1
q
guaranteed service
A
It guarantees a specific data transfer rate at a guaranteed speed. Time sensitive traffic (voice and video) is assigned to this classification.
2
q
Point to Point Protocol (PPP)
A
Point to Point Protocol (PPP)It is similar to HDLC in that it is a data link protocol that performs framing and encapsulation for point-to-point links. A peer-to-peer connection means that there is a connection between one device (peer) and another device (peer). If the systems on your LAN use the Ethernet protocol, what if a system needs to communicate with a server at your ISP to connect to the Internet? This is not an Ethernet connection. So how do systems know how to communicate with each other if they can't use Ethernet as their data link protocol? They use a data link protocol that they understand. Telecommunications devices generally use PPP as their data link protocol.
3
q
Protocolo Bootstrap (BOOTP)
A
oProtocolo Bootstrap (BOOTP)it was developed after RARP to improve the functionality that RARP provides for diskless workstations. The diskless workstation can obtain its IP address, the address of the name server for future name resolution, and the default gateway address of the BOOTP server. BOOTP generally provides more functionality for diskless workstations than RARP.
4
q
Dive deeper into SIP
A
As mentioned above, SIP is a widely used signaling protocol for VoIP communication sessions. It is used in applications such as video conferencing, multimedia, instant messaging, and online gaming. It is analogous to the SS7 protocol used in PSTN networks and supports features found in traditional telephone systems.
5
q
reduction
A
Gradual loss of intensity of any type of flow through a medium. When an electrical signal travels down a cable, the signal can degrade, distort, or damage the data being transmitted.
6
q
unshielded twisted pair
A
Wiring in which the copper wires are twisted together to suppress EMI from external sources. UTP cables are found in many Ethernet networks and telephone systems.
7
q
Instant messaging spam (SPIM)
A
Instant messaging spam (SPIM)it is a type of spam used by instant messengers for this malicious act. Although this type of spam is not as common as email spam, it is certainly increasing over time. The fact that firewalls couldn't block SPIM made it more attractive to spammers. One way to prevent SPIM is to enable the option to only receive instant messages from a known list of users.
8
q
single player mode
A
Small glass core and are used for high-speed data transmission over long distances. They are less prone to attenuation than multimode fibers.
9
q
FHSS x DSSS
A
FHSS x DSSSFHSS uses only a portion of the total available bandwidth at any given time, while DSSS technology continuously uses all available bandwidth. DSSS propagates signals over a wider frequency band, while FHSS uses a narrow-band carrier.
10
q
Internet Message Access Protocol (IMAP)
A
Internet Message Access Protocol (IMAP)it is also an Internet protocol that allows users to access email on an email server. IMAP offers all the features of POP but has more features. When a user uses POP and accesses your mail server to see if you have new messages, all messages are automatically downloaded to your computer. Once messages are downloaded from the POP server, they are usually deleted from that server, depending on how it is configured. POP can be frustrating for mobile device users, as messages are automatically delivered to your computer or device, and you may not have the storage space to store all your messages. This is especially true for mobile devices that can be used to access email servers. This is also inconvenient for people who check their email on other people's computers. If Christina checks her email on Jessica's computer, all of Christina's new emails can be downloaded to Jessica's computer.
11
q
Media Access Technologies
A
The physical topology of a network is the lowest or base layer of a network. It determines what type of media is used and how media is connected between different systems. Media access technologies deal with how these systems communicate over these media and are often represented in protocols, NIC drivers, and interfaces. LAN access technologies set the rules for how computers on a network communicate, how errors are handled, maximum frame transmission unit (MTU) sizes, and more. These rules allow all computers and devices to communicate and resolve problems, and allow users to perform their network tasks productively. Each participating entity must know how to communicate correctly so that all other systems understand transmissions, instructions, and requests. This is solved by LAN media access technology.
12
q
User-Agent-Server (UAS)
A
SIP consists of two main components: theUser-Agent-Client (UAC)miUser-Agent-Server (UAS)π§π· UAC is the application that creates the SIP requests to start a communication session. UACs are typically messaging tools and softphone applications that are used to make VoIP calls. The UAS is the SIP server responsible for all routing and signaling of VoIP calls.
13
q
Interior Gateway Routing Protocol
A
IGRP is a distance vector routing protocol developed and owned by Cisco Systems. Whereas RIP uses one criteria to find the best route between source and destination, IGRP uses five criteria to make the "best route" decision. A network administrator can weight these various metrics to make the protocol work best in that specific environment.
14
q
light sources
A
Convert electrical signal to light signal
quince
q
DHCPACK message
A
The DHCP acknowledgment message is sent from the DHCP server to the DHCP client and is the process by which the DHCP server assigns the IP address lease to the DHCP client.
sixteen
q
Next Generation IP (IPng)
A
IPv6, also calledNext Generation IP (IPng), it not only has a larger address space than IPv4 to support more IP addresses; It has some features that IPv4 doesn't, and it performs some of the same tasks differently. Full details of the new features within IPv6 are beyond the scope of this book, but we'll look at some of them because IPv6 is the way of the future. IPv6 allows for scoped addresses, which allows an administrator to restrict specific addresses to specific servers or file and printer shares, for example. IPv6 has Internet Protocol Security (IPSec) built into the protocol stack, providing secure end-to-end transmission and authentication. IPv6 offers more flexibility and routing capabilities, allowing the assignment of Quality of Service (QoS) priority values ββfor time-sensitive transmissions. The protocol offers self-configuration, which greatly simplifies administration and does not require Network Address Translation (NAT) to expand its address space.
17
q
LAN and WAN protocols
A
Communication error rates are lower in LAN environments than in WAN environments, which makes sense when comparing the complexity of each environment. WAN traffic can travel hundreds or thousands of miles and traverse many different types of devices, cables, and protocols. Due to this difference, most LAN MAC protocols are connectionless and most WAN communication protocols are connection oriented. Connection-oriented protocols provide reliable transmission because they have error detection and error correction capabilities.
18
q
Zeitmultiplex (TDM)
A
A type of multiplexing in which two or more bit streams or signals are transmitted apparently simultaneously as sub-channels on a communication channel, but are physically alternated on the single channel.
19
q
11π§π· Metro Ethernet is a MAN protocol that can work on network infrastructures consisting of access, aggregation, metro and core layers. Which of the following statements best describes these layers of network infrastructure?
Aπ§π· The access layer connects customer equipment to a service provider's aggregation network. Aggregation takes place in a core network. The metro layer is the metropolitan area network. The core connects different metropolitan networks.
Bπ§π· The access layer connects customer devices to a service provider's core network. Aggregation takes place in a distribution network at the core. The metro layer is the metropolitan area network.
Cπ§π· The access layer connects customer equipment to a service provider's aggregation network. Aggregation takes place in a distribution network. The metro layer is the metropolitan area network. The core connects different access layers.
Dπ§π· The access layer connects customer equipment to a service provider's aggregation network. Aggregation takes place in a distribution network. The metro layer is the metropolitan area network. The core connects different metropolitan networks.
A
11.Dπ§π· The access layer connects customer equipment to a service provider's aggregation network. Aggregation takes place in a distribution network. The metro layer is the metropolitan area network. The core connects different metropolitan networks.
20
q
Asynchronous Transfer Mode (ATM)
A
The next evolutionary step in the history of telecommunications isAsynchronous Transfer Mode (ATM)π§π· ATM encapsulates data in fixed cells and can be used to deliver data over a SONET network. The analogy of a highway and automobiles is used to describe the SONET and ATM relationship. SONET is the path that provides the base (or network) for automobiles, ATM packets, to travel.
21
q
Postprotocolo (POP)
A
Postprotocolo (POP)is an Internet mail server protocol that supports incoming and outgoing email. An email server using the POP protocol uses SMTP to move messages between email servers, as well as store and forward email messages.
22
q
The industry had to find other ways to allow millions of users flexible use of this finite resource (frequency range). Over time, mobile wireless technology has been supplemented by increasingly complex and powerful "multiple access" technologies, listed below:
A
- Frequency Division Multiple Access (FDMA)
- Time Division Multiple Access (TDMA)
- Multiple access by code division (CDMA)
- Orthogonal Frequency Division Multiple Access (OFDMA)
23
q
17π§π· What happens at the session level?
Aπ§π· Dialog control
Bπ§π· Routing
Cπ§π· Packet sequencing
Dπ§π· Addressing
A
17.Aπ§π· The session layer is responsible for controlling how applications communicate, not how computers communicate. Not all applications use protocols that operate at the session layer, so this layer is not always used for network functions. A session layer protocol logically establishes the connection to the other application and controls the round trip dialogue. Session layer protocols allow applications to continue the conversation.
24
q
virtual firewalls
A
A firewall running in a virtualized environment that monitors and controls traffic as it travels through the virtual machines. The firewall can be a traditional firewall running on a virtual guest machine or a component of a hypervisor.
25
q
double home
A
Firewall Dual-Homed Dual-Homedrefers to a device that has two interfaces: one to the external network and one to the internal network. If the firewall software is installed on a dual-based device, which is often the case, the underlying operating system should disable packet forwarding and routing for security reasons. If this option is enabled, the computer may not apply ACLs, rules, or other restrictions required by a firewall. When a packet arrives at the external NIC from a network that is not trusted by a dual-base firewall and the operating system has forwarding enabled, the operating system forwards the traffic instead of passing it to the firewall software for inspection.
26
q
14π§π· Which of the following protocols operates at the following layers: application, data connection, network, and transport?
A. FTP, ARP, TCP y UDP
B. FTP, ICMP, IP y UDP
C. TFTP, ARP, IP y UDP
D. TFTP, RARP, IP e ICMP
A
14.Cπ§π· Different protocols have different functionalities. The OSI model is an attempt to conceptually describe where these various functionalities occur in a network stack. The model tries to draw boxes around reality to help people better understand the stack. Each layer has a specific functionality and a set of different protocols that reside within that layer and can perform that specific functionality. These listed protocols operate at these associated layers: TFTP (application), ARP (data connection), IP (network), and UDP (transport).
27
q
cell phone security
A
Most organizations do not include the use of mobile devices and cell phone technology in their security policies or overall security program. This was normal when phones were just phones, but today they are small computers that can connect to websites and multiple devices and are therefore new entry points for malicious activity.
28
q
Internet Control Message Protocol
A
oInternet Control Message Protocol (ICMP)it is basically the "messenger" of IP. ICMP provides status messages, reports errors, responds to specific requests, reports routing information, and is used to test connectivity and troubleshoot IP networks.
29
q
Some of the best practices regarding WLAN implementations are as follows:
A
- Change the default SSID. Each AP comes with a pre-configured default SSID value.
- Disable "Broadcast SSID" on the AP. For most APs this can be disabled.
- Implement another layer of authentication (RADIUS, Kerberos). Before the user can access the network, they must be authenticated.
- Physically place the AP in the center of the building. The AP has a specific coverage area that it can provide.
- Logically place the AP in a DMZ with a firewall between the DMZ and the internal network. Allow the firewall to inspect the traffic before it reaches the wired network.
- Implement VPN to use wireless devices. This adds another layer of protection for the transmitted data.
- Configure the AP to allow only known MAC addresses on the network. Only allow known devices to authenticate. Note, however, that these MAC addresses are sent unencrypted, so an attacker could capture them and impersonate an authenticated device.
- Perform penetration tests on the WLAN. Use the tools described in this section to identify access points and try to crack the encryption scheme currently in use.
- Change to a product that supports the 802.11i standard.
30
q
Multi-Station Access Unit (MAU)
A
como ethernet,Token Ringis a LAN media access technology that enables communication and sharing of network resources. Token Ring technology was originally developed by IBM and later defined by the IEEE 802.5 standard. It uses token-passing technology with a star-configured topology. The ring part of the name refers to how the signals are transmitted, which is a logical ring. Each computer is connected to a central hub calledMulti-Station Access Unit (MAU)π§π· Physically, the topology may be a star, but the signals and transmissions are transmitted in a logical ring.
31
q
Frequency Multiplexing (FDM)
A
- An available wireless spectrum is used to transmit data.
- The available frequency band is divided into narrow frequency bands and used to have multiple parallel channels for data transmission.
32
q
Tom's company had a lot of problems with unauthorized trackers being installed on the network. One reason is that employees can connect their laptops, smartphones and other mobile devices to the network, which can become infected and run trackers unknown to the owners. VPN deployment doesn't work because all network devices should be configured for specific VPNs and some devices, like your switches, don't have that kind of functionality available. Another problem Tom's team is facing is how to protect internal wireless traffic. Although wireless access points can be configured with digital certificates for authentication, sending and managing certificates on each wireless user's device is prohibitively expensive and will place a heavy burden on network personnel. Tom's boss also told him that the company needed to move from a fixed-line solution for metropolitan areas to a wireless solution.
37π§π· Which of the following is the best solution to meet the wireless broadband connectivity needs of the company?
A. WiMAX
B. IEEE 802.12
C. WPA2
D. IEEE 802.15
A
37.Aπ§π· IEEE 802.16 is a wireless MAN standard that allows wireless traffic to cover a large geographic area. This technology is also known as broadband wireless access. The trade name for 802.16 is WiMAX.
33
q
7.Which of the following statements correctly describes bluejacking?
A.Bluejacking is a harmful and malicious attack.
B.It's all about taking control of another handheld device via a Bluetooth-enabled device.
C.It is commonly used to send contact information.
D.The term was coined to use a Bluetooth device and take over from another device.
Extended questions:
A
RIGHTC.Bluetooth is vulnerable to an attack called bluejacking, in which an attacker sends an unsolicited message to a Bluetooth-enabled device. Bluejackers look for a receiving device, e.g. B. a mobile device or laptop and then send it a message. Often the bluejacker will try to send your business card so that it will be added to the victim's contact list in their address book. The countermeasure is to put the Bluetooth-enabled device in unrecognizable mode so that other people cannot identify this device at all. If you get any kind of message this way, just look around you. Bluetooth only works 10 meters away, so it's coming from someone nearby.
INCORRECTAis incorrect, as bluejacking is more of a harmless nuisance than a malicious attack. It is the act of sending unsolicited messages to Bluetooth-enabled devices. The first attack took place at a bank, where the attacker searched the network and found an active Nokia phone. He then sent the message "Buy Ericcson".
INCORRECTBis incorrect because no other device is controlled during bluejacking. It does not give the attacker any control over the target device. Instead, Bluejacker simply sends an unsolicited message to the Bluetooth-enabled device. These messages are usually just text, but you can also send images or sounds. Victims are often unfamiliar with bluejacking and may think that their phone is broken or has been attacked by a virus or hijacked by a Trojan horse.
INCORRECTDis incorrect because the term bluejacking has nothing to do with hijacking, which means taking control of something. The name Bluejacking was coined by a Malaysian IT consultant who sent the message "Buy Ericsson" to another Bluetooth-enabled device.
34
q
Firewall for packet filtering
A
I don't like this package. Oh, but I like this package. I don't like this package. This other package is fine.
packet filteringis a firewall technology that makes access decisions based on protocol header values ββat the network level. The device that performs the packet filtering processes is configured with ACLs that dictate the type of traffic allowed into and out of specific networks.
35
q
Internet Group Management Protocol (IGMP)
A
Internet Group Management Protocol (IGMP)It is used to inform routers about membership in multicast groups. When a user accepts multicast traffic, he becomes a member of a specific multicast group. IGMP is the mechanism that allows your computer to tell local routers that it is part of this group and send traffic to your system with a specific multicast address. IGMP can be used for online video streaming and gaming activities. The protocol allows the efficient use of the resources necessary to support this type of applications.
36
q
frame transmission
A
Why are there so many paths to choose from?
For a long time, many companies used dedicated links to communicate with other companies. Company A had a pipeline to Company B that provided a certain amount of bandwidth 24 hours a day and was not used by any other entity. This was great because only the two companies could use the line, so there was always some bandwidth available, but it was expensive and most companies didn't use all the bandwidth for every hour the connection was available. So companies were spending a lot of money on a service that they didn't use all the time. Businesses today use Frame Relay instead of leased lines.
37
q
star topology
A
In onestar topologyall nodes connect to a central device such as a switch. Each node has a dedicated connection to the central device. The central device must provide enough throughput so that it does not become an adverse bottleneck for the network as a whole. Because a central device is required, it presents a potential single point of failure, so redundancy may need to be implemented. The switches can be configured in flat or tiered deployments to allow larger organizations to use them.
