Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
89 Cards in this Set
- Front
- Back
Which items MUST be included in a data network?
|
NETWORK PROTOCOL
NETWORK ADAPTER HWARE & DRIVERS NETWORK MEDIA |
|
Which reference model exchanges data between any two points on a telecom. network?
|
OSI model
|
|
What are the layers of the OSI Model?
|
Please do not throw sausage pizza away
1.Physical 2.Data Link 3.Network 4.Transport 5.Session 6.Presentation 7.Application |
|
Which model was developed in the late 60s from a project sponsored by DARPA to design the Internet's protocol?
|
TCP/IP Model
|
|
This TCP/IP model layer supports application-to-application info transfers using port number to ID the applications
|
HOST-TO-HOST
|
|
This TCP/IP model layer handles the physical networking reqs of generating frames on a cable, fiber, or wireless network.
|
Network access
|
|
This TCP/IP model layer creates logical networks using IP network addresses
|
Networking
|
|
This TCP/IP model layer begins process of sending info using application programs, then ends the process at the destination device or application.
|
Process
|
|
A multinational co. with offices all over the world needs to communicate. What type of network will this be?
|
WAN
|
|
What is the type of data network topology where all devices are connected to a central device that performs a traffic distribution function?
|
STAR
|
|
What is a type of network data topology where all devices are connected to all other devices?
|
MESH
|
|
Which TCP/IP protocol is a connection oriented protocol used in the TCP/IP model?
|
TCP
|
|
Data services are combinations of HW and SW dedicated to managing ________ and _____
|
functions and resources
|
|
Which remote access technology uses secure transport protocols like IPSEC to xfer info from a remote client over the Internet?
|
VPN
|
|
Which action is a capability of the PPTP remote access protocol?
|
Encapsulating PPP packets for remote delivery over the Internet to the target network
|
|
What happens in the OSI Presentation Layer
|
Conversion of data from one format to another
Encryption |
|
What happens in the OSI Session Layer?
|
Creation, maintenance, & discontinuation of connections.
Manages Sequence #s |
|
What happens in the Transport Layer
|
Connection oriented/ connectionless-Flow Control-
Segmentation-Error Detection AKA reliable delivery-Multiplex Contains Sequence #s |
|
What happens in the Network Layer?
|
Logic addressing-hierarchical addressing structure
Routing (which path is best) |
|
What happens in the Data Link Layer?
|
TWO SUBLAYERS:
LLC-Data formatting from one media to another MAC hardware address |
|
What is the Physical Layer responsible for?
|
Cable
How Fast |
|
What are the layers of the OSI Model?
|
Physical, Data Link, Network, Transport, Session, Presentation, Application
|
|
What is used in the TCPIP model to resolve IP to MAC addresses?
|
ARP (Address Resolution Protocol)
|
|
What is a logical address that is used to move info between nodes?
|
IP
|
|
What is a connection-oriented protocol used in the TCPIP model?
|
TCP
|
|
What is a connectionless protocol that supports process ID using port numbers?
|
UDP
|
|
This is used to assign IP addresses on a network
|
DHCP
|
|
This protocol is used with IP multicasting to indicate when a device is joining a multicast enabled app data stream
|
IGMP
|
|
This data network type is often implemented within workgroups and usually implemented with copper wiring or wireless
|
LAN
|
|
This type of data network is used to connect buildings within a campus setting
|
CAN
|
|
A network is used within a metro area and is often implemented as a SONET ring
|
MAN
|
|
This data network physically connects networks over large geographical areas
|
WAN
|
|
This data network type forwards traffic between segments using a single type of network protocol
|
Switched Network
|
|
This network type connects similar or dissimilar physical networks based on OSI layer 3
|
Routed Network
|
|
In this data network type, all devices are connected to a central device
|
Star
|
|
In this network topology, all devices are connected to a single, linear comm path shared by all
|
Bus
|
|
In this data network type, all devices are connected to a single, circular comm path with a structure requiring each to connect directly to two others
|
Ring
|
|
This data network type has all devices connected directly to all others
|
Mesh
|
|
This TCPIP model layer supports app to app info xfer using port numbers to ID the apps
|
Host to Host
|
|
This TCPIP model layer handles the physical networking reqs of generating frames on a cable, fi her, or wireless network
|
Network Access
|
|
This TCPIP model layer creates logical networks using IP addresses
|
Networking
|
|
This TCPIP model layer begins the process of sending info using app programs, then ends the process at the destination
|
Process
|
|
What is a type of data network topology where all devices are connected to a device performing traffic distr.function
|
STAR
|
|
Network topology where all devices re connected to all other devices?
