62
This command-line tool... Scans for open network ports on a remote system.
nmap
63
This command-line tool... Reads and writes traffic to/from network communications.
netcat
64
These two types of models allows users to mix personal and business use?
- Bring Your Own Device (BYOD) | - Corporate Owned, Personally Enabled (COPE)
65
Companies should use _______ _______ ________ (MDM) tools you enforce a variety of mobile security controls, such as: - Restricting applications - Remote wiping off lost/stolen devices - Geolocation and geofencing services - Screen locking and password/ PIN requirements - Full device encryption
Mobile Device Management
66
Telnet, HTTP, LDAP, and FTP are secure protocols (T/F)?
False! - They are insecure.
67
SSH, HTTPS, LDAPS, and FTPS or SFTP are insecure protocols (T/F)?
False! - They are secure.
68
Data Loss Prevention can be used to secure mail gateways (T/F)?
True! With DLP, outgoing e-mails can be scanned to ensure they don't contain any confidential or proprietary information.
69
What do spam filters prevent?
They prevent unsolicited e-mail messages from reaching users' mailboxes.
70
What does configuring server-to-server encryption do on the mail gateway?
Allows for any mail message sent from the internal network to external services located on the Internet to be encrypted. ** This ensures the message contents aren't transmitted as plain text.
71
Which are the CLI commands that are used exclusively with Linux? (Choose Three) - netstat - tcpdump - arp - dig - ifconfig
- tcpdump - dig - ifconfig
72
Which technology allows users to use the same identification data to gain access to network resources across multiple different enterprises? A. Trusted OS B. Federation C. RADIUS D. Certificate Authority
B. Federation aka Federated Identity Management (FIM)