38
q
Internet Control Message Protocol (ICMP)
A
A core protocol of the IP suite that is used to send status and error messages.
39
q
Digital Subscriber Line (DSL)
A
Digital Subscriber Line (DSL)It is another type of high-speed connection technology used to connect a home or business to the service provider's central office. It can provide broadband speeds from 6 to 30 times faster than ISDN and analog technologies. It uses existing telephone lines and offers Internet connection 24 hours a day, 7 days a week. Actually, that sounds better than sliced ββbread, but few people can take advantage of this service, since you have to be within 2.5 miles of the DSL service provider's equipment. DSL transmission rates decrease as the distance between home and business headquarters increases.
40
q
rede local (LAN)
A
Arede local (LAN)It is a network that provides communication and shared resources in a relatively small area. What defines a LAN versus a WAN depends on the physical medium, the encapsulation protocols, and the technology for accessing the medium. For example, a LAN can use 10Base-T cabling, TCP/IP protocols, and Ethernet media access technology, allowing users located on the same construction site to communicate. A WAN, on the other hand, can use fiber optic cable, L2TP tunneling protocol, and ATM media access technology, and allow users in one building to communicate with users in another building in another state (or country). A WAN connects LANs geographically over long distances. Most of the differences between these technologies are found at the data link layer.
41
q
Summary of tunneling protocols: Point-to-Point Tunneling Protocol (PPTP):
A
- Works in a client/server model
- Extend and secure PPP connections
- It works at the data link layer.
- Transmitted only over IP networks
42
q
Sub-Antideposition
A
A logical division of a network that improves network management and helps reduce network traffic congestion. The process of segmenting a network into smaller networks by using an addressing scheme made up of network and host parts.
43
q
wormhole attack
A
This occurs when an attacker captures packets at one point in the network and encapsulates them at another point in the network for use by a second attacker against a target system.
44
q
Internet Protocol (IP)
A
Core protocol of the TCP/IP suite. It provides packet creation, addressing, and routing functionality.
45
q
Digital Subscriber Line (DSL)
A
Digital Subscriber Line (DSL)It is another type of high-speed connection technology used to connect a home or business to the service provider's central office. It can provide broadband speeds from 6 to 30 times faster than ISDN and analog technologies. It uses existing telephone lines and offers Internet connection 24 hours a day, 7 days a week. Actually, that sounds better than sliced ββbread, but few people can take advantage of this service, since you have to be within 2.5 miles of the DSL service provider's equipment. DSL transmission rates decrease as the distance between home and business headquarters increases.
46
q
Ponte
A
APonteIt is a LAN device for connecting LAN segments. It works at the data link layer and therefore works with MAC addresses. A repeater does not work with addresses; it simply forwards all received signals. When a frame arrives at a bridge, the bridge determines whether the MAC address is on the local network segment or not. If the MAC address is not in the local network segment, the bridge forwards the frame to the required network segment.
47
q
12π§π· Which of the following statements is an incorrect definition of the specific component or protocol that makes up IPSec?
Aπ§π· The Authentication Header Protocol provides data integrity, data origin authentication, and protection against replay attacks.
Bπ§π· The Tunneling Security Payloads protocol provides confidentiality, data origin authentication, and data integrity.
Cπ§π· The Internet Security Association and Key Management Protocol provide a framework for creating security associations and exchanging keys.
DπΊπΈ Internet Key Exchange provides authenticated key material for use with cryptographic algorithms.
A
12.Dπ§π· The Authentication Header Protocol provides data integrity, data origin authentication, and protection against replay attacks. The Tunneling Security Payloads protocol provides confidentiality, data origin authentication, and data integrity. The Internet Security Association and Key Management Protocol provide a framework for creating security associations and exchanging keys. The Internet Key Exchange provides authenticated key material for use with the Internet Security Association and Key Management Protocol.
48
q
Wellenmultiplex (WDM)
A
Multiply available fiber optic capacity by using parallel channels, with each channel on a dedicated light wavelength. The bandwidth of an optical fiber can be divided into up to 160 channels.
49
q
John is the head of his company's security team. He discovered that the attackers had installed trackers on the network without the company's knowledge. Along with this issue, his team also discovered that two DNS servers had no record replication restrictions and the servers were caching suspicious name resolution data.
29π§π· Which of the following is the best countermeasure to implement to mitigate the threat of network management traffic being viewed by intruders?
A. SNMP v3
B. L2TP
Cπ§π· INDIVIDUAL
Dπ§π· Firewall with dynamic packet filtering
A
29.Aπ§π· SNMP versions 1 and 2 send their community string values ββin clear text, but version 3 added cryptographic functionality that provides encryption, message integrity, and authentication security. Therefore, sniffers installed on the network cannot eavesdrop on SNMP traffic.
50
q
High Speed ββSerial Interface (HSSI)
A
High Speed ββSerial Interface (HSSI)It is an interface used to connect multiplexers and routers with high-speed communication services such as ATM and Frame Relay. Supports speeds up to 52 Mbit/s, e.g. B. WAN T3 links, often built into routers and multiplexing devices to provide serial interfaces to the WAN. These interfaces define the electrical and physical interfaces to be used by DTE/DCE devices; therefore, HSSI operates at the physical layer.
51
q
Carrier Aware Multiple Access with Collision Detection (CSMA/CD)
A
A transmission is called a carrier, so when a computer transmits frames, it is performing carrier activity. When using the computerCarrier Aware Multiple Access with Collision Detection (CSMA/CD)Protocol, they monitor transmission activity or carrier activity on the line so they can determine when is the best time to transmit data. Each node continuously monitors the line and waits until the line is free before transmitting its data. As an analogy, consider several people gathered in a group, talking here and there about this and that. Typically, when a person wants to talk, they listen to the current conversation and wait for a pause before continuing. If you don't wait for the first person to stop speaking, he will speak at the same time as the other person and the people around you may not be able to fully understand what the other person is trying to say.
52
q
Intermediate System to Intermediate System (IS-IS)
A
Link-state protocol that allows each router to independently build a database of a network's topology. Similar to the OSPF protocol, it calculates the best route for the traffic. It is a provider-independent, hierarchical, and classless routing protocol.
53
q
If proper countermeasures are not implemented, an attacker could gain access to a large amount of device-related data that can be used in their subsequent attacks. The following are just a few records contained in SNMP MIB objects that could be of interest to attackers:
A
- .servidor.svSvcTable.svSvcEntry.svSvcName
- .servidor.svShareTable.svShareEntry.svShareName
- .servidor.sv.ShareTable.svShareEntry.svSharePath
- .servidor.sv.ShareTable.svShareEntry.svShareComment
- .server.svUserTable.svUserEntry.svBenutzername
- .domain.domMainDomain
54
q
filtered subnet
A
filtered subnetAfiltered subnetThe architecture adds another layer of security to the architecture of the crawled host. The external firewall filters traffic entering the DMZ network. However, instead of the firewall redirecting traffic to the internal network, an internal firewall also filters the traffic. Using these two physical firewalls creates a DMZ.
55
q
Generation 2Β½ (2.5G):
A
- Bandwidth greater than 2G
- "Always on" technology for emails and pages
56
q
marry a T
A
Leased lines that can carry voice and data information over trunks. It is a general term for any of several digitally multiplexed telecommunication bearer systems.
57
q
Voice over IP (VoIP)
A
The set of protocols, technologies, methodologies, and transmission techniques involved in the delivery of voice data and multimedia sessions over IP-based networks.
58
q
slide
A
Now you will be transformed into something that everyone can understand.
oslide, layer 6, takes the information from the application layer protocol and puts it in a format that all computers in the OSI model can understand. This layer provides a common means of representing data in a structure that the end system can process correctly. So if a user creates a Word document and sends it to multiple people, it doesn't matter if the receiving computers have different word processors. Each of these computers can receive and understand this file and present it as a document to its user. This is possible thanks to the processing of the data representation in the presentation layer. For example, when a computer running Windows 7 receives a file from another computer system, the information in the file's header indicates what type of file it is. The Windows 7 operating system has a list of the file types it understands and a table describing which program to use to open and edit each file type. For example, the sender can create a Word file in Word 2010 while the recipient uses Open Office. The recipient can open this file because the presentation layer on the sender's system has converted the file to American Standard Code for Information Interchange (ASCII) and the recipient's computer can open these types of files with their Open Office word processor. .
59
q
The following list addresses some of the issues to understand regarding firewalls:
A
- Most of the time, a distributed approach must be used to control all entry points to the network, which is not possible with a single firewall.
- Firewalls can represent a potential bottleneck to traffic flow and a single point of failure threat.
- Most firewalls do not offer protection against malware and can be fooled by the most sophisticated types of attacks.
- Firewalls do not protect against rogue wireless access points or trackers and offer little protection against insider attacks.
60
q
Physical β Network interface cards and drivers convert bits into electrical signals and control the physical aspects of data transmission, including optical, electrical, and mechanical requirements. The following are some of the standard interfaces at this level:
A
- EIA-422, EIA-423, RS-449, RS-485
- 10BASE-T, 10BASE-T, 10BASE-5, 100BASE-TX, 100BASE-FX, 100BASE-T, 1000BASE-T, 1000BASE-SX
- Integrated Digital Services Network (ISDN)
- Digital Subscriber Line (DSL)
- Synchronous Optical Network (SONET)
61
q
Frequency Division Multiple Access (FDMA)
A
Frequency Division Multiple Access (FDMA)it was the first multiple access technology to be put into practice. The available frequency range is divided into sub-bands (channels) and each subscriber (mobile phone) is assigned a channel. The subscriber has exclusive use of this channel while the call is being made or until the call is terminated or transferred; No further calls or conversations can be made on this channel during this call. Using FDMA in this way allows multiple users to share the frequency band without risk of interference between simultaneous calls. FMDA was used in the first generation (1G) of cellular networks. Several 1G mobile implementations, such as the Advanced Mobile Phone System (AMPS), the All Access Communication System (TACS), and the Nordic Mobile Telephone (NMT), used FDMA.
62
q
synchronous communication
A
Transmission sequencing technology that uses a clock pulse or timing scheme to synchronize data transmission.
63
q
Repeater
A
Aamplifieroffers the simplest type of connectivity, simply repeating electrical signals between cable segments, allowing you to expand a network. Repeaters operate at the physical layer and are add-on devices used to extend a network connection over a greater distance. The device amplifies the signals because the signals weaken over distance.
64
q
Summary of tunneling protocols: Layer 2 Tunneling Protocol (L2TP):
A
- Hybrid of L2F and PPTP
- Extend and secure PPP connections
- It works at the data link layer.
- Streams over many types of networks, not just IP
- Combined with IPSec for security
Sixty-five
q
IPv6
A
IP version 6 is the successor to IP version 4 and offers 128-bit addressing, integrated IPSec security protocol, simplified header formats, and some automated configuration.
66
q
special service
A
Compared to the best effort service, the traffic associated with this classification has more bandwidth, shorter delays, and fewer dropped frames.
67
q
wiring problems
A
Cables are extremely important in networks, and if they break, the entire network can collapse. This section addresses some of the most common cabling issues faced by many networks.
68
q
Public Switched Telephone Network (PSTN)
A
The circuit-switched public telephone network, consisting of telephone lines, fiber optic cables, cellular networks, communications satellites, and undersea telephone cables, enables all telephone-to-telephone communications. It used to be an analog landline telephone system, but now it is almost entirely digital, encompassing both landline and mobile phones.
69
q
selected host
A
A firewall that communicates directly with a perimeter router and the internal network. The router performs filtering activities on the traffic before it reaches the firewall.
70
q
lawyer
A
Alawyeris an intermediary. Intercepts and examines messages before forwarding them to the intended recipients. Suppose you have a box and a message to deliver to the President of the United States. You couldn't just go to the president and deliver these items. Instead, he would have to contact an intermediary, most likely the Secret Service, who would take the box and the message and examine the box thoroughly to make sure there was nothing dangerous inside. That's what a proxy firewall does: it accepts messages entering or leaving a network, examines them for malicious information, and if it decides the messages are correct, forwards the data to the destination computer.
71
q
firewall architecture
A
Firewalls are great, but where do we put them?
Firewalls can be placed in different areas of a network to meet specific needs. They can protect an internal network from an external network and act as a bottleneck for all traffic. A firewall can be used to segment and partition sections of the network and apply access controls between two or more subnets. Firewalls can also be used to provide a DMZ architecture. And as discussed in the previous section, the right type of firewall has to be in the right place. Organizations have general firewall requirements; Therefore, they keep them in similar places in their networks. We will see more about this topic in the next sections.
72
q
Packet filtering was the first generation of firewalls and is the most rudimentary of all firewall technologies. Filters only have the ability to inspect protocol header information at the network and transport layers and perform ALLOW or DENY actions on individual packets. This means that filters can make access decisions based on the following basic criteria:
A
- Source and destination IP addresses
- Source and destination port numbers
- record types
- Direction of incoming and outgoing traffic
73
q
First generation (1G):
A
- analog services
- voice service only
74
q
Serial Line Internet Protocol (SLIP)
A
PP replacedSerial Line Internet Protocol (SLIP), an older protocol used to encapsulate data to be sent over serial link connections. PPP has several features that SLIP does not:
75
q
Vishing
A
Social engineering activities on the phone system, often using VoIP-enabled features to gain unauthorized access to sensitive data.
76
q
dynamic ports
A
registered portsare 1024 to 49151, which can be registered with the Internet Corporation for Assigned Names and Numbers (ICANN) for a specific use. Vendors register specific ports to associate with their proprietary software.dynamic portsthey are 49152 to 65535 and can be used by any application "as needed".
77
q
fragmentation attack
A
A type of DDoS attack on a computer that floods the target system with a large amount of UDP echo traffic to broadcast IP addresses.
78
q
High Speed ββSerial Interface (HSSI)
A
High Speed ββSerial Interface (HSSI)It is an interface used to connect multiplexers and routers with high-speed communication services such as ATM and Frame Relay. Supports speeds up to 52 Mbit/s, e.g. B. WAN T3 links, often built into routers and multiplexing devices to provide serial interfaces to the WAN. These interfaces define the electrical and physical interfaces to be used by DTE/DCE devices; therefore, HSSI operates at the physical layer.
79
q
Ip address
A
Turn right at the router and left at the access server. I live on 10/10/2/3.
Each node in a network must have a unique IP address. Today the most widely used version of IPIP-Version 4 (IPv4), but their addresses are in such high demand that their supply is slowly running out.IP-Version 6 (IPv6)was created to meet this need. (IPv6 also has many built-in security features that are not part of IPv4.) IPv6 is covered later in this chapter.
80
q
asynchronous communication
A
Stream sequencing technology that uses start and stop bits or similar encoding mechanisms. It is used in environments that periodically transfer a variable amount of data.
81
q
Attacks at different levels.
A
As we look at the different layers of a typical network stack, let's also look at the specific types of attacks that can occur at each layer. One concept to understand at this point is that a network can be used as a channel for an attack or that the network can be the target of an attack. If the network is a channel for an attack, it means that the attacker is using the network as a resource. For example, when an attacker sends a virus from one system to another, the virus travels through the network channel. When an attacker performs a Denial of Service (DoS) attack, in which a large amount of spoofed traffic is sent over a network connection to crash it, the target is the network itself. As you will see in this chapter, it is important to understand how and where attacks occur so that you can take the correct countermeasures.
82
q
Network Devices: Various types of devices are used on LAN, MAN, and WAN to provide communication between computers and networks. We need physical devices throughout the network to actually use all the protocols and services we've covered so far. Different network devices vary in functionality, capacity, intelligence, and location on the network. We will see the following devices:
A
- Repeater
- bridges
- router
- Change
83
q
quince.Which of the following statements does not describe the security of IP telephony?
A.VoIP networks must be protected with the same security controls that are used in a data network.
B.Softphones are more secure than IP phones.
C.As terminals, IP phones can become the target of attacks.
D.The current Internet architecture over which voice is transmitted is less secure than physical phone lines.
Extended questions:
A
RIGHTB.IP softphones should be used with caution. A softphone is a software application that allows the user to make phone calls over the Internet using a computer. A softphone that replaces dedicated hardware behaves like a traditional phone. It can be used with a headset connected to a PC sound card or with a USB phone. Skype is an example of a softphone application. Compared to hardware-based IP phones, softphones make an IP network more vulnerable. However, softphones are no worse than any other interactive application on the Internet. Additionally, data-centric malware can more easily enter a network through softphones, since softphones do not separate voice traffic from data like IP phones do.