|
MESH
|
|
Connection oriented protocol used in the TCPIP model
|
TCP
|
|
Which remote access tech.uses secure transport protocols like IPSEC to xfer info from a remote client over the net?
|
VPN
|
|
What action is a capability of PPTP?
|
Encapsulating PPP packets for remote delivery over the net to the target network
|
|
This type of attack can be used to target the availability of the network or its services
|
DOS
|
|
This type of attack is when an attacker interposes a device between two legit hosts to gain access to their data transmissions
|
Man in the Middle
|
|
While this may not usually cause a failure, it does cause network over utilization by filling nets with unwanted email
|
SPAM
|
|
Malicious program that attaches itself to another program
|
Virus
|
|
Malware program that does not require support of a target program like a virus.Can duplicate itself to other devices
|
Worm
|
|
This is unauthorized software masquerading as authorized software.
|
Trojan horse
|
|
This type of attack is where attackers inserts some type of malicious software, or malware into the user's system disabling OS
|
Malicious Code attack
|
|
This security protocol is an upgraded version of SSL
|
TLS
|
|
This network security mechanism detects unwanted network attacks and alerts admin to the event.
|
IDS (Intrusion detection system)
|
|
This remote access security mechanism verifies the ID of auth users and performs authentication
|
RADIUS
|
|
This remote access sec is a radius like system with improvements.
|
TACACS, TACACS+, XTACACS
|
|
This is an authentication protocol improving on RADIUS by strengthening its weaknesses.Works in roaming.
|
DIAMETER
|
|
This list on a router can protect traffic with a rule to permit/deny traffic through the router
|
ACL
|
|
This can help network security. It's placed inline, does not monitor traffic, but reacts if intrusions are Id'd & blocks event
|
IPS
|
|
This backup method backs up all selected files
|
Full Backup
|
|
This backup method clears the archive bit and reduces backup time and media & copies files and dbs modified since last bu
|
Incremental backup
|
|
This backup method copies all modifications since last full bu to the bu media.Does not turn off archive bit
|
Differential backup
|
|
Here, realtime copies of db transactions are stored in journals at remote locals
|
Remote journaling
|
|
This bu method copies modified files to offsite local
|
Electronic vaulting
|
|
Names 3 single points of failure
|
DISKS, SERVERS, CIRCUITS
|
|
Single drive fails but recovery not forced due to distributing parity info on all striped drives. Which RAID levrel?
|
Level 5
|
|
Here, data striping occurs over all drives and parity held on one drive
|
RAID 3
|
|
Here, data striped over several drives and no redundancy or parity is involved.
|
RAID 0
|
|
Here, data is written in disk sector units to all drives and parity is written to all drives.
|
RAID 5
|
|
Here, there is mirroring of all drives. Data is written to 2 drives at once. If 1 fails the other has the same data.
|
RAID 1
|
|
What provides the ability to reconstruct contents of a failed disk onto a replacement?
|
Failure Resistant Disk System
|
|
What is the least user accepted biometric device?
|
Retina scan
|
|
The 3 things that must be considered for planning and implementation of access control mechanisms are:
|
Threats to the system
System's vuln to these threats Risk that threat may materialize |
|
What is a clipping level of three?
|
This means that three of fewer logo attempts by an individ at a workstation will not be reported as a violation
|
|
What is the most important error type for a biometric access control system?
|
Type II error AKA False acceptance rate.
|
|
This is obtaining info of a higher sensitivity by combining info from lower levels of sensitivity
|
Aggregation
|
|
Circumstance where collection of info items is required to be classified at a higher sec level than any of the individual items that comprise it
|
Aggregation
|
|
A cryptographic protocol and infrastructure developed to send encrypted credit card numbers over the Internet
|
SET
Secure Electronic Transaction |
|
Monitors network traffic/host audit logs in order to determine if any violations of an organization's security policy have taken place
|
IDS
|
|
This layer deals with MAC addresses
|
Data Link Layer
|
|
In which layer of the OSI Model are connection-oriented protocols in the TCP/IP suite implemented?
|
Transport Layer
|
|
A table of subjects and objects indicating what actions individual subjects can take upon individual objects
|
Access Control Matrix
|
|
Knowledge-based Intrusion Detection Systems (IDS) are more common than:
|
Behavior based IDS
|
|
A token-passing scheme like token ring that has second ring that remains dormant until an error condition is detected on the primary ring?
|
Fiber Distributed Data Interface
FDDI |
|
Which security model is based on the military classification of data and people with clearances?
|
Bell LaPadula Model
|
|
A one-way hash provides
|
Integrity
|
|
Which model does NOT include data integrity or conflict of interest?
|
Bell LaPadula Model
|