Technology & Tools . Flashcards

1
Q

What are the 7 layers of the OSI Model?

A
  1. Application
  2. Presentation
  3. Session
  4. Transport
  5. Network
  6. Data Link
  7. Physical

Verbiage To Remember (Going Down)
- All People Seem To Need Data Processing.

Verbiage To Remember (Going Up)
- Please Do Not Transport Santa’s Presentation Appliances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This layer of the OSI Model…

Encodes data into bits for transmission over wire, fiber, or radio.

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This layer of the OSI Model…

Formats packets for transmission; Ethernet, ARP, MAC addresses

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This layer of the OSI Model…

Routes packets over the network; IP, ICMP, BGP, IPSec, NAT.

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This layer of the OSI Model…

Managed Connection integrity; TCP, UDP, SSL, TLS.

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This layer of the OSI Model…

Establishes, maintains, and terminates sessions.

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This layer of the OSI Model…

Transforms user-friendly data into machine-friendly data; encryption.

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This layer of the OSI Model…

Serves as the point of integration for user applications with the network.

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

______ is a connection-oriented protocol, while ______ is a connectionless protocol that does not guarantee delivery.

A
  • TCP

- UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_______ converts between IP addresses and domain names.

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_______ converts between MAC addresses and IP addresses.

A

ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

______ converts between public and private IP addresses.

A

NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Wireless networks should be secured using WPA or WPA2 encryption, not WEP (T/F)?

A

True!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ _______ distribute connection requests among many identical servers.

A

Load balancers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_______ ________ generally work at layer 2 and connect directly to endpoints or other switches.

A

Network Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Switches can create _________ to further segment internal networks at layer 2.

A

Virtual LANs (VLANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PORT(S)…

20, 21

A

FTP

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

PORT(S)…

22

A

SSH

SECURE SHELL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

PORT(S)…

23

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

PORT(S)…

25

A

SMTP

Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

PORT(S)…

53

A

DNS

Domain Name Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

PORT(S)…

80

A

HTTP

Hypertext Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PORT(S)…

110

A

POP3

Post Office Protocol 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

PORT(S)…

123

A

NTP

Network Time Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

PORT(S)…

135, 137-139, 445

A

Windows File Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

PORT(S)…

143

A

IMAP

Internet Message Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

PORT(S)…

161/162

A

SNMP

Simple Network Management Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

PORT(S)…

443

A

HTTPS

Hypertext Transfer Protocol Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

PORT(S)…

1433/1434

A

SQL Server

Structured Query Language Server

30
Q

PORT(S)…

1521

A

Oracle

31
Q

PORT(S)…

1720

A

H.323

32
Q

PORT(S)…

1723

A

PPTP

Point-to-Point Tunneling Protocol

33
Q

PORT(S)…

3389

A

RDP

Remote Desktop Protocol

34
Q

PORT(S)…

9100

A

HP JetDirrect Printing

35
Q

______ generally work at layer 3 and connect networks to each other.

A

Routers

36
Q

_______ are the primary network security control used to separate networks of differing security levels.

A

Firewalls

37
Q

TLS should be used to secure network communications because SSL is not secure (T/F) ?

A

True!

38
Q

Most Virtual Private Networks (VPNs) use either ______ or _______ .

A

TLS or IPsec

39
Q

IPsec uses Authentication ________ to provide authentication, integrity, and nonrepudiation and _________ Security _________ to provide confidentiality.

A
  • Headers

- Encapsulating Security Payload

40
Q

______ tunnel VPNs only send traffic destined for the corporate network through VPN while _____ tunnel VPNs send all traffic through the VPN.

A
  • Split

- Full

41
Q

Network admission Control (NAC) systems screen devices before allowing them to connect to the network (T/F)?

A

True!

  • This screening may include both user authentication and device health checking.
42
Q

This tool…

Monitors a host or network for signs of intrusion and report to administrators.

A

Intrusion Detection System

43
Q

This tool…

Monitor a host or network for signs of intrusion and attempt to block malicious traffic automatically.

A

Intrusion Prevention Systems

44
Q

This tool…

Aggregates and correlates security information received from other systems.

A

Security Information & Event Management System

45
Q

This tool…

Restricts network traffic to authorized connections.

A

Firewall

46
Q

This tool…

Limits applications to those on an approved list.

A

Application Whitelisting

47
Q

This tool…

Blocks applications on an unapproved list.

A

Application Blacklisting

48
Q

This tool…

Provides a safe space to run potentially malicious code.

A

Sandbox

49
Q

This tool…

Is a system that serves as a decoy to attract attackers.

A

Honeypot

50
Q

This tool…

Is unused networks designed to capture probing traffic.

A

Honeynet

51
Q

This tool…

Provides a central aggregation point for VPN connections.

A

VPN Concentrator

52
Q

This tool…

Makes requests to other servers on behalf of an end user, providing anonymization and performance enhancement.

A

Proxy Server

53
Q

This tool…

Blocks the exfiltration of sensitive information from an organization.

A

Data Loss Prevention

54
Q

This tool…

Screens inbound messages for malicious content.

A

Mail Gateway

55
Q

Security professionals use a variety of command-line tools to assist in their work (T/F)?

A

True!

56
Q

This command-line tool…

Verifies connectivity to a remote networked system and is Windows based.

A

Ping

57
Q

This command-line tool…

Lists open network connections and listening ports on a system.

A

Netstat

58
Q

This command-line tool…

Determined the network path between two systems.

A

Tracert

59
Q

This command-line tool…

Performs DNS queries.

A

nslookup

60
Q

This command-line tool…

Performs MAC address queries.

A

arp

61
Q

This command-line tool…

Queries network configuration information on a Linux/Mac system.

A

ifconfig

62
Q

This command-line tool…

Scans for open network ports on a remote system.

A

nmap

63
Q

This command-line tool…

Reads and writes traffic to/from network communications.

A

netcat

64
Q

These two types of models allows users to mix personal and business use?

A
  • Bring Your Own Device (BYOD)

- Corporate Owned, Personally Enabled (COPE)

65
Q

Companies should use _______ _______ ________ (MDM) tools you enforce a variety of mobile security controls, such as:

  • Restricting applications
  • Remote wiping off lost/stolen devices
  • Geolocation and geofencing services
  • Screen locking and password/ PIN requirements
  • Full device encryption
A

Mobile Device Management

66
Q

Telnet, HTTP, LDAP, and FTP are secure protocols (T/F)?

A

False!

  • They are insecure.
67
Q

SSH, HTTPS, LDAPS, and FTPS or SFTP are insecure protocols (T/F)?

A

False!

  • They are secure.
68
Q

Data Loss Prevention can be used to secure mail gateways (T/F)?

A

True!

With DLP, outgoing e-mails can be scanned to ensure they don’t contain any confidential or proprietary information.

69
Q

What do spam filters prevent?

A

They prevent unsolicited e-mail messages from reaching users’ mailboxes.

70
Q

What does configuring server-to-server encryption do on the mail gateway?

A

Allows for any mail message sent from the internal network to external services located on the Internet to be encrypted.
** This ensures the message contents aren’t transmitted as plain text.

71
Q

Which are the CLI commands that are used exclusively with Linux? (Choose Three)

  • netstat
  • tcpdump
  • arp
  • dig
  • ifconfig
A
  • tcpdump
  • dig
  • ifconfig
72
Q

Which technology allows users to use the same identification data to gain access to network resources across multiple different enterprises?

A. Trusted OS
B. Federation
C. RADIUS
D. Certificate Authority

A

B. Federation

aka Federated Identity Management (FIM)