INCORRECTAis incorrect because the statement correctly describes the security of the IP telephony network. An IP telephony network uses the same technology as a traditional IP network, but can support voice applications. Therefore, the IP telephony network is vulnerable to the same vulnerabilities as a traditional IP network and must be protected accordingly. This means that the IP telephony network must be secure enough.
INCORRECTCis false because the statement is true. IP phones on an IP telephony network are equivalent to a workstation on a data network in terms of susceptibility to attacks. As such, IP phones must be protected with many of the same security controls implemented on a traditional workstation. For example, it is necessary to change the default administrator passwords. Unnecessary remote access features should be disabled. Logging must be enabled and the firmware update process must be protected.
INCORRECTDis false because the statement is true. For the most part, the current Internet architecture through which voice is transmitted is less secure than physical phone lines. Physical phone lines provide point-to-point connections that are more difficult to access than the software-based tunnels that make up most of the Internet. This is an important factor to consider when securing an IP telephony network as the network now contains two invaluable resources: data and voice. It is not uncommon for personal information, financial information, and other sensitive data to be shared over the phone. Intercepting this information over an IP telephone network is as simple as intercepting ordinary data. Voice traffic must now also be encrypted.
84
q
Unspecified Bit Rate (UBR)
A
A connectionless channel that does not promise a specific data rate. Clients cannot and do not have to control their traffic rate.
85
q
Spanning Tree Algorithm (STA)
A
Many bridges use thoseSpanning Tree Algorithm (STA), which adds more intelligence to bridges. STA ensures that frames do not circulate over networks forever, provides redundant paths in case a bridge fails, assigns unique identifiers to each bridge, assigns priority values ββto those bridges, and calculates path costs. This creates much more efficient frame forwarding processes across each bridge. The STA also allows an administrator to specify whether traffic should take certain routes over others.
86
q
shirred ruffle
A
Fiber Distributed Data Interface (FDDI)Developed by the American National Standards Institute (ANSI), the technology is a high-speed media access and token transfer technology. FDDI has a data rate of up to 100 Mbit/s and is generally used as a backbone over fiber optic cables. FDDI also provides fault tolerance by providing a second counter-rotating fiber ring. The main ring has data that moves in a clockwise direction and is used for regular data transmission. The second ring carries data in a counterclockwise direction and is only called if the main ring fails. The sensors look for the main ring and when it goes down they call a ring break so that the data is moved to the second ring. Each node in the FDDI network has relays connected to both rings, so that if the ring breaks, the two rings can be merged.
87
q
6π§π· What could happen if an attacker could inject tag values ββinto network and switch-based protocols to manipulate data link layer traffic?
Aπ§π· Dealing with open relays
B. VLAN-Hopping-Angriff
Cπ§π· Hypervisor-Denial-of-Service-Angriff
D. smurf attack
A
6.Bπ§π· VLAN hopping attacks allow attackers to access traffic on multiple VLAN segments. An attacker can make a system behave like a switch. The system understands the tag values ββused in the network and trunking protocols and can insert itself between other VLAN devices and gain access to incoming and outgoing traffic. Attackers can also inject tag values ββto manipulate traffic control at this link layer.
88
q
transmission types
A
The physical transmission of data can be done in different ways (analog or digital); you can use different timing schemes (synchronous or asynchronous); you can use a single channel on one transmission medium (baseband) or multiple different channels on one transmission medium (broadband); and the transmission can be electrical voltage, radio waves, microwaves, or infrared signals. These stream types and their properties are described in the following sections.
89
q
Temporal Key Integrity Protocol (TKIP)
A
The IEEE has published a standard that addresses the security issues of the original 802.11 standard called IEEE 802.11i. This standard uses different approaches that provide much more security and protection than the methods used in the original 802.11 standard. This security enhancement is achieved through specific protocols, technologies and algorithms. The first record isTemporal Key Integrity Protocol (TKIP), which is compatible with WLAN devices based on the original 802.11 standard. TKIP actually works alongside WEP by injecting key material, which is data used to generate new dynamic keys. The new standard also integrates 802.1X port authentication and EAP authentication methods.
90
q
X.25
A
X.25is a legacy WAN protocol that defines how devices and networks establish and maintain connections. Like Frame Relay, X.25 is a switching technology that uses carrier switches to provide connectivity to many different networks. It also offers any-to-any connection, which means many users can use the same service at the same time. Subscribers are billed based on the bandwidth they use, unlike dedicated connections, which charge a flat fee.
91
q
Security measures that must be implemented for dial-up connections include:
A
- Configure the remote access server to call back the initial phone number to ensure that it is a valid and approved number.
- Modems must be configured to answer after a predetermined number of rings to fight dial wars.
- Disable or remove modems when not in use.
- All modems should be consolidated in one place and managed as centrally as possible.
- The use of two-factor authentication, VPNs, and personal firewalls should be implemented for remote access connections.
92
q
Primary Rate Interface (PRI)
A
Analog telecommunications signals use a full channel for communication, but ISDN can split this channel into multiple channels to carry different types of data and provide full-duplex communication and a higher level of control and error handling. ISDN offers two basic services:Basic Rate Interface (BRI)miPrimary Rate Interface (PRI)π§π· The BRI has two B channels that allow data transmission and one D channel that provides call setup, connection management, error control, caller identification, and more. The available bandwidth with BRI is 144 Kbps, while dial-up modems can only provide 56 Kbps.
93
q
optical wireless
A
Optical wireless technology is the combined use of two technologies: wireless radio frequency (RF) and fiber optics. Long-range links are provided by fiber optic cables, and long-range endpoint links to the end user are provided by wireless RF transmitters. Local links can be provided by laser systems, also known as free space optics (FSO), instead of RF wireless. FSO is a point-to-point optical link that supports very high rates outdoors. These types of wireless transmissions are difficult to intercept and do not require a license to implement. While earlier versions of optical wireless technology have been adversely affected by weather conditions, there are more and more weather-resistant optical wireless systems available today.
94
q
Sean is the new security administrator at a large financial institution. There are several issues that Sean will become aware of in his first week in his new role. First, the rogue packets appear to reach critical servers, even though every network has well-configured firewalls at every gateway location to control traffic to and from those servers. One of Sean's team complains that the current firewall logs are too large and contain useless data. He also tells Sean that the team needs to use rules that are less permissive than the current All rule type. Sean also discovered that some members of the team want to implement tarpits on some of the most commonly attacked systems.
32π§π· Which of the following events is most likely to occur to allow unwanted packages to gain unauthorized access to critical servers?
Aπ§π· A TCP stream hijacking is taking place.
Bπ§π· Source routing is not restricted.
Cπ§π· Shard attacks are in progress.
Dπ§π· The attacker tunnels the communication via PPP.
A
32.Bπ§π· Source routing means that the packet decides how to get to its destination, not the routers between the source and destination computers. Source routing moves a packet along a specific path through the network. To ensure that none of these routing errors occur, many firewalls are configured to look for source routing information within the packet and reject it if it is present.
95
q
5π§π· Which of the following protocols is considered connection-oriented?
A. IP
B. ICMP
C. UDP
D. TCP
A
5.Dπ§π· TCP is the only connection-oriented protocol on the list. A connection-oriented protocol offers reliable connectivity and data transfer, while a connectionless protocol offers unreliable connections and does not promise or guarantee data transfer.
96
q
Metro-Ethernet
A
A data link technology used as a metropolitan area network to connect customer networks to larger service networks or the Internet. Businesses can also use Metro Ethernet to connect distributed locations to their intranet.
97
q
Simple Authentication and Security Layer (SASL)
A
A framework for authentication and data security in Internet protocols. It separates the authentication mechanisms from the application protocols and allows the use of any SASL-compliant authentication mechanism in any application protocol that uses SASL.
98
q
with status
A
Most NAT implementations are stateful, which means that they trace a communication between the internal host and an external host until the session ends. The NAT device needs to remember the internal IP address and port to send the response messages. This stateful feature is similar to stateful inspection firewalls, but NAT does not scan incoming packets for malicious properties. Instead, NAT is a service that typically runs on routers or gateway devices within an organization's protected subnet.
99
q
inscription
A
Application layer protocols handle file transfers, virtual terminals, network management, and servicing application network requests. Some of the protocols that operate at this level include
100
q
Single Attachment Concentrator (SAC)
A
Hub connecting a SAS device to the main ring
101
q
Encapsulating Security Payload (ESP)
A
B.Encapsulating Security Payload (ESP)provides confidentiality, data origin authentication, and data integrity.
102
q
clone phone
A
clone phoneIt has been around for many years and this activity is not going to stop anytime soon. A normal cell phone can be stolen and reprogrammed with someone else's credentials. This is a common activity used by organized crime gangs and drug dealers who do not want their information readily available to law enforcement. Global System Mobile (GSM) phones use a SIM (Subscriber Identity Module) chip that contains authentication credentials, phone numbers, saved messages, and more. Before a GSM phone can access the cellular network, the SIM card must be present in the phone. Attackers clone these SIM chips to make fraudulent calls to the cell phone owner's account.
103
q
Wirt Bastion
A
A system is considered as aWirt BastionIf it's a highly exposed device, it's more likely to be targeted by attackers. The closer a system is to an untrusted network like the Internet, the more likely it is to be seen as a potential target, since it has fewer layers of protection to protect it. If a system is on the public side of a DMZ or directly connected to an untrusted network, it is considered a bastion host; therefore, it must be extremely blocked.
104
q
Multi-service access technologies
A
voice in the packet What will they think next?
Multi-service access technologiescombining different types of communication categories (data, voice, and video) in one transmission line. This results in higher performance, lower operating costs, and more flexibility, integration, and control for administrators. The normal telephone system is based on a circuit-switched network centered on the voice calledpublic switched telephone network (PSTN)π§π· PSTN uses circuit switching instead of packet switching. When a phone call is made, it is placed on the PSTN interface, which is the user's phone. This telephone is connected to the subscriber line of the telephone company through a copper cable. Once the signals from that phone call reach the phone company's central office (the end of the subscriber line), they are part of the phone company's circuit-switched world. A connection is established between the source and the destination, and data flows through the same switches while the call is in session.
105
q
RJ-11
A
It is commonly used to terminate telephone lines.
106
q
Intra-site automatic tunnel routing protocol
A
An IPv6 transition mechanism for forwarding IPv6 packets between dual-stack nodes in an IPv4 network.
107
q
Wellenmultiplex (WDM)
A
- Used in fiber optic communications.
- Multiplexes multiple optical carrier signals onto a single optical fiber.
108
q
amplifier
A
Aamplifieroffers the simplest type of connectivity, simply repeating electrical signals between cable segments, allowing you to expand a network. Repeaters operate at the physical layer and are add-on devices used to extend a network connection over a greater distance. The device amplifies the signals because the signals weaken over distance.
109
q
state table
A
AStateful Firewallit is like a nosy neighbor who interferes in people's affairs and conversations. She tracks suspicious cars pulling into the neighborhood, who's out of town for the week, and the postman who stays a little late at the neighbor's house. This can be annoying until her house is burgled. Then you and the police will want to talk to the nosy neighbor because she knows everything that is going on in the neighborhood and she is more likely to know that something unusual has happened. A stateful inspection firewall is more inquisitive than a typical filtering device because it keeps track of what computers are saying to each other. This requires the firewall to maintain astate table, which is like a party report of who said what to whom.
110
q
Email Forgery
A
Activity that involves changing the sender's address and other parts of the email header to make the email appear to come from a different source. Since SMTP doesn't provide authentication, it's easy to impersonate someone and spoof emails.
111
q
3π§π· Which of the following features is not part of the IEEE 802.11a standard?
Aπ§π· It works in the 5 GHz band.
Bπ§π· It uses OFDM spread spectrum technology.
Cπ§π· It offers a bandwidth of 52 Mbit/s.
Dπ§π· Covers shorter distance than 802.11b.
A
3.Cπ§π· The IEEE 802.11a standard uses OFDM spread spectrum technology, operates in the 5 GHz frequency band and provides a bandwidth of up to 54 Mbps. The working range is smaller because it works at a higher frequency.
112
q
Open the shortest path first
A
OSPF uses link state algorithms to send routing table information. Using these algorithms allows for smaller and more frequent routing table updates. This provides a more stable network than RIP, but requires more memory and CPU resources to support this additional processing. OSPF enables a hierarchical routing network that has a trunk connecting all the subnets. OSPF has replaced RIP in many networks today. Authentication can be done with clear text passwords, encrypted passwords, or you can configure no authentication on routers that use this protocol.
113
q
multimode
A
Large glass cores can carry more data than single core fibers, although their higher attenuation makes them better for shorter distances.
114
q
Value Network (VAN)
A
A hosted EDI service offering that acts as an intermediary between trading partners who exchange standards-based or proprietary data through common business processes.
115
q
Single Clamping Station (SAS)
A
Connects to a single ring (the main one) through a hub
116
q
tear attack
A
Bad fragments are created by the attacker and, once reassembled, can cause the victim's system to become unstable.
117
q
BNC (British Marine Connector)
A
It is commonly used to terminate coaxial cables. It is used to connect various types of radio, television and other high-frequency electronic equipment. (Also known as the bayonet-Neill-Concelman connector.)
118
q
cable modems
A
We already have cable to your house, so buy this additional internet connection service.
Cable television companies have been bringing television services to homes for years and then began providing data transmission services to users who have cable modems and want to connect to the Internet at high speeds.
119
q
type of service
A
TO USEIP provides addressing, packet fragmentation, and packet timeouts. To ensure that packets don't traverse a network forever, IP provides atime to live(TTL) A value that is reduced each time the packet passes through a router. IP can also provide onetype of service(ToS), which means you can prioritize different packets for urgent functions.
120
q
Spanning Tree Protocol (STP)
A
A network protocol that ensures a loop-free topology for all bridged Ethernet LANs and allows redundant links to be available in the event that connecting links fail.
121
q
network control protocols
A
PPP performs several functions, including encapsulation of multi-protocol packets; there's aconnection control protocol(LCP), which establishes, configures, and maintains the connection;network control protocols(NCP) are used for network layer protocol configuration; and provides user authentication capabilities through the PAP (Password Authentication Protocol), CHAP (Challenge Handshake Authentication Protocol), and EAP (Extensible Authentication Protocol) protocols.
122
q
9π§π· Which of the following shows the sequence of layers as layers 2, 5, 7, 4 and 3?
Aπ§π· Data connection, session, application, transport and network
Bπ§π· Data connection, transport, application, session and network
Cπ§π· Network, session, application, network and transport
Dπ§π· Network, transport, application, meeting and presentation
A
9.Aπ§π· The OSI model consists of seven layers: Application (Layer 7), Presentation (Layer 6), Session (Layer 5), Transport (Layer 4), Network (Layer 3), Data Connection (Layer 2) and Physics (Layer 2). . layer 1).
123
q
remote connectivity
A
I need to talk to you, but I'm here!
Remote connectivity includes various technologies that allow home and remote users to connect to networks that give them access to network resources that help them perform their tasks. In most cases, these users must first access the Internet through an ISP, which connects to the destination network.
124
q
User-Agent-Server (UAS)
A
SIP consists of two main components: theUser-Agent-Client (UAC)miUser-Agent-Server (UAS)π§π· UAC is the application that creates the SIP requests to start a communication session. UACs are typically messaging tools and softphone applications that are used to make VoIP calls. The UAS is the SIP server responsible for all routing and signaling of VoIP calls.
125
q
6 a 4
A
Transition mechanism for migration from IPv4 to IPv6. It allows systems to use IPv6 for communication when their traffic needs to traverse an IPv4 network.
126
q
Extensible Authentication Protocol (EAP)
A
Extensible Authentication Protocol (EAP)it is also supported by PPP. In fact, EAP is not a specific authentication protocol like PAP and CHAP. Rather, it provides a framework that allows the use of many types of authentication techniques when establishing network connections. As the name suggests, it extends the authentication capabilities of the standard (PAP and CHAP) to include other methods, such as one-time passwords, token cards, biometrics, Kerberos, digital certificates, and future mechanisms. So if a user connects to an authentication server and they both have EAP capabilities, they can negotiate between a longer list of possible authentication methods.
127
q
30Which of the following statements best describes the difference between a virtual firewall that works in bridge mode and one built into a hypervisor?
A.Virtual bridging firewall allows the firewall to control individual traffic connections, and hypervisor integration allows the firewall to control all activities that take place on a host system.
