Term
| __________ is the assurance that a specific author actually did create and send a specific item to a specific recipient and it was successfully received. |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| Which document is the predecessor to ISO 27002? |
|
Definition
|
|
Term
| What are the four layers of the TCP/IP model from lowest to Highest? |
|
Definition
| Network Access Layer, Internetwork, Transport, Application Layer |
|
|
Term
| What are the seven OSI Layers? |
|
Definition
| Application, Presentation, Session, Transport, Network, Data Link, Physical |
|
|
Term
| What are the four phases of an attack, in order of occurance? |
|
Definition
| Target Acquisition, Target Analysis, Target Access, and Target Appropriation. |
|
|
Term
| What is the primary responsibility of the physical layer? |
|
Definition
| To translates bits to and from signals |
|
|
Term
| A _____________ topology is a LAN with a central cable to which all nodes connect. |
|
Definition
|
|
Term
| A ___________ topology is one in which data is transmitted in one direction. Each node can only receive from its upstream neighbor and transmit to its downstream neighbor. |
|
Definition
|
|
Term
| In a _____________ topology, all nodes connect to a central device |
|
Definition
|
|
Term
| In a ____________ topology, devices connect to a branch in the network. Branches are often switches. |
|
Definition
|
|
Term
| In a ____________ topology, every node in the network is connected to every other node. |
|
Definition
|
|
Term
| __________ refers to the rate of data transmission. |
|
Definition
|
|
Term
| What are the three components of a fiber optic cable? |
|
Definition
| A light source, an optical cable, and a light detector |
|
|
Term
| What are the two types of light sources used in fiber optic cables? |
|
Definition
|
|
Term
| What is the standard for WLAN? |
|
Definition
|
|
Term
| What is the standard for WMAN (Wireless Metro Area Networks)? |
|
Definition
|
|
Term
| _____________ transmissions are high-bandwidth, line of sight, point to point communications that require licensing. |
|
Definition
|
|
Term
| ______________ are high bandwidth, line of sight, point to point communications that do not require licensing. |
|
Definition
|
|
Term
| What type of device converts a digital signal to an analog signal? |
|
Definition
|
|
Term
| __________ are used to implement a physical star topology. |
|
Definition
|
|
Term
| What is the primary function of the Data Link Layer? |
|
Definition
| To connect The Physical and Networking layers |
|
|
Term
| _______________ networks establish a dedicated circuit between endpoints. |
|
Definition
|
|
Term
| In ____________ networks data is divided into packets and transmitted on a shared network |
|
Definition
|
|
Term
| What is the speed of a T1? |
|
Definition
|
|
Term
| What is the speed of an E1? |
|
Definition
|
|
Term
| ______________ is a connection-oriented suite of protocols designed to transmit data, voice, and video over the same network at very high speeds. |
|
Definition
|
|
Term
| ___________ provides bandwidth management and a scalable solution for network usage without the performance penalties of encryption. |
|
Definition
|
|
Term
| What layer(s) does MPLS operate with? |
|
Definition
|
|
Term
| A ______________ combines channels together. This is often used to permit several remote access connections to terminate on a network at the same time. |
|
Definition
|
|
Term
| Combining several signals into a single data stream is called ______________ |
|
Definition
|
|
Term
| A ___________ is a layer 2 device that filters traffic between segments based on MAC addresses. |
|
Definition
|
|
Term
| While a bridge connects networks, a switch connects ____________. |
|
Definition
|
|
Term
| WWhat is the Wireless network security standard? |
|
Definition
|
|
Term
| What is the maximum speed and frequency range of an 802.11b network? |
|
Definition
|
|
Term
| What is the maximum speed and frequency range of an 802.11a network |
|
Definition
|
|
Term
| What is the maximum speed and frequency range of an 802.11g network |
|
Definition
|
|
Term
| Which wireless standard introduced MIMO to wireless networks? |
|
Definition
|
|
Term
| What is the Bluetooth standard? |
|
Definition
|
|
Term
| The ____________ is the name given to the Wireless Access Point. |
|
Definition
|
|
Term
| _____________ is the most basic form of wireless authentication. |
|
Definition
| Open Systems Authentication |
|
|
Term
| ___________ uses a shared secret between the client and access point and can be cracked in 3 to 30 seconds with minimal tools and knowledge |
|
Definition
|
|
Term
| ___________ was established as a stop gap after WEP was exposed before the creation of 802.11i. |
|
Definition
|
|
Term
| WPA used the RC4 stream encryption algorithm. What does WPA2 use? |
|
Definition
|
|
Term
| What kind of integrity check does 802.11i (WPA2) use? |
|
Definition
|
|
Term
|
Definition
|
|
Term
| What three components make up PPP? |
|
Definition
| Encapsulation, Link Control Protocol, and Network Control Protocols |
|
|
Term
|
Definition
| Address Resolution Protocol |
|
|
Term
| ____________ is used to resolve layer 3 addresses to layer 2 addresses (IP to MAC) |
|
Definition
|
|
Term
|
Definition
|
|
Term
| _____________ is used to map a device's MAC address to its IP address. |
|
Definition
|
|
Term
| What are the three primary controls for wireless threats? |
|
Definition
| Encryption, Authentication, and RF Management |
|
|
Term
| What is the primary function of Layer 3? |
|
Definition
| Movement of information between hosts that are not physically connected |
|
|
Term
