IT CertificationsComprehensive Study Set

Cissp Sunflower

234 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

AMP - Asymmetric multiprocessing

ANSWER

- used in applications that are dedicated, such as embedded systems, when individual processors can be dedicated to specific tasks at design time.

QUESTION 2

Application - layer 7 - C, AU, I, NR

ANSWER

FTP, SNMP, TELNET, TFTP, SMTP, HTTP, NNTP, CDP, GOPHER, SMB, NDS, AFP, SAP, NCP, SET, LDAP. Technology: Gateways. User data

QUESTION 3

Secure HTTP, S-HTTP

ANSWER

encrypting HTTP documents. Also overtaken by SSL

QUESTION 4

SSL, Secure Socket Layer

ANSWER

encryption technology to provide secure transactions like credit card numbers exchange. Two layered: SSL record protocol and handshake protocol. Same as SSH it uses symmetric encryption for private connections and asymmetric or public key cryptography for peer authentication.

QUESTION 5

Secure Electronic Transaction (SET)

ANSWER

authentication for credit card transactions. Overtaken by SSL Also uses message authentication code for integrity checking.

QUESTION 6

Telnet

ANSWER

terminal emulation enables user to access resources on another machine. Port 23

QUESTION 7

FTP, File Transfer Protocol (Layer 7)

ANSWER

for file transfers. Cannot execute remote files as programs. Authentication. Port 20 and 21

QUESTION 8

TFTP, Trivial File Transfer Protocol (Layer 7)

ANSWER

stripped down, can only send/receive but not browse directories. No authentication thus insecure. Port 69

QUESTION 9

SMTP, Simple Mail Transfer protocol (Layer 7)

ANSWER

email queuing. Port 25 (UDP)

QUESTION 10

SNMP, Simple Networking Management Protocol (layer 7)

ANSWER

collection of network information by polling the devices from a management station. Sends out alerts -called traps- to an database called Management Information Bases (MIBs)

QUESTION 11

Presentation - layer 6 - C, AU, Encryption

ANSWER

Translations like EBCDIC/ANSI; compression/decompression and encryption/decryption. Uses a common format to represent data, Standards like JPEG, TIFF, MID, HTML; Technology: Gateway. Messages

QUESTION 12

Session -layer 5 -- None

ANSWER

Inter-host communication, logical persistent connection between peer hosts, a conversation, simplex, half duplex, full duplex. Protocols as NFS, SQL, RADIUS, and RPC. Protocols: PAP, PPTP, RPC Technology: Gateway PAP - Password Authentication Protocol PPTP - Point-to-Point Tunneling Protocol RPC - Remote Procedure Call Protocol

QUESTION 13

NFS, Network File System

ANSWER

protocol that supports file sharing between two different file systems

QUESTION 14

Transport - layer 4 - C, AU, I

ANSWER

End-to-end data transfer services and reliability. Technology: Gateways. Segmentation, sequencing, and error checking at this layer. Datagrams

QUESTION 15

TCP Three-way Handshake

ANSWER

SYN, SYN-/ACK, ACK Protocols: TCP, UDP, SSL, SSH-2, SPX, NetBIOS, ATP

QUESTION 16

Secure Shell (SSH-2)

ANSWER

Authentication, compression, confidentiality and integrity. Uses RSA certificates for authentication and triple DES for encryption

QUESTION 17

TCP, Transmission control protocol

ANSWER

reliable, sequences and works with acknowledgements. Provides a manageable data flow to avoid congestions overloading and data loss. (Like having a telephone conversation with someone). Connection Oriented.

QUESTION 18

User UDP, Datagram protocol

ANSWER

unreliable, scaled down version of TCP, no error correction, no sequencing. Less overhead. (Like sending a letter to someone). Connectionless.

QUESTION 19

Network - layer 3 - C, AU, I

ANSWER

Path selection and logical/network addressing. Technology: Virtual circuits (ATM), routers.

QUESTION 20

Packets Addressing

ANSWER

- IP uses the destination IP to transmit packets thru networks until delivered

QUESTION 21

Fragmentation

ANSWER

IP will subdivide a packet if its size is greater than the maximum allowed on a local network Message routing, error detection and control of node data are managed. IP, IPSEC, ICMP, BGP, OSPF, RIP, BOOTP, DHCP, ZIP, DDP, X.25, NAT and IGMP

QUESTION 22

OSPF Open Shortest Path First

ANSWER

routing protocol short path

QUESTION 23

SKIP, Simple Key Management for Internet Protocols

ANSWER

provides high availability in encrypted sessions to protect against crashes. Exchanges keys on a session by session basis.

QUESTION 24

ARP, Address resolution protocol

ANSWER

Used to match an IP address to a hardware MAC address. ARP sends out broadcast to a network node to reply with its hardware address. It stores the address in a dynamic table for the duration of the session, so ARP requests are only sent the first time

QUESTION 25

ICMP, Internet control message protocol

ANSWER

sends messages between network nodes regarding the health of the network. Also informs about rerouting in case of errors. Utility PING uses ICMP messages to check physical connectivity of the network machines IPX, Appletalk, and NetBEUI are non-IP protocols. IP, Internet protocol - all hosts have an IP address. Each data packet has an IP address of sender and recipient. Routing in network is based upon these addresses. Datagram service is considered unreliable because there's no guarantee that the packet will be delivered, not even that its delivered only once and no guarantee that its delivered in the same sequence that its sent 32 bits long, IPv6 is 128 bits long