B.Virtual Bridged Firewall allows the firewall to control individual network connections, and hypervisor integration allows the firewall to control all activities that take place on a guest system.
C.Virtual bridging firewall allows the firewall to control individual traffic connections, and hypervisor integration allows the firewall to control all activities that take place on a guest system.
D.Virtual bridging firewall allows the firewall to control individual guest systems, and hypervisor integration allows the firewall to control all activities that take place on a networked system.
Extended questions:
A
RIGHTA.Virtual firewalls can be bridging products that monitor individual traffic links between virtual machines, or they can be integrated into the hypervisor of a virtualized environment. The hypervisor is the software component that manages the virtual machine and monitors the execution of the guest system software. When the firewall is integrated into the hypervisor, it can "see" and monitor all activity taking place on the host system.
INCORRECTBis incorrect because the virtual firewall in bridge mode allows the firewall to handle individual traffic connections between hosts and not network connections. Hypervisor integration allows the firewall to control all activity that occurs on a host system, not a guest system.
INCORRECTCis incorrect because the virtual firewall in bridge mode allows the firewall to control individual traffic connections, and the hypervisor integration allows the firewall to control all activities that take place on a host system and not on a guest system. The hypervisor is the software component that manages the virtual machine and monitors the execution of the guest system software. When the firewall is integrated into the hypervisor, it can "see" and monitor all the activities that take place on the system.
INCORRECTDis incorrect because a virtual firewall in bridge mode allows the firewall to control individual traffic between guest systems, and hypervisor integration allows the firewall to control all activity that occurs on a host system and not on a network system.
128
q
Simple Network Management Protocol (SNMP)
A
A protocol within the IP suite that is used for network device management activities through the use of a framework that uses managers, agents, and management databases.
129
q
Session Initiation Protocol (SIP)
A
When calling by phone, the connection must be established, the signaling checked and the session terminated. This is done using the Signaling System 7 (SS7) protocol. WhenVoice over IP (VoIP)is used, uses theSession Initiation Protocol (SIP), which sets up and splits call sessions like SS7 does for non-IP phone calls. SIP is an application layer protocol that can run on top of TCP or UDP. SIP provides the basis for enabling the more complex phone line features provided by SS7, e.g. B. call a telephone, dial a telephone number, generate busy signals, etc.
130
q
Servicio-Set-ID (SSID)
A
All hosts wishing to participate in a specific WLAN must be configured with theServicio-Set-ID (SSID)π§π· Multiple hosts can be segmented on different WLANs with different SSIDs. The reasons for segmenting a WLAN into parts are the same reasons for segmenting wired systems in a network: users need access to different resources, have different business roles, or have different levels of trust.
131
q
bluetooth inalambrico
A
obluetooth inalambricothe technology is actually based in part on the 802.15 standard. It has a transmission speed of 1 to 3 Mbit/s and works in a range of around ten meters. If you have a Bluetooth-enabled cell phone and a PDA with a calendar function, you can update them without having to physically connect them. For example, if you have added some information to your phone's contact list and task list, simply place the phone next to your PDA. The PDA would detect that the other device was nearby and try to establish a network connection with it. Once connected, a synchronization would take place between the two devices and the PDA would add the new contact list and the to-do list data. Bluetooth works in the frequency band of other 802.11 (2.4 GHz) devices.
132
q
long distance networks
A
LAN technologies provide communication capabilities in a small geographic area.wide area network (WAN)Technologies are used when communication needs to take place over a larger geographic area. LAN technologies cover how a computer transmits its data over a network cable, the rules and protocols, how that information is formatted and transmitted, how errors are handled, and how the destination computer collects that information from the cable. When a computer on a network needs to communicate with a network across the country or in a completely different country, WAN technologies come into play.
133
q
Functions and protocols in the OSI model
A
The exam requires you to understand the functionality that occurs at the various layers of the OSI model, along with the specific protocols that operate at each layer. Below is a brief description of each layer and its components.
134
q
13π§π· Systems based on the OSI framework are considered to be open systems. What does that mean?
Aπ§π· You do not have any authentication mechanism configured by default.
Bπ§π· You have interoperability problems.
Cπ§π· They are built with internationally recognized protocols and standards, so they can easily communicate with other systems.
Dπ§π· They are built with international protocols and standards, so they can choose what type of systems they communicate with.
A
13.Cπ§π· An open system is a system developed on the basis of standardized protocols and interfaces. Complying with these standards allows systems to work more effectively with other systems that follow the same standards.
135
q
Hill
A
Hillis a general term for software running on a device that connects two different environments, often acting as a translator for them or limiting their interactions. A gateway is usually needed when one environment speaks a different language, that is, it uses a specific protocol that the other environment does not understand. The gateway can convert Internetwork Packet Exchange (IPX) protocol packets to IP packets, accept email from one type of email server and format it so that another type of email server can accept and understand it, or Combine different data connection technologies and convert like FDDI to Ethernet.
136
q
Dual base firewall
A
This device has two interfaces and sits between an untrusted network and a trusted network to provide secure access. A multi-homed device simply means that it has multiple interfaces. Multi-interface firewalls allow segmentation of the network based on security zones with unique security settings.
137
q
The following is a brief snapshot of the history of telecommunications:
A
- Copper lines carry purely analog signals.
- T1 lines carry up to 24 calls.
- T3 lines carry up to 28 T1 lines.
- Fiber optic and SONET network.
- ATM over SONET.
138
q
Enhanced Internal Gateway Routing Protocol
A
EIGRP is a Cisco proprietary extended distance vector routing protocol. It allows faster router table updates than its IGRP predecessor and minimizes routing jitter that can occur after topology changes. The routers exchange messages containing information about the bandwidth, delay, load, reliability, and maximum transmission unit (MTU) of the path to each destination, as known to the advertising router.
139
q
Multiple access with operator recognition with collision detection
A
A media access control method that uses a carrier sniffing scheme. If a transmission system detects another signal during the transmission of a frame, it stops transmitting that frame, sends out an interference signal, and waits a random amount of time before attempting to resend the frame. This reduces collisions on a network.
140
q
circuit level proxy
A
Acircuit level proxyestablishes a connection (circle) between the two communication systems. It works at the session layer of the OSI model and monitors traffic from a network-based perspective. This type of proxy cannot "inspect" the content of a packet; Therefore, deep packet inspection is not performed. It can only make access decisions based on the protocol header and the session information available to it. While this means that it can't offer as much protection as an application-layer proxy because it doesn't need to understand application-layer protocols, it is considered application-agnostic. As such, it cannot provide the granular protection that a higher-level proxy can, but it allows for a broader range of protection where application-level proxies may not be appropriate or available.
141
q
Electronic Data Interchange (EDI)
A
aextranetit extends beyond the boundaries of the corporate network to allow two or more companies to share common information and resources. Trading partners often set up extranets to allow communication between companies. An extranet allows trading partners to collaborate on projects; share marketing information; communicate and work together on problems; Postal twists; and share catalogs, pricing structures, and information about upcoming events. Trading partners often useElectronic Data Interchange (EDI), which provides structure and organization for electronic documents, purchase orders, invoices, purchase orders, and a data flow. EDI has evolved to web-based technologies to allow for easy access and simpler methods of communication.
142
q
data transmission level
A
As we move through the protocol stack, we get closer to the actual transmission channel (ie, the network line) that all this data travels over. The external format of the data packet changes slightly at each layer and must at some point be translated into the binary format of LAN or Wide Area Network (WAN) technology for proper line transmission. that happens indata transmission level, capa 2.
143
q
Open Systems Interconnection Model (OSI)
A
International standardization of systems-based network communication through a seven-layer modular architecture.
144
q
The following list enumerates the current private IP address ranges:
A
- 10.0.0.0-10.255.255.255 Class A network
- 172.16.0.0-172.31.255.255 Class B Networks
- 192.168.0.0-192.168.255.255 Class C networks
145
q
Internet Message Access Protocol (IMAP)
A
A standard Internet protocol used by email clients to retrieve email from a remote server. Email clients using IMAP generally leave messages on the server until specifically deleted by the user.
146
q
Multiple access by code division (CDMA)
A
Multiple access by code division (CDMA)It was developed after FDMA, and as the term "code" suggests, CDMA assigns each voice call or data transmission a unique code to distinguish it from all other transmissions sent over the cellular network. In a "spread spectrum" CDMA network, calls are distributed over the entire radio frequency band. CDMA allows all network users to use all network channels simultaneously. At the same time, a given cell can interact with several other cells at the same time. These characteristics make CDMA a very powerful technology. It is the key technology for the cellular networks that currently dominate the wireless space.
147
q
Email threats
A
Email Forgeryis a technique used by malicious users to fake an email as coming from a legitimate source. Typically, these emails appear to come from known and trusted email addresses, when in fact they come from a malicious source. This technique is now widely used by attackers for spam and phishing purposes. An attacker attempts to obtain sensitive information from the target, such as B. Username and password or bank account details. Sometimes email messages contain a link to a well-known website when, in fact, it is a fake website that is used to trick the user into revealing their information.
148
q
best effort service
A
There is no guarantee of performance, delay or delivery. Traffic with priority ratings has priority over traffic that has received that rating. Most of the traffic on the Internet has this classification.
149
q
Grace is a security administrator for a medical facility and is responsible for several different teams. One team reported that three critical systems went offline when their primary FDDI link failed, even though the link was supposed to provide redundancy. Grace is also expected to advise her staff on the type of fiber to be deployed for building-to-building connectivity on campus. Because it is a medical school, many surgeries are videotaped and this data must be continuously transmitted from building to building. Another thing Grace has been told is that DoS attacks against specific servers within the internal network occur regularly. The attacker sends excessive ICMP ECHO REQUEST packets to all hosts on a given subnet, pointing to a given server.
28π§π· Which of the following is the best and most profitable countermeasure for Grace's team?
Aπ§π· Network Address Translation
Bπ§π· Ban ββunnecessary ICMP traffic from untrusted networks
Cπ§π· Application-based proxy firewall
Dπ§π· Filtered subnet with two firewalls from two different providers.
A
28.Bπ§π· The description of the attack is a smurf attack. In this situation, the attacker sends an ICMP echo request packet with a spoofed source address to the victim's network broadcast address. This means that each system on the victim's subnet receives an ICMP echo request packet. Each system responds to this request with an ICMP echo reply packet to the spoofed address specified in the packets: the victim's address. All of these response packets go to the victim's system, overloading it by bombarding it with packets it doesn't necessarily have the capacity to process. Filtering out unnecessary ICMP traffic is the cheapest solution.
150
q
Time Division Multiple Access (TDMA)
A
Time Division Multiple Access (TDMA)increases the speed and efficiency of the cellular network by taking channels from the radio frequency spectrum and dividing them into time slots. In different periods, multiple users can share the same channel; Systems within the cell change from user to user, effectively reusing available frequencies. TDMA has increased speeds and quality of service. A common example of TDMA in action is a conversation. One person speaks for a while, then pauses, and then another person speaks. In TDMA systems, time is divided into frames. Each box is divided into slots. TDMA requires that both the source and destination know the start and end time of each slot. Mobile communication systems such as the Global System for Mobile Communications (GSM), Digital AMPS (D-AMPS), and Personal Digital Cellular (PDC) use TDMA.
151
q
Switched Virtual Circuits (SVC)
A
Unlike PVCSwitched Virtual Circuits (SVC)they require steps similar to a dial-up and connection process. The difference is that PVC frames set up a fixed path, while using SVC requires the construction of a circuit. It is similar to setting up a phone call over the public network. During the configuration process, the required bandwidth is requested, the destination computer is contacted and must accept the call, a route is determined, and forwarding information is programmed into each switch along the SVC path. SVCs are used for teleconferencing, establishing temporary connections to remote sites, data replication, and voice calls. Once the connection is no longer needed, the circuit is disabled and the switches forget it ever existed.
152
q
1.Layer 2 of the OSI model has two sublayers. What are these sublayers, and which two IEEE standards describe technologies at this layer?
A.LCL and MAC; IEEE 802.2 and 802.3
B.LCL and MAC; IEEE 802.1 and 802.3
C.Red y MAC; IEEE 802.1 y 802.3
D.LLC by MAC; IEEE E802.2 and 802.3
Extended questions:
A
RIGHTD.The data link layer or layer 2 of the OSI model is responsible for adding a header and a trailer to a packet to prepare the packet for the local area network or wide area network technology binary format for wired transmission. adequate. Layer 2 is divided into two functional sublayers. The upper sublayer is Logical Link Control (LLC) and is defined in the IEEE 802.2 specification. It communicates with the network layer, which sits just above the data link layer. Beneath LLC is the Media Access Control (MAC) sublayer, which specifies the interface to the physical layer protocol requirements. Therefore, the specification of this layer depends on the technology of the physical layer. The IEEE MAC specification for Ethernet is 802.3, Token Ring is 802.5, Wireless LAN is 802.11, etc. Anytime you see a reference to an IEEE standard like 802.11 or 802.16, it refers to the protocol that runs at the MAC sublayer of the data link layer of the protocol stack.
INCORRECTAis incorrect because the LCL is a distractor. The correct acronym for the upper sublayer of the data link layer is LLC. It stands for Logical Link Control. By providing multiplexing and flow control mechanisms, LLC allows network protocols to coexist within a multipoint network and transport them over the same network media.
INCORRECTBis incorrect because the LCL is a distractor. The sublayers of the data link layer are logical link control (LLC) and media access control (MAC). Also, LLC is defined in the IEEE 802.2 specification, not 802.1. The IEEE 802.1 specifications relate to the protocol layers above the MAC and LLC layers. It covers LAN/MAN architecture, network management, connection between LAN and WAN and connection security, etc.
INCORRECTCis incorrect because the network is not a sublayer of the data link layer. The sublayers of the data link layer are logical link control (LLC) and media access control (MAC). LLC sits between the network layer (the layer just above the data link layer) and the MAC sublayer. Also, LLC is defined in the IEEE 802.2 specification, not IEEE 802.1. As just explained, the 802.1 standards address areas of LAN/MAN architecture, network management, the connection between LAN and WAN, and connection security. The four active task groups in the IEEE 802.1 group are Networking, Security, Audio/Video Bridging, and Data Center Bridging.
153
q
asymmetric services
A
DSL offers many types of services. With symmetric services, traffic flows up and down (to and from the Internet or destination) at the same rate. For asymmetric services, the download speed is much faster than the upload speed. In most situations, an asymmetric connection is suitable for home users, since home users tend to download things from the Internet much more often than they upload data.
154
q
26IPv6 has many new and different features and functionality compared to IPv4. Which of the following is a bad feature or function of IPv6?
i.IPv6 allows scopeless addresses, which allows an administrator, for example, to restrict specific addresses to specific servers or file and printer shares.
ii.IPv6 has integrated IPSec into the protocol stack that provides application-based secure transmission and authentication.
iii.IPv6 has more flexibility and routing capabilities compared to IPv4, and allows the assignment of Quality of Service (QoS) priority values ββfor time-sensitive transmissions.
4. The protocol offers automatic configuration, which greatly simplifies administration compared to IPv4, and does not require Network Address Translation (NAT) to expand its address space.
A.yo, iii
B.myself
C.ii, iii
D.ii, iv
Extended questions:
A
RIGHTB.IPv6 allows for scoped addresses, which allows an administrator to restrict specific addresses to specific servers or file and printer shares, for example. IPv6 has integrated IPSec into the protocol stack, providing end-to-end secure transmission and authentication.
INCORRECTAThat's wrong. IPv6 allows for scoped addresses, which allows an administrator to restrict specific addresses to specific servers or file and printer shares, for example. IPv6 offers more flexibility and routing capabilities, allowing the assignment of Quality of Service (QoS) priority values ββfor time-sensitive transmissions.
INCORRECTCThat's wrong. IPv6 offers more flexibility and routing capabilities, allowing the assignment of Quality of Service (QoS) priority values ββfor time-sensitive transmissions. IPv6 has integrated IPSec into the protocol stack, providing end-to-end secure transmission and authentication.
INCORRECTDis incorrect because IPv6 has IPSec built into the protocol stack that provides end-to-end secure transmission and authentication. The protocol offers self-configuration, which greatly simplifies administration and does not require Network Address Translation (NAT) to expand its address space.
155
q
forward tables
A
you walk like this And you, go this way!
A jumper needs to know how to get a frame to its destination, i. h needs to know which port to send the frame to and where the destination host is. Years ago, network administrators had to enter routing paths into bridges so that the bridges would have static routes indicating where frames to different destinations should be forwarded. This was a tedious and error prone task. Today's bridges use transparent bridges.
