Udemy-Domain 4 Flashcards

1
Q

the 3 types of network communication are:

A
  1. Simplex (one way)
  2. Half-Duplex (one way at a time, reciprocating)
  3. Full-Duplex (simultaneous two-way)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ networks have one channel, whereas ___ networks have multiple channels that can be used simultaneously

A

Baseband; Broadband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the ___ is a global collection of peered WAN networks,
the ___ is an organizations private network,
the ___ is a connection between private networks

A

Internet;
Intranet;
Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

data is normally sent over the internet using ___ switching, but ___ switching is a way to guarantee full bandwidth and no delays due to routing

A

packet; circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ gives specific internet traffic priority so that it will be close to real-time (like VOIP)

A

QoS (Quality of Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a ___ is used for supporting mobile customers across a number of wireless LAN’s, satellite coverage areas, etc.

A

GAN (Global Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

wire and cable types belong to OSI layer ___

A

1 (Physical)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

network topologies belong to OSI layer ___

A

1 (Physical)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

threats related to EMI, sniffing, interference, etc. belong to OSI layer ___

A

1 (Physical)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the ___ OSI layer connects nodes in the same network

A

2 (Data Link)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

LLC (Logic Link Detection) error detection belongs to OSI layer ___

A

2 (Data Link)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the first ___ bits of a MAC address identify the manufacturer (UOI - Unique Organization Identifier)

A

24 (6 hexadecimal characters)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a devices MAC address is also called its ___

A

BIA (Burned In Address)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the last ___ bits of a MAC address identify the unique device (UAA - Universally Administered Address)

A

24 or 40

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP (Address Resolution Protocol) belongs to OSI layer ___

A

2 (Data Link) and 3 (Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CSMA (Carrier Sense Multiple Access) belongs to OSI layer ___ (CD for ethernet and CA for wireless)

A

2 (Data Link)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Token Passing belongs to OSI layer ___

A

2 (Data Link)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

most protocols that start with “I” (except IMAP) like IP, ICMP, IPSEC… belong to OSI layer ___

A

3 (Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a large number of protocol attacks (ping floods, smurf, spoofs, etc.) occur on OSI layer ___

A

3 (Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SSL/TLS operate from OSI layer ___ through layer ___

A

4 (Transport); 7 (Application)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

UDP (User Datagram Protocol) flood attacks are called ___ and occur on OSI layer ___

A

Fraggle; 4 (Transport)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

TCP SYN attacks, or SYN floods occur on OSI layer ___

A

4 (Transport)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fraggle attacks are often more successful than Smurf attacks because

A

many networks block ICMP but not UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

VIOP and other real-time applications use UDP because ___

A

they cannot afford the overhead of delivery confirmation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

the 9 control bit flags in TCP function on OSI layer ___

A

4 (Transport)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

establishing (as well as maintaining and terminating) connections between applications is done in OSI layer ___

A

5 (Session);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

the only OSI layer with no protocols is layer ___

A

6 (Presentation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

formatting, compressing and file encryption are done on OSI layer ___

A

6 (Presentation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

data is actually presented to the user on OSI layer ___

A

7 (Application)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

protocols such at HTTP, HTTPS, FTP, SNMP, IMAP and POP all function on OSI layer ___

A

7 (Application)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

non-repudiation, certificates, application proxies, deep packet inspection, content inspection and AD (Active Directory) integration all happen on OSI layer ___

A

7 (Application)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Viruses, worms, trojans, buffer overflow and application/OS vulnerability attacks all happen on OSI layers ___ through ___

A

5 (Session); 7 (Application)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

in the TCP/IP model, the ___ layer includes all the communication within a single network segment, which corresponds to OSI layer(s): ___

A

Link; 1 (Physical) and 2 (Data Link)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

in the TCP/IP model, the ___ layer includes all the communication between independent networks, which corresponds to OSI layer(s): ___

A

Internet; 3 (Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

in the TCP/IP model, the ___ layer includes all host-to-host communication, which corresponds to OSI layer(s): ___

A

Transport; 4 (Transport)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

in the TCP/IP model, the ___ layer includes all processing of data exchanges for applications, which corresponds to OSI layer(s): ___

A

Application; 5 (Session), 6 (Presentation) and 7 (Application)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

the process of sending and receiving packets of data, adding headers to packets, etc. are in the ___ layer of the TCP/IP model

A

Link and Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

the process of routing packets to their final destination and resolving addresses is on the ___ layer of the TCP/IP model

A

Internetwork

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

the process of establishing data channels and port addressing for applications is on the ___ layer of the TCP/IP model

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

the protocols used by applications (user protocols like HTTP, IMAP, etc.) as well as firewalls operate on the ___ layer of the TCP/IP model

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

an IP address and a Port taken together are called a ___, and one difference between TCP and UDP is that ___

A

socket; TCP uses a pair of sockets (source and destination)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

since IPv6 requires a 64 bit MAC address, when a device has only 48 bits the characters ___ are added to the end

