Untitled 17 Flashcards

1
Q

__ topology e.g. Ethernet, ATM defines the rules of communication across the __ topology.

A

Logical topology (layer 2), Physical topology (layer 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

__ applies labels to packets, is commonly used to privately control international networks and is much cheaper than dedicated lines.

A

MPLS (Multi Protocol Label Switching)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

__ are asynchronous devices that provide dial-in and dial-out connections.

A

Access servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

__ are distributed series of caching web servers, designed to improve performance and availability by bring data closer to the end user.

A

CDN (Content Distribution Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

__ are the signaling protocols and __ is the packetization of your voice.

A

SIP and H.323 (which is wrapped around SIP for security), RTP (Real-time protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__ checks a system’s patches, antivirus and local firewall. If the client passes, access is granted, otherwise it is placed on an isolated VLAN where patches and antivirus updates may be provided.

A

NAC (Network Access Control). It builds on top of 802.1X.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

__ communications is where data is just sent with no need for start and stop bits. It is more efficient since there is no overhead (start/stop bits) but trasmitting and receiving stations need to be synchronized.

A

Synchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

__ communications is where data is sent by changes in levels of voltage or current in a sequential fashion. There are start and stop sequence bits.

A

Asynchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

__ DSL has the same upload and download rates.

A

SDSL (symmetric)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

__ DSL is higher download than upload. __ is much higher download than upload rates.

A

ADSL (Asymmetric), VDSL (very-high-data-rate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

__ DSL is used to provide the last mile of T1 service and uses two copper twisted pairs.

A

HDSL (high-rate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

__ extends Fibre channel to Ethernet networks.

A

FCoE (Fibre Channel over Ethernet) since FC was designed for high-performance directly attached storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__ integration is a common and phased approach for VoIP. The more long-term solution is __ integration.

A

PSTN PBX/VoIP integration: combines traditional and VoIP networks
IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

__ is a helpful network path troubleshooting tool that shows each of the nodes from a local machine to a destination.

A

traceroute, part of ICMP and built on ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

__ is a layer 2 error correction for serial connections.

A

HDLC (High-Level Data Link Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

__ is a layer 2 polling method for serial connections

A

SDLC (Synchronous Data Link Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

__ is a simple, weak authentication mechanism that sends the password in plaintext. This can be mitigated by sending a hash of the password but this is still vulnerable to a replay attack.

A

PAP (Password Authentication Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

__ is a TCP-based logon system with robust AAA, which is why Diameter came out.

A

TACACS (Terminal Access Controller Access Control System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

__ is a UDP-based logon system mostly focused on authentication and doesn’t focus much on authorization and accounting.

A

RADIUS (Remote Authentication Dial In User Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

__ is a vast improvement over WEP, requires NIC replacement and AP replacement or firmware upgrade (AES-CCMP).

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

__ is an authentication mechanism that uses challenge/response authentication and is not vulnerable to a replay attack.

A

CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

__ is an authentication mechanism, an extension to PPP and supports a variety of authentication protocols.

A

EAP (Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

__ is an IETF standard (RFC 2401) for establishing encrypted communication between users and devices. It offers sophisticated replay attack prevention and was issued as an open standard thus promoting multivendor interoperability.

A

IPsec VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

__ is an improved version of RADIUS which focuses on all three areas of AAA.

A

Diameter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

__ is an improvement over WEP (Wired Equivalent Privacy) and compatible with WEP hardware (TKIP).

A

WPA (Wi-Fi Protected Access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

__ is built on ping and used to plot the path a packet took through the network.

A

traceroute, part of ICMP and built on ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

__ is layer 2 network level authentication to authenticate a device, using MAC addresses (can be spoofed) and/or certificates.

A

802.1X. Using both would be ideal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

__ is used to find whether a given Internet host is reachable or not.

A

Ping, part of ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

__ layer convers bits into electrical signals or light impulses for transmission.

A

Physical Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

__ of the OSI model connects the physical part of the network with the abstract part?

A

Data link layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

__ offers SCSI disk access via TCP/IP and is routed via IP.

A

iSCSI (Internet Small Computer System Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

__ or __ which are forms of __ should be used for wireless networks where we should have mutual authentication. Otherwise if just using CHAP, the server authenticates the client but the client does not authenticate the server.

A

LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), forms of EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

__ topology (layer 1) describes how systems are connected together e.g. bus ring, star.

A

Physical topology (layer 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

__ VPN is also known as Transport Mode.

A

Client-to-site VPN: provide remote access from a remote client such as a traveling sales rep or telecommuting employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

__ VPN is also known as Tunnel Mode.

A

Site-to-site VPN: provide connectivity to networks such as headquarters and a remote office. Gateway devices are located in front of both networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

__, given a MAC address, will find out what the corresponding IP address is.

A

RARP (Reverse Address Resolution Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

__, given an IP address, will find out what the corresponding MAC address is.

A

ARP (Address Resolution Protocol), so computer can determine the next hop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

105.255.255.255 is a Class __ __ broadcast address.

A

Class A directed broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

150.5.255.255 is a Class __ __ broadcast address.

A

Class B directed broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

802.11 supports which frequencies and speeds?

A

BAGN: 11,54,54,144+Mbps. 2.4,5,2.4,2.4/5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

802.11 supports which two physical layers?

A

IR: Infrared, requires line of sight
RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A __ broadcast goes to every system on the LAN

A

limited broadcast. Will not get routed to any other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A __ broadcast is where the entire address is set to all 1’s or 255.255.255.255.

A

limited broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A __ broadcast is where the host portion is set to all 1’s

A

directed broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A __ broadcast would be routed to every computer on the destination network.

A

directed broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A __ determines the path a packet will take.

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

A __ firewall operates at layer 3.

A

packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A __ firewall operates at layer 4.

A

stateful filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A __ identifies a device by vendor code (first 3 bytes) and a unique identifier (last 3 bytes).

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A __ is a layer 3 device that connects two different networks together and moves packets between networks.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A __ is a mapping of FCoE over the network.

A

vSAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A __ is a path through intermediate devices and bridges where there are multiple physical connections but virtually makes a single connection.

A

VC (Virtual Circuit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A __ is a physical topology that is not very scalable or fault tolerant since a single wire connects all of them together. If one goes down they all do.

A

bus. legacy Ethernet uses a bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A __ is a router (inline device connecting two devices together) with a filtering capability (ruleset)

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A __ is a single broadcast domain and defines LANs logically.

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

A __ is always at layer 1 of the OSI model.

A

Bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

A __ is always at layer 2 of the OSI model.

A

Frame e.g. an Ethernet Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

A __ is always at layer 4 of the OSI model.

A

Segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

A __ is information at layer 3 of the OSI model.

A

Packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A __ is like a bus where you connect the two endpoints together

A

ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

A __ is often used to connect multiple bus networks.

A

tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

A __ is the most common physical topology. It is very fault tolerant since there are multiple paths, scalable since easy to add more connections without interrupting others and easy to troulbeshoot.

A

star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

A __ is used to directly connect two similar devices (e.g. two computers, two switches, etc), otherwise there will be constant collisions.

A

crossover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

A __ is used to get to the next hop.

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

A __ is where two locations may be 20 miles apart which is good for a very local disaster (building fire). A __ is where two locations may be 200 miles apart which is best for large scale disasters.

A

MAN: Metropolitan Area Network, WAN: Wide Area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

A __ line is great because it is reserved for use however when not in use you’re paying for bandwidth no one is utilizing. A __ line means you don’t need to know bandwith.

A

Dedicated line, leased line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

A __ NAT formally referred to as PAT.

A

Many to one NAT aka PAT (Port address translation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

A __ NAT is a set of public addresses that are mapped and is not as scalable today since computers have many connections.

A

pool NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A __ operates at layer 2 and can connect multiple LANs. It is useful in breaking up a large LAN into smaller LANs.

A

bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

A __ provides block-level network file system access and is equivalent to directly attached storage (such as an IDE, SATA or SCSI drive) via a network.

A

SAN (Storage Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

A __ provides file and directory access via Ethernet but there is no direct access to blocks or clusters.

A

NAS (Network Attached Storage)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

A __ virtual circuit is better for small data transfers or infrequent transfers. A __ virtual circuit is better for large or frequent data transfers.

A

SVC (Switched Virtual Circuit), PVC (Permanent Virtual Circuit, permanently keeps connection up rather than constantly creating and tearing down connections like SVC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

A bridge is a layer __ device that breaks up an Ethernet domain into two different collission domains to increase performance.

A

Data link layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

A computer will only use DNS if a __ is not present

A

static host file. Every OS supports a static host file which is where the computer goes first to translate a domain to IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

A firewall without a ruleset, a firewall with an any-any ruleset, or a firewall with a default allow is a __.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

A hub operates at layer __.

A

Physical layer 1 since it is just re-transmitting raw data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

A layer __ switch can do load balancing because it is __ aware.

A

Layer 7, Application-aware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

A MAC address operates at layer __.

A

layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

A modulator/demodulator that converts digital signals to analog signals, transmits over conventional telephone lines and then converts analog back to digital signals.

A

modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

A packet filtering firewall operates at layer __.

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

A proxy firewall or next gen firewall operates at layer __.

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

A stateful firewall operates at layer __.

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

A switch is a layer __ device that acts like a hub except that it probes each system and stores it’s MAC address so it can send communications directly from one computer to another which increases performance and security.

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

A type of network that could be used by an electrical company to read meters at multiple locations in a small area without going to each location.

A

NAN (Neighborhood Area Network) e.g. so don’t have to worry about dogs/guns when he reads the meter at a house.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

All DSL requires a __ in the neighborhood.

A

POP (Point of Presence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

An __ is connecting from your organization to only another organization (e.g. via T1, MPLS, VPN). What can be a problem with this?

A

Extranet. Your security is only as good as the other organization’s security e.g. Target’s extranet with HVAC vendor is how the adversary go to their POS systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

An example of a distance vector routing protocol where hop count is used as the metric is __

A

RIP (Routing Information Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

An example of a link state routing protocol which is not subject to routing loops, is more efficient, uses multiple parameters to determine the best route and only sends an update if there’s a change is __

A

OSPF (Open Shortest Path First)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

An IPv6 is __ bits or __ bytes.

A

128-bit or 16 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

An unmanaged switch has no __ capability while a managed switch does. Both are layer __.

A

VLAN, Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Any time you enter in a domain name you need to do a __ before you get to layer 3 in the protocol stack, otherwise you won’t get the IP so you won’t get routing.

A

forward lookup or gethostbyname

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

As you go down a stack you __ a header. As you go up the stack you __ a header.

A

Add,Remove e.g. layer 1 processes layer 1 and then takes the header off and passes it up to layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

ATM is designed for high speed networks sending small amounts of information, using 48 byte box plus 5 byte header so it’s very optimized and minimal chance of collisions. It uses layers __ and __.

A

Layers 2 & 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Autoconfiguration embeds the __ byte __ address into the __ portion of IPv6.

A

6 byte MAC address into the host portion of IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Client-to-site VPN which provides access from a remote client such as a traveling sales rep or telecommuting employee is also known as __.

A

Transport Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Common __ solutions are iSCSI, Fibre Channel and FCoE.

A

SAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Convert the nibble 1101 to decimal.

A
  1. Write each digit separate 1 1 0 1. Label number from right to left 0,1,2,3. Then put base (in this case 2) on bottom left of those numbers, multiply down, add across. ‘Binary,Hex to Decimal conversion - Drawing 4A’
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

CSMA with __ is a one way link and not typically used. CSMA with __ is typically used and is where the computer monitors the line to see if another computer is transmitting, if not the computer transmits.

A

CSMA/CA (collision avoidance), CSMA/CD (collision detection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Draw the OSI and TCP/IP models

A

OSI vs TCP-IP - Domain 4 pg 15’ Also add hub/repeater, switch/bridge, router, firewall so I know the layers for those

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Ethernet is a baseband or shared media where data is transmitted using __

A

CSMA/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Ethernet, ATM (Asynchronous Transfer Mode), HDLC (High-level data link control), ISDN (Integrated Services Digital Network) and X.25 and examples of __ which are the rules for sending signals to each other.

A

Logical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Even though networks are packet-based this OSI layer sets up a virtual session to make it look like we’re on a circuit-switched network.

A

Layer 5 Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Every single piece of information must have a readable unencrypted __ which routers use to determine the path.

A

IP header. This is why the IP protocol is often called the workhorse of the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Examples of leased lines in the US are __ and in Europe are __.

A

T’s e.g. T1, T3 vs E’s in Europe e.g. E1, E3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Explain the 3 way handshake

A

A synchronizes with B (1), B acknowledges (2), B synchronizes with A (3), A acknowledges. Syn (1), Syn/Ack (2,3), Ack (4). So it’s a 4 step process but since Steps 2 & 3 are done over one packet it’s a three-way handshake. ‘3 way handshake - drawing 4C’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

For IPsec VPN you would primarily want to use __ for confidentiality.

A

ESP (Encapsulating Security Payload): protects the payload only; provides confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

For IPsec VPN you would primarily want to use __ for integrity and authentication.

A

AH (Authentication Header): protects entire packet including headers; provides authentication and integrity but no confidentiality. AH used for internal tunnels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

For LAN transmission methods, a __ is one-to-one, a __ is one-to-many but not all, a __ is one-to-all.

A

Unicast, Multicast (Multi=Many), Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

For TCP every single packet has __ bytes more than UDP.

A

12 bytes. TCP header is 20 bytes, UDP has 8 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

gethostbyaddr is also known as __.

A

reverse lookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

gethostbyname is also known as __.

A

forward lookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

How do we uniquely identify a connection?

A

Socket pair which consists of the source/destination IPs and ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

How does the Network layer know which protocol at layer 4 to hand off to?

A

That’s the 9th byte (protocol field) in the IP header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

How many more bytes does IPv4 use for overhead than IPv6?

A

4 bytes since IPv6 header has 8 bytes overhead as opposed to 12 for IPv4. ‘IPv4 vs IPv6 header overhead - Drawing 4B’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Hubs and switches connect computers together to create a network. __ connect hubs and switches together to move packets between those networks.

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

ICMP is a layer __ protocol.

A

Layer 3 Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

If an attacker wants to bypass DNS completely, she can modify the __.

A

host table aka static host file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

If an organization is using wireless and wants mutual authentication, which could be used?

A

LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

If the sender compresses the data prior to transmission the __ layer on the receiving end would have to decompress it before the receiver could use it.