QUESTION 26

DHCP

ANSWER

DHCP: Dynamic Host Configuration Protocol

QUESTION 27

BootP, Bootstrap Protocol

ANSWER

when wireless workstation is on-line it sends out a BootP request with its MAC address to get an IP address and the file from which it should boot. Replaced by DHCP

QUESTION 28

Data Link - layer 2 - C

ANSWER

This layer deals with addressing physical hardware. FRAMES Translates data into bits and formats them into data frames with destination header and source address. Error detection via checksums. LLC, the Logical Link Control Sub layer - Flow control and error notification

QUESTION 29

MAC: the Media Access Control layer

ANSWER

Physical addressing. Concerns frames, logical topologies and MAC-addresses Protocols: L2F, PPTP, L2TP, PPP, SLIP, ARP, RARP, SLARP, IARP, SNAP, BAP, CHAP, LCP, LZS, MLP, Frame Relay, Annex A, Annex D, HDLC, BPDU, LAPD, ISL, MAC, Ethernet, Token Ring, FDDI

QUESTION 30

RARP, Reverse address resolution protocol

ANSWER

When a hardware address is known but the IP address has to be found. (like an diskless machine) Switches, bridges, hardware addressing

QUESTION 31

Physical - layer 1 - C

ANSWER

Developed by Department of Defense in the 1970s to support the construction of the internet (Hubs, Cables, Modem)

QUESTION 32

LPD, Line printer daemon (Network layers TCP/IP Model)

ANSWER

for printing and spooling

QUESTION 33

X Windows (Network layers TCP/IP Model)

ANSWER

graphical user interface

QUESTION 34

Dedicated security mode :

ANSWER

- All users can access all data. - Clearance for all information. - Need to know for ALL data system high security mode: - All users can access some data, based on need to know - Clearance for all information - Need to know for SOME data compartmented security mode: - All users can access some data, based on their need to know and approval. - Clearance for all information they access - Need to know for SOME data - Use of information labels Multi-level: - All users can access some data, based on their need to know, approval and clearance. - Clearance for all information they access - Need to know for SOME data Others: controlled type of multilevel security where a limited amount of trust is placed in the system's hardware/software along with classification limited access: minimum user clearance is not cleared and the maximum data classification is unclassified but sensitive

QUESTION 35

Firewalls

ANSWER

A method of guarding a private network by analyzing the data leaving and entering. Firewalls can also provide network address translation, so the IP addresses of computers inside the firewall stay hidden from view.

QUESTION 36

Packet-filtering firewalls (layer 3/4)

ANSWER

use rules based on a packet's source, destination, port or other basic information to determine whether or not to allow it into the network.

QUESTION 37

Stateful packet filtering firewalls (layer 5)

ANSWER

have access to information such as; conversation, look at state table and context of packets; from which to make their decisions.

QUESTION 38

Application Proxy firewalls (layer 7) (3-7 actually)-

ANSWER

which look at content and can involve authentication and encryption, can be more flexible and secure but also tend to be far slower.

QUESTION 39

Circuit level proxy (layer 5)-

ANSWER

looks at header of packet only, protects wide range of protocols and services than app-level proxy, but as detailed a level of control. Basically once the circuit is allowed all info is tunneled between the parties. Although firewalls are difficult to configure correctly, they are a critical component of network security.

QUESTION 40

IEEE 802.15 is the standard for Bluetooth. IEEE 802.3 defines Ethernet, 802.11 defines wireless networking, and 802.20 defines LTE

ANSWER

802.11 2 Mbps 2.4 GHz FHSS/DSSS 802.11a 54 Mbps 5 GHz 150 - OFD A 802.11b 11 Mbps 2.4 GHz 300 - DSSSS b/g/n 802.11g 54 Mbps 2.4 GHz 300 b/g/n 802.11n 200+ Mbps 2.4 or 5 GHz 300 a/b/g 802.11ac 1 Gbps 5 GHz 300 a/b/g 802.16 IEEE 802 WBA 802.11i AES CCMP WPA2

QUESTION 41

REMOTE PROCEDURE CALL

ANSWER

Secure remote procedure call (SRA)

QUESTION 42

SSH

ANSWER

Secure Shell over Telnet for remote server administration via the command line

QUESTION 43

TCPIP Class A

ANSWER

network number values begin at 1 and end at 127

QUESTION 44

TCPIP Class B

ANSWER

network number values begin at 128 and end at 191

QUESTION 45

TCPIP Class C

ANSWER

network number values begin at 192 and end at 223

QUESTION 46

ISDN BRI B

ANSWER

channel 64Kbps, D-channel 16Kbps

QUESTION 47

ISDN PRI B

ANSWER

and D-channels are 64Kbps

QUESTION 48

80211

ANSWER

has CSMA/CA as protocol. Can use DSSS and FHSS (ss stands for spread spectrum)

QUESTION 49

802.11b

ANSWER

uses only DSSS

QUESTION 50

Netwok IPV4

ANSWER

Before a computer can communicate with the internet, it needs an IP-address, a default gateway and a subnet mask To connect multiple LAN segments you can use Bridges, Switches and Routers Fast Ethernet 100Base-TX has as characteristics: 100Mbps data transmission, 1 pairs Cat5 UTP and max segment of 100 meters (328 feet) Unsubnetted netmask is shown as /24 Other word for DMZ is screened subnet FTP, RLOGIN and TELNET never uses UDP but TCP

QUESTION 51

Attenuation

ANSWER

is a decrease in amplitude as a signal propagates along a transmission medium

QUESTION 52

SSL session key length

ANSWER

is from 40bit to 256 bit

QUESTION 53

bridge

ANSWER

connects multiple networks at the data link layer

QUESTION 54

router

ANSWER

connects multiple networks at the network layer.