156
q
DNS zone transfer
A
The process of replicating databases containing DNS data to a set of DNS servers.
157
q
The IPv6 specification, as described in RFC 2460, defines the differences and advantages of IPv6 over IPv4. Some of the differences are as follows:
A
- IPv6 increases the size of the IP address from 32 bits to 128 bits to support more levels of the addressing hierarchy, a much larger number of addressable nodes, and easier address autoconfiguration.
158
q
sixteen.When an organization partitions name zones, its host names, which can only be accessed through an intranet, are hidden from the Internet. Which of the following statements best describes why this happens?
A.To prevent attackers from accessing servers
B.To avoid tampering with the hosts file
C.To prevent attackers from gaining valuable information that could be used to mount an attack
D.To prevent attackers from getting the information they need to cybersquat
Extended questions:
A
RIGHTC.Many companies have their own internal DNS servers to resolve their internal hostnames. These companies also often use your ISP's DNS servers to resolve host names on the Internet. An internal DNS server can be used to resolve host names on the network, but often more than one DNS server is used for load balancing and for redundancy and fault tolerance. With DNS servers, networks are divided into zones. One zone might contain all the host names for the marketing and accounting departments, and another zone might contain the host names for the administrative, research, and legal departments. It's a good idea to split DNS zones whenever possible so that hostnames only accessible from an intranet are not visible from the Internet. This information is valuable to an attacker planning an attack, as it can lead to other information such as network structure, organizational structure, or server operating systems.
INCORRECTAis wrong because it is not the best answer to this question. Namezones are partitioned in such a way that attackers cannot obtain information about internal systems, such as names, IP addresses, roles, etc. One of the secondary attacks after exploiting a DNS server may be unauthorized access to a server, but ensuring unauthorized access to servers only is not the main reason for DNS zone splitting.
INCORRECTBis incorrect as namezone splitting has to do with configuring DNS servers to resolve hostnames and not tamper with the hosts file. The hosts file can be tampered with for many good and bad reasons. The hosts file always maps the hostname's localhost to the IP address 127.0.0.1 (this is the loopback network interface defined in RFC 3330), as well as other hosts. Some viruses add invalid IP addresses of antivirus vendors to the hosts file to avoid detection. By adding frequently visited IP addresses to the hosts file, you can increase your Internet browsing speed. You can also block spyware and ad networks by adding spyware and ad network site lists to the hosts file and assigning them to the loopback network interface. In this way, these websites always point to the user's computer and the websites cannot be accessed.
INCORRECTDis incorrect because hackers do not need information on a DNS server to squat. Cybersquatting occurs when an attacker buys a well-known brand or company name, or a variation thereof, as a domain name in order to sell it to the rightful owner. Meanwhile, the company may be misrepresented to the public. The only way a business can prevent cyberattacks is by registering adjacent domains and domain variations, or through trademark litigation.
159
q
Single point of failure for traffic
A
Some kind of redundancy must be created.
160
q
analog signals
A
Continuously variable electromagnetic wave that represents and transmits data. The carrier signals vary in gain and frequency.
161
q
housekeeping rule
A
Last rule in the rule base that drops and logs traffic that does not match the previous rules.
162
q
Sean is the new security administrator at a large financial institution. There are several issues that Sean will become aware of in his first week in his new role. First, the rogue packets appear to reach critical servers, even though every network has well-configured firewalls at every gateway location to control traffic to and from those servers. One of Sean's team complains that the current firewall logs are too large and contain useless data. He also tells Sean that the team needs to use rules that are less permissive than the current All rule type. Sean also discovered that some members of the team want to implement tarpits on some of the most commonly attacked systems.
33π§π· Which of the following statements best describes the firewall configuration issues described by Sean's team member?
Aπ§π· Clean rule, progressive rule
Bπ§π· Rule of stealth, silent rule
Cπ§π· Silent rule, denial of the rule
Dπ§π· Rule of stealth, silent rule
A
33.Cπ§π· The different types of firewall rules are described below:
β’silent reignDrop "noisy" traffic without logging it. This reduces the size of the log by not responding to packets that are considered unimportant.
β’Secrecy-RegelDo not allow access to firewall software from unauthorized systems.
β’housekeeping ruleThe last rule in the rulebase that drops and logs any traffic that does not match the previous rules.
β’negation ruleIt is used in place of the broad and permissive "any rule". Deny rules provide stricter permission rights and determine which system can be accessed and how.
163
q
dedicated links
A
ADedicated linkAlso called a leased line or point-to-point connection. It is a single pre-established connection for WAN communication purposes between two destinations. It is dedicated, which means that only the endpoints can communicate with each other. This link will not be shared by any other entity at any time. In the past, this was the main way businesses communicated because there weren't as many options available as today. Setting up a dedicated connection is a good idea for two sites that communicate frequently and require fast transmission and specific bandwidth, but it is expensive compared to other possible technologies that allow multiple companies to share the same bandwidth and also shared costs. This does not mean that leased lines are not used; They are definitely used, but there are many other options available now, including X.25, Frame Relay, MPLS, and ATM technologies.
164
q
DHCPREQUEST message
A
The client sends a DHCP Request message to the initial DHCP server that responded to its query.
165
q
Spanning Tree Algorithm (STA)
A
Many bridges use thoseSpanning Tree Algorithm (STA), which adds more intelligence to bridges. STA ensures that frames do not circulate over networks forever, provides redundant paths in case a bridge fails, assigns unique identifiers to each bridge, assigns priority values ββto those bridges, and calculates path costs. This creates much more efficient frame forwarding processes across each bridge. The STA also allows an administrator to specify whether traffic should take certain routes over others.
166
q
Some of the weaknesses of packet filtering firewalls are as follows:
A
- You cannot prevent attacks that use application-specific vulnerabilities or features.
- The logging capacity present in packet filtering firewalls is limited.
- Most packet filtering firewalls do not support advanced user authentication schemes.
- Many packet filtering firewalls cannot detect spoofed addresses.
- They may not be able to detect packet fragmentation attacks.
167
q
wormhole attack
A
An attacker can intercept a packet at one point on the network and encapsulate it at another point on the network. In this type of attack, there are two attackers, one at each end of the tunnel (calledwormholeπ§π· Attacker A could capture an authentication token sent to one authentication server and then send that token to the other attacker, who would use it to gain unauthorized access to a resource. This can be done on a wired or wireless network, but it's easier to do on a wireless network because the attacker doesn't actually have to penetrate a physical cable.
168
q
Despite all these problems and potential vulnerabilities, many companies allow their employees to use this technology because it allows for fast and effective communication. So if it is absolutely necessary to allow this technology in your environment, there are a few things you can do to reduce the threat level. The following are best practices for protecting an environment from these types of security breaches:
A
- Establish a security policy that imposes restrictions on the use of instant messaging.
- Deploy an integrated antivirus/firewall product to all computers.
- Configure firewalls to block unwanted instant messaging traffic.
- Patch instant messaging software to ensure that the most secure versions are running.
- Deploy corporate IM servers so that internal employees communicate only within the corporate network.
- Only allow instant messaging client software that provides encryption capabilities when protection of this type of traffic is required.
169
q
It is important to understand the following characteristics of these types of firewall architectures: Doble base:
A
- A single computer with separate NICs attached to each network.
- It is used to separate a trusted internal network from an untrusted external network.
- You need to disable routing and forwarding on a computer for the two networks to be truly separate.
170
q
Electronic Data Interchange (EDI)
A
aextranetit extends beyond the boundaries of the corporate network to allow two or more companies to share common information and resources. Trading partners often set up extranets to allow communication between companies. An extranet allows trading partners to collaborate on projects; share marketing information; communicate and work together on problems; Postal twists; and share catalogs, pricing structures, and information about upcoming events. Trading partners often useElectronic Data Interchange (EDI), which provides structure and organization for electronic documents, purchase orders, invoices, purchase orders, and a data flow. EDI has evolved to web-based technologies to allow for easy access and simpler methods of communication.
171
q
Synchronous Digital Hierarchy (SDH)
A
Europeans have a different infrastructure and have chosen to use itSynchronous Digital Hierarchy (SDH), which supports E1 lines (2.048 Mbit/s) and E3 lines (34.368 Mbit/s). SONET is the standard for North America, while SDH is the standard for the rest of the world. SDH and SONET are similar but different enough to be incompatible. For communication between SDH and SONET lines to occur, a gateway must perform the proper signaling translation.
172
q
IP fragmentation
A
Exploitation of fragmentation and reassembly errors within IP, leading to DoS.
173
q
firewall-proxy server kernel
A
Afirewall-proxy server kernelIt is considered a fifth generation firewall. It differs from all the firewall technologies discussed above in that it creates dynamic, custom network stacks when a packet needs to be evaluated.
174
q
Address Resolution Protocol (ARP)
A
A network protocol used to resolve network layer IP addresses to link layer MAC addresses.
175
q
Cabos Plenum
A
The cable is encased in a flame retardant plastic jacket that will not release toxic chemicals if burned.
176
q
Overlapping Fragment Attack
A
It is used to subvert packet filters that do not reassemble packet fragments prior to inspection. A malicious snippet overwrites a previously approved snippet and launches an attack on the victim's system.
177
q
war dial
A
When a special program is used to automatically scan a list of phone numbers to search for computers for exploitation and hacking purposes.
178
q
Virtualized Firewalls
A
Virtualized environments also need protection.
Many of the network functions discussed so far can be performed in virtual environments. Most people understand that a host system can run virtual guests, allowing multiple operating systems to run simultaneously on the same hardware platform. But the industry has come a long way when it comes to virtualized technology. Routers and switches can be virtualized, which means that you don't actually buy hardware and connect it to your network, but rather implement software products that perform routing and switching functions.
179
q
public switched telephone network (PSTN)
A
Multi-service access technologiescombining different types of communication categories (data, voice, and video) in one transmission line. This results in higher performance, lower operating costs, and more flexibility, integration, and control for administrators. The normal telephone system is based on a circuit-switched network centered on the voice calledpublic switched telephone network (PSTN)π§π· PSTN uses circuit switching instead of packet switching. When a phone call is made, it is placed on the PSTN interface, which is the user's phone. This telephone is connected to the subscriber line of the telephone company through a copper cable. Once the signals from that phone call reach the phone company's central office (the end of the subscriber line), they are part of the phone company's circuit-switched world. A connection is established between the source and the destination, and data flows through the same switches while the call is in session.
180
q
emulated
A
Ajars of honeyThe system is a computer that usually sits on the crawled subnet or DMZ and tries to lure attackers there instead of the actual production computers. To make a honeypot attractive to attackers, administrators can open popular ports and services for exploitation. Some honeypots have emulated services, which means that the actual service is not running, but software that acts as those services is available. Honeypot systems can attract the attention of an attacker by presenting themselves as an easily compromised target. They are configured to look like normal enterprise systems, so attackers are drawn to them like bears to honey.
181
q
broadband and baseband
A
How many channels can you fit on this single cable?
So analog transmission means data is transmitted as waves, and digital transmission means data is transmitted as discrete electrical pulses. Synchronous transmission means that two devices control their conversations using a clockwork mechanism, and asynchronous means that systems use start and stop bits to synchronize communications. Now let's see how many individual communication sessions can take place at the same time.
182
q
Secure Sockets Layer (SSL)
A
Newer VPN technology isSecure Sockets Layer (SSL), which operates at even higher layers in the OSI model than the VPN protocols discussed above. SSL works at the transport and session layers of the network stack and is primarily used to secure HTTP traffic. SSL capabilities are already built into most web browsers, so implementation and interoperability issues are minimal.
183
q
star topology
A
The network consists of a central device that serves as a channel for the transmission of messages. The central device to which all other nodes are connected provides a common connection point for all nodes.
184
q
Don is a security manager for a large medical facility. One of his groups develops proprietary software that provides distributed computing through a client/server model. He discovered that some of the systems running proprietary software suffered from semi-open denial of service attacks. Some of the software is outdated and still uses basic remote procedure calls, which made disguised attacks possible.
23π§π· What type of client ports should Don ensure that the institution's software is used when client-server communication is needed?
Aπ§π· Very well known
Bπ¬π§ Registered
Cπ§π· Dynamic
D. Buch
A
23.Cπ§π· Well-known ports are assigned to commonly used services (HTTP, FTP, etc.). The registered ports are 1024-49151 and vendors register specific ports to associate with their proprietary software. Dynamic ports (private ports) are available for use by any application.
185
q
looser
A
Direct Sequence Spread Spectrum Direct Sequence Spread Spectrum (DSSS)takes a different approach when applying subbits to a message. The subbits are used by the sending system to create a different format of the data before the data is transmitted. The receiving end uses these subbits to reassemble the signal into the original data format. The subbits are called chips, and the order in which the subbits are applied is called the chipping code.
186
q
circuit circuit:
A
- Connection-oriented virtual connections.
- Traffic moves predictably and steadily.
- Fixed delays.
- It usually carries language-oriented data.
187
q
Asymmetric DSL (ADSL)
A
Data travels downstream faster than upstream. Upload speeds range from 128 Kbps to 384 Kbps and download speeds can reach 768 Kbps. Generally used by home users.
188
q
Dial-Up Connections
A
Since almost every home and office already had a phone line connected, the first type of remote connectivity technology to be used took advantage of this local infrastructure. Modems were added to computers that needed to communicate with other computers over telecommunication lines.
189
q
quinceπ§π· Which of the following allows you to pool resources, automate resource provisioning, and rapidly scale processing power up and down to meet the demands of dynamic computing workloads?
Aπ§π· Software as a Service
Bπ§π· Network convergence
C. IEEE802.1x
DπΊπΈ ATTACK
A
quince.Bπ§π· Network convergence means combining server, storage and network resources in a single framework. This helps reduce the cost and complexity of data center operations and has accelerated the evolution of cloud computing. Converged infrastructures offer the ability to pool resources, automate resource provisioning, and rapidly scale processing power up and down to meet the demands of dynamic workloads.
190
q
Tasa de bits variable (VBR)
A
A connection-oriented channel that is best used for delay-insensitive applications because the flow of data transfer is not smooth. Customers specify the maximum and sustained data throughput rate required.
191
q
9.IP telephony networks require the same security measures as those implemented in an IP data network. Which of the following statements is unique to IP telephony?
A.Restrict IP sessions routed through media gateways
B.Identification of unauthorized devices
C.authentication implementation
D.Encryption of packets containing sensitive information
Extended questions:
A
RIGHTA.A media portal is the translation unit between different telecommunication networks. VoIP media gateways perform the conversion between voice Time Division Multiplexing (TDM) to Voice over Internet Protocol (VoIP). As a security measure, the number of calls through the media gateways should be limited. Otherwise, media gateways are vulnerable to denial-of-service attacks, hijacking, and other types of attacks.
INCORRECTBis incorrect because it is necessary to identify unauthorized devices in IP telephony and data networks. On IP telephony networks, you should specifically look for unauthorized IP phones and softphones. Rogue means that these devices are not authorized. As such, they are not managed or protected by IT and can present additional risks to the network. A common rogue device on data networks are wireless access points. A rogue access point can give unauthorized users access to the network.
INCORRECTCis incorrect because authentication is recommended for voice and data networks. In either case, authentication allows you to register users and devices on the network so that you can verify that they are who they say they are when they try to connect to the network. Authentication also allows you to deny access to unauthorized users and devices.
INCORRECTDis incorrect, as sensitive data can be transmitted over a voice or data network and must be encrypted in any case. Spying is a very real threat to VoIP networks. Consider any sales meeting, management meeting, financial meeting, etc. to be done over the phone. Every word spoken in these meetings is vulnerable to eavesdropping. Voice data encryption is one of the best ways to protect this sensitive data.
192
q
application layer
A
Give me your information. I'll take it from here.
oapplication layer, Layer 7, works closer to the user, enabling file transfers, messaging, terminal sessions, and more. This layer does not include the actual applications, but rather the protocols that the applications support. When an application needs to send data over the network, it passes instructions and data to supporting protocols at the application layer. This layer correctly processes and formats the data and passes it to the next layer within the OSI model. This happens until the data that the application layer created contains the essential information that each layer needs to transmit the data over the network. The data is then placed on the network cable and transmitted until it reaches the destination computer.
193
q
4.Two commonly used network protocols are TCP and UPD. Which of the following statements correctly describes the two?