A

FF:FE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

IPv4 only allowed for ___ individual addresses

A

4 billion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

to capture all unicast (client/server) traffic, configure a NIC in ___ mode and configure the switch port being used as a ___

A

promiscuous; span port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

in ___ traffic, data is being sent to a pre-defined list of clients

A

multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Broadcast traffic is sent to ___, if it is layer 3 (IP address) or layer 2 (MAC address) broadcast then ___, and a ___ broadcast sends to everyone logically connected (i.e. VLAN) in a network (the broadcast ID)

A

everybody in the network;
routers will not pass it on so it won’t go past the Node;
directed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

each number in an IPv4 address (separated by dots) represents ___

A

a 32 bit binary octet

48
Q

Private IP addresses include the entire range of ___, ___ and ___ through ___

A

10.x.x.x (Class A); 192.168.x.x (Class C); 172.16.x.x - 172.31.x.x (Class B)

49
Q

the IP address ___ is reserved for loopback IP’s, on your PC only

A

127.0.0.0/8 (127.x.x.x)

50
Q

the IP address ___ is reserved for Link-Local, if there is a problem connecting with a router/switch

A

169.254.0.0/16 (169.254.x.x)

51
Q

the IP address ___ is reserved for Broadcast traffic

A

255.255.255.255

52
Q

NAT can be ___ (unchanging one-to-one), ___ (one-to-one from a pool of available public addresses) or ___ (One-to-many using ports)

A

Static NAT; Dynamic NAT; PAT/NAT Overload

53
Q

the ___ in an IPv4 header is designed to prevent routing loops

A

TTL (Time To Live)

54
Q

the ___ in an IPv4 header identifies the maximum size a packet can be, normally ___ bytes in Ethernet usage

A

MTU (Maximum Transmission Unit); 1500

55
Q

what was called “Quality of Service” in IPv4 has been renamed and split between ___ and ___ in IPv6

A

Traffic Class; Flow Label (QoS management)

56
Q

the Time To Live (TTL) in IPv4 has been renamed in IPv6 to ___

A

Hop Limit

57
Q

ARP poisoning can occur because the ARP request goes out ___ and any device on the network can reply. to avoid this, ARP entries can be hard-coded, or ___ is used by diskless workstations

A

Multicast; RARP (Reverse Address Resolution Protocol) - (the workstation sends it’s MAC address, asking for an IP address)

58
Q

downloading the OS for diskless workstations, called ___, uses the ___ protocol and port ___

A

Bootstrapping; TFTP; 69

59
Q

the ___ protocol is used for saving router configuration

A

TFTP

60
Q

the Mail ___ formats a message using SMTP and sends it to the Mail ___

A

User Agent; Submission Agent

61
Q

The ___ determines where an email needs to be delivered, resolving the FQDN (Domain Name) of the mail server. The DNS server then replies with any ___ records for that domain

A

Mail Submission Agent; MX (Mail EXchange)

62
Q

email is delivered to an inbox by an ___, after passing through one or more ___

A

MDA; MTA (Mail Transfer Agent)

63
Q

DNS servers use ___ port 53

A

both TCP and UDP

64
Q

DNS servers use the commands ___ and ___

A

GetHostByName(); GetHostByAddress()

65
Q

___ name servers are the authority for a given namespace

A

authoritative

66
Q

___ name servers try to resolve names it doesn’t already know

A

recursive

67
Q

___ name servers keep previously resolved names in a temporary cache

A

cache

68
Q

the only SNMP version with encryption is ___

A

v3

69
Q

SNMPv2 is particularly dangerous because ___

A

it can control devices but has no encryption

70
Q

HTTP can use 3 ports: ___

A

80; 8008 or 8080

71
Q

HTTPS can use port ___ or ___

A

443; 8443

72
Q

both DHCP and BOOTP (Bootstrap for diskless workstations) use ports ___

A

UDP 67 for the Server and 68 for the Client

73
Q

the signal for a wired network flows from the ___, and too much distance from it might require an amplifier to avoid ___

A

DSLAM (Digital Subscriber Line Access Multiplexer); attenuation

74
Q

the difference between CAT3 and CAT6 UTP (Unshielded Twisted Pair) is ___

A

it is twisted, because more twisting makes it less susceptible to EMI

75
Q

a copper cable connector for a PC is an ___, but a connector for a phone is an ___

A

RJ45; RJ11

76
Q

ethernet CSMA uses CD, or ___, which works by ___

A

Collision Detection; listen to see if the line is idle, then wait a random number of milliseconds to start transmitting

77
Q

wireless CSMA uses CA, or ___, which works by ___, because devices on a wireless network may not ___

A

Collision Avoidance; sending a RTS (Request To Send) and waiting to a CTS (Clear To Send) if there is congestion; be aware of each other

78
Q

___ is a legacy L2 protocol with no error recovery, focused on speed

A

Frame-Relay

79
Q

Frame-Relay systems can use either ___ or ___ circuits to transmit data, and uses ___ to identify the virtual connection