QUESTION 55

Data backups

ANSWER

addresses availability, integrity and recovery but not confidentiality

QUESTION 56

IP headers

ANSWER

contain 32-bit addresses (in IPv4) and 128 in IPv6

QUESTION 57

Ethernet LAN

ANSWER

addresses for attached devices are 48 bits long

QUESTION 58

Subnet Masks CLASS A

ANSWER

Class A 255.0.0.0

QUESTION 59

Subnet Masks CLASS C

ANSWER

Class C 255.255.255.0

QUESTION 60

Subnet Masks CLASS B

ANSWER

Class B 255.255.0.0

QUESTION 61

Types of Wireless Networks

ANSWER

Uses the 802.11x specification to create a wireless LAN

QUESTION 62

Ad hoc Mode

ANSWER

directly connect two+ clients, no access point

QUESTION 63

Infrastructure Mode

ANSWER

connects endpoints to a central network, not directly to each other, need access point and wireless clients for IM mode wireless

QUESTION 64

Stand-alone Mode

ANSWER

isolated system

QUESTION 65

WEP

ANSWER

don't use can be cracked in seconds, predecessor to WPA and WPA2, confidentiality, uses RC4 for encryption, weakened by use of RC4 use of common key and a limited number of initialization vectors

QUESTION 66

WPA

ANSWER

uses TKIP for data encryption

QUESTION 67

WPA2

ANSWER

based on 802.11i, uses AES, key management, reply attack protection, and data integrity, most secure, CCMP included, WPA2 ENTERPRISE Mode - uses RADIUS account lockout if a password-cracker is used

QUESTION 68

TKIP

ANSWER

Temporal Key Integrity Protocol, uses RC4

QUESTION 69

LEAP

ANSWER

Lightweight Extensible Authentication Protocol, Cisco proprietary protocol to handle problems with TKIP, security issues don't use. Provides reauthentication but was designed for WEP

QUESTION 70

Coaxial

ANSWER

many workstations, length. 1000Base-T - 100 M Twisted pair to long. Cat 5 better than cat3 for interference Fiber optics immune to EMI, can be broken and high cost/expertise Topology failures

QUESTION 71

Ethernet twisted pair

ANSWER

more resistant than coaxial Token Ring because a token is passed by every station, a NIC that's is set to wrong speed or error can take all network down

QUESTION 72

Fiber Distributed Data Interface

ANSWER

form of token ring that has second ring that activates on error Leased lines use multiple lines and/or multiple vendors

QUESTION 73

Frame Relay WAN

ANSWER

over a public switched network. High Fault tolerance by relaying fault segments to working.

QUESTION 74

Network Ethernet Speeds

ANSWER

T-1 - 1.544 Mbps, T-3 - 44,736 Mbps (45) ATM - 155 Mbps, ISDN - 64 or 128 Mbps CAT 3 UTP; 10 Mbps, CAT 5;100 Mbps CAT 5e/6 - 1,000 Mb

QUESTION 75

LDAP

ANSWER

Lightweight Directory Access Protocol, client/server based directory query protocol loosely based upon X.500, commonly manages user information, for accessing directory services and manage certificates Ex. Active Directory, cn=ben+ou=sales Zero or more, comma separated, no semi-colon, + to join

QUESTION 76

SASL

ANSWER

provides secure LDAP authentication

QUESTION 77

OpenLDAP

ANSWER

default, stores user PW in the clear

QUESTION 78

Client SSL Certificates

ANSWER

used to identify clients to servers via SSL (client authentication)

QUESTION 79

S/MIME Certificates

ANSWER

used for signed and encrypted emails, can form sign, and use as part of a SSO solution

QUESTION 80

MOSS

ANSWER

MIME Object Security Services, provides authentication, confidentiality, integrity, and nonrepudiation

QUESTION 81

PEM

ANSWER

provides authentication, confidentiality, integrity, and nonrepudiation

QUESTION 82

DKIM

ANSWER

Domain Keys Identified Mail, domain validation tool

QUESTION 83

OAuth (open authentication)

ANSWER

ability to access resources from another service (Ex. Login with Google or Facebook)

QUESTION 84

OpenID

ANSWER

paired with OAuth is a RESTful, JSON-based authentication protocol can provide identity verification and basic profile information, phishing attack possible by sending fake data

QUESTION 85

Security Perimeter

ANSWER

The first line of protection between trusted and untrusted networks. Generally includes a firewall and router that help filter traffic. May also include proxies, IDSs, and IPSs. Zero Day - application white list

QUESTION 86

Multiplexors

ANSWER

device that enables more than one signal to be send out of one physical circuit

QUESTION 87

WAN switches

ANSWER

multi-port networking devices that are used in carrier networks. Connect private data over public data by using digital signals. Data link layer.