A

Presentation Layer 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

If you add security directly into the protocol stack, it would be the __ layer in OSI.

A

Presentation Layer 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

If you are running a sniffer in a switch, which traffic will you see, if any?

A

Anything coming from your computer, anything going to your computer and any broadcast traffic. It is INCORRECT to say that you will not see any traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

__ topology e.g. Ethernet, ATM defines the rules of communication across the __ topology.

A

Logical topology (layer 2), Physical topology (layer 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

__ applies labels to packets, is commonly used to privately control international networks and is much cheaper than dedicated lines.

A

MPLS (Multi Protocol Label Switching)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

__ are asynchronous devices that provide dial-in and dial-out connections.

A

Access servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

__ are distributed series of caching web servers, designed to improve performance and availability by bring data closer to the end user.

A

CDN (Content Distribution Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

__ are the signaling protocols and __ is the packetization of your voice.

A

SIP and H.323 (which is wrapped around SIP for security), RTP (Real-time protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

__ checks a system’s patches, antivirus and local firewall. If the client passes, access is granted, otherwise it is placed on an isolated VLAN where patches and antivirus updates may be provided.

A

NAC (Network Access Control). It builds on top of 802.1X.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

__ communications is where data is just sent with no need for start and stop bits. It is more efficient since there is no overhead (start/stop bits) but trasmitting and receiving stations need to be synchronized.

A

Synchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

__ communications is where data is sent by changes in levels of voltage or current in a sequential fashion. There are start and stop sequence bits.

A

Asynchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

__ DSL has the same upload and download rates.

A

SDSL (symmetric)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

__ DSL is higher download than upload. __ is much higher download than upload rates.

A

ADSL (Asymmetric), VDSL (very-high-data-rate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

__ DSL is used to provide the last mile of T1 service and uses two copper twisted pairs.

A

HDSL (high-rate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

__ extends Fibre channel to Ethernet networks.

A

FCoE (Fibre Channel over Ethernet) since FC was designed for high-performance directly attached storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

__ integration is a common and phased approach for VoIP. The more long-term solution is __ integration.

A

PSTN PBX/VoIP integration: combines traditional and VoIP networks
IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

__ is a helpful network path troubleshooting tool that shows each of the nodes from a local machine to a destination.

A

traceroute, part of ICMP and built on ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

__ is a layer 2 error correction for serial connections.

A

HDLC (High-Level Data Link Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

__ is a layer 2 polling method for serial connections

A

SDLC (Synchronous Data Link Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

__ is a simple, weak authentication mechanism that sends the password in plaintext. This can be mitigated by sending a hash of the password but this is still vulnerable to a replay attack.

A

PAP (Password Authentication Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

__ is a TCP-based logon system with robust AAA, which is why Diameter came out.

A

TACACS (Terminal Access Controller Access Control System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

__ is a UDP-based logon system mostly focused on authentication and doesn’t focus much on authorization and accounting.

A

RADIUS (Remote Authentication Dial In User Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

__ is a vast improvement over WEP, requires NIC replacement and AP replacement or firmware upgrade (AES-CCMP).

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

__ is an authentication mechanism that uses challenge/response authentication and is not vulnerable to a replay attack.

A

CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

__ is an authentication mechanism, an extension to PPP and supports a variety of authentication protocols.

A

EAP (Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

__ is an IETF standard (RFC 2401) for establishing encrypted communication between users and devices. It offers sophisticated replay attack prevention and was issued as an open standard thus promoting multivendor interoperability.

A

IPsec VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

__ is an improved version of RADIUS which focuses on all three areas of AAA.

A

Diameter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

__ is an improvement over WEP (Wired Equivalent Privacy) and compatible with WEP hardware (TKIP).

A

WPA (Wi-Fi Protected Access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

__ is built on ping and used to plot the path a packet took through the network.

A

traceroute, part of ICMP and built on ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

__ is layer 2 network level authentication to authenticate a device, using MAC addresses (can be spoofed) and/or certificates.

A

802.1X. Using both would be ideal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

__ is used to find whether a given Internet host is reachable or not.

A

Ping, part of ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

__ layer convers bits into electrical signals or light impulses for transmission.

A

Physical Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

__ of the OSI model connects the physical part of the network with the abstract part?

A

Data link layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

__ offers SCSI disk access via TCP/IP and is routed via IP.

A

iSCSI (Internet Small Computer System Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

__ or __ which are forms of __ should be used for wireless networks where we should have mutual authentication. Otherwise if just using CHAP, the server authenticates the client but the client does not authenticate the server.

A

LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), forms of EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

__ topology (layer 1) describes how systems are connected together e.g. bus ring, star.

A

Physical topology (layer 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

__ VPN is also known as Transport Mode.

A

Client-to-site VPN: provide remote access from a remote client such as a traveling sales rep or telecommuting employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

__ VPN is also known as Tunnel Mode.

A

Site-to-site VPN: provide connectivity to networks such as headquarters and a remote office. Gateway devices are located in front of both networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

__, given a MAC address, will find out what the corresponding IP address is.

A

RARP (Reverse Address Resolution Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

__, given an IP address, will find out what the corresponding MAC address is.

A

ARP (Address Resolution Protocol), so computer can determine the next hop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

105.255.255.255 is a Class __ __ broadcast address.

A

Class A directed broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

150.5.255.255 is a Class __ __ broadcast address.

A

Class B directed broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

802.11 supports which frequencies and speeds?

A

BAGN: 11,54,54,144+Mbps. 2.4,5,2.4,2.4/5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

802.11 supports which two physical layers?

A

IR: Infrared, requires line of sight
RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

A __ broadcast goes to every system on the LAN

A

limited broadcast. Will not get routed to any other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

A __ broadcast is where the entire address is set to all 1’s or 255.255.255.255.

A

limited broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

A __ broadcast is where the host portion is set to all 1’s

A

directed broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

A __ broadcast would be routed to every computer on the destination network.

A

directed broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

A __ determines the path a packet will take.

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

A __ firewall operates at layer 3.

A

packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

A __ firewall operates at layer 4.

A

stateful filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

A __ identifies a device by vendor code (first 3 bytes) and a unique identifier (last 3 bytes).

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

A __ is a layer 3 device that connects two different networks together and moves packets between networks.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

A __ is a mapping of FCoE over the network.

A

vSAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

A __ is a path through intermediate devices and bridges where there are multiple physical connections but virtually makes a single connection.

A

VC (Virtual Circuit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

A __ is a physical topology that is not very scalable or fault tolerant since a single wire connects all of them together. If one goes down they all do.

A

bus. legacy Ethernet uses a bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

A __ is a router (inline device connecting two devices together) with a filtering capability (ruleset)

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

A __ is a single broadcast domain and defines LANs logically.

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

A __ is always at layer 1 of the OSI model.

A

Bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

A __ is always at layer 2 of the OSI model.

A

Frame e.g. an Ethernet Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

A __ is always at layer 4 of the OSI model.

A

Segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

A __ is information at layer 3 of the OSI model.

A

Packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

A __ is like a bus where you connect the two endpoints together

A

ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

A __ is often used to connect multiple bus networks.

A

tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

A __ is the most common physical topology. It is very fault tolerant since there are multiple paths, scalable since easy to add more connections without interrupting others and easy to troulbeshoot.

A

star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

A __ is used to directly connect two similar devices (e.g. two computers, two switches, etc), otherwise there will be constant collisions.

A

crossover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

A __ is used to get to the next hop.

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

A __ is where two locations may be 20 miles apart which is good for a very local disaster (building fire). A __ is where two locations may be 200 miles apart which is best for large scale disasters.

A

MAN: Metropolitan Area Network, WAN: Wide Area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

A __ line is great because it is reserved for use however when not in use you’re paying for bandwidth no one is utilizing. A __ line means you don’t need to know bandwith.

A

Dedicated line, leased line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

A __ NAT formally referred to as PAT.

A

Many to one NAT aka PAT (Port address translation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

A __ NAT is a set of public addresses that are mapped and is not as scalable today since computers have many connections.

A

pool NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

A __ operates at layer 2 and can connect multiple LANs. It is useful in breaking up a large LAN into smaller LANs.

A

bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

A __ provides block-level network file system access and is equivalent to directly attached storage (such as an IDE, SATA or SCSI drive) via a network.

A

SAN (Storage Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

A __ provides file and directory access via Ethernet but there is no direct access to blocks or clusters.

A

NAS (Network Attached Storage)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

A __ virtual circuit is better for small data transfers or infrequent transfers. A __ virtual circuit is better for large or frequent data transfers.

A

SVC (Switched Virtual Circuit), PVC (Permanent Virtual Circuit, permanently keeps connection up rather than constantly creating and tearing down connections like SVC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

A bridge is a layer __ device that breaks up an Ethernet domain into two different collission domains to increase performance.

A

Data link layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

A computer will only use DNS if a __ is not present

A

static host file. Every OS supports a static host file which is where the computer goes first to translate a domain to IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

A firewall without a ruleset, a firewall with an any-any ruleset, or a firewall with a default allow is a __.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

A hub operates at layer __.

A

Physical layer 1 since it is just re-transmitting raw data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

A layer __ switch can do load balancing because it is __ aware.

A

Layer 7, Application-aware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

A MAC address operates at layer __.

A

layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

A modulator/demodulator that converts digital signals to analog signals, transmits over conventional telephone lines and then converts analog back to digital signals.

A

modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

A packet filtering firewall operates at layer __.

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

A proxy firewall or next gen firewall operates at layer __.

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

A stateful firewall operates at layer __.

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

A switch is a layer __ device that acts like a hub except that it probes each system and stores it’s MAC address so it can send communications directly from one computer to another which increases performance and security.

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q

A type of network that could be used by an electrical company to read meters at multiple locations in a small area without going to each location.

A

NAN (Neighborhood Area Network) e.g. so don’t have to worry about dogs/guns when he reads the meter at a house.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

All DSL requires a __ in the neighborhood.

A

POP (Point of Presence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
207
Q

An __ is connecting from your organization to only another organization (e.g. via T1, MPLS, VPN). What can be a problem with this?

A

Extranet. Your security is only as good as the other organization’s security e.g. Target’s extranet with HVAC vendor is how the adversary go to their POS systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
208
Q

An example of a distance vector routing protocol where hop count is used as the metric is __

A

RIP (Routing Information Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
209
Q

An example of a link state routing protocol which is not subject to routing loops, is more efficient, uses multiple parameters to determine the best route and only sends an update if there’s a change is __

A

OSPF (Open Shortest Path First)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
210
Q

An IPv6 is __ bits or __ bytes.

A

128-bit or 16 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
211
Q

An unmanaged switch has no __ capability while a managed switch does. Both are layer __.

A

VLAN, Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
212
Q

Any time you enter in a domain name you need to do a __ before you get to layer 3 in the protocol stack, otherwise you won’t get the IP so you won’t get routing.

A

forward lookup or gethostbyname

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
213
Q

As you go down a stack you __ a header. As you go up the stack you __ a header.

A

Add,Remove e.g. layer 1 processes layer 1 and then takes the header off and passes it up to layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
214
Q

ATM is designed for high speed networks sending small amounts of information, using 48 byte box plus 5 byte header so it’s very optimized and minimal chance of collisions. It uses layers __ and __.

A

Layers 2 & 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
215
Q

Autoconfiguration embeds the __ byte __ address into the __ portion of IPv6.

A

6 byte MAC address into the host portion of IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
216
Q

Client-to-site VPN which provides access from a remote client such as a traveling sales rep or telecommuting employee is also known as __.

A

Transport Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
217
Q

Common __ solutions are iSCSI, Fibre Channel and FCoE.

A

SAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
218
Q

Convert the nibble 1101 to decimal.

A
  1. Write each digit separate 1 1 0 1. Label number from right to left 0,1,2,3. Then put base (in this case 2) on bottom left of those numbers, multiply down, add across. ‘Binary,Hex to Decimal conversion - Drawing 4A’
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
219
Q

CSMA with __ is a one way link and not typically used. CSMA with __ is typically used and is where the computer monitors the line to see if another computer is transmitting, if not the computer transmits.

A

CSMA/CA (collision avoidance), CSMA/CD (collision detection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
220
Q

Draw the OSI and TCP/IP models

A

OSI vs TCP-IP - Domain 4 pg 15’ Also add hub/repeater, switch/bridge, router, firewall so I know the layers for those

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
221
Q

Ethernet is a baseband or shared media where data is transmitted using __

A

CSMA/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
222
Q

Ethernet, ATM (Asynchronous Transfer Mode), HDLC (High-level data link control), ISDN (Integrated Services Digital Network) and X.25 and examples of __ which are the rules for sending signals to each other.

A

Logical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
223
Q

Even though networks are packet-based this OSI layer sets up a virtual session to make it look like we’re on a circuit-switched network.

A

Layer 5 Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
224
Q

Every single piece of information must have a readable unencrypted __ which routers use to determine the path.

A

IP header. This is why the IP protocol is often called the workhorse of the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
225
Q

Examples of leased lines in the US are __ and in Europe are __.

A

T’s e.g. T1, T3 vs E’s in Europe e.g. E1, E3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
226
Q

Explain the 3 way handshake

A

A synchronizes with B (1), B acknowledges (2), B synchronizes with A (3), A acknowledges. Syn (1), Syn/Ack (2,3), Ack (4). So it’s a 4 step process but since Steps 2 & 3 are done over one packet it’s a three-way handshake. ‘3 way handshake - drawing 4C’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
227
Q

For IPsec VPN you would primarily want to use __ for confidentiality.

A

ESP (Encapsulating Security Payload): protects the payload only; provides confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
228
Q

For IPsec VPN you would primarily want to use __ for integrity and authentication.

A

AH (Authentication Header): protects entire packet including headers; provides authentication and integrity but no confidentiality. AH used for internal tunnels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
229
Q

For LAN transmission methods, a __ is one-to-one, a __ is one-to-many but not all, a __ is one-to-all.

A

Unicast, Multicast (Multi=Many), Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
230
Q

For TCP every single packet has __ bytes more than UDP.

A

12 bytes. TCP header is 20 bytes, UDP has 8 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
231
Q

gethostbyaddr is also known as __.

A

reverse lookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
232
Q

gethostbyname is also known as __.

A

forward lookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
233
Q

How do we uniquely identify a connection?

A

Socket pair which consists of the source/destination IPs and ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
234
Q

How does the Network layer know which protocol at layer 4 to hand off to?

