OSI, TCP/IP and Network Security from C172

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following best defines packet filtering?

A limit is placed on the packets that can enter the network.

A simpler technique that specifies the number of bits set to a 1 to indicate the subnet mass.

CIDR (classless interdomain routing)

This TCP/IP layer defines how the host connects to the network.

Network Interface

This OSI layer features multiplexing strategy, bandwidth usage, connection services, logical addressing, switching, and route discovery and selection

Network Layer (OSI Layer 3)

Addresses data messages, translates logical addresses into actual physical addresses, and routes data to addresses on the network

Network layer (OSI layer 3)

This OSI layer features synchronizing bits, how bits are represented on the medium, wiring standards for connectors and jacks, physical topology, bandwidth usage, multiplexing strategy

Physical Layer (OSI Layer 1)

Transmits bits from one computer to another and regulates the transmission stream over a medium.

Physical layer (OSI layer 1)

Translates application layer data to an intermediate form that provides security, encryption, and compression for the data

Presentation (OSI layer 6)

This OSI layer features encryption and data formatting

Presentation Layer (OSI Layer 6)

_____________ is the best way to keep from contributing to DDoS attacks.

Preventing intrusions

Used to send and receive e-mail messages between mail servers. Also used by e-mail client software, such as Outlook.

SMTP

This OSI layer features setting up a session, tearing down a session, maintaining a session

Session Layer (OSI layer 5)

Establishes and controls data communication between applications operating on two computers

Session layer (OSI layer 5)

The first issue of intrusion is ____

Social engineering

What type of firewall inspects traffic leaving an inside network as it goes out to the Internet and allows returning traffic belonging to that session?

Stateful. A stateful firewall inspects traffic leaving an inside network as it goes out to the Internet. Then, when returning traffic from the same session (as identified by source and destination IP addresses and port numbers) attempts to enter the inside network, the stateful firewall permits that traffic. The process of inspecting traffic to identify unique sessions is called "stateful inspection.

Proposed in 1992 to eliminate class boundaries and to make available the unused IP address space in Class A and Class B.

Supernetting

An attacker situated between two hosts takes over the role of one of the hosts, then assumes full control of the TCP session.

TCP session hijacking

A terminal emulation protocol primarily used to remotely connect to UNIX and Linux Systems.

TELNET

What is a common reason for disabling SSID broadcast in a wireless LAN (WLAN)?

To better conceal the SSID of a WLN

This TCP/IP layer features defining the type of connection established between hosts and how acknowledgements are sent. This is what makes TCP a connection-oriented protocol

Transport

This OSI layer features windowing, TCP/UDP and buffering

Transport Layer (OSI Layer 4)

Divides long communications into smaller data packages, handles error recognition and correction, and acknowledges the correct receipt of data

Transport layer (OSI layer 4)

Which of the following allows a secure communication between a private network and a public network, such as the internet?

Tunneling. Through a encapsulation process, tunneling allows a secure communication between a private network and a public network, such as the Internet. VPN is an example of tunneling.

Access lists

are a basic form of firewall

Encryption guarantees ___________.

data confidentiality.

Cisco routers use _________ command to block broadcasts to a subnet.

no ip directed-broadcast

Used for retrieving e-mail messages and includes commands to download and delete email from the server.

• POP3:

What is the first line against viruses and worms?

Antivirus software

This TCP/IP Layer processes requests from hosts and ensures that a connection is made to an appropriate port.

Application

Allows programs on a network node (computer) access network services, such as file transfers, electronic mail, and database access

Application (OSI layer 7)

This OSI layer features service advertisement, and application services

Application layer (OSI Layer 7)

The personal firewall software is typically based on _______.

Basic packet filtering inspections. Packet filtering allows or restricts the flow of specific types of packets to provide security. It analyzes the incoming and outgoing packets and lets them pass or stops them at a network interface based on the source and destination addresses, ports, or protocols.

Used to retrieve e-mail messages, but does not download and delete from the server.

IMAP4

A time synchronization system for computer clocks throughout the Internet.

NTP

This OSI layer features synchronizing transmissions, physical addressing, logical topology, method of transmitting on the media, and connection services

Data Link Layer (OSI Layer 2)

Packages bits of data from the physical layer into frames, transfers them from one computer to another, and receives acknowledgement from the addressed computer.

Datalink layer (OSI layer 2)

Which of the following security attacks occurs when an attacker sends the target system a flood of data or requests that consume the target system's resources?

DoS attack (denial-of-service) attack occurs when an attacker sends the target system a flood of data or requests that consume the target system's resources.

The attacker passively records data passing between hosts to gather sensitive information.

Information theft

This TCP/IP layer defines the protocols used for addressing and routing the data packets.

Internet

An attacker modifies the content that is being viewed by the victim.

Web spoofing


Set pelajaran terkait

Philosophical language and thought: Plato

View Set

computer forensics - 2nd half - chapter 15

View Set

TREATMENT AND SYMPTOM MANAGEMENT ONCOLOGY/ ONS COURSES:

View Set

Experimental Animal Research - 3 R's

View Set

Accounting Test 2 (chapters 5, 6, 8, 9)

View Set