QUESTION 88

Access servers

ANSWER

server that provides dial-in and dial-out connections to the network

QUESTION 89

Modems

ANSWER

transmits data over telephone lines

QUESTION 90

Channel Service Unit (CSU)/Data service unit (DSU)

ANSWER

digital interface device used to terminate the physical interface on a DTE device. They connect to the closest telephone company switch in a central office (CO)

QUESTION 91

Repeaters

ANSWER

amplify data signals to extend range (physical)

QUESTION 92

HUBS

ANSWER

connect multiple LAN devices into a concentrator. Is actually a multi-port repeater (physical)

QUESTION 93

Bridges

ANSWER

Forwards data to all other network segments if it's not on the local segment. Operates at level 2 (thus no IP-addressing)

QUESTION 94

Switches

ANSWER

Will only send data to the specific destination address. It's actually a multi-port bridge. (Data link)

QUESTION 95

Routers

ANSWER

opens up data packet, reads hardware or network address and then forwards it to the correct network

QUESTION 96

Gateway

ANSWER

software that acts as access point to another network or device that translates between different protocols

QUESTION 97

LAN extenders

ANSWER

remote access, multi layer switch that connects LANs over a WAN

QUESTION 98

Broadband Technologies

ANSWER

ISDN, cable modems, DSL, and T1/T3 lines that can support multiple simultaneous signals. They are analog and not broadcast technologies.

QUESTION 99

Broadcast Domain

ANSWER

set of systems that can receive a broadcast from each other

QUESTION 100

CHAP

ANSWER

- Challenge-Handshake Authentication Protocol, used by PPP servers to authenticate remote clients. Encrypts username and PW and performs periodic re authentication while connected using techniques to prevent replay attacks.

QUESTION 101

CIR

ANSWER

(committed Information Rate) minimum bandwidth guarantee provided by service provider to customers

QUESTION 102

Collision Domain

ANSWER

set of systems that could cause a collision if they transmitted at the same time, more number of systems in domain increases likelihood of network congestion due to more collisions

QUESTION 103

Data Streams

ANSWER

occur at Application, Presentation, and Session layers.

QUESTION 104

EAP, Extensible Authentication Protocol

ANSWER

an authentication framework. Effectively, EAP allows for new authentication technologies to be compatible with existing wireless or point-topoint connection technologies, extensible was used for PPP connections

QUESTION 105

FCoE

ANSWER

Fiber Channel Over Ethernet, allows existing high-speed networks to be used to carry storage traffic FDDI - Fiber Distributed Data Interface, token-passing network uses a pair of rings with traffic flowing in opposite directions, uses tokens

QUESTION 106

FTP

ANSWER

File Transfer Protocol

QUESTION 107

ICMP

ANSWER

Internet Control Message Protocol, means to send error messages for non-transient error conditions and provides a way to probe the network in order to determine general characteristics about the network, ping

QUESTION 108

iSCI

ANSWER

Internet Small Computer Interface, Converged protocol that allows location-independent file services over traditional network technologies. Cost less than Fiber. Standard for linking data storage sites

QUESTION 109

ISDN

ANSWER

PRI (Primary Rate Interface) bandwidth of 1.544 Mbps, faster than BRI's 144 Kbps

QUESTION 110

MAC

ANSWER

Machine Access Control, hardware address of machine, can tell manufacturer,

QUESTION 111

Multilayer Protocols

ANSWER

- allow encryption at various layers, support a range of protocols at higher levels. Bad - conceal covert channels, filters can be bypassed, sometimes logical boundaries can be bypassed

QUESTION 112

MPLS

ANSWER

Multiprotocol Label Switching, high performance networking, uses path labels instead of network addresses, wide area networking protocol, label switching, finds final destination and then labels route for others to follow

QUESTION 113

PAP

ANSWER

Password Authentication Protocol, sends PW unencrypted

QUESTION 114

PEAP

ANSWER

provides encryption for EAP methods and can provide authentication, does not implement CCMP, encapsulates EAS in a TLS tunnel

QUESTION 115

Port Based Authentication

ANSWER

802.1x, can be used with EAP

QUESTION 116

PPP (Point-to-Point Protocol)

ANSWER

most common, used for dial up connections, replaced SLIP

QUESTION 117

Proxy

ANSWER

form of gateway that provide clients with a filtering, caching, or other service that protects their information from remote systems

QUESTION 118

PVCs

ANSWER

Private Virtual Circuits

QUESTION 119

RST flag

ANSWER

used to reset or disconnect a session, resumed by restarting the connection via a new three-way handshak

QUESTION 120

Converged Network

ANSWER

carries multiple types of traffic like voice, video, and data

QUESTION 121

SDN

ANSWER

a unique approach to network operation, design, and management. SDN aims at separating the infrastructure layer (i.e., hardware and hardware-based settings) from the control layer (i.e., network services of data transmission management). Furthermore, this also removes the traditional networking concepts of IP addressing, subnets, routing, and so on from needing to be programmed into or be deciphered by hosted applications. SDN offers a new network design that is directly programmable from a central location, is flexible, is vendor neutral, and is open-standards based.

QUESTION 122

Hypervisor-based Network

ANSWER

may be software defined, but it could also use traditional network devices running as virtual machines

QUESTION 123

SSID

ANSWER

normally disabled for secure networks

QUESTION 124

Site Survey

ANSWER

identify areas where wireless network may be accessible

QUESTION 125

SONET

ANSWER

protocol for sending multiple optical streams over fiber

QUESTION 126

SUBNET

ANSWER

logical division of a network

QUESTION 127

Supernet

ANSWER

made up of two or more networks

QUESTION 128

UDP

ANSWER

User Datagram Protocol, lightweight service for connectionless data transfer without error detection and correction

QUESTION 129

WAF

ANSWER

Web Application Firewall

QUESTION 130

Wired Extension Mode

ANSWER

uses WAP to link wireless clients to a wired network

QUESTION 131

SMP - Symmetric Multiprocessors

ANSWER

hardware and software architecture where two or more identical processors are connected to a single, shared main memory, have full access to all I/O devices, and are controlled by a single operating system instance that treats all processors equally, reserving none for special purposes.