A

PVC (Permanent Virtual Circuit); SVC (Switched Virtual Circuit); DLCI (Data Link Connection Identifiers)

80
Q

___ is a legacy protocol suite for WAN communication which used PSE (Packet-Switching Exchange) nodes and leased lines with error correction which added latency

A

X.25

81
Q

___ is a legacy WAN technology which carried multiple T circuits over fiber optics using a physical ring topology

A

SONET (Synchronous Optical Networking)

82
Q

___ is a widely used WAN technology that encapsulates packets with other protocols and labels them for delivery to their next node only. It operated between OSI layers ___

A

MPLS (Multiprotocol Label Switching). 2 and 3

83
Q

___ is a synchronous L2 WAN protocol that uses polling to transmit data (NRM only). It was replaced by ___, which added error correction and flow control and two modes

A

SDLC (Synchronized Data Link Control); HDLC (High-level Data Link Control)

84
Q

the 3 modes of SDLC and HDLC are:

A

NRM (Normal Response Mode) nodes only transmit with permission of the primary
ARM (Asynchronous Response Mode) nodes may initiate communication with the primary
ABM (Asynchronous Balanced Mode) nodes act as primary or secondary

85
Q

most protocols containing the words ___ or ___ are used by VOIP

A

Transport Protocol; Control Protocol

86
Q

wireless NIC’s can operate in 4 modes:

A
  1. Managed/client (can connect only to a WAP - most common)
  2. Master/Infrastructure (act like a hotspot)
  3. Ad-Hoc (connect directly to other clients
  4. Monitor/RFMIN (captures whatever traffic moves)
87
Q

a ___ is all the devices associated with an organizations WLAN

A

Service Set

88
Q

WPA2 is also called ___

A

RSN (Robust Security Network)

89
Q
Bluetooth class 1 has a range of \_\_\_ 
class 2 has a range of \_\_\_
A

300 feet

30 feet

90
Q

Bluetooth is secured through ___ based algorithms

A

SAFER+ block cipher

91
Q

___ is taking complete control over a device via Bluetooth, but rarely done because patches have resolved it

A

bluebugging

92
Q

___ are Layer 1 devices used to extend the range of copper wired transmission by receiving a signal and retransmitting it

A

Repeaters

93
Q

network ___ are basically just Repeaters with a few extra ports

A

Hubs

94
Q

___ are Layer 2 devices that separate collision domains on a network

A

Bridges

95
Q

___ are Layer 2 devices that prevent collisions (like Bridges) with more than 2 ports. Each port is its own collision domain, and it directs traffic via MAC addresses

A

Switches

96
Q

the ___ command prevents different devices from using the same port on a switch

A

MAC sticky

97
Q

it is good policy to put each port on a switch on a particular ___ for logical grouping

A

VLAN

98
Q

use ___ to keep switch traffic only going to other switches that are logically grouped

A

VLAN pruning

99
Q

___ ports are used to connect two different switches on a network, and often have a larger capacity than other ports

A

trunk

100
Q

routers have two operational planes:

A

Control plane and Forwarding plane

101
Q

___ routing only looks at the number of hops to get to a destination, regardless of bandwidth

A

distance vector

102
Q

when 2 routers have the same information about a network they are in ___

A

convergence

103
Q

___ is an example of distance vector routing which uses split horizon, route poisoning and hold-down timers to prevent incorrect information from propagating

A

RIP (Routing Information Protocol)

104
Q

in ___ routing, each node independently runs an algorithm over the map to determine the shortest path from itself to every other node in the network

A

link-state

105
Q

___ is used within a single routing domain to identify the most efficient routes, and update routes when changes to the topology are detected. It supports IPv4, IPv6 and CIDR addressing

A

OSPF (Open Shortest Path First)

106
Q

___ is a link-state routing protocol used to connect over the internet

A

BGP (Border Gateway Protocol)

107
Q

First-Generation firewalls are also called ___ and work on OSI Layer 1-3 using rules

A

packet-filtering

108
Q

Second-Generation firewalls are also called ___ and work on OSI Layer 1-4, which is better defense against ___

A

stateful filtering; DOS attacks

109
Q

Third-Generation firewalls are ___ firewalls, which are aware of applications and protocols

A

Application Layer

110
Q

___ filter traffic between two or more networks, and can be either software or hardware based

A

Network Firewalls

111
Q

___ provide a layer of software security on one host that controls network traffic in and out of a single machine

A

Host-Based firewalls

112
Q

a ___ host is a special purpose host designed and configured to withstand attacks

A

bastion

113
Q

a ___ host has two network interfaces, one trusted and one not (i.e. internet)

A

dual-homed

114
Q

___ architecture can be used to separate components of a firewall onto separate systems, and is often used to establish a DMZ

A

screened subnet

115
Q

firewalls are designed to ___ when they fail

A

close

116
Q

previously, at the demarc where a network meets the internet, the ___ is often a desktop or server, and the ___ is often a modem

A

DTE (Data Terminal Equipment); DCE (Data Circuit-terminating Equipment)