OSI, TCP/IP and Network Security from C172
Which of the following best defines packet filtering?
A limit is placed on the packets that can enter the network.
A simpler technique that specifies the number of bits set to a 1 to indicate the subnet mass.
CIDR (classless interdomain routing)
This TCP/IP layer defines how the host connects to the network.
Network Interface
This OSI layer features multiplexing strategy, bandwidth usage, connection services, logical addressing, switching, and route discovery and selection
Network Layer (OSI Layer 3)
Addresses data messages, translates logical addresses into actual physical addresses, and routes data to addresses on the network
Network layer (OSI layer 3)
This OSI layer features synchronizing bits, how bits are represented on the medium, wiring standards for connectors and jacks, physical topology, bandwidth usage, multiplexing strategy
Physical Layer (OSI Layer 1)
Transmits bits from one computer to another and regulates the transmission stream over a medium.
Physical layer (OSI layer 1)
Translates application layer data to an intermediate form that provides security, encryption, and compression for the data
Presentation (OSI layer 6)
This OSI layer features encryption and data formatting
Presentation Layer (OSI Layer 6)
_____________ is the best way to keep from contributing to DDoS attacks.
Preventing intrusions
Used to send and receive e-mail messages between mail servers. Also used by e-mail client software, such as Outlook.
SMTP
This OSI layer features setting up a session, tearing down a session, maintaining a session
Session Layer (OSI layer 5)
Establishes and controls data communication between applications operating on two computers
Session layer (OSI layer 5)
The first issue of intrusion is ____
Social engineering
What type of firewall inspects traffic leaving an inside network as it goes out to the Internet and allows returning traffic belonging to that session?
Stateful. A stateful firewall inspects traffic leaving an inside network as it goes out to the Internet. Then, when returning traffic from the same session (as identified by source and destination IP addresses and port numbers) attempts to enter the inside network, the stateful firewall permits that traffic. The process of inspecting traffic to identify unique sessions is called "stateful inspection.
Proposed in 1992 to eliminate class boundaries and to make available the unused IP address space in Class A and Class B.
Supernetting
An attacker situated between two hosts takes over the role of one of the hosts, then assumes full control of the TCP session.
TCP session hijacking
A terminal emulation protocol primarily used to remotely connect to UNIX and Linux Systems.
TELNET
What is a common reason for disabling SSID broadcast in a wireless LAN (WLAN)?
To better conceal the SSID of a WLN
This TCP/IP layer features defining the type of connection established between hosts and how acknowledgements are sent. This is what makes TCP a connection-oriented protocol
Transport
This OSI layer features windowing, TCP/UDP and buffering
Transport Layer (OSI Layer 4)
Divides long communications into smaller data packages, handles error recognition and correction, and acknowledges the correct receipt of data
Transport layer (OSI layer 4)
Which of the following allows a secure communication between a private network and a public network, such as the internet?
Tunneling. Through a encapsulation process, tunneling allows a secure communication between a private network and a public network, such as the Internet. VPN is an example of tunneling.
Access lists
are a basic form of firewall
Encryption guarantees ___________.
data confidentiality.
Cisco routers use _________ command to block broadcasts to a subnet.
no ip directed-broadcast
Used for retrieving e-mail messages and includes commands to download and delete email from the server.
• POP3:
What is the first line against viruses and worms?
Antivirus software
This TCP/IP Layer processes requests from hosts and ensures that a connection is made to an appropriate port.
Application
Allows programs on a network node (computer) access network services, such as file transfers, electronic mail, and database access
Application (OSI layer 7)
This OSI layer features service advertisement, and application services
Application layer (OSI Layer 7)
The personal firewall software is typically based on _______.
Basic packet filtering inspections. Packet filtering allows or restricts the flow of specific types of packets to provide security. It analyzes the incoming and outgoing packets and lets them pass or stops them at a network interface based on the source and destination addresses, ports, or protocols.
Used to retrieve e-mail messages, but does not download and delete from the server.
IMAP4
A time synchronization system for computer clocks throughout the Internet.
NTP
This OSI layer features synchronizing transmissions, physical addressing, logical topology, method of transmitting on the media, and connection services
Data Link Layer (OSI Layer 2)
Packages bits of data from the physical layer into frames, transfers them from one computer to another, and receives acknowledgement from the addressed computer.
Datalink layer (OSI layer 2)
Which of the following security attacks occurs when an attacker sends the target system a flood of data or requests that consume the target system's resources?
DoS attack (denial-of-service) attack occurs when an attacker sends the target system a flood of data or requests that consume the target system's resources.
The attacker passively records data passing between hosts to gather sensitive information.
Information theft
This TCP/IP layer defines the protocols used for addressing and routing the data packets.
Internet
An attacker modifies the content that is being viewed by the victim.
Web spoofing