QUESTION 132

Bluejacking

ANSWER

when attackers send unsolicited messages via Bluetooth

QUESTION 133

Bluesnarfing

ANSWER

targets the data or information on Bluetoothenabled devices

QUESTION 134

DNS Spoofing

ANSWER

when an attacker sends false replies to a requesting system, beating valid replies from the real DNS server DNS Poisoning - when an attacker changes the domain name to IP address mappings of a system to redirect traffic to alternative systems

QUESTION 135

Screenscraper

ANSWER

copy actual screen, subset of remote control

QUESTION 136

SPIT attacks

ANSWER

Spam over Internet Telephony and targets VoIP systems

QUESTION 137

Nikto, Burp Suite, Wapiti

ANSWER

web application vulnerability scanners

QUESTION 138

Network Attacks - Denial of Service Used to overwhelm a targets resources

ANSWER

- Filling up hard drive by using huge email attachments or file transfers - Sends messages to reset targets host subnets masks - Using up all system resources

QUESTION 139

DOS

ANSWER

performed by sending malformed packets to a system; can interrupt service or completely deny legitimate users of system resources, an attack that attempts to prevent authorized use of a resource. This can be done through flaw exploitation, connection overloading, or traffic flooding.

QUESTION 140

DDOS

ANSWER

botnet, zombie, massive dos attack using multiple computers

QUESTION 141

SMURF

ANSWER

ICMP requires three players (attacker, victim and amplifying network); attacker spoofs packet header to make it appear that it originated on the victim system with amplifying network broadcasting the message. Countermeasures - disable broadcast at border routers; border routers should not accept packets that originate within network; restrict ICMP traffic (Hint IC = Its Smurf though spelled wrong)

QUESTION 142

FRAGGLE

ANSWER

similar to Smurf but uses UDP Countermeasures - disable broadcast at border routers; border routers should not accept packets that originate within network; restrict UDP traffic; employ IDS; apply appropriate patches, block UDP port 7 & 9 from entering network

QUESTION 143

Land Attack

ANSWER

The attack involves sending a spoofed TCP SYN packet (connection initiation) with the target host's IP address and an open port as both source and destination. The reason a LAND attack works is because it causes the machine to reply to itself continuously.

QUESTION 144

SYN Flood

ANSWER

TCP packets requesting a connection (SYN bit set) are sent to the target network with a spoofed source address. The target responds with a SYN-ACK packet, but the spoofed source never replies. This can quickly overwhelm a system's resources while waiting for the half-open connections to time out. This causes the system to crash or otherwise become unusable. Counter: sync cookies/proxies, where connections are created later

QUESTION 145

Teardrop

ANSWER

The length and fragmentation offset fields of sequential IP packets are modified, causing the target system to become confused and crash. Uses fragmented packets to target a TCP flaw in how the TCP stack reassembles them. DOS

QUESTION 146

Session hijacking (Spoofing)

ANSWER

IP spoofing involves altering a TCP packet so that it appears to be coming from a known, trusted source, thus giving the attacker access to the network. Intercept cookies from a request header

QUESTION 147

TCP sequence number attack

ANSWER

intruder tricks target to believe it is connected to a trusted host and then hijacks the session by predicting the targets choice of an initial TCP sequence number

QUESTION 148

X25

ANSWER

defines point-to-point communication between Data terminal Equipment (DTE) and Data Circuit Terminating Equipment (DCE)

QUESTION 149

Link Access Procedure-Balanced (LAPB)

ANSWER

created for use with X25, LAPB defines frame types and is capable of retransmitting, exchanging and acknowledging frames as detecting out of sequence or missing frames

QUESTION 150

Frame Relay

ANSWER

High performance WAN protocol designed for use across ISDN interfaces. Is fast but has no error correction, supports multiple PVCs, unlike X.25, packet switched technology that provides CIR, requires DTE/DCE at each connection point

QUESTION 151

Switched Multimegabit DATA Service (SMDS)

ANSWER

high speed communication over public switches networks for exchanging 'bursts of data' between enterprises

QUESTION 152

Asynchronous Transfer mode (ATM)

ANSWER

very high bandwidth. It uses 53-byte fixed size cells instead of frames like Ethernet. It can allocate bandwidth up on demand making it a solution for Busty applications. Requires fiber optics.

QUESTION 153

Voice over IP (VOIP)

ANSWER

combines many types of data into a single IP packet. Cost, interoperability and performance wise it's a major benefit.

QUESTION 154

Synchronous Data Link Control (SDLC)

ANSWER

created by IBM for mainframes to connect to their remote offices. Uses a polling media access method. Works with dedicated leased lines permanent up. Data link layer of OSI model

QUESTION 155

High-level Data Link Control (HDLC)

ANSWER

extension to SDLC also for mainframes. Uses data encapsulation on synchronous serial links using frame characters and checksums. Also data link layer

QUESTION 156

High Speed Serial Interface (HSSI)

ANSWER

Defines electrical and physical interfaces to use for DTE/DCE communications. Physical layer of OSI

QUESTION 157

Twisted pair

ANSWER

Shielded (STP) or unshielded (UTP) Cat 3=10BaseT, Cat5=100BaseT

QUESTION 158

Fiber Optic

ANSWER

Most expensive, but hard to tap and resistant to EMI

QUESTION 159

First generation - (static) Packet filtering firewall AKA screening router

ANSWER

Examines source/destination address, protocol and ports of the incoming package. Based on ACL's access can be denied or accepted. Is considered a firewall and operates at Network or Transport layer of OSI

QUESTION 160

Second generation - Application level firewall AKA proxy server

ANSWER

While transferring data stream to another network, it masks the data origin. operating at Application layer of OSI

QUESTION 161

Third generation - Stateful inspection firewall

ANSWER

(also known as Dynamic) All packages are inspected at the Networking layer so it's faster. By examining the state and context of the data packages it helps to track connectionless protocols like UDP and RPC. Analyzed at all OSI Layers.

