Term
__________ is the assurance that a specific author actually did create and send a specific item to a specific recipient and it was successfully received. |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Which document is the predecessor to ISO 27002? |
|
Definition
|
|
Term
What are the four layers of the TCP/IP model from lowest to Highest? |
|
Definition
Network Access Layer, Internetwork, Transport, Application Layer |
|
|
Term
What are the seven OSI Layers? |
|
Definition
Application, Presentation, Session, Transport, Network, Data Link, Physical |
|
|
Term
What are the four phases of an attack, in order of occurance? |
|
Definition
Target Acquisition, Target Analysis, Target Access, and Target Appropriation. |
|
|
Term
What is the primary responsibility of the physical layer? |
|
Definition
To translates bits to and from signals |
|
|
Term
A _____________ topology is a LAN with a central cable to which all nodes connect. |
|
Definition
|
|
Term
A ___________ topology is one in which data is transmitted in one direction. Each node can only receive from its upstream neighbor and transmit to its downstream neighbor. |
|
Definition
|
|
Term
In a _____________ topology, all nodes connect to a central device |
|
Definition
|
|
Term
In a ____________ topology, devices connect to a branch in the network. Branches are often switches. |
|
Definition
|
|
Term
In a ____________ topology, every node in the network is connected to every other node. |
|
Definition
|
|
Term
__________ refers to the rate of data transmission. |
|
Definition
|
|
Term
What are the three components of a fiber optic cable? |
|
Definition
A light source, an optical cable, and a light detector |
|
|
Term
What are the two types of light sources used in fiber optic cables? |
|
Definition
|
|
Term
What is the standard for WLAN? |
|
Definition
|
|
Term
What is the standard for WMAN (Wireless Metro Area Networks)? |
|
Definition
|
|
Term
_____________ transmissions are high-bandwidth, line of sight, point to point communications that require licensing. |
|
Definition
|
|
Term
______________ are high bandwidth, line of sight, point to point communications that do not require licensing. |
|
Definition
|
|
Term
What type of device converts a digital signal to an analog signal? |
|
Definition
|
|
Term
__________ are used to implement a physical star topology. |
|
Definition
|
|
Term
What is the primary function of the Data Link Layer? |
|
Definition
To connect The Physical and Networking layers |
|
|
Term
_______________ networks establish a dedicated circuit between endpoints. |
|
Definition
|
|
Term
In ____________ networks data is divided into packets and transmitted on a shared network |
|
Definition
|
|
Term
What is the speed of a T1? |
|
Definition
|
|
Term
What is the speed of an E1? |
|
Definition
|
|
Term
______________ is a connection-oriented suite of protocols designed to transmit data, voice, and video over the same network at very high speeds. |
|
Definition
|
|
Term
___________ provides bandwidth management and a scalable solution for network usage without the performance penalties of encryption. |
|
Definition
|
|
Term
What layer(s) does MPLS operate with? |
|
Definition
|
|
Term
A ______________ combines channels together. This is often used to permit several remote access connections to terminate on a network at the same time. |
|
Definition
|
|
Term
Combining several signals into a single data stream is called ______________ |
|
Definition
|
|
Term
A ___________ is a layer 2 device that filters traffic between segments based on MAC addresses. |
|
Definition
|
|
Term
While a bridge connects networks, a switch connects ____________. |
|
Definition
|
|
Term
WWhat is the Wireless network security standard? |
|
Definition
|
|
Term
What is the maximum speed and frequency range of an 802.11b network? |
|
Definition
|
|
Term
What is the maximum speed and frequency range of an 802.11a network |
|
Definition
|
|
Term
What is the maximum speed and frequency range of an 802.11g network |
|
Definition
|
|
Term
Which wireless standard introduced MIMO to wireless networks? |
|
Definition
|
|
Term
What is the Bluetooth standard? |
|
Definition
|
|
Term
The ____________ is the name given to the Wireless Access Point. |
|
Definition
|
|
Term
_____________ is the most basic form of wireless authentication. |
|
Definition
Open Systems Authentication |
|
|
Term
___________ uses a shared secret between the client and access point and can be cracked in 3 to 30 seconds with minimal tools and knowledge |
|
Definition
|
|
Term
___________ was established as a stop gap after WEP was exposed before the creation of 802.11i. |
|
Definition
|
|
Term
WPA used the RC4 stream encryption algorithm. What does WPA2 use? |
|
Definition
|
|
Term
What kind of integrity check does 802.11i (WPA2) use? |
|
Definition
|
|
Term
|
Definition
|
|
Term
What three components make up PPP? |
|
Definition
Encapsulation, Link Control Protocol, and Network Control Protocols |
|
|
Term
|
Definition
Address Resolution Protocol |
|
|
Term
____________ is used to resolve layer 3 addresses to layer 2 addresses (IP to MAC) |
|
Definition
|
|
Term
|
Definition
|
|
Term
_____________ is used to map a device's MAC address to its IP address. |
|
Definition
|
|
Term
What are the three primary controls for wireless threats? |
|
Definition
Encryption, Authentication, and RF Management |
|
|
Term
What is the primary function of Layer 3? |
|
Definition
Movement of information between hosts that are not physically connected |
|
|