| ____________ are used to provide a common storage area and a dedicated network for backup and common storage. |
|
Definition
|
|
Term
| A ________ is a network connecting Local Networks and/or access points. |
|
Definition
|
|
Term
| ________ is the company's internal collection of internet services |
|
Definition
|
|
Term
| ____________ allows large quantities of data to be shared between companies |
|
Definition
|
|
Term
| What is the encrypted version of Telnet? |
|
Definition
|
|
Term
| The ____________ is used to guarantee the identity of the sending node and ensure that the transmitted data has not been tampered with |
|
Definition
|
|
Term
| The ___________ encrypts IP packets for confidentiality in IPSec. |
|
Definition
| Encapsulation Security Payload |
|
|
Term
| __________ is the protocol IPSec uses to negotiate and establish authenticated keying materials for security associations. |
|
Definition
| Internet Key Exchange (IKE) |
|
|
Term
| Layer 2 Tunneling protocol was the combination of what two other protocols? |
|
Definition
| Point to Point tunneling protocol and Layer 2 forwarding |
|
|
Term
| __________ is the act of moving information across an internetwork from source to destination. |
|
Definition
|
|
Term
| What is the range of Class A private IP addresses? |
|
Definition
| 10.0.0.0 - 10.255.255.255 |
|
|
Term
| What is the range of Class B private IP addresses? |
|
Definition
| 172.16.0.0 - 172.31.255.255 |
|
|
Term
| What is the range of Class C private IP addresses? |
|
Definition
| 192.168.0.0 - 192.168.255.255 |
|
|
Term
| ___________ is the layer of software that serves as the interface between an application and the hardware. |
|
Definition
|
|
Term
| ___________ are computers that users physically log into. |
|
Definition
|
|
Term
| ____________ is a dynamic routing protocol designed for small networks. Views of the network are regularly merged through the neighborly exchange of routing tables. |
|
Definition
| Routing Information Protocol |
|
|
Term
| _____________ is an interior gateway protocol based on the Djikstra algorithm. |
|
Definition
|
|
Term
| ___________ was developed as the replacement for EGP and is the routing protocol employed on the internet. |
|
Definition
|
|
Term
| ___________ is a classless, hierarchical, vendor-neutral routing protocol. |
|
Definition
|
|
Term
| _________ is a vendor-proprietary routing protocol that provides stable routing tables for large networks |
|
Definition
| Interior Gateway Routing Protocol |
|
|
Term
| ___________ is used for the exchange of control messages such as ping. |
|
Definition
|
|
Term
| Supernetting is also called ___________. |
|
Definition
|
|
Term
| What size are IPv6 addresses? |
|
Definition
|
|
Term
| A ___________ attack is characterized by an ICMP request with a spoofed source address of the broadcast domain used to create a DOS. |
|
Definition
|
|
Term
| The ___________ layer provides data communication between hosts and is concerned with the information payload. |
|
Definition
|
|
Term
| What are the components of the 3 way handshake? |
|
Definition
|
|
Term
| __________ provides a lightweight service for connectionless data transfer. |
|
Definition
|
|
Term
| What are the three functions of TLS? |
|
Definition
| Mutual Authentication, Encryption, and Integrity |
|
|
Term
| The _________ layer provides a logical, persistent connection between peer hosts. |
|
Definition
|
|
Term
| ____________ provides end to end delivery services for data with real time characteristics. |
|
Definition
|
|
Term
| _____________ is an authentication protocol used mainly in networked environments requiring single sign on service for Layer 3 network access and scalable authentication. |
|
Definition
|
|
Term
| What is the difference between RADIUS and TACACS+? |
|
Definition
| TACACS+ separates out authentication and authorization whereas they are together in RADIUS |
|
|
Term
| What are the two functions of the Presentation layer? |
|
Definition
| Ensures a common format for data and provides services for encryption and compression |
|
|
Term
| What does the Application Layer do? |
|
Definition
| Performs communication between peer applications |
|
|
Term
| __________ is the installation of a telephone switch on customer premises. |
|
Definition
| Private Branched Exchange (PBx) |
|
|
Term
| What does PSTN stand for? |
|
Definition
| Publicly Switched Telephone Network |
|
|
Term
| ___________ allows one network to provide both voice and data services. |
|
Definition
|
|
Term
| ____________ uses products such as phone sweep to dial large blocks of numbers |
|
Definition
|
|
Term
| _________ is driving through an area trying to detect unprotected Wireless Access Points |
|
Definition
|
|
Term
| ____________ is a client-server based directory query protocol loosely based on X.500, commonly used for managing user information. |
|
Definition
|
|
Term
| _________ is a protocol designed to manage network infrastructure |
|
Definition
|
|
Term
| Cloud computing involves accessing software and data accross the internet on servers managed by a third party supplier. Cloud computing arrangements increase availability, and _______________ |
|
Definition
| Increase the opportunity for attack |
|
|
Term
| What does training all employees on security awareness defend against? |
|
Definition
|
|
Term
| ____________ authentication protocol periodically re-validates users, keeps its standard password database unencrypted, and sends passwords as one way hashes. |
|
Definition
|
|
Term
| What is the primary purpose of a firewall? |
|
Definition
| To protect trusted networks from less trusted networks |
|
|