QUESTION 162

Fourth generation - Dynamic Packet Filtering firewall

ANSWER

Enables modification of the firewall rule. It provides limited support for UDP by remembering UDP packages across the network.

QUESTION 163

Fifth generation - Kernel Proxy Firewall / Application level Firewall

ANSWER

Runs in windows NT, modular, kernel based, multiplayer session evaluation. Uses dynamic TCP/IP stacks to inspect network packages and enforce security policies.

QUESTION 164

Packet filtering routers

ANSWER

Sits between trusted and un-trusted network, sometimes used as boundary router. Uses ACL's. Protects against standard generic external attacks. Has no user authentication, has minimal auditing.

QUESTION 165

Screened-Host firewall system

ANSWER

Has both a packet-filter router and a bastion host. Provides both network layer (package filtering) as application layer (proxy) server.

QUESTION 166

Dual homed host firewall

ANSWER

Consists of a host with 2 NIC's. One connected to trusted, one to un-trusted. Can thus be used as translator between 2 network types like Ethernet/token ring. Internal routing capabilities must not be enabled to make it impossible to circumvent inspection of data.

QUESTION 167

Screened-subnet firewalls

ANSWER

Has also defined a De-Militarized Zone (DMZ) : a small network between trusted an untrusted.

QUESTION 168

Socks firewall

ANSWER

Every workstation gets some Socks software to reduce overhead Tiers - design separates distinct protected zones and can be protected by a single firewall that has multiple interfaces

QUESTION 169

Centralized access control

ANSWER

CALLBACK; system calls back to specific location (danger in user forwarding number) somewhere you are CHAP (part of PPP) supports encryption XTACACS separates authentication, authorization and accounting processes TACACS+: stronger through use of tokens

QUESTION 170

Terminal Access Controller Access Control System TACACS

ANSWER

User passwords are administrated in a central database instead of individual routers. A network device prompts user for a username and static password then the device queries a TACACS server to verify the password. TACACSs does not support prompting for password change or use of dynamic password tokens. Port 49 TACACS: user-id and static password for network access via TCP

QUESTION 171

TACACS+

ANSWER

Enhanced version with use of two factor authentication, ability to change user password, ability of security tokens to be resynchronized and better audit trails and session accounting

QUESTION 172

Remote Authentication Dial-In User Service RADIUS

ANSWER

Client/server protocol, often leads to TACACS+. Clients sends their authentication request to a central radius server that contains all of the user authentication and network ACL's RADIUS does not provide two way authentication, therefore it's not used for routerto-router authentication. Port 1812. Contains dynamic password and network service access information (Network ACLs) NOT a SSO solution, TLS over TCP - to encrypt, Default UDP, PW encrypted, supports TCP and TLD if set, Remote connectivity via dial in (user dials in to access server, access server prompt for credentials, user enters credentials and forwards to radius server, radius server accepts or rejects). USES UDP. Incorporates an AS and dynamic/static password user can connect to any network access server, which then passes on the user's credentials to the RADIUS server to verify authentication and authorization and to track accounting. In this context, the network access server is the RADIUS client and a RADIUS server acts as an authentication server. The RADIUS server also provides AAA services for multiple remote access servers

QUESTION 173

DIAMETER

ANSWER

remote connectivity using phone wireless etc, more secure than radius, cordless phone signal is rarely encrypted and easily monitored

QUESTION 174

Asynchronous Dial-Up Access

ANSWER

(390) Asynchronous Dial-Up Access This is how everyone connects to the internet. Using a public switched telephone network to access an ISP

QUESTION 175

Integrated Serviced Digital Network (ISDN) communication

ANSWER

protocol that permits telephone line to carry data, voice and other source traffic. Two types: BRI Basic rate interface and Primary Rate Interface (PRI)

QUESTION 176

xDSL

ANSWER

uses regular telephone lines for high speed digital access

QUESTION 177

Cable Modems

ANSWER

Via single shared coaxial cable, insecure because of not being filtered or firewalled

QUESTION 178

Restricted Address

ANSWER

incoming calls are only allowed from specific addresses on an approval list. This authenticates the node, not the user!

QUESTION 179

Callback

ANSWER

User initiates a connection, supplies identifying code, and then the system will call back a predetermined telephone number. Also less useful for travelling users

QUESTION 180

Caller ID

ANSWER

checks incoming telephone number against an approval list and then uses Callback. Less useful for travelling users.

QUESTION 181

Password Authenticate Protocol PAP

ANSWER

Provides identification and authentication of the user using static replayable passwords. No encryption of user-id or password during communication

QUESTION 182

Challenge Handshake Authenticate Protocol (CHAP)

ANSWER

nonreplayable challenge/response dialog

QUESTION 183

BUS

ANSWER

all transmissions have to travel the full length of the cable

QUESTION 184

RING

ANSWER

Workstations are connected to form a closed loop

QUESTION 185

STAR

ANSWER

nodes are connected to a central LAN device

QUESTION 186

TREE

ANSWER

bus type with multiple branches

QUESTION 187

MESH

ANSWER

all nodes interconnected

QUESTION 188

Unicast

ANSWER

Packet is sent from single source to single destination

QUESTION 189

Multicast

ANSWER

source packet is copied and sent to multiple destinations

QUESTION 190

Broadcast

ANSWER

source packet is copied and sent to all n

QUESTION 191

Analog Signal

ANSWER

Infinite wave form, continuous signal, varied by amplification

QUESTION 192

Digital Signal

ANSWER

Saw-tooth form, pulses, on-off only, digital signals are a means of transmission that involves the use of a discontinuous electrical signal and a state change or on‐off pulses.