A.TCP provides the best possible delivery and UDP establishes a virtual connection to the destination.
B.TCP offers more services and is more reliable in data transmission while UDP requires less resources and overhead for data transmission.
C.TCP offers more services and is more reliable, but UDP offers more security services.
D.TCP is reliable and UDP handles flow control and ACKs.
Extended questions:
A
RIGHTB.Two main protocols within the TCP/IP stack operate at the transport layer: TCP and UDP. TCP is a reliable and connection-oriented protocol, which means that it guarantees that packets are delivered to the destination computer. If a packet is lost in transit, TCP can detect this problem and resend the lost or damaged packet. TCP is referred to as a connection-oriented protocol because the handshake takes place between the two communication systems before the user data is actually sent. After a successful handshake, a virtual connection is established between the two systems. UDP is considered a connectionless protocol because it does not follow these steps. Instead, UDP sends messages without first communicating with the destination computer and without knowing whether the packets were correctly received or dropped. TCP provides a reliable full-duplex communication mechanism, and if packets are lost or corrupted, they are resent. However, TCP requires a lot of system overhead compared to UDP. If a developer knows that data loss in transit is not detrimental to the application, he may choose UDP as it is faster and uses fewer resources.
INCORRECTAis incorrect because the descriptions are reversed. UDP is a connectionless protocol that does not send or receive acknowledgments when a datagram is received. There is no guarantee that the data will reach its destination. Offers best effort delivery. TCP is a connection-oriented protocol; It performs the handshake and establishes a virtual connection with the destination computer. It ensures that the data reaches its destination.
INCORRECTCis incorrect because UDP does not provide security services. However, TCP is more reliable and offers more services than UDP. Unlike UDP, TCP guarantees packets reach their destination, returns ACK when a packet is received, and is a reliable protocol. It supports flow and congestion control, as well as error detection and correction.
INCORRECTDis incorrect since the description of UDP describes TCP. UDP does not return ACK and does not guarantee that a packet will reach its destination. It is an unreliable protocol. Also, the destination computer does not communicate with the source computer using flow control over UDP.
194
q
8π§π· Which of the following technologies is a bridge mode technology that can monitor individual traffic links between virtual machines or be integrated into a hypervisor component?
Aπ§π· Orthogonal Frequency Division
Bπ§π· Unified Threat Management-Modem
C. virtual firewalls
Dπ§π· Internet Security Association and Key Management Protocol
A
8.Cπ§π· Virtual firewalls can be bridging products that monitor individual traffic links between virtual machines, or they can be integrated into the hypervisor. The hypervisor is the software component that manages the virtual machine and monitors the execution of the guest system software. When the firewall is integrated into the hypervisor, it can "see" and monitor all activity that occurs within a single system.
195
q
medio duplex
A
Communication is bi-directional, but only one application can send information at a time.
196
q
Tom's company had a lot of problems with unauthorized trackers being installed on the network. One reason is that employees can connect their laptops, smartphones and other mobile devices to the network, which can become infected and run trackers unknown to the owners. VPN deployment doesn't work because all network devices should be configured for specific VPNs and some devices, like your switches, don't have that kind of functionality available. Another problem Tom's team is facing is how to protect internal wireless traffic. Although wireless access points can be configured with digital certificates for authentication, sending and managing certificates on each wireless user's device is prohibitively expensive and will place a heavy burden on network personnel. Tom's boss also told him that the company needed to move from a fixed-line solution for metropolitan areas to a wireless solution.
36π§π· Which of the following solutions is the best to meet the needs of the company to secure wireless traffic?
A. EAP-TLS
B. EAP-PEAP
CπΊπΈ JUMP
D. EAP-TTLS
A
36.Dπ§π· EAP-Tunneled Transport Layer Security (EAP-TTLS) is an EAP protocol that extends TLS. EAP-TTLS is designed to provide as strong authentication as EAP-TLS, but does not require all wireless devices to obtain a certificate. Instead, only authentication servers receive certificates. User authentication is done through a password, but the password credentials are transported through a securely encrypted tunnel established based on server certificates.
197
q
baseband transmission
A
It uses all the bandwidth for a single communication channel and has a low data transfer rate compared to broadband.
198
q
subnets
A
subnetsIt allows dividing large IP ranges into smaller, logical and tangible network segments. Imagine an organization with multiple departments such as IT, accounting, human resources, etc. By creating subnets for each partition, networks are divided into logical partitions that route traffic directly to recipients without distributing data across the network. This drastically reduces the traffic load on the network, reducing the possibility of network congestion and excessive broadcast packets on the network. Even on logically categorized subnets with a tight perimeter, network security policy enforcement is much more effective than on a large, confusing, and complex network.
199
q
19Today, satellites are used to provide wireless connections between different places. What two requirements are necessary for two different locations to be able to communicate through satellite links?
A.You must be connected to a phone line and have access to a modem.
B.It must be within the position line and the track of the satellite.
C.You must have broadband and a satellite in low earth orbit.
D.It must have a transponder and be within the satellite's footprint.
Extended questions:
A
RIGHTB.For two different locations to communicate via satellite links, they must be within the satellite's line of sight and footprint (the area covered by the satellite). The information transmitter modulates the data into a radio signal that is sent to the satellite. A transponder on the satellite receives this signal, amplifies it, and sends it to the receiver. The receiver must have a specific type of antenna, which is one of those round, bowl-shaped components found on top of buildings. The antenna contains one or more microwave receivers, depending on how many satellites it receives data from. The size of the footprint depends on the type of satellite used. It can be as big as a country or just a few hundred meters in circumference.
INCORRECTAit's wrong because a phone line and modem are not wireless. However, in most cases, satellite broadband is a hybrid system that uses a regular phone line and modem-like technologies to send data and requests from the user's computer, but uses a satellite connection to send data to the user.
INCORRECTCis incorrect as the satellite provides broadband transmission. It is widely used for TV channels and Internet access on PC. While having a satellite in orbit is certainly necessary, and low Earth orbit satellites are commonly used for two-way paging, international cellular communications, television broadcasting, and Internet use, this is not the best answer to this question.
INCORRECTDis incorrect as both locations do not require a transponder. The transponder is located on the satellite itself, the transponder receives a signal, amplifies it and sends it to the receiver. However, both locations must be within the satellite's footprint.
200
q
application layer
A
oapplication layer, Layer 7, works closer to the user, enabling file transfers, messaging, terminal sessions, and more. This layer does not include the actual applications, but rather the protocols that the applications support. When an application needs to send data over the network, it passes instructions and data to supporting protocols at the application layer. This layer correctly processes and formats the data and passes it to the next layer within the OSI model. This happens until the data that the application layer created contains the essential information that each layer needs to transmit the data over the network. The data is then placed on the network cable and transmitted until it reaches the destination computer.
201
q
Types of spread spectrum: This technology transmits data by "spreading" it over a wide range of frequencies:
A
- FHSS moves data by changing the frequency.
- DSSS takes a different approach, applying subbits to a message and using all available frequencies at the same time.
202
q
wireless personal network (WPAN)
A
This pattern deals with a much smaller geographic network, calledwireless personal network (WPAN)π§π· This technology allows the connection between local devices, e.g. a computer that communicates with a wireless keyboard, a cell phone that communicates with a computer, or a headset that communicates with another device. The goal here, as with all wireless technologies, is to allow data transfer without all those annoying cables.
203
q
Software as a Service (SaaS)
A
β’Software as a Service (SaaS)The provider provides users with access to certain application software (CRM, email, games). The provider offers customers web-based access to a single copy of an application designed specifically for SaaS distribution and consumption.
204
q
Wi-Fi security
A
The first IEEE 802.11 WLAN standard had numerous security gaps. These were found within the main pattern itself, as well as in various implementations of that pattern. The three main disadvantages of WEP are the use of static encryption keys, the inefficient use of initialization vectors, and the lack of packet integrity guarantees. The WEP protocol uses the RC4 algorithm, which is a symmetric stream cipher. Symmetric means that the sender and receiver must use the exact same key to encrypt and decrypt. The 802.11 standard does not specify how these keys are updated through an automated process; Therefore, symmetric RC4 keys never change in most environments. And typically all wireless devices and the AP share the exact same key. It's like everyone in your company uses the exact same password. That's not a good idea. That's the first problem: static WEP encryption keys on all devices.
205
q
12Which of the following statements incorrectly describes how routing works in general on the Internet?
A.EGP is used in the areas "between" each AS.
B.Regions of nodes that share properties and behaviors are called AS.
C.CAs are specific nodes responsible for routing to nodes outside of their region.
D.Each AS uses IGP to perform routing functionality.
Extended questions:
A
RIGHTC.A CA, or certificate authority, is a trusted third party that provides digital certificates for use in a public key infrastructure. Certificate authorities have nothing to do with routing. A PKI environment provides a hierarchical trust model but does not handle traffic routing.
INCORRECTAis false because the statement is true. The Exterior Gateway Protocol (EGP) works between each Autonomous System (AS). The Internet architecture that supports these various ASes is designed in such a way that no entity that needs to connect to a particular AS needs to know or understand the internal protocols that may be used. Instead, ASs only need to use the same external routing protocols in order to communicate.
INCORRECTBis false because the statement is true; Regions of nodes (networks) that share properties and behaviors are called Autonomous Systems (AS). These AS are independently controlled by various companies and organizations. An AS consists of computers and devices managed by a single entity that share a common Interior Gateway Protocol (IGP). The boundaries of these AS are bounded by border routers. These routers connect to the border routers of other ASs and perform internal and external routing protocols. Internal routers connect to other routers within the same AS and run internal routing protocols. So in reality the internet is just a network made up of AS and routing protocols.
INCORRECTDis incorrect because the Interior Gateway Protocol (IGP) handles routing tasks within each AS. There are two categories of IGPs: distance vector routing protocols and link state routing protocols. Distance vector routing protocols include Routing Information Protocol (RIP) and Interior Gateway Routing Protocol (IGRP). Routers using these protocols do not have information about the general topology of the network. By contrast, nodes using link-state routing protocols have information about the entire network topology. Examples of these protocols are Open Shortest Path First (OSPF) and Intermediate System to Intermediate System (IS-IS).
206
q
Orthogonal Frequency Multiplexing (OFDM)
A
While not considered official "spread spectrum" technology, the next step in trying to transmit even more data over wireless frequency signals came in the form ofOrthogonal Frequency Multiplexing (OFDM)π§π· OFDM is a multi-carrier digital modulation scheme that packages several modulated carriers together, reducing the required bandwidth. The modulated signals are orthogonal (perpendicular) and do not interfere with each other. OFDM uses a narrow channel band composition to improve its performance in high frequency bands. OFDM is officially a multiplexing technology and not a spread spectrum technology, but it is used in a similar way.
207
q
E-Carrier
A
E-CarrierThey are similar to T-bar telecommunications links, where a single pair of physical wires can be used to carry many simultaneous voice calls through time division multiplexing. Within this technology, 30 channels interleave eight data bits in one frame. Although the T-Carrier and E-Carrier technologies are similar, they are not interoperable. Electronic carriers are used by European countries.
208
q
Link State Routing Protocol
A
A routing protocol used in packet-switched networks in which each router creates a connectivity map within the network and calculates the best logical paths that make up its routing table.
209
q
Sender Policy Framework (SPF)
A
An email validation system to prevent spam by detecting email spoofing, a common vulnerability, by checking sender IP addresses.
210
q
Summary of tunneling protocols: IPSec:
A
- Handle multiple VPN connections simultaneously
- Provides secure authentication and encryption.
- Only supports IP networks
- Focuses on LAN-to-LAN communication instead of user-to-user
- Works at the network layer and provides security over IP
211
q
Switched Multimegabit Data Service (SMDS)
A
Switched Multimegabit Data Service (SMDS)It is a high-speed packet switching technology that allows customers to extend their LANs between MANs and WANs. For example, if a company has an office in one state that needs to communicate with an office in another state, the two LANs can use this packet-switched protocol to communicate over the existing public network. This protocol is connectionless and can provide bandwidth on demand.
212
q
Data Over Cable Service Interface (DOCSIS) Specifications.
A
Most cable providers comply with thisData Over Cable Service Interface (DOCSIS) Specifications., an international telecommunications standard that allows high-speed data transmission to be added to an existing cable television (CATV) system. DOCSIS includes MAC layer security services in its Basic Security/Privacy Interface (BPI/SEC) specifications. This protects individual user traffic by encrypting data as it travels through the provider's infrastructure.
213
q
ethernet
A
Common LAN media access technology standardized by IEEE 802.3. It uses 48-bit MAC addressing, works in contention-based networks, and has only been extended to LAN environments.
214
q
VPN para portal SSL
A
A person uses a single standard SSL connection to a website to securely access various network services. The website accessed is often called a portal because it is a single place that provides access to other resources. The remote user accesses the SSL VPN gateway through a web browser, is authenticated, and then receives a web page that acts as a portal to the other services.
215
q
Switched Multimegabit Data Service (SMDS)
A
Switched Multimegabit Data Service (SMDS)It is a high-speed packet switching technology that allows customers to extend their LANs between MANs and WANs. For example, if a company has an office in one state that needs to communicate with an office in another state, the two LANs can use this packet-switched protocol to communicate over the existing public network. This protocol is connectionless and can provide bandwidth on demand.
216
q
19π§π· Which of the following functions is not part of the Protected Extensible Authentication Protocol?
Aπ§π· Authentication protocol used in wireless networks and peer-to-peer connections
Bπ§π· Designed to provide authentication for 802.11 wireless networks
Cπ§π· Designed to support 802.1X port access control and transport layer security
Dπ§π· Designed to support password protected connections
A
19.Dπ§π· PEAP (Protected Extensible Authentication Protocol) is a version of EAP and an authentication protocol used in wireless networks and point-to-point connections. PEAP is used for authentication of 802.11 wireless networks that support 802.1X port access control and TLS. It is a protocol that encapsulates EAP in a potentially encrypted and authenticated TLS tunnel.
217
q
Multiple access by code division (CDMA)
A
Multiple access by code division (CDMA)It was developed after FDMA, and as the term "code" suggests, CDMA assigns each voice call or data transmission a unique code to distinguish it from all other transmissions sent over the cellular network. In a "spread spectrum" CDMA network, calls are distributed over the entire radio frequency band. CDMA allows all network users to use all network channels simultaneously. At the same time, a given cell can interact with several other cells at the same time. These characteristics make CDMA a very powerful technology. It is the key technology for the cellular networks that currently dominate the wireless space.
218
q
2π§π· How does TKIP provide more protection for WiFi environments?
Aπ§π· It uses the AES algorithm.
Bπ§π· Decreases IV size and uses AES algorithm.
Cπ§π· Add more key images.
DπΊπΈ Uses MAC and IP filtering.
A
2.Cπ§π· The TKIP protocol actually works with WEP by injecting key material, which is data used to generate random key streams. TKIP increases the size of the IV, ensures that it is random for each packet, and adds the sender's MAC address to the encryption material.
219
q
Value Network (VAN)
A
AValue Network (VAN)It is an EDI infrastructure developed and maintained by a service bureau. A Wal-Mart store tracks its inventory by having associates scan barcodes on individual items. When an item is running low, a Wal-Mart employee submits a request for more of that particular item. This request goes to a drop box on a VAN that Wal-Mart pays to use, and the request is sent to a vendor who ships this type of inventory to Wal-Mart. Because Wal-Mart (and other stores) manage thousands of vendors, using a VAN simplifies the ordering process: instead of requiring a staff member to locate the correct vendor and place an order, it all happens in seconds to through an automated EDI network managed by a company VAN is managed for use by other companies.
220
q
Sender Policy Framework (SPF)
A
Another way to deal with the problem of fake email messages is to useSender Policy Framework (SPF), an email validation system designed to prevent spam by detecting email spoofing by verifying the sender's IP address. With SPF, administrators can specify which hosts are allowed to send email from a specific domain by creating a specific SPF record in DNS. The mail exchange uses DNS to verify that mail for a specific domain is being sent from a host approved by that domain's administrators.
221
q
Third generation (3G):
A
- Voice and data integration
- Packet switching technology instead of line switching
222
q
band langes
A
AbasebandThe technology uses the entire communication channel for its transmission, whereas aband langesThe technology divides the communication channel into individual and independent sub-channels, allowing the simultaneous transmission of different types of data. Baseband only allows one signal to be transmitted at a time, while broadband transmits multiple signals on different sub-channels. For example, a coaxial cable television (CATV) system is a broadband technology that provides multiple television channels over the same cable. This system can also provide home users with Internet access, but this data is transmitted on a different frequency spectrum than TV channels.