Term
____________ are used to provide a common storage area and a dedicated network for backup and common storage. |
|
Definition
|
|
Term
A ________ is a network connecting Local Networks and/or access points. |
|
Definition
|
|
Term
________ is the company's internal collection of internet services |
|
Definition
|
|
Term
____________ allows large quantities of data to be shared between companies |
|
Definition
|
|
Term
What is the encrypted version of Telnet? |
|
Definition
|
|
Term
The ____________ is used to guarantee the identity of the sending node and ensure that the transmitted data has not been tampered with |
|
Definition
|
|
Term
The ___________ encrypts IP packets for confidentiality in IPSec. |
|
Definition
Encapsulation Security Payload |
|
|
Term
__________ is the protocol IPSec uses to negotiate and establish authenticated keying materials for security associations. |
|
Definition
Internet Key Exchange (IKE) |
|
|
Term
Layer 2 Tunneling protocol was the combination of what two other protocols? |
|
Definition
Point to Point tunneling protocol and Layer 2 forwarding |
|
|
Term
__________ is the act of moving information across an internetwork from source to destination. |
|
Definition
|
|
Term
What is the range of Class A private IP addresses? |
|
Definition
10.0.0.0 - 10.255.255.255 |
|
|
Term
What is the range of Class B private IP addresses? |
|
Definition
172.16.0.0 - 172.31.255.255 |
|
|
Term
What is the range of Class C private IP addresses? |
|
Definition
192.168.0.0 - 192.168.255.255 |
|
|
Term
___________ is the layer of software that serves as the interface between an application and the hardware. |
|
Definition
|
|
Term
___________ are computers that users physically log into. |
|
Definition
|
|
Term
____________ is a dynamic routing protocol designed for small networks. Views of the network are regularly merged through the neighborly exchange of routing tables. |
|
Definition
Routing Information Protocol |
|
|
Term
_____________ is an interior gateway protocol based on the Djikstra algorithm. |
|
Definition
|
|
Term
___________ was developed as the replacement for EGP and is the routing protocol employed on the internet. |
|
Definition
|
|
Term
___________ is a classless, hierarchical, vendor-neutral routing protocol. |
|
Definition
|
|
Term
_________ is a vendor-proprietary routing protocol that provides stable routing tables for large networks |
|
Definition
Interior Gateway Routing Protocol |
|
|
Term
___________ is used for the exchange of control messages such as ping. |
|
Definition
|
|
Term
Supernetting is also called ___________. |
|
Definition
|
|
Term
What size are IPv6 addresses? |
|
Definition
|
|
Term
A ___________ attack is characterized by an ICMP request with a spoofed source address of the broadcast domain used to create a DOS. |
|
Definition
|
|
Term
The ___________ layer provides data communication between hosts and is concerned with the information payload. |
|
Definition
|
|
Term
What are the components of the 3 way handshake? |
|
Definition
|
|
Term
__________ provides a lightweight service for connectionless data transfer. |
|
Definition
|
|
Term
What are the three functions of TLS? |
|
Definition
Mutual Authentication, Encryption, and Integrity |
|
|
Term
The _________ layer provides a logical, persistent connection between peer hosts. |
|
Definition
|
|
Term
____________ provides end to end delivery services for data with real time characteristics. |
|
Definition
|
|
Term
_____________ is an authentication protocol used mainly in networked environments requiring single sign on service for Layer 3 network access and scalable authentication. |
|
Definition
|
|
Term
What is the difference between RADIUS and TACACS+? |
|
Definition
TACACS+ separates out authentication and authorization whereas they are together in RADIUS |
|
|
Term
What are the two functions of the Presentation layer? |
|
Definition
Ensures a common format for data and provides services for encryption and compression |
|
|
Term
What does the Application Layer do? |
|
Definition
Performs communication between peer applications |
|
|
Term
__________ is the installation of a telephone switch on customer premises. |
|
Definition
Private Branched Exchange (PBx) |
|
|
Term
What does PSTN stand for? |
|
Definition
Publicly Switched Telephone Network |
|
|
Term
___________ allows one network to provide both voice and data services. |
|
Definition
|
|
Term
____________ uses products such as phone sweep to dial large blocks of numbers |
|
Definition
|
|
Term
_________ is driving through an area trying to detect unprotected Wireless Access Points |
|
Definition
|
|
Term
____________ is a client-server based directory query protocol loosely based on X.500, commonly used for managing user information. |
|
Definition
|
|
Term
_________ is a protocol designed to manage network infrastructure |
|
Definition
|
|
Term
Cloud computing involves accessing software and data accross the internet on servers managed by a third party supplier. Cloud computing arrangements increase availability, and _______________ |
|
Definition
Increase the opportunity for attack |
|
|
Term
What does training all employees on security awareness defend against? |
|
Definition
|
|
Term
____________ authentication protocol periodically re-validates users, keeps its standard password database unencrypted, and sends passwords as one way hashes. |
|
Definition
|
|
Term
What is the primary purpose of a firewall? |
|
Definition
To protect trusted networks from less trusted networks |
|
|