QUESTION 193

Asynchronous

ANSWER

sends bits of data sequentially. Same speed on both sides. Modems and dial-up remote access systems

QUESTION 194

Synchronous

ANSWER

very high speed governed by electronic clock timing signals Asynchronous communications, broadband connections, and halfduplex links can be digital or analog.

QUESTION 195

Ethernet IEEE 802.3

ANSWER

using CSMA with an BUS-topology Thinnet: 10base2 with coax cables up to 185 meters Thicknet: 10Base5, coax up to 500 meters UTP: 10BaseT=10MBps 100baseT=Fast Ethernet =100MBps 1000BaseT=Gigabit Ethernet=1GBps Ethernet networks were originally designed to work with more sporadic traffic than token ring networks

QUESTION 196

ARCnet

ANSWER

uses token passing in a star technology on coax

QUESTION 197

Token Ring IEEE 802.5

ANSWER

IBM created. All end stations are connected to a MAU Multi Access Unit. CAU: Controlled Access Units - for filtering allowed MAC (Extended Unique Identifier) addresses.

QUESTION 198

FDDI, Fiber Distributed Data Interface

ANSWER

token-passing dual token ring with fiber optic. Long distances, minimal EMI interference permits several tokens at the time active

QUESTION 199

Carrier Sense Multiple Access CSMA

ANSWER

for Ethernet. Workstations send out packet. If it doesn't get an acknowledgement, it resends

QUESTION 200

CSMA with Collision Avoidance workstations

ANSWER

are attached by 2 coax cables. In one direction only. Wireless 802.11

QUESTION 201

CSMA with Collision Detection

ANSWER

Only one host can send at the time, using jamming signals for the rest.

QUESTION 202

Polling

ANSWER

Host can only transmit when he polls a secondary to see if its free

QUESTION 203

Token-passing

ANSWER

Used in token rings, Hosts can only transit when they receive a clear to send token.

QUESTION 204

Local Area Network LAN

ANSWER

Limited geographically to e.g. a building. Devices are sharing resources like printers, email and files. Connected through copper wire or fiber optics.

QUESTION 205

CAN

ANSWER

campus area network, multiple building connected to fast backbone on a campus

QUESTION 206

MAN

ANSWER

metropolitan network extends over cities

QUESTION 207

Wide Area network WAN

ANSWER

Connects LANS over a large geographical area

QUESTION 208

Internet intranet and extranet

ANSWER

Internet is global, intranet local for use within companies and extranet can be used e.g. by your customers and clients but is not public.

QUESTION 209

Virtual Private Networks VPN

ANSWER

A VPN is created by dynamically building a secure communications link between two nodes, using a secret encapsulation method via network address translation (NAT) where internal IP addresses are translated to external IP addresses. Cannot double NAT with the same IP range, same IP address cannot appear inside and outside of a NAT router.

QUESTION 210

PPTP, Point to Point tunneling protocol

ANSWER

- Works at data link layer of OSI - Only one single point-to-point connection per session - Point To Point protocol (PPP) for authentication and tunneling - Dial-up network use - Does not support EAP - Sends initial packets in plaintext

QUESTION 211

L2F, Layer 2 Forwarding

ANSWER

- Cisco developed its own VPN protocol called which is a mutual authentication tunneling mechanism. - L2F does not offer encryption. L2F was not widely deployed and was soon replaced by L2TP. - both operate at layer 2. Both can encapsulate any LAN protocol.

QUESTION 212

L2TP, Layer 2 tunneling protocol

ANSWER

- Also in data-link layer of OSI - Single point-to-point connection per session - Dial-up network use - Port 115 - Uses IPsec

QUESTION 213

IPSEC

ANSWER

- Operates at Network Layer of OSI - Enables multiple and simultaneous tunnels - Encrypt and authenticate - Build into IPv6 - Network-to-network use - Creates a private, encrypted network via a public network - Encryption for confidentiality and integrity 2 protocols: AH Authentication header and ESP Encapsulated Security Payload works with Security Associations (SA's) works with IKE protocols IKE IS FOR MANAGING SECURITY ASSOCIATIONS 2 modes: transport, data is encrypted header is not tunneled: new uses rc6; IP header is added, old IP header and data is encrypted cipher types: block (padding to blocks of fixed size) like DES 3DES AES or stream (bit/byte one by one o padding) like RC4, Sober

QUESTION 214

TLS - Transport Layer Security

ANSWER

- encrypt and protect transactions to prevent sniffing while data is in transit along with VPN and IPsec - most effective control against session hijacking - ephemeral session key is used to encrypt the actual content of communications between a web server and client - TLS - MOST CURRENT not SSL!!!

QUESTION 215

PVC

ANSWER

Permanent virtual circuits, is like a dedicated leased line; the logical circuit always exists and is waiting for the customer to send data. Like a walkie-tealie

QUESTION 216

SVC

ANSWER

switched virtual circuit, is more like a shortwave or ham radio. You must tune the transmitter and receiver to a new frequency every time you want to communicate with someone.