223
q
ADDRESS resolution protocol
A
This IP is not good for me! I need a MAC!
On a TCP/IP network, each computer and network device requires a unique IP address and a unique physical hardware address. Each NIC has a unique physical address that is programmed into the card's ROM chips by the manufacturer. The physical address is also mentioned.Media Access Control (MAC)Family. The network layer works and understands IP addresses, and the data link layer works and understands physical MAC addresses. So how do these two types of addresses work together, since they work on different levels?
224
q
Grace is a security administrator for a medical facility and is responsible for several different teams. One team reported that three critical systems went offline when their primary FDDI link failed, even though the link was supposed to provide redundancy. Grace is also expected to advise her staff on the type of fiber to be deployed for building-to-building connectivity on campus. Because it is a medical school, many surgeries are videotaped and this data must be continuously transmitted from building to building. Another thing Grace has been told is that DoS attacks against specific servers within the internal network occur regularly. The attacker sends excessive ICMP ECHO REQUEST packets to all hosts on a given subnet, pointing to a given server.
27π§π· Which of the following types of fiber optics is best suited to this scenario?
A. single player mode
B. multimode
CπΊπΈ optical carrier
D. SONET
A
27.Bπ§π· In simple mode, a small glass core is used for high-speed data transmission over long distances. This scenario specifies building-to-campus connections, which are typically short distances. Multimode uses a large glass core that can carry more data than singlemode fibers, although their higher attenuation makes them better for shorter distances.
225
q
SMTP Authentication (SMTP-AUTH)
A
SMTP Authentication (SMTP-AUTH)It was designed to provide an access control mechanism. This extension includes an authentication feature that allows clients to authenticate with the mail server before sending an email. Servers that use the SMTP AUTH extension are configured to require their clients to use the extension to authenticate the sender.
226
q
4π§π· Why are switched infrastructures more secure environments than routed networks?
Aπ§π· It's harder to detect traffic because computers have virtual private connections.
Bπ§π· They are as insecure as environments without a switch.
Cπ§π· The encryption of the data connection does not allow espionage.
Dπ§π· Switches are smarter than bridges and implement security mechanisms.
A
4.Aπ§π· Switched environments use switches to allow different network segments and/or systems to communicate. With this communication, a virtual connection is established between the communicating devices. Because it is a dedicated connection, the transmission and collision data is not available to other systems, for example, in an environment that only uses bridges and routers.
227
q
Domain Name Service (DNS)
A
Imagine how difficult it would be to use the Internet if we had to remember real specific IP addresses to access different websites. EITHERDomain Name Service (DNS)is a method of resolving hostnames to IP addresses so that the names can be used instead of IP addresses in network environments.
228
q
Data Over Cable Service Interface (DOCSIS) Specifications.
A
Most cable providers comply with thisData Over Cable Service Interface (DOCSIS) Specifications., an international telecommunications standard that allows high-speed data transmission to be added to an existing cable television (CATV) system. DOCSIS includes MAC layer security services in its Basic Security/Privacy Interface (BPI/SEC) specifications. This protects individual user traffic by encrypting data as it travels through the provider's infrastructure.
229
q
rede local (LAN)
A
Arede local (LAN)It is a network that provides communication and shared resources in a relatively small area. What defines a LAN versus a WAN depends on the physical medium, the encapsulation protocols, and the technology for accessing the medium. For example, a LAN can use 10Base-T cabling, TCP/IP protocols, and Ethernet media access technology, allowing users located on the same construction site to communicate. A WAN, on the other hand, can use fiber optic cable, L2TP tunneling protocol, and ATM media access technology, and allow users in one building to communicate with users in another building in another state (or country). A WAN connects LANs geographically over long distances. Most of the differences between these technologies are found at the data link layer.
230
q
10Cross-site scripting (XSS) is an application security vulnerability commonly found in web applications. What type of XSS vulnerability occurs when a victim is tricked into opening a URL programmed with an unauthorized script to steal sensitive information?
A.Persistent XSS vulnerability
B.Non-persistent XSS vulnerability
C.second order vulnerability
D.DOM-based vulnerability
Extended questions:
A
RIGHTB.XSS attacks allow an attacker to inject their malicious code into vulnerable websites. When an unsuspecting user visits the infected site, malicious code is executed in the victim's browser and can steal cookies, hijack sessions, execute malware, bypass access control, or exploit browser vulnerabilities. There are three different XSS vulnerabilities: persistent, non-persistent, and DOM-based. A non-persistent vulnerability (also known as a reflected vulnerability) occurs when an attacker tricks a victim into opening a URL programmed with an unauthorized script in order to steal the victim's sensitive information, e.g. B. a cookie or session ID. The principle behind this attack is to exploit the lack of proper input or output validation on dynamic websites. An XSS attack like this can deal massive damage. Stolen cookies can lead to compromised webmail systems, flooded blogs, and leaked bank accounts. Most of the phishing attacks are caused by XSS vulnerabilities.
INCORRECTAis false as a persistent vulnerability targets websites that allow users to input data stored in a database or a similar location, such as a forum or message board. The code for this type of attack can be processed automatically without having to lure the user to a third-party website. The best way to overcome the XSS vulnerability is through safe programming practices. Web application developers must ensure that all user input is filtered. Only a limited set of known and safe characters should be allowed user input.
INCORRECTCis incorrect because a second-order vulnerability is another name for a persistent XSS vulnerability that targets websites that allow users to input data stored in a database.
INCORRECTDis false because in a DOM-based XSS vulnerability, the attacker uses the Document Object Model (DOM) environment to modify the original JavaScript on the client side. This causes the victim's browser to execute the resulting malicious JavaScript code. Therefore, cross-site attacks can be used to exploit vulnerabilities in the victim's web browser. Once the attacker has successfully compromised the system, the attacker can further penetrate other systems on the network or execute scripts that can spread throughout the internal network. On the client side, the most effective way to prevent XSS attacks is to disable scripting support in the browser. If this is not possible, proxy servers can be used for content filtering.
231
q
Pasarelas H.323
A
ITU-T Recommendations cover a wide range of multimedia communication services.H.323belongs to this family of recommendations, but is also a standard that addresses transmissions of video, real-time audio, and packet-based data where multiple users may be involved in the exchange of data. An H.323 environment has end devices, which can be phones or computers running phone software, gateways that connect that environment to the PSTN, multipoint control units, and gatekeepers that manage calls and features.
232
q
Digital Subscriber Line (DSL)
A
Set of technologies that provide Internet access by transmitting digital data over the cables of a local telephone network. DSL is used to digitize the "last mile" and to provide a fast connection to the Internet.
233
q
Cloud Computing
A
The provision of computer processing resources as a service rather than a product, where shared resources, software and information are made available to end users as a utility. Offerings are often grouped as infrastructure, platform, or software.
234
q
Rate Adaptable Digital Subscriber Line (RADSL)
A
Adaptive rate function that adapts the transmission speed to the quality and length of the line.
235
q
DHCP-Snooping
A
A set of techniques used to protect an existing DHCP infrastructure by tracking physical locations to ensure that only authorized DHCP servers can be reached and that hosts only use the addresses assigned to them.
236
q
Synchronous Data Link Control (SDLC)
A
Synchronous Data Link Control (SDLC)It is a protocol used in networks that use dedicated and leased lines with permanent physical connections. It is primarily used to communicate with IBM hosts within a Systems Network Architecture (SNA). Developed by IBM in the 1970s, SDLC is a bit-oriented synchronous protocol that evolved into other communication protocols such as HDLC, Link Access Procedure (LAP), and Link Access Procedure Balanced (LAPB).
237
q
Private Branch Exchange (PBX)
A
A switchboard serving a particular business makes connections between internal telephones and connects them to the public switched telephone network (PSTN) through trunks.
238
q
Address Resolution Protocol (ARP)
A
The MAC and IP addresses must be correctly mapped in order for them to resolve correctly. This happens throughAddress Resolution Protocol (ARP)π§π· When the data link layer receives a frame, the network layer already has the destination IP address attached to it, but the data link layer cannot understand the IP address, so it calls ARP for help. ARP transmits a frame requesting the MAC address that matches the destination IP address. All computers on the subnet receive this broadcast frame, and all except the computer with the requested IP address ignore it. The computer with the destination IP address responds with its MAC address. Now ARP knows which hardware address corresponds to that specific IP address. The data link layer takes the frame, adds the hardware address to it, and forwards it to the physical layer, allowing the frame to reach the wire and reach the destination computer. ARP assigns the hardware address and the associated IP address and stores this assignment in its table for a predefined period of time. This cache is used so that ARP does not have to resend its request when another frame destined for the same IP address needs to hit the line. You simply look up this information in your table.
239
q
41π§π· Wireless LAN technologies have gone through several iterations over the years to address some of the security issues inherent in the original IEEE 802.11 standard. Which of the following provides the correct features of Wi-Fi Protected Access 2 (WPA2)?
A. IEEE 802.1X, WEP, MAC
B. IEEE 802.1X, EAP, TKIP
C. IEEE 802.1X, EAP, WEP
D. IEEE 802.1X, EAP, CCMP
A
41.Dπ§π· Wi-Fi Protected Access 2 requires IEEE 802.1X or pre-shared keys for access control, EAP or pre-shared keys for authentication, and AES over counter mode/CBC-MAC protocol (CCMP) for encryption.
240
q
The types of firewalls that we will see are
A
- packet filtering
- civic
- Attorney
- Dynamic packet filtering
- proxy does kernel
241
q
broadband transmission
A
It divides the bandwidth of a communication channel into multiple channels, allowing different types of data to be transmitted simultaneously.
242
q
Control Protocol RTP (RTCP)
A
RTP is a session layer protocol that carries data in a streaming media format, such as audio and video, and is widely used in VoIP, telephony, video conferencing, and other streaming media technologies. It provides end-to-end delivery services and typically runs on top of the UDP transport layer protocol.Control Protocol RTP (RTCP)it is used in conjunction with RTP and is also considered a session layer protocol. It provides out-of-band statistics and monitoring information to provide feedback on the QoS levels of individual streaming media sessions.
243
q
How many logs do we need?
A
If you are new to networking, all of these protocols can be quite confusing. For example, the following data link protocols have already been covered in this chapter: Ethernet, Token Ring, FDDI, ATM, Frame Relay, SDLC, HDLC, and now PPP, and we haven't gotten to PPTP, Wi-Fi, or WiMAX yet. . Why the hell do we need so many data connection protocols?
244
q
Copper Distributed Data Interface (CDDI)
A
A version of the FDDI,Copper Distributed Data Interface (CDDI), it can work with UTP cabling. While FDDI would be used more like MAN, CDDI can be used in a LAN environment to connect network segments.
245
q
Point to Point Protocol (PPP)
A
Point to Point Protocol (PPP)It is similar to HDLC in that it is a data link protocol that performs framing and encapsulation for point-to-point links. A peer-to-peer connection means that there is a connection between one device (peer) and another device (peer). If the systems on your LAN use the Ethernet protocol, what if a system needs to communicate with a server at your ISP to connect to the Internet? This is not an Ethernet connection. So how do systems know how to communicate with each other if they can't use Ethernet as their data link protocol? They use a data link protocol that they understand. Telecommunications devices generally use PPP as their data link protocol.
246
q
1π§π· What does it mean when someone says they were the victim of a bluejacking attack?
Aπ§π· A spam message was sent.
Bπ§π· A cell phone has been cloned.
Cπ§π· An instant messaging channel introduced a worm.
Dπ§π· The traffic has been analyzed.
A
1.Aπ§π· Bluejacking occurs when someone sends a spam message to a Bluetooth-enabled device. Bluejackers search for a receiving device (phone, PDA, tablet, laptop) and then send a message to it. Often the bluejacker will try to send someone else his business card, which will then be added to the victim's contact list in his address book.
247
q
Here are some of the most commonly used protocols and the ports they are typically assigned to:
A
- Telnet-Puerto 23
- SMTP-Puerto 25
- Puerto HTTP 80
- SNMP ports 161 and 162
- FTP ports 21 and 20
248
q
Internet Control Message Protocol (ICMP)
A
oInternet Control Message Protocol (ICMP)it is basically the "messenger" of IP. ICMP provides status messages, reports errors, responds to specific requests, reports routing information, and is used to test connectivity and troubleshoot IP networks.
249
q
Ping of the Todes
A
A type of DoS attack on a computer that sends oversized or malformed ICMP packets to a target.
250
q
Integrated Digital Services Network (ISDN)
A
A circuit-switched telephone network system technology developed to enable digital transmission of voice and data over ordinary copper telephone lines.
251
q
Problems with IP telephony
A
The integration of VoIP with the TCP/IP protocol has presented enormous security challenges, as it allows malicious users to bring their TCP/IP expertise to this relatively new platform, where they can search for vulnerabilities in both architectures and can search the systems of VoIP. Traditional security issues associated with networks, such as unauthorized access, exploitation of communication protocols, and spread of malware, are also affected. The promise of financial gain for stolen airtime is a strong incentive for most attackers. In short, the VoIP phone network faces all the shortcomings that traditional computer networks face. Also, VoIP devices follow architectures similar to traditional computers; h use operating systems, communicate via Internet protocols, and provide a mix of services and applications.
252
q
Electronic Data Interchange (EDI)
A
The structured transfer of data between organizations. It is considered the strictly standardized format of electronic documents and is widely used in supply chains between customers, vendors, and suppliers.
253
q
generations of mobile technologies
A
Like many technologies, mobile communication technology has gone through several generations.
254
q
expanded
A
Extensible Authentication Protocol (EAP)it is also supported by PPP. In fact, EAP is not a specific authentication protocol like PAP and CHAP. Rather, it provides a framework that allows the use of many types of authentication techniques when establishing network connections. As the name suggests, it extends the authentication capabilities of the standard (PAP and CHAP) to include other methods, such as one-time passwords, token cards, biometrics, Kerberos, digital certificates, and future mechanisms. So if a user connects to an authentication server and they both have EAP capabilities, they can negotiate between a longer list of possible authentication methods.
255
q
Dual Link Station (DAS)
A
It has two ports, and each port provides a connection for the primary and secondary rings.
256
q
satellites
A
Today, satellites are used to provide wireless connections between different places. For two different locations to communicate via satellite links, they must be within line of sight of the satellite andfingerprint(area covered by the satellite). The information transmitter (ground station) modulates the data into a radio signal that is sent to the satellite. A transponder on the satellite receives this signal, amplifies it, and sends it to the receiver. The receiver must have some kind of antenna, one of those round dish-shaped things you see on top of buildings. The antenna contains one or more microwave receivers, depending on how many satellites it receives data from.
257
q
Bastion-Host
A
This guy gets hit first; it better be tough.
A system is considered as aWirt BastionIf it's a highly exposed device, it's more likely to be targeted by attackers. The closer a system is to an untrusted network like the Internet, the more likely it is to be seen as a potential target, since it has fewer layers of protection to protect it. If a system is on the public side of a DMZ or directly connected to an untrusted network, it is considered a bastion host; therefore, it must be extremely blocked.
258
q
Real Time Transport Protocol (RTP)
A
It is used to transmit audio and video over IP-based networks. It is used in conjunction with RTCP. RTP carries the media data and RTCP is used to monitor streaming statistics and QoS and helps synchronize multiple data streams.
259
q
TCP/IP Model
A
Device-based network communication standardization through a four-layer modular architecture. Specific to the IP packet created by a United States Department of Defense (DoD) agency in 1970.
260
q
Lance has been hired as the new security officer for a large medical device company. He was informed that many of the firewalls and IDS products were not configured to filter IPv6 traffic; Therefore, many attacks occurred without the knowledge of the security team. Although the network team has tried to implement an automatic tunneling feature to fix this issue, they are still encountering problems with the NAT device on the network. Lance also discovered that caching attacks against the company's public DNS server were successful. Lance also noted that while current LDAP requests require additional authentication, current technology only offers password-based authentication options.
39π§π· Which of the following is the best countermeasure for the type of attack discussed in the scenario?
A. DNSSEC
B. IPSec
Cπ§π· Split server setup
Dπ§π· Disable zone transfers
A
39.Aπ§π· DNSSEC protects DNS servers from spoofed DNS information, which is often used for DNS cache poisoning attacks. When DNSSEC is implemented, all responses received by the server are verified with digital signatures. This ensures that an attacker does not pass false information to a DNS server that would direct the victim to a malicious website.