A

That’s the 9th byte (protocol field) in the IP header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
235
Q

How many more bytes does IPv4 use for overhead than IPv6?

A

4 bytes since IPv6 header has 8 bytes overhead as opposed to 12 for IPv4. ‘IPv4 vs IPv6 header overhead - Drawing 4B’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
236
Q

Hubs and switches connect computers together to create a network. __ connect hubs and switches together to move packets between those networks.

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
237
Q

ICMP is a layer __ protocol.

A

Layer 3 Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
238
Q

If an attacker wants to bypass DNS completely, she can modify the __.

A

host table aka static host file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
239
Q

If an organization is using wireless and wants mutual authentication, which could be used?

A

LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
240
Q

If the sender compresses the data prior to transmission the __ layer on the receiving end would have to decompress it before the receiver could use it.

A

Presentation Layer 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
241
Q

If you add security directly into the protocol stack, it would be the __ layer in OSI.

A

Presentation Layer 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
242
Q

If you are running a sniffer in a switch, which traffic will you see, if any?

A

Anything coming from your computer, anything going to your computer and any broadcast traffic. It is INCORRECT to say that you will not see any traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
243
Q

__ topology e.g. Ethernet, ATM defines the rules of communication across the __ topology.

A

Logical topology (layer 2), Physical topology (layer 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
244
Q

__ applies labels to packets, is commonly used to privately control international networks and is much cheaper than dedicated lines.

A

MPLS (Multi Protocol Label Switching)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
245
Q

__ are asynchronous devices that provide dial-in and dial-out connections.

A

Access servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
246
Q

__ are distributed series of caching web servers, designed to improve performance and availability by bring data closer to the end user.

A

CDN (Content Distribution Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
247
Q

__ are the signaling protocols and __ is the packetization of your voice.

A

SIP and H.323 (which is wrapped around SIP for security), RTP (Real-time protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
248
Q

__ checks a system’s patches, antivirus and local firewall. If the client passes, access is granted, otherwise it is placed on an isolated VLAN where patches and antivirus updates may be provided.

A

NAC (Network Access Control). It builds on top of 802.1X.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
249
Q

__ communications is where data is just sent with no need for start and stop bits. It is more efficient since there is no overhead (start/stop bits) but trasmitting and receiving stations need to be synchronized.

A

Synchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
250
Q

__ communications is where data is sent by changes in levels of voltage or current in a sequential fashion. There are start and stop sequence bits.

A

Asynchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
251
Q

__ DSL has the same upload and download rates.

A

SDSL (symmetric)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
252
Q

__ DSL is higher download than upload. __ is much higher download than upload rates.

A

ADSL (Asymmetric), VDSL (very-high-data-rate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
253
Q

__ DSL is used to provide the last mile of T1 service and uses two copper twisted pairs.

A

HDSL (high-rate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
254
Q

__ extends Fibre channel to Ethernet networks.

A

FCoE (Fibre Channel over Ethernet) since FC was designed for high-performance directly attached storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
255
Q

__ integration is a common and phased approach for VoIP. The more long-term solution is __ integration.

A

PSTN PBX/VoIP integration: combines traditional and VoIP networks
IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
256
Q

__ is a helpful network path troubleshooting tool that shows each of the nodes from a local machine to a destination.

A

traceroute, part of ICMP and built on ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
257
Q

__ is a layer 2 error correction for serial connections.

A

HDLC (High-Level Data Link Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
258
Q

__ is a layer 2 polling method for serial connections

A

SDLC (Synchronous Data Link Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
259
Q

__ is a simple, weak authentication mechanism that sends the password in plaintext. This can be mitigated by sending a hash of the password but this is still vulnerable to a replay attack.

A

PAP (Password Authentication Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
260
Q

__ is a TCP-based logon system with robust AAA, which is why Diameter came out.

A

TACACS (Terminal Access Controller Access Control System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
261
Q

__ is a UDP-based logon system mostly focused on authentication and doesn’t focus much on authorization and accounting.

A

RADIUS (Remote Authentication Dial In User Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
262
Q

__ is a vast improvement over WEP, requires NIC replacement and AP replacement or firmware upgrade (AES-CCMP).

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
263
Q

__ is an authentication mechanism that uses challenge/response authentication and is not vulnerable to a replay attack.

A

CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
264
Q

__ is an authentication mechanism, an extension to PPP and supports a variety of authentication protocols.

A

EAP (Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
265
Q

__ is an IETF standard (RFC 2401) for establishing encrypted communication between users and devices. It offers sophisticated replay attack prevention and was issued as an open standard thus promoting multivendor interoperability.

A

IPsec VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
266
Q

__ is an improved version of RADIUS which focuses on all three areas of AAA.

A

Diameter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
267
Q

__ is an improvement over WEP (Wired Equivalent Privacy) and compatible with WEP hardware (TKIP).

A

WPA (Wi-Fi Protected Access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
268
Q

__ is built on ping and used to plot the path a packet took through the network.

A

traceroute, part of ICMP and built on ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
269
Q

__ is layer 2 network level authentication to authenticate a device, using MAC addresses (can be spoofed) and/or certificates.

A

802.1X. Using both would be ideal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
270
Q

__ is used to find whether a given Internet host is reachable or not.

A

Ping, part of ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
271
Q

__ layer convers bits into electrical signals or light impulses for transmission.

A

Physical Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
272
Q

__ of the OSI model connects the physical part of the network with the abstract part?

A

Data link layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
273
Q

__ offers SCSI disk access via TCP/IP and is routed via IP.

A

iSCSI (Internet Small Computer System Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
274
Q

__ or __ which are forms of __ should be used for wireless networks where we should have mutual authentication. Otherwise if just using CHAP, the server authenticates the client but the client does not authenticate the server.

A

LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), forms of EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
275
Q

__ topology (layer 1) describes how systems are connected together e.g. bus ring, star.

A

Physical topology (layer 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
276
Q

__ VPN is also known as Transport Mode.

A

Client-to-site VPN: provide remote access from a remote client such as a traveling sales rep or telecommuting employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
277
Q

__ VPN is also known as Tunnel Mode.

A

Site-to-site VPN: provide connectivity to networks such as headquarters and a remote office. Gateway devices are located in front of both networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
278
Q

__, given a MAC address, will find out what the corresponding IP address is.

A

RARP (Reverse Address Resolution Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
279
Q

__, given an IP address, will find out what the corresponding MAC address is.

A

ARP (Address Resolution Protocol), so computer can determine the next hop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
280
Q

105.255.255.255 is a Class __ __ broadcast address.

A

Class A directed broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
281
Q

150.5.255.255 is a Class __ __ broadcast address.

A

Class B directed broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
282
Q

802.11 supports which frequencies and speeds?

A

BAGN: 11,54,54,144+Mbps. 2.4,5,2.4,2.4/5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
283
Q

802.11 supports which two physical layers?

A

IR: Infrared, requires line of sight
RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
284
Q

A __ broadcast goes to every system on the LAN

A

limited broadcast. Will not get routed to any other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
285
Q

A __ broadcast is where the entire address is set to all 1’s or 255.255.255.255.

A

limited broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
286
Q

A __ broadcast is where the host portion is set to all 1’s

A

directed broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
287
Q

A __ broadcast would be routed to every computer on the destination network.

A

directed broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
288
Q

A __ determines the path a packet will take.

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
289
Q

A __ firewall operates at layer 3.

A

packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
290
Q

A __ firewall operates at layer 4.

A

stateful filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
291
Q

A __ identifies a device by vendor code (first 3 bytes) and a unique identifier (last 3 bytes).

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
292
Q

A __ is a layer 3 device that connects two different networks together and moves packets between networks.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
293
Q

A __ is a mapping of FCoE over the network.

A

vSAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
294
Q

A __ is a path through intermediate devices and bridges where there are multiple physical connections but virtually makes a single connection.

A

VC (Virtual Circuit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
295
Q

A __ is a physical topology that is not very scalable or fault tolerant since a single wire connects all of them together. If one goes down they all do.

A

bus. legacy Ethernet uses a bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
296
Q

A __ is a router (inline device connecting two devices together) with a filtering capability (ruleset)

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
297
Q

A __ is a single broadcast domain and defines LANs logically.

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
298
Q

A __ is always at layer 1 of the OSI model.

A

Bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
299
Q

A __ is always at layer 2 of the OSI model.

A

Frame e.g. an Ethernet Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
300
Q

A __ is always at layer 4 of the OSI model.

A

Segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
301
Q

A __ is information at layer 3 of the OSI model.

A

Packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
302
Q

A __ is like a bus where you connect the two endpoints together

A

ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
303
Q

A __ is often used to connect multiple bus networks.

A

tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
304
Q

A __ is the most common physical topology. It is very fault tolerant since there are multiple paths, scalable since easy to add more connections without interrupting others and easy to troulbeshoot.

A

star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
305
Q

A __ is used to directly connect two similar devices (e.g. two computers, two switches, etc), otherwise there will be constant collisions.

A

crossover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
306
Q

A __ is used to get to the next hop.

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
307
Q

A __ is where two locations may be 20 miles apart which is good for a very local disaster (building fire). A __ is where two locations may be 200 miles apart which is best for large scale disasters.

A

MAN: Metropolitan Area Network, WAN: Wide Area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
308
Q

A __ line is great because it is reserved for use however when not in use you’re paying for bandwidth no one is utilizing. A __ line means you don’t need to know bandwith.

A

Dedicated line, leased line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
309
Q

A __ NAT formally referred to as PAT.

A

Many to one NAT aka PAT (Port address translation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
310
Q

A __ NAT is a set of public addresses that are mapped and is not as scalable today since computers have many connections.

A

pool NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
311
Q

A __ operates at layer 2 and can connect multiple LANs. It is useful in breaking up a large LAN into smaller LANs.

A

bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
312
Q

A __ provides block-level network file system access and is equivalent to directly attached storage (such as an IDE, SATA or SCSI drive) via a network.

A

SAN (Storage Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
313
Q

A __ provides file and directory access via Ethernet but there is no direct access to blocks or clusters.

A

NAS (Network Attached Storage)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
314
Q

A __ virtual circuit is better for small data transfers or infrequent transfers. A __ virtual circuit is better for large or frequent data transfers.

A

SVC (Switched Virtual Circuit), PVC (Permanent Virtual Circuit, permanently keeps connection up rather than constantly creating and tearing down connections like SVC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
315
Q

A bridge is a layer __ device that breaks up an Ethernet domain into two different collission domains to increase performance.

A

Data link layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
316
Q

A computer will only use DNS if a __ is not present

A

static host file. Every OS supports a static host file which is where the computer goes first to translate a domain to IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
317
Q

A firewall without a ruleset, a firewall with an any-any ruleset, or a firewall with a default allow is a __.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
318
Q

A hub operates at layer __.

A

Physical layer 1 since it is just re-transmitting raw data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
319
Q

A layer __ switch can do load balancing because it is __ aware.

A

Layer 7, Application-aware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
320
Q

A MAC address operates at layer __.

A

layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
321
Q

A modulator/demodulator that converts digital signals to analog signals, transmits over conventional telephone lines and then converts analog back to digital signals.

A

modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
322
Q

A packet filtering firewall operates at layer __.

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
323
Q

A proxy firewall or next gen firewall operates at layer __.

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
324
Q

A stateful firewall operates at layer __.

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
325
Q

A switch is a layer __ device that acts like a hub except that it probes each system and stores it’s MAC address so it can send communications directly from one computer to another which increases performance and security.

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
326
Q

A type of network that could be used by an electrical company to read meters at multiple locations in a small area without going to each location.

A

NAN (Neighborhood Area Network) e.g. so don’t have to worry about dogs/guns when he reads the meter at a house.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
327
Q

All DSL requires a __ in the neighborhood.

A

POP (Point of Presence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
328
Q

An __ is connecting from your organization to only another organization (e.g. via T1, MPLS, VPN). What can be a problem with this?

A

Extranet. Your security is only as good as the other organization’s security e.g. Target’s extranet with HVAC vendor is how the adversary go to their POS systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
329
Q

An example of a distance vector routing protocol where hop count is used as the metric is __

A

RIP (Routing Information Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
330
Q

An example of a link state routing protocol which is not subject to routing loops, is more efficient, uses multiple parameters to determine the best route and only sends an update if there’s a change is __

A

OSPF (Open Shortest Path First)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
331
Q

An IPv6 is __ bits or __ bytes.

A

128-bit or 16 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
332
Q

An unmanaged switch has no __ capability while a managed switch does. Both are layer __.

A

VLAN, Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
333
Q

Any time you enter in a domain name you need to do a __ before you get to layer 3 in the protocol stack, otherwise you won’t get the IP so you won’t get routing.

A

forward lookup or gethostbyname

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
334
Q

As you go down a stack you __ a header. As you go up the stack you __ a header.

A

Add,Remove e.g. layer 1 processes layer 1 and then takes the header off and passes it up to layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
335
Q

ATM is designed for high speed networks sending small amounts of information, using 48 byte box plus 5 byte header so it’s very optimized and minimal chance of collisions. It uses layers __ and __.

A

Layers 2 & 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
336
Q

Autoconfiguration embeds the __ byte __ address into the __ portion of IPv6.

A

6 byte MAC address into the host portion of IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
337
Q

Client-to-site VPN which provides access from a remote client such as a traveling sales rep or telecommuting employee is also known as __.

A

Transport Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
338
Q

Common __ solutions are iSCSI, Fibre Channel and FCoE.

A

SAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
339
Q

Convert the nibble 1101 to decimal.

A
  1. Write each digit separate 1 1 0 1. Label number from right to left 0,1,2,3. Then put base (in this case 2) on bottom left of those numbers, multiply down, add across. ‘Binary,Hex to Decimal conversion - Drawing 4A’
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
340
Q

CSMA with __ is a one way link and not typically used. CSMA with __ is typically used and is where the computer monitors the line to see if another computer is transmitting, if not the computer transmits.

A

CSMA/CA (collision avoidance), CSMA/CD (collision detection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
341
Q

Draw the OSI and TCP/IP models

A

OSI vs TCP-IP - Domain 4 pg 15’ Also add hub/repeater, switch/bridge, router, firewall so I know the layers for those

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
342
Q

Ethernet is a baseband or shared media where data is transmitted using __

A

CSMA/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
343
Q

Ethernet, ATM (Asynchronous Transfer Mode), HDLC (High-level data link control), ISDN (Integrated Services Digital Network) and X.25 and examples of __ which are the rules for sending signals to each other.