QUESTION 217

VPN Devices

ANSWER

Is hardware or software to create secure tunnels

QUESTION 218

IP-sec compatible

ANSWER

- Encryption via Tunnel mode (entire data package encrypted) or Transport mode (only datagram encrypted) - Only works with IP at Network layer of OSI

QUESTION 219

NON IP-sec compatible

ANSWER

Socks-based proxy servers Used to reach the internal network from the outside. Also contains strong encryption and authentication methods PTP used in windows machines. Multiprotocol, uses PAP or CHAP Dial-up VPN's remote access servers using PPTP commonly used by ISP's Secure Shell SSH2 not strictly a VPN product but opens a secure encrypted shell session from the internet through a firewall to a SSH server

QUESTION 220

Encapsulating Security Payload

ANSWER

Encrypts IP packets and ensured integrity. ESP Header - contains information showing which security association to use and the packet sequence number. Like the AH, the ESP sequences every packet to thwart replay attacks. ESP Payload

QUESTION 221

FHSS

ANSWER

Frequency Hopping Spread Spectrum, The entire range of available frequencies is employed, but only one frequency at a time is used.

QUESTION 222

DSSS

ANSWER

Direct Sequence Spread Spectrum, employs all the available frequencies simultaneously in parallel. This provides a higher rate of data throughput than FHSS. DSSS also uses a special encoding mechanism known as chipping code to allow a receiver to reconstruct data even if parts of the signal were distorted because of interference.

QUESTION 223

OFDM

ANSWER

Orthogonal Frequency-Division Multiplexing, employs a digital multicarrier modulation scheme that allows for a more tightly compacted transmission. The modulated signals are perpendicular and thus do not cause interference with each other. 5 All use spread spectrum techniques to transmit on more than one frequency at the same time. Neither FHSS nor DHSS uses orthogonal modulation, while multiplexing describes combining multiple signals over a shared medium of any sort. Wi-Fi may receive interference from FHSS systems but doesn't use it.

QUESTION 224

Dedicated line

ANSWER

reserved communication, always available Leased line can be reserved for communications. Type of dedicated line. - T1 1,5 Mbps through telephone line - T3 44,7 Mbps through telephone line - E1 European 2048 Mbps digital transmission - Serial Line IP (SLIP) TCP/IP over slow interfaces to communicate with external hosts (Berkley UNIX, windows NT RAS), no authentication, supports only half-duplex communications, no error detection, manual link establishment and teardown

QUESTION 225

Point to Point protocol (PPP)

ANSWER

improvement on slip, adds login, password and error (by CHAP and PAP) and error correction. Data link.

QUESTION 226

Integrated Services Digital Network (ISDN)

ANSWER

combination of digital telephony and data transports. Overtaken by xDSL, not all useable due to "D Channel" used for call management not data xDSL Digital subscriber Line uses telephone to transport high bandwidth data to remote subscribers - ADSL - Asymmetric. More downstream bandwidth up to 18,000 feet over single copper cable pair - SDSL - Symmetric up to 10,000 feet over single copper cable pair - HDSL - High Rate T1 speed over two copper cable pairs up to 12,000 feet - VDSL - Very High speed 13-52MBps down, 1,5-2,3 Mbps upstream over a single copper pair over 1,00 to 4500 feet

QUESTION 227

Circuit-switched networks

ANSWER

There must be a dedicated physical circuit path exist during transmission. The right choice for networks that have to communicate constantly. Typically for a telephone company network Voice oriented. Sensitive to loss of connection

QUESTION 228

Message switching networks

ANSWER

Involves the transmission of messages from node-to-node. Messages are stored on the network until a forwarding path is available.

QUESTION 229

Packet-switched networks (PSN or PSDN)

ANSWER

Nodes share bandwidth with each other by sending small data units called packets. Packets will be send to the other network and reassembled. Data oriented. Sensitive to loss of data. More cost effective than circuit switching because it creates virtual circuits only when they are needed.

QUESTION 230

Converged Protocols

ANSWER

are the merging of specialty or proprietary protocols with standard protocols, such as those from the TCP/ IP suite. The primary benefit of converged protocols is the ability to use existing TCP/ IP supporting network infrastructure to host special or proprietary services without the need for unique deployments of alternate networking hardware.

QUESTION 231

Fibre Channel over Ethernet (FCoE)

ANSWER

a form of network datastorage solution (SAN or NAS) that allows for high-speed file transfers at upward of 16 GBps. It was designed to be operated over fiber-optic cables; support for copper cables was added later to offer less-expensive options. Fibre Channel over Ethernet (FCoE) can be used to support it over the existing network infrastructure. FCoE is used to encapsulate Fibre Channel communications over Ethernet networks. Fibre Channel operates as a Network layer or OSI layer 3 protocol, replacing IP as the payload of a standard Ethernet network.

QUESTION 232

MPLS - (Multiprotocol Label Switching)

ANSWER

is a high-throughput highperformance network technology that directs data across a network based on short path labels rather than longer network addresses. MPLS is designed to handle a wide range of protocols through encapsulation.

QUESTION 233

iSCSI - Internet Small Computer System Interface (iSCSI)

ANSWER

is a networking storage standard based on IP. This technology can be used to enable location-independent file storage, transmission, and retrieval over LAN, WAN, or public Internet connections. It is often viewed as a low-cost alternative to Fibre Channel.

QUESTION 234

VoIP - Voice over IP

ANSWER

a tunneling mechanism used to transport voice and/ or data over a TCP/ IP network. VoIP has the potential to replace or supplant PSTN because it's often less expensive and offers a wider variety of options and features.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials