Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
50 Cards in this Set
- Front
- Back
What are the six basic security services to secure OSI communications?
|
Authentication
Access Control Data confidentiality Data integrity Non repudiation Logging and Monitoring |
|
What layers of the OSI model does TCP/IP generally operate in?
|
Transport and Network Layers
|
|
In the TCP/IP model what is layer is considered comparable to the OSI transport layer?
|
Host-to-host layer
|
|
What does the host-to-host-layer in TCP/IP do?
|
Provides reliable end-to-end communications, ensures error free delivery of the data, handles packet sequencing of the data and maintains the integrity of the data.
|
|
What are the primary host-to-host layer protocols?
|
TCP/UDP
|
|
In the TCP/IP model what layer most closely corresponds to the OSI Network layer?
|
Internet Layer
|
|
What are the primary Internet layer protocols?
|
IP, ARP, RARP, ICMP
|
|
In the TCP/IP model the Network access layer most closely resembles what layer(s) of the OSI model?
|
Data-link/physical
|
|
Ports that are dynamically assigned by the source host are usually some number greater than...
|
1023
|
|
What is ARP used for?
|
To resolve a MAC address from a given IP
|
|
What is RARP?
|
To resolve an IP address from a given MAC
|
|
Which bytes on a MAC address identify the manufacturer?
|
The first three bytes
|
|
What is the primary function of ICMP?
|
To send messages between network devices regarding the health of the network.
|
|
What is BootP?
|
A successor to ARP, it allows a diskless workstation to obtain an IP from a BootP server.
|
|
What type of topology does Ethernet define?
|
Bus
|
|
What type of access method does Arcnet use?
|
token passing
|
|
What is an issue with the deployment of Arcnet networks?
|
node addresses of each station must be set manually during installation.
|
|
What physical topology is ARCnet?
|
Star/coax cable
|
|
In a token ring architecture what are all stations connected to?
|
MSAU
|
|
What Ohm rating of cable is used for digital signaling?
|
50 Ohm
|
|
What Ohm rating of cable is used for analog signaling and high speed digital signaling?
|
75Ohm
|
|
True or False:
Coax requires fixed spacing between connections |
True
|
|
How many Mbps is Cat2 rated for?
|
4Mbps
|
|
What type of networks is Cat3 cable used in?
|
10BaseT
|
|
How many Mbps is Cat6 cable rating for?
|
155 Mbps
|
|
How many Mbps is Cat7 cable rating for?
|
1Gbps
|
|
What is the maximum effective length of fiber cabling?
|
2 Km
|
|
What are the five common LAN topologies?
|
BUS, RING, STAR, TREE and MESH
|
|
Where do dumb devices like repeaters and hubs operate at?
|
Physical layer
|
|
What protocol was developed to stop broadcast storms?
|
Spanning Tree Protocol (802.1d)
|
|
What are the five steps of transparent bridging?
|
Learning
Flooding filtering forwarding Aging |
|
What is distance vector routing?
|
uses RIP to maintain a dynamic table of routing information .
|
|
What does RIP base its routing decisions on?
|
Number of hops
|
|
What are link state routers?
|
similar to distance vector routers but they use only first hand information and maintain copies of other routers tables.
|
|
What is IGRP
|
A Cisco routing protocol that uses composite metrics including bandwidth, delay, reliability, loading and transmission unit to determine the best routing path.
|
|
What is a big difference between a router and a Layer 3 Switch?
|
Layer 3 Switches have optimized hardware to pass data faster.
|
|
Which is faster a router or a Layer 3 switch?
|
Layer 3 switch
|
|
What is the VLAN Trunking Protocol?
|
a protocol that allows switches use to communicate among themselves about VLAN configuration
|
|
What is a packet filtering firewall?
|
Examines both the source and destination address of the incoming data packet and then blocks or forwards that packet based on ACLs
|
|
At what layer of the OSI model do packet filtering firewalls operate?
|
Network Layer
|
|
What is a liability of packet filtering firewalls?
|
It doesn't keep a history of the communications sessions.
|
|
How does an application layer firewall operate?
|
Like a proxy server it examines the packets and masks the source IPs from the internal network. It operates at Layer 7 and can intelligently filter protocols and application use on the network.
|
|
What type of preliminary attack is an application firewall good at thwarting?
|
network probing
|
|
What type of firewall uses an inspection engine to maintian information in a dynamic state table and evaluate subsequent connections?
|
Stateful inspection
|
|
What is a dual homed host?
|
A type of firewall that has two NICS but no screening router
|
|
What is an important step to remember when configuring a dual homed host?
|
To disable automatic bridging/routing
|
|
What components make up a screened subnet firewall?
|
Two screening routers and a bastion host or proxy
|
|
What port does SOCK use?
|
1080
|
|
What does it mean to be SOCKSified?
|
altering applications or protocols to use SOCK based network calls in lieu of standard network calls
|
|
What are the three parts of SSH
|
a Transport Layer protocol, User Authentication protocol, Connection protocol
|