A

Logical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
344
Q

Even though networks are packet-based this OSI layer sets up a virtual session to make it look like we’re on a circuit-switched network.

A

Layer 5 Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
345
Q

Every single piece of information must have a readable unencrypted __ which routers use to determine the path.

A

IP header. This is why the IP protocol is often called the workhorse of the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
346
Q

Examples of leased lines in the US are __ and in Europe are __.

A

T’s e.g. T1, T3 vs E’s in Europe e.g. E1, E3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
347
Q

Explain the 3 way handshake

A

A synchronizes with B (1), B acknowledges (2), B synchronizes with A (3), A acknowledges. Syn (1), Syn/Ack (2,3), Ack (4). So it’s a 4 step process but since Steps 2 & 3 are done over one packet it’s a three-way handshake. ‘3 way handshake - drawing 4C’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
348
Q

For IPsec VPN you would primarily want to use __ for confidentiality.

A

ESP (Encapsulating Security Payload): protects the payload only; provides confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
349
Q

For IPsec VPN you would primarily want to use __ for integrity and authentication.

A

AH (Authentication Header): protects entire packet including headers; provides authentication and integrity but no confidentiality. AH used for internal tunnels.

350
Q

For LAN transmission methods, a __ is one-to-one, a __ is one-to-many but not all, a __ is one-to-all.

A

Unicast, Multicast (Multi=Many), Broadcast

351
Q

For TCP every single packet has __ bytes more than UDP.

A

12 bytes. TCP header is 20 bytes, UDP has 8 bytes.

352
Q

gethostbyaddr is also known as __.

A

reverse lookup

353
Q

gethostbyname is also known as __.

A

forward lookup

354
Q

How do we uniquely identify a connection?

A

Socket pair which consists of the source/destination IPs and ports.

355
Q

How does the Network layer know which protocol at layer 4 to hand off to?

A

That’s the 9th byte (protocol field) in the IP header.

356
Q

How many more bytes does IPv4 use for overhead than IPv6?

A

4 bytes since IPv6 header has 8 bytes overhead as opposed to 12 for IPv4. ‘IPv4 vs IPv6 header overhead - Drawing 4B’

357
Q

Hubs and switches connect computers together to create a network. __ connect hubs and switches together to move packets between those networks.

A

Routers

358
Q

ICMP is a layer __ protocol.

A

Layer 3 Network

359
Q

If an attacker wants to bypass DNS completely, she can modify the __.

A

host table aka static host file

360
Q

If an organization is using wireless and wants mutual authentication, which could be used?

A

LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), EAP

361
Q

If the sender compresses the data prior to transmission the __ layer on the receiving end would have to decompress it before the receiver could use it.

A

Presentation Layer 6

362
Q

If you add security directly into the protocol stack, it would be the __ layer in OSI.

A

Presentation Layer 6

363
Q

If you are running a sniffer in a switch, which traffic will you see, if any?

A

Anything coming from your computer, anything going to your computer and any broadcast traffic. It is INCORRECT to say that you will not see any traffic.

364
Q

If you are using ESP with data transport mode, does that effect security?

A

Yes, you can only do layer 3 filtering, not higher level filtering since IPsec data is encrypted at layer 4 and higher so all you can see is the IP header.

365
Q

If you have the address and are looking for the FQDC or local name you would perform the __ command.

A

gethostbyaddr aka forward lookup to find the FQDN (eric.sans.org) or local name (eric)

366
Q

If you have the FQDN or local name and need the address you would perform the __ command.

A

gethostbyname aka forward lookup if you have the FQDN (eric.sans.org) or local name (eric)

367
Q

If you want your IPv4 network to communicate with the v6 internet you need __.

A

translation: IPv4 over IPv6

368
Q

If your network is IPv6 and the Internet is IPv4, what must you do with your gateways?

A

tunneling: IPv6 over IPv4

369
Q

In __ mode, the IPsec header is after the IP header and before the TCP/UDP header.

A

Transport mode: between two hosts, pg 160

370
Q

In __, a server generates a new challenge every time and combines the client’s response with the password so if it is sniffed, it’s a new password every time.

A

CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.

371
Q

In __, the same password is used every time you authenticate so it sould be sniffed and used in a replay attack.

A

PAP (Password Authentication Protocol)

372
Q

In 802.1X the __ is responsible for forwarding authentication credentials supplied by a user or a digital certificate to an authenticating entity.

A

Supplicant

373
Q

__ topology e.g. Ethernet, ATM defines the rules of communication across the __ topology.

A

Logical topology (layer 2), Physical topology (layer 1)

374
Q

__ applies labels to packets, is commonly used to privately control international networks and is much cheaper than dedicated lines.

A

MPLS (Multi Protocol Label Switching)

375
Q

__ are asynchronous devices that provide dial-in and dial-out connections.

A

Access servers

376
Q

__ are distributed series of caching web servers, designed to improve performance and availability by bring data closer to the end user.

A

CDN (Content Distribution Network)

377
Q

__ are the signaling protocols and __ is the packetization of your voice.

A

SIP and H.323 (which is wrapped around SIP for security), RTP (Real-time protocol)

378
Q

__ checks a system’s patches, antivirus and local firewall. If the client passes, access is granted, otherwise it is placed on an isolated VLAN where patches and antivirus updates may be provided.

A

NAC (Network Access Control). It builds on top of 802.1X.

379
Q

__ communications is where data is just sent with no need for start and stop bits. It is more efficient since there is no overhead (start/stop bits) but trasmitting and receiving stations need to be synchronized.

A

Synchronous

380
Q

__ communications is where data is sent by changes in levels of voltage or current in a sequential fashion. There are start and stop sequence bits.

A

Asynchronous

381
Q

__ DSL has the same upload and download rates.

A

SDSL (symmetric)

382
Q

__ DSL is higher download than upload. __ is much higher download than upload rates.

A

ADSL (Asymmetric), VDSL (very-high-data-rate)

383
Q

__ DSL is used to provide the last mile of T1 service and uses two copper twisted pairs.

A

HDSL (high-rate)

384
Q

__ extends Fibre channel to Ethernet networks.

A

FCoE (Fibre Channel over Ethernet) since FC was designed for high-performance directly attached storage.

385
Q

__ integration is a common and phased approach for VoIP. The more long-term solution is __ integration.

A

PSTN PBX/VoIP integration: combines traditional and VoIP networks
IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes calls

386
Q

__ is a helpful network path troubleshooting tool that shows each of the nodes from a local machine to a destination.

A

traceroute, part of ICMP and built on ping

387
Q

__ is a layer 2 error correction for serial connections.

A

HDLC (High-Level Data Link Control)

388
Q

__ is a layer 2 polling method for serial connections

A

SDLC (Synchronous Data Link Control)

389
Q

__ is a simple, weak authentication mechanism that sends the password in plaintext. This can be mitigated by sending a hash of the password but this is still vulnerable to a replay attack.

A

PAP (Password Authentication Protocol)

390
Q

__ is a TCP-based logon system with robust AAA, which is why Diameter came out.

A

TACACS (Terminal Access Controller Access Control System)

391
Q

__ is a UDP-based logon system mostly focused on authentication and doesn’t focus much on authorization and accounting.

A

RADIUS (Remote Authentication Dial In User Service)

392
Q

__ is a vast improvement over WEP, requires NIC replacement and AP replacement or firmware upgrade (AES-CCMP).

A

WPA2

393
Q

__ is an authentication mechanism that uses challenge/response authentication and is not vulnerable to a replay attack.

A

CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.

394
Q

__ is an authentication mechanism, an extension to PPP and supports a variety of authentication protocols.

A

EAP (Extensible Authentication Protocol

395
Q

__ is an IETF standard (RFC 2401) for establishing encrypted communication between users and devices. It offers sophisticated replay attack prevention and was issued as an open standard thus promoting multivendor interoperability.

A

IPsec VPN

396
Q

__ is an improved version of RADIUS which focuses on all three areas of AAA.

A

Diameter

397
Q

__ is an improvement over WEP (Wired Equivalent Privacy) and compatible with WEP hardware (TKIP).

A

WPA (Wi-Fi Protected Access)

398
Q

__ is built on ping and used to plot the path a packet took through the network.

A

traceroute, part of ICMP and built on ping

399
Q

__ is layer 2 network level authentication to authenticate a device, using MAC addresses (can be spoofed) and/or certificates.

A

802.1X. Using both would be ideal.

400
Q

__ is used to find whether a given Internet host is reachable or not.

A

Ping, part of ICMP

401
Q

__ layer convers bits into electrical signals or light impulses for transmission.

A

Physical Layer 1

402
Q

__ of the OSI model connects the physical part of the network with the abstract part?

A

Data link layer 2

403
Q

__ offers SCSI disk access via TCP/IP and is routed via IP.

A

iSCSI (Internet Small Computer System Interface)

404
Q

__ or __ which are forms of __ should be used for wireless networks where we should have mutual authentication. Otherwise if just using CHAP, the server authenticates the client but the client does not authenticate the server.

A

LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), forms of EAP

405
Q

__ topology (layer 1) describes how systems are connected together e.g. bus ring, star.

A

Physical topology (layer 1)

406
Q

__ VPN is also known as Transport Mode.

A

Client-to-site VPN: provide remote access from a remote client such as a traveling sales rep or telecommuting employee.

407
Q

__ VPN is also known as Tunnel Mode.

A

Site-to-site VPN: provide connectivity to networks such as headquarters and a remote office. Gateway devices are located in front of both networks.

408
Q

__, given a MAC address, will find out what the corresponding IP address is.

A

RARP (Reverse Address Resolution Protocol)

409
Q

__, given an IP address, will find out what the corresponding MAC address is.

A

ARP (Address Resolution Protocol), so computer can determine the next hop

410
Q

105.255.255.255 is a Class __ __ broadcast address.

A

Class A directed broadcast

411
Q

150.5.255.255 is a Class __ __ broadcast address.

A

Class B directed broadcast

412
Q

802.11 supports which frequencies and speeds?

A

BAGN: 11,54,54,144+Mbps. 2.4,5,2.4,2.4/5

413
Q

802.11 supports which two physical layers?

A

IR: Infrared, requires line of sight
RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)

414
Q

A __ broadcast goes to every system on the LAN

A

limited broadcast. Will not get routed to any other networks

415
Q

A __ broadcast is where the entire address is set to all 1’s or 255.255.255.255.

A

limited broadcast

416
Q

A __ broadcast is where the host portion is set to all 1’s

A

directed broadcast

417
Q

A __ broadcast would be routed to every computer on the destination network.

A

directed broadcast

418
Q

A __ determines the path a packet will take.

A

IP address

419
Q

A __ firewall operates at layer 3.

A

packet filtering

420
Q

A __ firewall operates at layer 4.

A

stateful filtering

421
Q

A __ identifies a device by vendor code (first 3 bytes) and a unique identifier (last 3 bytes).

A

MAC address

422
Q

A __ is a layer 3 device that connects two different networks together and moves packets between networks.

A

Router

423
Q

A __ is a mapping of FCoE over the network.

A

vSAN

424
Q

A __ is a path through intermediate devices and bridges where there are multiple physical connections but virtually makes a single connection.

A

VC (Virtual Circuit)

425
Q

A __ is a physical topology that is not very scalable or fault tolerant since a single wire connects all of them together. If one goes down they all do.

A

bus. legacy Ethernet uses a bus

426
Q

A __ is a router (inline device connecting two devices together) with a filtering capability (ruleset)

A

firewall

427
Q

A __ is a single broadcast domain and defines LANs logically.

A

VLAN

428
Q

A __ is always at layer 1 of the OSI model.

A

Bit

429
Q

A __ is always at layer 2 of the OSI model.

A

Frame e.g. an Ethernet Frame

430
Q

A __ is always at layer 4 of the OSI model.

A

Segment

431
Q

A __ is information at layer 3 of the OSI model.

A

Packet

432
Q

A __ is like a bus where you connect the two endpoints together

A

ring

433
Q

A __ is often used to connect multiple bus networks.

A

tree

434
Q

A __ is the most common physical topology. It is very fault tolerant since there are multiple paths, scalable since easy to add more connections without interrupting others and easy to troulbeshoot.

A

star

435
Q

A __ is used to directly connect two similar devices (e.g. two computers, two switches, etc), otherwise there will be constant collisions.

A

crossover

436
Q

A __ is used to get to the next hop.

A

MAC address

437
Q

A __ is where two locations may be 20 miles apart which is good for a very local disaster (building fire). A __ is where two locations may be 200 miles apart which is best for large scale disasters.

A

MAN: Metropolitan Area Network, WAN: Wide Area network

438
Q

A __ line is great because it is reserved for use however when not in use you’re paying for bandwidth no one is utilizing. A __ line means you don’t need to know bandwith.

A

Dedicated line, leased line

439
Q

A __ NAT formally referred to as PAT.

A

Many to one NAT aka PAT (Port address translation)

440
Q

A __ NAT is a set of public addresses that are mapped and is not as scalable today since computers have many connections.

A

pool NAT

441
Q

A __ operates at layer 2 and can connect multiple LANs. It is useful in breaking up a large LAN into smaller LANs.

A

bridge

442
Q

A __ provides block-level network file system access and is equivalent to directly attached storage (such as an IDE, SATA or SCSI drive) via a network.

A

SAN (Storage Area Network)

443
Q

A __ provides file and directory access via Ethernet but there is no direct access to blocks or clusters.

A

NAS (Network Attached Storage)

444
Q

A __ virtual circuit is better for small data transfers or infrequent transfers. A __ virtual circuit is better for large or frequent data transfers.

A

SVC (Switched Virtual Circuit), PVC (Permanent Virtual Circuit, permanently keeps connection up rather than constantly creating and tearing down connections like SVC)

445
Q

A bridge is a layer __ device that breaks up an Ethernet domain into two different collission domains to increase performance.

A

Data link layer 2

446
Q

A computer will only use DNS if a __ is not present

A

static host file. Every OS supports a static host file which is where the computer goes first to translate a domain to IP address.

447
Q

A firewall without a ruleset, a firewall with an any-any ruleset, or a firewall with a default allow is a __.

A

Router

448
Q

A hub operates at layer __.

A

Physical layer 1 since it is just re-transmitting raw data.

449
Q

A layer __ switch can do load balancing because it is __ aware.

A

Layer 7, Application-aware

450
Q

A MAC address operates at layer __.

A

layer 2

451
Q

A modulator/demodulator that converts digital signals to analog signals, transmits over conventional telephone lines and then converts analog back to digital signals.

A

modem

452
Q

A packet filtering firewall operates at layer __.

A

3

453
Q

A proxy firewall or next gen firewall operates at layer __.

A

7

454
Q

A stateful firewall operates at layer __.

A

4

455
Q

A switch is a layer __ device that acts like a hub except that it probes each system and stores it’s MAC address so it can send communications directly from one computer to another which increases performance and security.

A

Layer 2

456
Q

A type of network that could be used by an electrical company to read meters at multiple locations in a small area without going to each location.

A

NAN (Neighborhood Area Network) e.g. so don’t have to worry about dogs/guns when he reads the meter at a house.

457
Q

All DSL requires a __ in the neighborhood.

A

POP (Point of Presence)

458
Q

An __ is connecting from your organization to only another organization (e.g. via T1, MPLS, VPN). What can be a problem with this?

A

Extranet. Your security is only as good as the other organization’s security e.g. Target’s extranet with HVAC vendor is how the adversary go to their POS systems.

459
Q

An example of a distance vector routing protocol where hop count is used as the metric is __

A

RIP (Routing Information Protocol)

460
Q

An example of a link state routing protocol which is not subject to routing loops, is more efficient, uses multiple parameters to determine the best route and only sends an update if there’s a change is __

A

OSPF (Open Shortest Path First)

461
Q

An IPv6 is __ bits or __ bytes.

A

128-bit or 16 bytes

462
Q

An unmanaged switch has no __ capability while a managed switch does. Both are layer __.

A

VLAN, Layer 2

463
Q

Any time you enter in a domain name you need to do a __ before you get to layer 3 in the protocol stack, otherwise you won’t get the IP so you won’t get routing.

A

forward lookup or gethostbyname

464
Q

As you go down a stack you __ a header. As you go up the stack you __ a header.

A

Add,Remove e.g. layer 1 processes layer 1 and then takes the header off and passes it up to layer 2

465
Q

ATM is designed for high speed networks sending small amounts of information, using 48 byte box plus 5 byte header so it’s very optimized and minimal chance of collisions. It uses layers __ and __.

A

Layers 2 & 3

466
Q

Autoconfiguration embeds the __ byte __ address into the __ portion of IPv6.

A

6 byte MAC address into the host portion of IPv6

467
Q

Client-to-site VPN which provides access from a remote client such as a traveling sales rep or telecommuting employee is also known as __.

A

Transport Mode

468
Q

Common __ solutions are iSCSI, Fibre Channel and FCoE.

A

SAN

469
Q

Convert the nibble 1101 to decimal.

A
  1. Write each digit separate 1 1 0 1. Label number from right to left 0,1,2,3. Then put base (in this case 2) on bottom left of those numbers, multiply down, add across. ‘Binary,Hex to Decimal conversion - Drawing 4A’
470
Q

CSMA with __ is a one way link and not typically used. CSMA with __ is typically used and is where the computer monitors the line to see if another computer is transmitting, if not the computer transmits.

A

CSMA/CA (collision avoidance), CSMA/CD (collision detection)

471
Q

Draw the OSI and TCP/IP models

A

OSI vs TCP-IP - Domain 4 pg 15’ Also add hub/repeater, switch/bridge, router, firewall so I know the layers for those

472
Q

Ethernet is a baseband or shared media where data is transmitted using __

A

CSMA/CD

473
Q

__ topology e.g. Ethernet, ATM defines the rules of communication across the __ topology.

A

Logical topology (layer 2), Physical topology (layer 1)

474
Q

__ applies labels to packets, is commonly used to privately control international networks and is much cheaper than dedicated lines.

A

MPLS (Multi Protocol Label Switching)

475
Q

__ are asynchronous devices that provide dial-in and dial-out connections.

A

Access servers

476
Q

__ are distributed series of caching web servers, designed to improve performance and availability by bring data closer to the end user.

A

CDN (Content Distribution Network)

477
Q

__ are the signaling protocols and __ is the packetization of your voice.

A

SIP and H.323 (which is wrapped around SIP for security), RTP (Real-time protocol)

478
Q

__ checks a system’s patches, antivirus and local firewall. If the client passes, access is granted, otherwise it is placed on an isolated VLAN where patches and antivirus updates may be provided.

A

NAC (Network Access Control). It builds on top of 802.1X.

479
Q

__ communications is where data is just sent with no need for start and stop bits. It is more efficient since there is no overhead (start/stop bits) but trasmitting and receiving stations need to be synchronized.

A

Synchronous

480
Q

__ communications is where data is sent by changes in levels of voltage or current in a sequential fashion. There are start and stop sequence bits.

A

Asynchronous

481
Q

__ DSL has the same upload and download rates.

A

SDSL (symmetric)

482
Q

__ DSL is higher download than upload. __ is much higher download than upload rates.

A

ADSL (Asymmetric), VDSL (very-high-data-rate)

483
Q

__ DSL is used to provide the last mile of T1 service and uses two copper twisted pairs.

A

HDSL (high-rate)

484
Q

__ extends Fibre channel to Ethernet networks.

A

FCoE (Fibre Channel over Ethernet) since FC was designed for high-performance directly attached storage.

485
Q

__ integration is a common and phased approach for VoIP. The more long-term solution is __ integration.

A

PSTN PBX/VoIP integration: combines traditional and VoIP networks
IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes calls

486
Q

__ is a helpful network path troubleshooting tool that shows each of the nodes from a local machine to a destination.

A

traceroute, part of ICMP and built on ping

487
Q

__ is a layer 2 error correction for serial connections.

A

HDLC (High-Level Data Link Control)

488
Q

__ is a layer 2 polling method for serial connections

A

SDLC (Synchronous Data Link Control)

489
Q

__ is a simple, weak authentication mechanism that sends the password in plaintext. This can be mitigated by sending a hash of the password but this is still vulnerable to a replay attack.

A

PAP (Password Authentication Protocol)

490
Q

__ is a TCP-based logon system with robust AAA, which is why Diameter came out.

A

TACACS (Terminal Access Controller Access Control System)

491
Q

__ is a UDP-based logon system mostly focused on authentication and doesn’t focus much on authorization and accounting.

A

RADIUS (Remote Authentication Dial In User Service)

492
Q

__ is a vast improvement over WEP, requires NIC replacement and AP replacement or firmware upgrade (AES-CCMP).

A

WPA2

493
Q

__ is an authentication mechanism that uses challenge/response authentication and is not vulnerable to a replay attack.

A

CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.

494
Q

__ is an authentication mechanism, an extension to PPP and supports a variety of authentication protocols.

A

EAP (Extensible Authentication Protocol

495
Q

__ is an IETF standard (RFC 2401) for establishing encrypted communication between users and devices. It offers sophisticated replay attack prevention and was issued as an open standard thus promoting multivendor interoperability.

A

IPsec VPN

496
Q

__ is an improved version of RADIUS which focuses on all three areas of AAA.

A

Diameter

497
Q

__ is an improvement over WEP (Wired Equivalent Privacy) and compatible with WEP hardware (TKIP).

A

WPA (Wi-Fi Protected Access)

498
Q

__ is built on ping and used to plot the path a packet took through the network.

A

traceroute, part of ICMP and built on ping

499
Q

__ is layer 2 network level authentication to authenticate a device, using MAC addresses (can be spoofed) and/or certificates.

A

802.1X. Using both would be ideal.

500
Q

__ is used to find whether a given Internet host is reachable or not.

A

Ping, part of ICMP

501
Q

__ layer convers bits into electrical signals or light impulses for transmission.

A

Physical Layer 1

502
Q

__ of the OSI model connects the physical part of the network with the abstract part?

A

Data link layer 2

503
Q

__ offers SCSI disk access via TCP/IP and is routed via IP.

A

iSCSI (Internet Small Computer System Interface)

504
Q

__ or __ which are forms of __ should be used for wireless networks where we should have mutual authentication. Otherwise if just using CHAP, the server authenticates the client but the client does not authenticate the server.

A

LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), forms of EAP

505
Q

__ topology (layer 1) describes how systems are connected together e.g. bus ring, star.

A

Physical topology (layer 1)

506
Q

__ VPN is also known as Transport Mode.

A

Client-to-site VPN: provide remote access from a remote client such as a traveling sales rep or telecommuting employee.

507
Q

__ VPN is also known as Tunnel Mode.

A

Site-to-site VPN: provide connectivity to networks such as headquarters and a remote office. Gateway devices are located in front of both networks.

508
Q

__, given a MAC address, will find out what the corresponding IP address is.

A

RARP (Reverse Address Resolution Protocol)

509
Q

__, given an IP address, will find out what the corresponding MAC address is.

A

ARP (Address Resolution Protocol), so computer can determine the next hop

510
Q

105.255.255.255 is a Class __ __ broadcast address.

A

Class A directed broadcast

511
Q

150.5.255.255 is a Class __ __ broadcast address.

A

Class B directed broadcast

512
Q

802.11 supports which frequencies and speeds?

A

BAGN: 11,54,54,144+Mbps. 2.4,5,2.4,2.4/5

513
Q

802.11 supports which two physical layers?

A

IR: Infrared, requires line of sight
RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)

514
Q

A __ broadcast goes to every system on the LAN

A

limited broadcast. Will not get routed to any other networks

515
Q

A __ broadcast is where the entire address is set to all 1’s or 255.255.255.255.

A

limited broadcast

516
Q

A __ broadcast is where the host portion is set to all 1’s

A

directed broadcast

517
Q

A __ broadcast would be routed to every computer on the destination network.

A

directed broadcast

518
Q

A __ determines the path a packet will take.

A

IP address

519
Q

A __ firewall operates at layer 3.

A

packet filtering

520
Q

A __ firewall operates at layer 4.

A

stateful filtering

521
Q

A __ identifies a device by vendor code (first 3 bytes) and a unique identifier (last 3 bytes).

A

MAC address

522
Q

A __ is a layer 3 device that connects two different networks together and moves packets between networks.

A

Router

523
Q

A __ is a mapping of FCoE over the network.

A

vSAN

524
Q

A __ is a path through intermediate devices and bridges where there are multiple physical connections but virtually makes a single connection.

A

VC (Virtual Circuit)

525
Q

A __ is a physical topology that is not very scalable or fault tolerant since a single wire connects all of them together. If one goes down they all do.

A

bus. legacy Ethernet uses a bus

526
Q

A __ is a router (inline device connecting two devices together) with a filtering capability (ruleset)

A

firewall

527
Q

A __ is a single broadcast domain and defines LANs logically.

A

VLAN

528
Q

A __ is always at layer 1 of the OSI model.

A

Bit

529
Q

A __ is always at layer 2 of the OSI model.

A

Frame e.g. an Ethernet Frame

530
Q

A __ is always at layer 4 of the OSI model.

A

Segment

531
Q

A __ is information at layer 3 of the OSI model.

A

Packet

532
Q

A __ is like a bus where you connect the two endpoints together

A

ring

533
Q

A __ is often used to connect multiple bus networks.

A

tree

534
Q

A __ is the most common physical topology. It is very fault tolerant since there are multiple paths, scalable since easy to add more connections without interrupting others and easy to troulbeshoot.

A

star

535
Q

A __ is used to directly connect two similar devices (e.g. two computers, two switches, etc), otherwise there will be constant collisions.

A

crossover

536
Q

A __ is used to get to the next hop.

A

MAC address

537
Q

A __ is where two locations may be 20 miles apart which is good for a very local disaster (building fire). A __ is where two locations may be 200 miles apart which is best for large scale disasters.

A

MAN: Metropolitan Area Network, WAN: Wide Area network

538
Q

A __ line is great because it is reserved for use however when not in use you’re paying for bandwidth no one is utilizing. A __ line means you don’t need to know bandwith.

A

Dedicated line, leased line

539
Q

A __ NAT formally referred to as PAT.

A

Many to one NAT aka PAT (Port address translation)

540
Q

A __ NAT is a set of public addresses that are mapped and is not as scalable today since computers have many connections.

A

pool NAT

541
Q

A __ operates at layer 2 and can connect multiple LANs. It is useful in breaking up a large LAN into smaller LANs.

A

bridge

542
Q

A __ provides block-level network file system access and is equivalent to directly attached storage (such as an IDE, SATA or SCSI drive) via a network.

A

SAN (Storage Area Network)

543
Q

A __ provides file and directory access via Ethernet but there is no direct access to blocks or clusters.

A

NAS (Network Attached Storage)

544
Q

A __ virtual circuit is better for small data transfers or infrequent transfers. A __ virtual circuit is better for large or frequent data transfers.

A

SVC (Switched Virtual Circuit), PVC (Permanent Virtual Circuit, permanently keeps connection up rather than constantly creating and tearing down connections like SVC)

545
Q

A bridge is a layer __ device that breaks up an Ethernet domain into two different collission domains to increase performance.

A

Data link layer 2

546
Q

A computer will only use DNS if a __ is not present

A

static host file. Every OS supports a static host file which is where the computer goes first to translate a domain to IP address.

547
Q

A firewall without a ruleset, a firewall with an any-any ruleset, or a firewall with a default allow is a __.

A

Router

548
Q

A hub operates at layer __.

A

Physical layer 1 since it is just re-transmitting raw data.

549
Q

A layer __ switch can do load balancing because it is __ aware.

A

Layer 7, Application-aware

550
Q

A MAC address operates at layer __.

A

layer 2

551
Q

A modulator/demodulator that converts digital signals to analog signals, transmits over conventional telephone lines and then converts analog back to digital signals.

A

modem

552
Q

A packet filtering firewall operates at layer __.

A

3

553
Q

A proxy firewall or next gen firewall operates at layer __.

A

7

554
Q

A stateful firewall operates at layer __.

A

4

555
Q

A switch is a layer __ device that acts like a hub except that it probes each system and stores it’s MAC address so it can send communications directly from one computer to another which increases performance and security.

A

Layer 2

556
Q

A type of network that could be used by an electrical company to read meters at multiple locations in a small area without going to each location.

A

NAN (Neighborhood Area Network) e.g. so don’t have to worry about dogs/guns when he reads the meter at a house.

557
Q

All DSL requires a __ in the neighborhood.

A

POP (Point of Presence)

558
Q

An __ is connecting from your organization to only another organization (e.g. via T1, MPLS, VPN). What can be a problem with this?

A

Extranet. Your security is only as good as the other organization’s security e.g. Target’s extranet with HVAC vendor is how the adversary go to their POS systems.

559
Q

An example of a distance vector routing protocol where hop count is used as the metric is __

A

RIP (Routing Information Protocol)

560
Q

An example of a link state routing protocol which is not subject to routing loops, is more efficient, uses multiple parameters to determine the best route and only sends an update if there’s a change is __

A

OSPF (Open Shortest Path First)

561
Q

An IPv6 is __ bits or __ bytes.

A

128-bit or 16 bytes

562
Q

An unmanaged switch has no __ capability while a managed switch does. Both are layer __.

A

VLAN, Layer 2

563
Q

Any time you enter in a domain name you need to do a __ before you get to layer 3 in the protocol stack, otherwise you won’t get the IP so you won’t get routing.

A

forward lookup or gethostbyname

564
Q

As you go down a stack you __ a header. As you go up the stack you __ a header.

A

Add,Remove e.g. layer 1 processes layer 1 and then takes the header off and passes it up to layer 2

565
Q

ATM is designed for high speed networks sending small amounts of information, using 48 byte box plus 5 byte header so it’s very optimized and minimal chance of collisions. It uses layers __ and __.

A

Layers 2 & 3

566
Q

Autoconfiguration embeds the __ byte __ address into the __ portion of IPv6.

A

6 byte MAC address into the host portion of IPv6

567
Q

Client-to-site VPN which provides access from a remote client such as a traveling sales rep or telecommuting employee is also known as __.

A

Transport Mode

568
Q

Common __ solutions are iSCSI, Fibre Channel and FCoE.

A

SAN

569
Q

Convert the nibble 1101 to decimal.

A
  1. Write each digit separate 1 1 0 1. Label number from right to left 0,1,2,3. Then put base (in this case 2) on bottom left of those numbers, multiply down, add across. ‘Binary,Hex to Decimal conversion - Drawing 4A’
570
Q

CSMA with __ is a one way link and not typically used. CSMA with __ is typically used and is where the computer monitors the line to see if another computer is transmitting, if not the computer transmits.

A

CSMA/CA (collision avoidance), CSMA/CD (collision detection)

571
Q

Draw the OSI and TCP/IP models

A

OSI vs TCP-IP - Domain 4 pg 15’ Also add hub/repeater, switch/bridge, router, firewall so I know the layers for those

572
Q

Ethernet is a baseband or shared media where data is transmitted using __

A

CSMA/CD

573
Q

__ topology e.g. Ethernet, ATM defines the rules of communication across the __ topology.

A

Logical topology (layer 2), Physical topology (layer 1)

574
Q

__ applies labels to packets, is commonly used to privately control international networks and is much cheaper than dedicated lines.

A

MPLS (Multi Protocol Label Switching)

575
Q

__ are asynchronous devices that provide dial-in and dial-out connections.

A

Access servers

576
Q

__ are distributed series of caching web servers, designed to improve performance and availability by bring data closer to the end user.

A

CDN (Content Distribution Network)

577
Q

__ are the signaling protocols and __ is the packetization of your voice.

A

SIP and H.323 (which is wrapped around SIP for security), RTP (Real-time protocol)

578
Q

__ checks a system’s patches, antivirus and local firewall. If the client passes, access is granted, otherwise it is placed on an isolated VLAN where patches and antivirus updates may be provided.

A

NAC (Network Access Control). It builds on top of 802.1X.

579
Q

__ communications is where data is just sent with no need for start and stop bits. It is more efficient since there is no overhead (start/stop bits) but trasmitting and receiving stations need to be synchronized.

A

Synchronous

580
Q

__ communications is where data is sent by changes in levels of voltage or current in a sequential fashion. There are start and stop sequence bits.

A

Asynchronous

581
Q

__ DSL has the same upload and download rates.

A

SDSL (symmetric)

582
Q

__ DSL is higher download than upload. __ is much higher download than upload rates.

A

ADSL (Asymmetric), VDSL (very-high-data-rate)

583
Q

__ DSL is used to provide the last mile of T1 service and uses two copper twisted pairs.

A

HDSL (high-rate)

584
Q

__ extends Fibre channel to Ethernet networks.

A

FCoE (Fibre Channel over Ethernet) since FC was designed for high-performance directly attached storage.

585
Q

__ integration is a common and phased approach for VoIP. The more long-term solution is __ integration.

A

PSTN PBX/VoIP integration: combines traditional and VoIP networks
IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes calls

586
Q

__ is a helpful network path troubleshooting tool that shows each of the nodes from a local machine to a destination.

A

traceroute, part of ICMP and built on ping

587
Q

__ is a layer 2 error correction for serial connections.

A

HDLC (High-Level Data Link Control)

588
Q

__ is a layer 2 polling method for serial connections

A

SDLC (Synchronous Data Link Control)

589
Q

__ is a simple, weak authentication mechanism that sends the password in plaintext. This can be mitigated by sending a hash of the password but this is still vulnerable to a replay attack.

A

PAP (Password Authentication Protocol)

590
Q

__ is a TCP-based logon system with robust AAA, which is why Diameter came out.

A

TACACS (Terminal Access Controller Access Control System)

591
Q

__ is a UDP-based logon system mostly focused on authentication and doesn’t focus much on authorization and accounting.

A

RADIUS (Remote Authentication Dial In User Service)

592
Q

__ is a vast improvement over WEP, requires NIC replacement and AP replacement or firmware upgrade (AES-CCMP).

A

WPA2

593
Q

__ is an authentication mechanism that uses challenge/response authentication and is not vulnerable to a replay attack.

A

CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.

594
Q

__ is an authentication mechanism, an extension to PPP and supports a variety of authentication protocols.

A

EAP (Extensible Authentication Protocol

595
Q

__ is an IETF standard (RFC 2401) for establishing encrypted communication between users and devices. It offers sophisticated replay attack prevention and was issued as an open standard thus promoting multivendor interoperability.

A

IPsec VPN

596
Q

__ is an improved version of RADIUS which focuses on all three areas of AAA.

A

Diameter

597
Q

__ is an improvement over WEP (Wired Equivalent Privacy) and compatible with WEP hardware (TKIP).

A

WPA (Wi-Fi Protected Access)

598
Q

__ is built on ping and used to plot the path a packet took through the network.

A

traceroute, part of ICMP and built on ping

599
Q

__ is layer 2 network level authentication to authenticate a device, using MAC addresses (can be spoofed) and/or certificates.

A

802.1X. Using both would be ideal.

600
Q

__ is used to find whether a given Internet host is reachable or not.

A

Ping, part of ICMP

601
Q

__ layer convers bits into electrical signals or light impulses for transmission.

A

Physical Layer 1

602
Q

__ of the OSI model connects the physical part of the network with the abstract part?

A

Data link layer 2

603
Q

__ offers SCSI disk access via TCP/IP and is routed via IP.

A

iSCSI (Internet Small Computer System Interface)

604
Q

__ or __ which are forms of __ should be used for wireless networks where we should have mutual authentication. Otherwise if just using CHAP, the server authenticates the client but the client does not authenticate the server.

A

LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), forms of EAP

605
Q

__ topology (layer 1) describes how systems are connected together e.g. bus ring, star.

A

Physical topology (layer 1)

606
Q

__ VPN is also known as Transport Mode.

A

Client-to-site VPN: provide remote access from a remote client such as a traveling sales rep or telecommuting employee.

607
Q

__ VPN is also known as Tunnel Mode.

A

Site-to-site VPN: provide connectivity to networks such as headquarters and a remote office. Gateway devices are located in front of both networks.

608
Q

__, given a MAC address, will find out what the corresponding IP address is.

A

RARP (Reverse Address Resolution Protocol)

609
Q

__, given an IP address, will find out what the corresponding MAC address is.

A

ARP (Address Resolution Protocol), so computer can determine the next hop

610
Q

105.255.255.255 is a Class __ __ broadcast address.

A

Class A directed broadcast

611
Q

150.5.255.255 is a Class __ __ broadcast address.

A

Class B directed broadcast

612
Q

802.11 supports which frequencies and speeds?

A

BAGN: 11,54,54,144+Mbps. 2.4,5,2.4,2.4/5

613
Q

802.11 supports which two physical layers?

A

IR: Infrared, requires line of sight
RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)

614
Q

A __ broadcast goes to every system on the LAN

A

limited broadcast. Will not get routed to any other networks

615
Q

A __ broadcast is where the entire address is set to all 1’s or 255.255.255.255.

A

limited broadcast

616
Q

A __ broadcast is where the host portion is set to all 1’s

A

directed broadcast

617
Q

A __ broadcast would be routed to every computer on the destination network.

A

directed broadcast

618
Q

A __ determines the path a packet will take.

A

IP address

619
Q

A __ firewall operates at layer 3.

A

packet filtering

620
Q

A __ firewall operates at layer 4.

A

stateful filtering

621
Q

A __ identifies a device by vendor code (first 3 bytes) and a unique identifier (last 3 bytes).

A

MAC address

622
Q

A __ is a layer 3 device that connects two different networks together and moves packets between networks.

A

Router

623
Q

A __ is a mapping of FCoE over the network.

A

vSAN

624
Q

A __ is a path through intermediate devices and bridges where there are multiple physical connections but virtually makes a single connection.

A

VC (Virtual Circuit)

625
Q

A __ is a physical topology that is not very scalable or fault tolerant since a single wire connects all of them together. If one goes down they all do.

A

bus. legacy Ethernet uses a bus

626
Q

A __ is a router (inline device connecting two devices together) with a filtering capability (ruleset)

A

firewall

627
Q

A __ is a single broadcast domain and defines LANs logically.

A

VLAN

628
Q

A __ is always at layer 1 of the OSI model.

A

Bit

629
Q

A __ is always at layer 2 of the OSI model.

A

Frame e.g. an Ethernet Frame

630
Q

A __ is always at layer 4 of the OSI model.

A

Segment

631
Q

A __ is information at layer 3 of the OSI model.

A

Packet

632
Q

A __ is like a bus where you connect the two endpoints together

A

ring

633
Q

A __ is often used to connect multiple bus networks.

A

tree

634
Q

A __ is the most common physical topology. It is very fault tolerant since there are multiple paths, scalable since easy to add more connections without interrupting others and easy to troulbeshoot.

A

star

635
Q

A __ is used to directly connect two similar devices (e.g. two computers, two switches, etc), otherwise there will be constant collisions.

A

crossover

636
Q

A __ is used to get to the next hop.

A

MAC address

637
Q

A __ is where two locations may be 20 miles apart which is good for a very local disaster (building fire). A __ is where two locations may be 200 miles apart which is best for large scale disasters.

A

MAN: Metropolitan Area Network, WAN: Wide Area network

638
Q

A __ line is great because it is reserved for use however when not in use you’re paying for bandwidth no one is utilizing. A __ line means you don’t need to know bandwith.

A

Dedicated line, leased line

639
Q

A __ NAT formally referred to as PAT.

A

Many to one NAT aka PAT (Port address translation)

640
Q

A __ NAT is a set of public addresses that are mapped and is not as scalable today since computers have many connections.

A

pool NAT

641
Q

A __ operates at layer 2 and can connect multiple LANs. It is useful in breaking up a large LAN into smaller LANs.

A

bridge

642
Q

A __ provides block-level network file system access and is equivalent to directly attached storage (such as an IDE, SATA or SCSI drive) via a network.

A

SAN (Storage Area Network)

643
Q

A __ provides file and directory access via Ethernet but there is no direct access to blocks or clusters.

A

NAS (Network Attached Storage)

644
Q

A __ virtual circuit is better for small data transfers or infrequent transfers. A __ virtual circuit is better for large or frequent data transfers.

A

SVC (Switched Virtual Circuit), PVC (Permanent Virtual Circuit, permanently keeps connection up rather than constantly creating and tearing down connections like SVC)

645
Q

A bridge is a layer __ device that breaks up an Ethernet domain into two different collission domains to increase performance.

A

Data link layer 2

646
Q

A computer will only use DNS if a __ is not present

A

static host file. Every OS supports a static host file which is where the computer goes first to translate a domain to IP address.

647
Q

A firewall without a ruleset, a firewall with an any-any ruleset, or a firewall with a default allow is a __.

A

Router

648
Q

A hub operates at layer __.

A

Physical layer 1 since it is just re-transmitting raw data.

649
Q

A layer __ switch can do load balancing because it is __ aware.

A

Layer 7, Application-aware

650
Q

A MAC address operates at layer __.

A

layer 2

651
Q

A modulator/demodulator that converts digital signals to analog signals, transmits over conventional telephone lines and then converts analog back to digital signals.

A

modem

652
Q

A packet filtering firewall operates at layer __.

A

3

653
Q

A proxy firewall or next gen firewall operates at layer __.

A

7

654
Q

A stateful firewall operates at layer __.

A

4

655
Q

A switch is a layer __ device that acts like a hub except that it probes each system and stores it’s MAC address so it can send communications directly from one computer to another which increases performance and security.

A

Layer 2

656
Q

A type of network that could be used by an electrical company to read meters at multiple locations in a small area without going to each location.

A

NAN (Neighborhood Area Network) e.g. so don’t have to worry about dogs/guns when he reads the meter at a house.

657
Q

All DSL requires a __ in the neighborhood.

A

POP (Point of Presence)

658
Q

An __ is connecting from your organization to only another organization (e.g. via T1, MPLS, VPN). What can be a problem with this?

A

Extranet. Your security is only as good as the other organization’s security e.g. Target’s extranet with HVAC vendor is how the adversary go to their POS systems.

659
Q

An example of a distance vector routing protocol where hop count is used as the metric is __

A

RIP (Routing Information Protocol)

660
Q

An example of a link state routing protocol which is not subject to routing loops, is more efficient, uses multiple parameters to determine the best route and only sends an update if there’s a change is __

A

OSPF (Open Shortest Path First)

661
Q

An IPv6 is __ bits or __ bytes.

A

128-bit or 16 bytes

662
Q

An unmanaged switch has no __ capability while a managed switch does. Both are layer __.

A

VLAN, Layer 2

663
Q

Any time you enter in a domain name you need to do a __ before you get to layer 3 in the protocol stack, otherwise you won’t get the IP so you won’t get routing.

A

forward lookup or gethostbyname

664
Q

As you go down a stack you __ a header. As you go up the stack you __ a header.

A

Add,Remove e.g. layer 1 processes layer 1 and then takes the header off and passes it up to layer 2

665
Q

ATM is designed for high speed networks sending small amounts of information, using 48 byte box plus 5 byte header so it’s very optimized and minimal chance of collisions. It uses layers __ and __.

A

Layers 2 & 3

666
Q

Autoconfiguration embeds the __ byte __ address into the __ portion of IPv6.

A

6 byte MAC address into the host portion of IPv6

667
Q

Client-to-site VPN which provides access from a remote client such as a traveling sales rep or telecommuting employee is also known as __.

A

Transport Mode

668
Q

Common __ solutions are iSCSI, Fibre Channel and FCoE.

A

SAN

669
Q

Convert the nibble 1101 to decimal.

A
  1. Write each digit separate 1 1 0 1. Label number from right to left 0,1,2,3. Then put base (in this case 2) on bottom left of those numbers, multiply down, add across. ‘Binary,Hex to Decimal conversion - Drawing 4A’
670
Q

CSMA with __ is a one way link and not typically used. CSMA with __ is typically used and is where the computer monitors the line to see if another computer is transmitting, if not the computer transmits.

A

CSMA/CA (collision avoidance), CSMA/CD (collision detection)

671
Q

Draw the OSI and TCP/IP models

A

OSI vs TCP-IP - Domain 4 pg 15’ Also add hub/repeater, switch/bridge, router, firewall so I know the layers for those

672
Q

Ethernet is a baseband or shared media where data is transmitted using __

A

CSMA/CD

673
Q

__ topology e.g. Ethernet, ATM defines the rules of communication across the __ topology.

A

Logical topology (layer 2), Physical topology (layer 1)

674
Q

__ applies labels to packets, is commonly used to privately control international networks and is much cheaper than dedicated lines.

A

MPLS (Multi Protocol Label Switching)

675
Q

__ are asynchronous devices that provide dial-in and dial-out connections.

A

Access servers

676
Q

__ are distributed series of caching web servers, designed to improve performance and availability by bring data closer to the end user.

A

CDN (Content Distribution Network)

677
Q

__ are the signaling protocols and __ is the packetization of your voice.

A

SIP and H.323 (which is wrapped around SIP for security), RTP (Real-time protocol)

678
Q

__ checks a system’s patches, antivirus and local firewall. If the client passes, access is granted, otherwise it is placed on an isolated VLAN where patches and antivirus updates may be provided.

A

NAC (Network Access Control). It builds on top of 802.1X.

679
Q

__ communications is where data is just sent with no need for start and stop bits. It is more efficient since there is no overhead (start/stop bits) but trasmitting and receiving stations need to be synchronized.

A

Synchronous

680
Q

__ communications is where data is sent by changes in levels of voltage or current in a sequential fashion. There are start and stop sequence bits.

A

Asynchronous

681
Q

__ DSL has the same upload and download rates.

A

SDSL (symmetric)

682
Q

__ DSL is higher download than upload. __ is much higher download than upload rates.

A

ADSL (Asymmetric), VDSL (very-high-data-rate)

683
Q

__ DSL is used to provide the last mile of T1 service and uses two copper twisted pairs.

A

HDSL (high-rate)

684
Q

__ extends Fibre channel to Ethernet networks.

A

FCoE (Fibre Channel over Ethernet) since FC was designed for high-performance directly attached storage.

685
Q

__ integration is a common and phased approach for VoIP. The more long-term solution is __ integration.

A

PSTN PBX/VoIP integration: combines traditional and VoIP networks
IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes calls

686
Q

__ is a helpful network path troubleshooting tool that shows each of the nodes from a local machine to a destination.

A

traceroute, part of ICMP and built on ping

687
Q

__ is a layer 2 error correction for serial connections.

A

HDLC (High-Level Data Link Control)

688
Q

__ is a layer 2 polling method for serial connections

A

SDLC (Synchronous Data Link Control)

689
Q

__ is a simple, weak authentication mechanism that sends the password in plaintext. This can be mitigated by sending a hash of the password but this is still vulnerable to a replay attack.

A

PAP (Password Authentication Protocol)

690
Q

__ is a TCP-based logon system with robust AAA, which is why Diameter came out.

A

TACACS (Terminal Access Controller Access Control System)

691
Q

__ is a UDP-based logon system mostly focused on authentication and doesn’t focus much on authorization and accounting.

A

RADIUS (Remote Authentication Dial In User Service)

692
Q

__ is a vast improvement over WEP, requires NIC replacement and AP replacement or firmware upgrade (AES-CCMP).

A

WPA2

693
Q

__ is an authentication mechanism that uses challenge/response authentication and is not vulnerable to a replay attack.

A

CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.

694
Q

__ is an authentication mechanism, an extension to PPP and supports a variety of authentication protocols.

A

EAP (Extensible Authentication Protocol

695
Q

__ is an IETF standard (RFC 2401) for establishing encrypted communication between users and devices. It offers sophisticated replay attack prevention and was issued as an open standard thus promoting multivendor interoperability.

A

IPsec VPN

696
Q

__ is an improved version of RADIUS which focuses on all three areas of AAA.

A

Diameter

697
Q

__ is an improvement over WEP (Wired Equivalent Privacy) and compatible with WEP hardware (TKIP).

A

WPA (Wi-Fi Protected Access)

698
Q

__ is built on ping and used to plot the path a packet took through the network.

A

traceroute, part of ICMP and built on ping

699
Q

__ is layer 2 network level authentication to authenticate a device, using MAC addresses (can be spoofed) and/or certificates.

A

802.1X. Using both would be ideal.

700
Q

__ is used to find whether a given Internet host is reachable or not.

A

Ping, part of ICMP

701
Q

__ layer convers bits into electrical signals or light impulses for transmission.

A

Physical Layer 1

702
Q

__ of the OSI model connects the physical part of the network with the abstract part?

A

Data link layer 2

703
Q

__ offers SCSI disk access via TCP/IP and is routed via IP.

A

iSCSI (Internet Small Computer System Interface)

704
Q

__ or __ which are forms of __ should be used for wireless networks where we should have mutual authentication. Otherwise if just using CHAP, the server authenticates the client but the client does not authenticate the server.

A

LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), forms of EAP

705
Q

__ topology (layer 1) describes how systems are connected together e.g. bus ring, star.

A

Physical topology (layer 1)

706
Q

__ VPN is also known as Transport Mode.

A

Client-to-site VPN: provide remote access from a remote client such as a traveling sales rep or telecommuting employee.

707
Q

__ VPN is also known as Tunnel Mode.

A

Site-to-site VPN: provide connectivity to networks such as headquarters and a remote office. Gateway devices are located in front of both networks.

708
Q

__, given a MAC address, will find out what the corresponding IP address is.

A

RARP (Reverse Address Resolution Protocol)

709
Q

__, given an IP address, will find out what the corresponding MAC address is.

A

ARP (Address Resolution Protocol), so computer can determine the next hop

710
Q

105.255.255.255 is a Class __ __ broadcast address.

A

Class A directed broadcast

711
Q

150.5.255.255 is a Class __ __ broadcast address.

A

Class B directed broadcast

712
Q

802.11 supports which frequencies and speeds?

A

BAGN: 11,54,54,144+Mbps. 2.4,5,2.4,2.4/5

713
Q

802.11 supports which two physical layers?

A

IR: Infrared, requires line of sight
RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)

714
Q

A __ broadcast goes to every system on the LAN

A

limited broadcast. Will not get routed to any other networks

715
Q

A __ broadcast is where the entire address is set to all 1’s or 255.255.255.255.

A

limited broadcast

716
Q

A __ broadcast is where the host portion is set to all 1’s

A

directed broadcast

717
Q

A __ broadcast would be routed to every computer on the destination network.

A

directed broadcast

718
Q

A __ determines the path a packet will take.

A

IP address

719
Q

A __ firewall operates at layer 3.

A

packet filtering

720
Q

A __ firewall operates at layer 4.

A

stateful filtering

721
Q

A __ identifies a device by vendor code (first 3 bytes) and a unique identifier (last 3 bytes).

A

MAC address

722
Q

A __ is a layer 3 device that connects two different networks together and moves packets between networks.

A

Router

723
Q

A __ is a mapping of FCoE over the network.

A

vSAN

724
Q

A __ is a path through intermediate devices and bridges where there are multiple physical connections but virtually makes a single connection.

A

VC (Virtual Circuit)

725
Q

A __ is a physical topology that is not very scalable or fault tolerant since a single wire connects all of them together. If one goes down they all do.

A

bus. legacy Ethernet uses a bus

726
Q

A __ is a router (inline device connecting two devices together) with a filtering capability (ruleset)

A

firewall

727
Q

A __ is a single broadcast domain and defines LANs logically.

A

VLAN

728
Q

A __ is always at layer 1 of the OSI model.

A

Bit

729
Q

A __ is always at layer 2 of the OSI model.

A

Frame e.g. an Ethernet Frame

730
Q

A __ is always at layer 4 of the OSI model.

A

Segment

731
Q

A __ is information at layer 3 of the OSI model.

A

Packet

732
Q

A __ is like a bus where you connect the two endpoints together

A

ring

733
Q

A __ is often used to connect multiple bus networks.

A

tree

734
Q

A __ is the most common physical topology. It is very fault tolerant since there are multiple paths, scalable since easy to add more connections without interrupting others and easy to troulbeshoot.

A

star

735
Q

A __ is used to directly connect two similar devices (e.g. two computers, two switches, etc), otherwise there will be constant collisions.

A

crossover

736
Q

A __ is used to get to the next hop.

A

MAC address

737
Q

A __ is where two locations may be 20 miles apart which is good for a very local disaster (building fire). A __ is where two locations may be 200 miles apart which is best for large scale disasters.

A

MAN: Metropolitan Area Network, WAN: Wide Area network

738
Q

A __ line is great because it is reserved for use however when not in use you’re paying for bandwidth no one is utilizing. A __ line means you don’t need to know bandwith.

A

Dedicated line, leased line

739
Q

A __ NAT formally referred to as PAT.

A

Many to one NAT aka PAT (Port address translation)

740
Q

A __ NAT is a set of public addresses that are mapped and is not as scalable today since computers have many connections.

A

pool NAT

741
Q

A __ operates at layer 2 and can connect multiple LANs. It is useful in breaking up a large LAN into smaller LANs.

A

bridge

742
Q

A __ provides block-level network file system access and is equivalent to directly attached storage (such as an IDE, SATA or SCSI drive) via a network.

A

SAN (Storage Area Network)

743
Q

A __ provides file and directory access via Ethernet but there is no direct access to blocks or clusters.

A

NAS (Network Attached Storage)

744
Q

A __ virtual circuit is better for small data transfers or infrequent transfers. A __ virtual circuit is better for large or frequent data transfers.

A

SVC (Switched Virtual Circuit), PVC (Permanent Virtual Circuit, permanently keeps connection up rather than constantly creating and tearing down connections like SVC)

745
Q

A bridge is a layer __ device that breaks up an Ethernet domain into two different collission domains to increase performance.

A

Data link layer 2

746
Q

A computer will only use DNS if a __ is not present

A

static host file. Every OS supports a static host file which is where the computer goes first to translate a domain to IP address.

747
Q

A firewall without a ruleset, a firewall with an any-any ruleset, or a firewall with a default allow is a __.

A

Router

748
Q

A hub operates at layer __.

A

Physical layer 1 since it is just re-transmitting raw data.

749
Q

A layer __ switch can do load balancing because it is __ aware.

A

Layer 7, Application-aware

750
Q

A MAC address operates at layer __.

A

layer 2

751
Q

A modulator/demodulator that converts digital signals to analog signals, transmits over conventional telephone lines and then converts analog back to digital signals.

A

modem

752
Q

A packet filtering firewall operates at layer __.

A

3

753
Q

A proxy firewall or next gen firewall operates at layer __.

A

7

754
Q

A stateful firewall operates at layer __.

A

4

755
Q

A switch is a layer __ device that acts like a hub except that it probes each system and stores it’s MAC address so it can send communications directly from one computer to another which increases performance and security.

A

Layer 2

756
Q

A type of network that could be used by an electrical company to read meters at multiple locations in a small area without going to each location.

A

NAN (Neighborhood Area Network) e.g. so don’t have to worry about dogs/guns when he reads the meter at a house.

757
Q

All DSL requires a __ in the neighborhood.

A

POP (Point of Presence)

758
Q

An __ is connecting from your organization to only another organization (e.g. via T1, MPLS, VPN). What can be a problem with this?

A

Extranet. Your security is only as good as the other organization’s security e.g. Target’s extranet with HVAC vendor is how the adversary go to their POS systems.

759
Q

An example of a distance vector routing protocol where hop count is used as the metric is __

A

RIP (Routing Information Protocol)

760
Q

An example of a link state routing protocol which is not subject to routing loops, is more efficient, uses multiple parameters to determine the best route and only sends an update if there’s a change is __

A

OSPF (Open Shortest Path First)

761
Q

An IPv6 is __ bits or __ bytes.

A

128-bit or 16 bytes

762
Q

An unmanaged switch has no __ capability while a managed switch does. Both are layer __.

A

VLAN, Layer 2

763
Q

Any time you enter in a domain name you need to do a __ before you get to layer 3 in the protocol stack, otherwise you won’t get the IP so you won’t get routing.

A

forward lookup or gethostbyname

764
Q

As you go down a stack you __ a header. As you go up the stack you __ a header.

A

Add,Remove e.g. layer 1 processes layer 1 and then takes the header off and passes it up to layer 2

765
Q

ATM is designed for high speed networks sending small amounts of information, using 48 byte box plus 5 byte header so it’s very optimized and minimal chance of collisions. It uses layers __ and __.

A

Layers 2 & 3

766
Q

Autoconfiguration embeds the __ byte __ address into the __ portion of IPv6.

A

6 byte MAC address into the host portion of IPv6

767
Q

Client-to-site VPN which provides access from a remote client such as a traveling sales rep or telecommuting employee is also known as __.

A

Transport Mode

768
Q

Common __ solutions are iSCSI, Fibre Channel and FCoE.

A

SAN

769
Q

Convert the nibble 1101 to decimal.

A
  1. Write each digit separate 1 1 0 1. Label number from right to left 0,1,2,3. Then put base (in this case 2) on bottom left of those numbers, multiply down, add across. ‘Binary,Hex to Decimal conversion - Drawing 4A’
770
Q

CSMA with __ is a one way link and not typically used. CSMA with __ is typically used and is where the computer monitors the line to see if another computer is transmitting, if not the computer transmits.

A

CSMA/CA (collision avoidance), CSMA/CD (collision detection)

771
Q

Draw the OSI and TCP/IP models

A

OSI vs TCP-IP - Domain 4 pg 15’ Also add hub/repeater, switch/bridge, router, firewall so I know the layers for those

772
Q

Ethernet is a baseband or shared media where data is transmitted using __

A

CSMA/CD

773
Q

__ topology e.g. Ethernet, ATM defines the rules of communication across the __ topology.

A

Logical topology (layer 2), Physical topology (layer 1)

774
Q

__ applies labels to packets, is commonly used to privately control international networks and is much cheaper than dedicated lines.

A

MPLS (Multi Protocol Label Switching)

775
Q

__ are asynchronous devices that provide dial-in and dial-out connections.

A

Access servers

776
Q

__ are distributed series of caching web servers, designed to improve performance and availability by bring data closer to the end user.

A

CDN (Content Distribution Network)

777
Q

__ are the signaling protocols and __ is the packetization of your voice.

A

SIP and H.323 (which is wrapped around SIP for security), RTP (Real-time protocol)

778
Q

__ checks a system’s patches, antivirus and local firewall. If the client passes, access is granted, otherwise it is placed on an isolated VLAN where patches and antivirus updates may be provided.

A

NAC (Network Access Control). It builds on top of 802.1X.

779
Q

__ communications is where data is just sent with no need for start and stop bits. It is more efficient since there is no overhead (start/stop bits) but trasmitting and receiving stations need to be synchronized.

A

Synchronous

780
Q

__ communications is where data is sent by changes in levels of voltage or current in a sequential fashion. There are start and stop sequence bits.

A

Asynchronous

781
Q

__ DSL has the same upload and download rates.

A

SDSL (symmetric)

782
Q

__ DSL is higher download than upload. __ is much higher download than upload rates.

A

ADSL (Asymmetric), VDSL (very-high-data-rate)

783
Q

__ DSL is used to provide the last mile of T1 service and uses two copper twisted pairs.

A

HDSL (high-rate)

784
Q

__ extends Fibre channel to Ethernet networks.

A

FCoE (Fibre Channel over Ethernet) since FC was designed for high-performance directly attached storage.

785
Q

__ integration is a common and phased approach for VoIP. The more long-term solution is __ integration.

A

PSTN PBX/VoIP integration: combines traditional and VoIP networks
IP PBX/PSTN integration:users must use VoIP phones, IP PBX is a soft-switch that routes calls

786
Q

__ is a helpful network path troubleshooting tool that shows each of the nodes from a local machine to a destination.

A

traceroute, part of ICMP and built on ping

787
Q

__ is a layer 2 error correction for serial connections.

A

HDLC (High-Level Data Link Control)

788
Q

__ is a layer 2 polling method for serial connections

A

SDLC (Synchronous Data Link Control)

789
Q

__ is a simple, weak authentication mechanism that sends the password in plaintext. This can be mitigated by sending a hash of the password but this is still vulnerable to a replay attack.

A

PAP (Password Authentication Protocol)

790
Q

__ is a TCP-based logon system with robust AAA, which is why Diameter came out.

A

TACACS (Terminal Access Controller Access Control System)

791
Q

__ is a UDP-based logon system mostly focused on authentication and doesn’t focus much on authorization and accounting.

A

RADIUS (Remote Authentication Dial In User Service)

792
Q

__ is a vast improvement over WEP, requires NIC replacement and AP replacement or firmware upgrade (AES-CCMP).

A

WPA2

793
Q

__ is an authentication mechanism that uses challenge/response authentication and is not vulnerable to a replay attack.

A

CHAP (Challenge-Handshake Authentication Protocol). It should be used instead of PAP wherever possible.

794
Q

__ is an authentication mechanism, an extension to PPP and supports a variety of authentication protocols.

A

EAP (Extensible Authentication Protocol

795
Q

__ is an IETF standard (RFC 2401) for establishing encrypted communication between users and devices. It offers sophisticated replay attack prevention and was issued as an open standard thus promoting multivendor interoperability.

A

IPsec VPN

796
Q

__ is an improved version of RADIUS which focuses on all three areas of AAA.

A

Diameter

797
Q

__ is an improvement over WEP (Wired Equivalent Privacy) and compatible with WEP hardware (TKIP).

A

WPA (Wi-Fi Protected Access)

798
Q

__ is built on ping and used to plot the path a packet took through the network.

A

traceroute, part of ICMP and built on ping

799
Q

__ is layer 2 network level authentication to authenticate a device, using MAC addresses (can be spoofed) and/or certificates.

A

802.1X. Using both would be ideal.

800
Q

__ is used to find whether a given Internet host is reachable or not.

A

Ping, part of ICMP

801
Q

__ layer convers bits into electrical signals or light impulses for transmission.

A

Physical Layer 1

802
Q

__ of the OSI model connects the physical part of the network with the abstract part?

A

Data link layer 2

803
Q

__ offers SCSI disk access via TCP/IP and is routed via IP.

A

iSCSI (Internet Small Computer System Interface)

804
Q

__ or __ which are forms of __ should be used for wireless networks where we should have mutual authentication. Otherwise if just using CHAP, the server authenticates the client but the client does not authenticate the server.

A

LEAP (Lightweight Extensible Authentication Protocol or PEAP (Protected Extensible Authentication Protocol), forms of EAP

805
Q

__ topology (layer 1) describes how systems are connected together e.g. bus ring, star.

A

Physical topology (layer 1)

806
Q

__ VPN is also known as Transport Mode.

A

Client-to-site VPN: provide remote access from a remote client such as a traveling sales rep or telecommuting employee.

807
Q

__ VPN is also known as Tunnel Mode.

A

Site-to-site VPN: provide connectivity to networks such as headquarters and a remote office. Gateway devices are located in front of both networks.

808
Q

__, given a MAC address, will find out what the corresponding IP address is.

A

RARP (Reverse Address Resolution Protocol)

809
Q

__, given an IP address, will find out what the corresponding MAC address is.

A

ARP (Address Resolution Protocol), so computer can determine the next hop

810
Q

105.255.255.255 is a Class __ __ broadcast address.

A

Class A directed broadcast

811
Q

150.5.255.255 is a Class __ __ broadcast address.

A

Class B directed broadcast

812
Q

802.11 supports which frequencies and speeds?

A

BAGN: 11,54,54,144+Mbps. 2.4,5,2.4,2.4/5

813
Q

802.11 supports which two physical layers?

A

IR: Infrared, requires line of sight
RF (Radio Frequency): FHSS (Frequency Hopping Spread Spectrum; police on CB radios used to hop to different frequencies every 10 seconds so that’s all you could hear), DSSS (Direct Sequence Spread Spectrum, if you have small channels break up data into pieces and transfer in lots of small chunks)

814
Q

A __ broadcast goes to every system on the LAN

A

limited broadcast. Will not get routed to any other networks

815
Q

A __ broadcast is where the entire address is set to all 1’s or 255.255.255.255.

A

limited broadcast

816
Q

A __ broadcast is where the host portion is set to all 1’s

A

directed broadcast

817
Q

A __ broadcast would be routed to every computer on the destination network.

A

directed broadcast

818
Q

A __ determines the path a packet will take.

A

IP address

819
Q

A __ firewall operates at layer 3.

A

packet filtering

820
Q

A __ firewall operates at layer 4.

A

stateful filtering

821
Q

A __ identifies a device by vendor code (first 3 bytes) and a unique identifier (last 3 bytes).

A

MAC address

822
Q

A __ is a layer 3 device that connects two different networks together and moves packets between networks.

A

Router

823
Q

A __ is a mapping of FCoE over the network.

A

vSAN

824
Q

A __ is a path through intermediate devices and bridges where there are multiple physical connections but virtually makes a single connection.

A

VC (Virtual Circuit)

825
Q

A __ is a physical topology that is not very scalable or fault tolerant since a single wire connects all of them together. If one goes down they all do.

A

bus. legacy Ethernet uses a bus

826
Q

A __ is a router (inline device connecting two devices together) with a filtering capability (ruleset)

A

firewall

827
Q

A __ is a single broadcast domain and defines LANs logically.

A

VLAN

828
Q

A __ is always at layer 1 of the OSI model.

A

Bit

829
Q

A __ is always at layer 2 of the OSI model.

A

Frame e.g. an Ethernet Frame

830
Q

A __ is always at layer 4 of the OSI model.

A

Segment

831
Q

A __ is information at layer 3 of the OSI model.

A

Packet

832
Q

A __ is like a bus where you connect the two endpoints together

A

ring

833
Q

A __ is often used to connect multiple bus networks.

A

tree

834
Q

A __ is the most common physical topology. It is very fault tolerant since there are multiple paths, scalable since easy to add more connections without interrupting others and easy to troulbeshoot.

A

star

835
Q

A __ is used to directly connect two similar devices (e.g. two computers, two switches, etc), otherwise there will be constant collisions.

A

crossover

836
Q

A __ is used to get to the next hop.

A

MAC address

837
Q

A __ is where two locations may be 20 miles apart which is good for a very local disaster (building fire). A __ is where two locations may be 200 miles apart which is best for large scale disasters.

A

MAN: Metropolitan Area Network, WAN: Wide Area network

838
Q

A __ line is great because it is reserved for use however when not in use you’re paying for bandwidth no one is utilizing. A __ line means you don’t need to know bandwith.

A

Dedicated line, leased line

839
Q

A __ NAT formally referred to as PAT.

A

Many to one NAT aka PAT (Port address translation)

840
Q

A __ NAT is a set of public addresses that are mapped and is not as scalable today since computers have many connections.

A

pool NAT

841
Q

A __ operates at layer 2 and can connect multiple LANs. It is useful in breaking up a large LAN into smaller LANs.

A

bridge

842
Q

A __ provides block-level network file system access and is equivalent to directly attached storage (such as an IDE, SATA or SCSI drive) via a network.

A

SAN (Storage Area Network)

843
Q

A __ provides file and directory access via Ethernet but there is no direct access to blocks or clusters.

A

NAS (Network Attached Storage)

844
Q

A __ virtual circuit is better for small data transfers or infrequent transfers. A __ virtual circuit is better for large or frequent data transfers.

A

SVC (Switched Virtual Circuit), PVC (Permanent Virtual Circuit, permanently keeps connection up rather than constantly creating and tearing down connections like SVC)

845
Q

A bridge is a layer __ device that breaks up an Ethernet domain into two different collission domains to increase performance.

A

Data link layer 2

846
Q

A computer will only use DNS if a __ is not present

A

static host file. Every OS supports a static host file which is where the computer goes first to translate a domain to IP address.

847
Q

A firewall without a ruleset, a firewall with an any-any ruleset, or a firewall with a default allow is a __.

A

Router

848
Q

A hub operates at layer __.

A

Physical layer 1 since it is just re-transmitting raw data.

849
Q

A layer __ switch can do load balancing because it is __ aware.

A

Layer 7, Application-aware

850
Q

A MAC address operates at layer __.

A

layer 2

851
Q

A modulator/demodulator that converts digital signals to analog signals, transmits over conventional telephone lines and then converts analog back to digital signals.

A

modem

852
Q

A packet filtering firewall operates at layer __.

A

3

853
Q

A proxy firewall or next gen firewall operates at layer __.

A

7

854
Q

A stateful firewall operates at layer __.

A

4

855
Q

A switch is a layer __ device that acts like a hub except that it probes each system and stores it’s MAC address so it can send communications directly from one computer to another which increases performance and security.

A

Layer 2

856
Q

A type of network that could be used by an electrical company to read meters at multiple locations in a small area without going to each location.

A

NAN (Neighborhood Area Network) e.g. so don’t have to worry about dogs/guns when he reads the meter at a house.

857
Q

All DSL requires a __ in the neighborhood.

A

POP (Point of Presence)

858
Q

An __ is connecting from your organization to only another organization (e.g. via T1, MPLS, VPN). What can be a problem with this?

A

Extranet. Your security is only as good as the other organization’s security e.g. Target’s extranet with HVAC vendor is how the adversary go to their POS systems.

859
Q

An example of a distance vector routing protocol where hop count is used as the metric is __

A

RIP (Routing Information Protocol)

860
Q

An example of a link state routing protocol which is not subject to routing loops, is more efficient, uses multiple parameters to determine the best route and only sends an update if there’s a change is __

A

OSPF (Open Shortest Path First)

861
Q

An IPv6 is __ bits or __ bytes.

A

128-bit or 16 bytes

862
Q

An unmanaged switch has no __ capability while a managed switch does. Both are layer __.

A

VLAN, Layer 2

863
Q

Any time you enter in a domain name you need to do a __ before you get to layer 3 in the protocol stack, otherwise you won’t get the IP so you won’t get routing.

A

forward lookup or gethostbyname

864
Q

As you go down a stack you __ a header. As you go up the stack you __ a header.

A

Add,Remove e.g. layer 1 processes layer 1 and then takes the header off and passes it up to layer 2

865
Q

ATM is designed for high speed networks sending small amounts of information, using 48 byte box plus 5 byte header so it’s very optimized and minimal chance of collisions. It uses layers __ and __.

A

Layers 2 & 3

866
Q

Autoconfiguration embeds the __ byte __ address into the __ portion of IPv6.

A

6 byte MAC address into the host portion of IPv6

867
Q

Client-to-site VPN which provides access from a remote client such as a traveling sales rep or telecommuting employee is also known as __.

A

Transport Mode

868
Q

Common __ solutions are iSCSI, Fibre Channel and FCoE.

A

SAN

869
Q

Convert the nibble 1101 to decimal.

A
  1. Write each digit separate 1 1 0 1. Label number from right to left 0,1,2,3. Then put base (in this case 2) on bottom left of those numbers, multiply down, add across. ‘Binary,Hex to Decimal conversion - Drawing 4A’
870
Q

CSMA with __ is a one way link and not typically used. CSMA with __ is typically used and is where the computer monitors the line to see if another computer is transmitting, if not the computer transmits.

A

CSMA/CA (collision avoidance), CSMA/CD (collision detection)

871
Q

Draw the OSI and TCP/IP models

A

OSI vs TCP-IP - Domain 4 pg 15’ Also add hub/repeater, switch/bridge, router, firewall so I know the layers for those

872
Q

Ethernet is a baseband or shared media where data is transmitted using __

A

CSMA/CD