261
q
3.5G generation (3GPP)
A
- Higher data speeds
- Use of OFDMA technology
262
q
Zeitmultiplex (TDM)
A
These lines can have multiplex functionalityZeitmultiplex (TDM)π§π· What does this multiplexing really mean? Imagine a T1 line capable of multiplexing up to 24 channels. If a business has a PBX that connects to a T1 line, which in turn connects to the central office of the phone company, 24 calls can be dropped and placed on the T1 line and forwarded to the central office. If this company did not use a T1 line, it would take 24 individual twisted pairs to handle that many calls.
263
q
13Both de facto embedded and proprietary protocols are used today. Which of the following is a proprietary internal protocol that chooses the best path between source and destination?
A.IGRP
B.TEAR
C.BGP
D.OSPF
Extended questions:
A
RIGHTA.Interior Gateway Routing Protocol (IGRP) is a distance vector routing protocol developed and owned by Cisco Systems. While Routing Information Protocol (RIP) uses one criteria to find the best path between source and destination, IGRP uses five criteria to make the "best path" decision. A network administrator can weight these various metrics to make the protocol work best in that specific environment.
INCORRECTBis incorrect because the Routing Information Protocol (RIP) is non-proprietary. RIP is a standard that describes how routers exchange routing table information and is considered a distance vector protocol; h calculates the shortest distance between the source and the destination. It is considered a legacy protocol due to its slow performance and lack of functionality. It should only be used in small networks. RIP version 1 has no authentication and RIP version 2 sends passwords in clear text or encrypted with MD5.
INCORRECTCis incorrect because Border Gateway Protocol (BGP) is an Exterior Gateway Protocol (EGP). BGP allows routers in different ASs to share routing information to ensure effective and efficient routing between different networks. Internet service providers often use BGP to route data from one place on the Internet to another.
INCORRECTDis incorrect because Open Shortest Path First (OSPF) is non-proprietary. OSPF uses link state algorithms to send routing table information. Using these algorithms allows for smaller and more frequent routing table updates. This provides a more stable network than RIP, but requires more memory and CPU resources to support this additional processing. OSPF enables a hierarchical routing network that has a trunk connecting all the subnets. OSPF is the protocol of choice and has replaced RIP in many networks today. Authentication can be done with clear text passwords, encrypted passwords, or you can configure no authentication on routers that use this protocol.
264
q
Simple Network Management Protocol
A
Simple Network Management Protocol (SNMP)was released to the networking world in 1988 to meet the growing demand for IP network device management. Businesses use many types of products that use SNMP to view their network status, traffic flows, and hosts within the network. Because these tasks are typically performed by graphical user interface (GUI)-based applications, many people do not have a full understanding of how the protocol actually works. Understanding the registry is important because it can provide attackers with a wealth of information, and you need to understand how much information is available to those who want to damage it, how they actually access that data, and what can be done with it.
265
q
The following list describes the functions of a bridge:
A
- Segment a large network into smaller, more manageable units.
- It uses filtering based on MAC addresses.
- It unifies different types of network connections while maintaining the same transmission domain.
- Isolates collision domains within the same broadcast domain.
- Bridging functionality can occur locally within a LAN or remotely to connect two remote LANs.
- You can translate between protocol types.
266
q
Teredo
A
Transition mechanism for migration from IPv4 to IPv6. It allows systems to use IPv6 for communication when their traffic needs to traverse an IPv4 network, but also performs its function behind NAT devices.
267
q
Email
A
One popular type of gateway is an email gateway. Because different email providers have their own syntax, message format, and way of delivering messages, email gateways are required to convert messages between email server software. Suppose David, whose corporate network uses Sendmail, writes an email message to Dan, whose corporate network uses Microsoft Exchange. The email gateway converts the message to a standard that all email servers understand, usually X.400, and forwards it to Dan's email server.
268
q
The relationship between data, IP and network can be compared to the relationship between a letter and the postal system:
A
- data = letter
- IP = envelope with address
- red = sistema postal
269
q
source routing
A
Sesource routingallowed, the packets contain the information needed to tell the bridge or router where to go. Packets retain routing information so they can find their way to their destination without bridges and routers having to dictate their routes. If the computer wants to dictate its routing information instead of relying on a bridge, how is it supposed to know the correct path to the destination computer? The source computer sends out scout packets that arrive at the destination computer. These packets contain the route information the packets had to take to reach their destination, including any bridges and/or routers they had to traverse. The destination computer then sends those packets back to the source computer, and the source computer takes the routing information, puts it into the packets, and sends it to the destination.
270
q
Don is a security manager for a large medical facility. One of his groups develops proprietary software that provides distributed computing through a client/server model. He discovered that some of the systems running proprietary software suffered from semi-open denial of service attacks. Some of the software is outdated and still uses basic remote procedure calls, which made disguised attacks possible.
25π§π· What should Don's team do to stop the masked attacks that are taking place?
Aπ§π· Dynamic Packet Filter Firewall
Bπ§π· ARP-Spoofing-Schutz
Cπ§π· Disable unnecessary ICMP traffic on border routers
D. SRPC
A
25.Dπ§π· Basic RPC does not have authentication capabilities, which allows masquerade attacks. Secure RPC (SRPC) can be implemented, which requires authentication before remote systems can communicate with each other. Authentication can be done with shared secrets, public keys, or Kerberos tickets.
271
q
instant messaging spam
A
Instant messaging spam (SPIM)it is a type of spam used by instant messengers for this malicious act. Although this type of spam is not as common as email spam, it is certainly increasing over time. The fact that firewalls couldn't block SPIM made it more attractive to spammers. One way to prevent SPIM is to enable the option to only receive instant messages from a known list of users.
272
q
Characteristics of application-level proxy firewalls vs. line-level proxy firewalls: Characteristics of line-level proxy firewalls:
A
- Proxy is not required for each protocol.
- Do not provide the deep inspection capabilities of an application layer proxy.
- Provide security for a variety of protocols.
273
q
dynamic mapping
A
NAT software has a pool of IP addresses, but instead of statically mapping a public address to a specific private address, it works on a first-come, first-served basis. So, when Bob needs to communicate over the Internet, his system makes a request to the NAT server. The NAT server takes the first IP address in the list and assigns it to Bob's home address. The balancing act is estimating how many computers are likely to need to communicate outside of the internal network at the same time. This estimate is the number of public addresses the company buys versus buying one public address for each computer.
274
q
negation rule
A
It is used in place of the broad and permissive "any rule". Deny rules provide stricter permission rights and determine which system can be accessed and how.
275
q
Fueling the WiFi War
A
A common attack on wireless networks islead the warThis occurs when one or more people walk or drive with a wireless device equipped with the necessary equipment and software to identify and hack access points. Traditionally, this activity is carried out using a laptop and driving in close proximity to buildings with WiFi networks in place, but today even smartphones can be used for this type of attack.
276
q
27Hanna is the new director of security for a computer consulting company. She noted that the company had a history of losing intellectual property because malicious employees installed unauthorized devices on the network that were used to intercept sensitive traffic. Hanna needs to implement a solution that ensures that only authorized devices have access to the corporate network. Which of the following IEEE standards was developed for this type of protection?
A.IEEE 802.1AR
B.IEEE802.1AE
C.IEEE 802.1AF
D.IEEE802.1XR
Extended questions:
A
RIGHTA.The IEEE 802.1AR standard specifies unique device identifiers (DevIDs) and the management and cryptographic binding of a device (router, switch, access point) to its identifiers. A unique and verifiable device identity allows you to build trust in the device; Thus, it facilitates the secure deployment of devices. A Secure Device Identifier (DevID) is cryptographically associated with a device and helps authenticate the identity of the device. Locally significant identities can be securely associated with a manufacturer-supplied initial DevID and can be used in provisioning and authentication protocols to allow a network administrator to establish trust of a device and select appropriate policies for sending and receiving data and protocols to control to and from the device. .
INCORRECTBis incorrect because 802.1AE is the IEEE MAC Security (MACSec) standard that defines a security infrastructure to provide data confidentiality, data integrity, and data origin authentication. Where a VPN connection provides protection at the higher network layers, MACSec provides hop-by-hop protection at Layer 2.
INCORRECTCis incorrect because 802.1AR provides a unique identification for a device. 802.1AE provides data encryption, integrity, and origin authentication capabilities. 802.1AF performs key agreement functions on the session keys used for data encryption. Each of these standards provides specific parameters for working within an 802.1X EAP-TLS framework.
INCORRECTDis incorrect because it is a distracting answer. This is not a valid pattern.
277
q
18What is not an advantage of VoIP?
A.Cost
B.convergence
C.flexibility
D.security
Extended questions:
A
RIGHTD.Voice over Internet Protocol (VoIP) refers to transmission technologies that provide voice communications over IP networks. IP telephony uses technologies similar to TCP/IP, so its vulnerabilities are similar. The voice system is vulnerable to application tampering (eg, fraud and call blocking), unauthorized administrative access, and incorrect implementation. With respect to networks and media, it is also vulnerable to denial of service attacks on the gateways and network resources. Snooping is also a problem, as traffic is sent in clear text unless encrypted.
INCORRECTAis incorrect because cost is an advantage of VoIP. Using VoIP means that a business only has to pay for and maintain one network, rather than one network for data transmission and another network for voice transmission. Telephony features such as conference calling, call forwarding, and automatic redialing are free in open source VoIP implementations, while traditional telcos charge more. And finally, VoIP costs are lower due to billing. VoIP calls are billed by the megabyte, while regular phone calls are billed by the minute. In general, it is cheaper to send data over the Internet for a certain amount of time than to use a normal phone for the same amount of time.
INCORRECTBis incorrect because convergence is an advantage of VoIP. Convergence refers to the merging of the traditional IP network with the traditional analog telephone network. This is an advantage because a business no longer has to pay for or maintain separate networks for data and voice. Although convergence saves money and administrative overhead, certain security issues must be understood and addressed.
INCORRECTCis wrong, because flexibility is an advantage of VoIP. The technology easily supports multiple phone calls over a single broadband Internet connection without the need to add additional lines. It also offers location independence. All you need to get a WAN or MAN dial-up connection from a VoIP provider is a proper internet connection. VoIP can also be integrated with other Internet services such as video chat, in-call file sharing, and audio conferencing.
278
q
Incomplete
A
IncompleteCables generally have a polyvinyl chloride (PVC) jacket, while plenum cables have fluoropolymer jackets. When setting up a network or expanding an existing network, it's important to know what types of cables are required in each situation.
279
q
open mail relay
A
An SMTP server configured to allow anyone on the Internet to send email, not just messages destined for or from known users.
280
q
classless forwarding between domains
A
Variable-length subnet mask used to divide a network into subnets of different sizes. The goal is to increase the efficiency of IP address usage, since classical addressing schemes often result in unused addresses.
281
q
2.Which of the following is not an effective countermeasure against spam?
A.open mail relay server
B.Correctly configured mail relay servers
C.Filtering on an email gateway
D.Filter non-customer
Extended questions:
A
RIGHTA.An open mail relay server is not an effective countermeasure against spam; In fact, they are often used by spammers to spread spam, as they allow an attacker to hide their identity. An open mail relay is an SMTP server configured to allow incoming SMTP connections from anyone to anyone on the Internet. This is how the internet was originally set up, but many repeaters are now configured correctly to prevent attackers from using them to spread spam or pornography.
INCORRECTBis incorrect because a properly configured mail relay server will only allow mail destined for and from known users. In this way, a closed mail relay server helps prevent the spread of spam. To be considered closed, an SMTP server must be configured to accept messages from local IP addresses to local mailboxes, from local IP addresses to non-local mailboxes, from known and trusted IP addresses to local mailboxes, and from authenticated and authorized clients that are accepted and forwarded. Servers left open are considered the result of system mismanagement.
INCORRECTCis incorrect because implementing spam filters in an email gateway is the most common anti-spam countermeasure. This helps protect network and server capacity, reduces the risk of losing legitimate email, and saves users time. There are several commercial spam filters available based on a variety of algorithms. Filtering software accepts email as input and forwards the message to the recipient without modifying it, redirects the message for delivery elsewhere, or discards the message.
INCORRECTDis false because client-side filtering is a countermeasure against spam. In fact, filtering can be done at the gateway, which is the most popular method, at the mail server, or at the client. There are also different filtering methods. Keyword-based filtering was once a popular method, but is now deprecated as it is prone to false positives and can be easily avoided by spammers. More sophisticated filters are now used. They are based on statistical analysis or analysis of email traffic patterns.
282
q
jars of honey
A
Systems to protect critical production systems. When two or more honeypots are used together, this is considered a honeynet.
283
q
Token Ring
A
LAN media access technology that controls network communication traffic through the use of token frames. This technology has been largely superseded by Ethernet.
284
q
Platform as a Service (PaaS)
A
β’Platform as a Service (PaaS)Cloud providers provide a computing platform that can include an operating system, database, and web server as a holistic execution environment. Where IaaS is the "raw IT network", PaaS is the software environment that runs on the IT network.
285
q
Reverse Address Resolution Protocol (RARP)
A
Diskless workstations do not have a complete operating system, but just enough code to know how to boot and broadcast to an IP address, and may have a pointer to the server containing the operating system. The diskless workstation knows its hardware address and broadcasts this information so that a listening server can assign it the correct IP address. like ARP,Reverse Address Resolution Protocol (RARP)The frames go to all systems on the subnet, but only the RARP server responds. After receiving this request, the RARP server consults its table to determine which IP address matches the sent hardware address. The server then sends a message to the requesting computer with its IP address. The system now has an IP address and can work on the network.
286
q
Dynamic Host Configuration Protocol (DHCP)
A
A network configuration service for hosts on IP networks. It provides IP addressing, DNS servers, subnet mask, and other important network configuration data for each host through automation.
287
q
Management Information Base (MIB)
A
The agent is software that runs on a network device and is usually built into the operating system. The agent has a list of objects it needs to keep track of, stored in a database-like structure calledManagement Information Base (MIB)π§π· A MIB is a logical grouping of managed objects that contain data used for specific management tasks and status checks.
288
q
supernest
A
When traditional subnet masks are used, they are called classic or classic IP addresses. When an organization needs to create subnets that do not fit these traditional sizes, it uses classless IP addresses. It simply means that a different subnet mask is used to define the host and network parts of the addresses. When it became clear that available IP addresses were running out as more people and businesses participated on the Internet,Klassenloses Inter-Domain Routing (CIDR)rose. A class B address range is often too large and a class C address range too small for most organizations, so CIDR provides the flexibility to increase or decrease the class size as needed. CIDR is the method for specifying more flexible classes of IP addresses. CIDR is also known assupernest.
289
q
fiberglass
A
By using glass,fiberglassCables have higher transmission speeds that allow signals to travel longer distances. Fiber optic cables are not as affected by attenuation and EMI as copper cables. It does not radiate signals like UTP cable and is difficult to intercept; Therefore, fiber optic cabling is much more secure than UTP, STP, or coaxial.
290
q
Want
A
WantIt is a type of attack similar to phishing that attempts to trick victims into revealing sensitive information through a social engineering attack. The victim may receive a pre-recorded message on their phone indicating that there has been suspicious activity on their credit card, bank account or other financial account. The victim is instructed to call a specific phone number, where they must enter identification data. The identifying information is typically the associated account number, PIN, and/or password value. The victim believes that this data is being sent to a trusted source such as her bank, but it is actually recorded by an attacker who uses it for fraudulent activities.
291
q
Internet Key Exchange (IKE)
A
D.Internet Key Exchange (IKE)provides authenticated key material for use with ISAKMP.
292
q
Dynamic Host Configuration Protocol (DHCP)
A
A computer can obtain its IP addresses in a number of ways when it first starts up. If you have a statically assigned address, nothing needs to happen. You now have the necessary configuration settings to communicate and work with the intended network. When a computer depends on aDynamic Host Configuration Protocol (DHCP)The correct IP address assignment to the server is initialized and a request is made to the DHCP server. The DHCP server assigns the IP address and everyone is happy.
293
q
silent reign
A
Drop "noisy" traffic without logging it. This reduces the size of the log by not responding to packets that are considered unimportant.
294
q
Second generation (2G):
A
- Mostly voice, some slow data (circuit switched)
- phones were smaller
- Added email, paging, and caller ID features.
295
q
John is the head of his company's security team. He discovered that the attackers had installed trackers on the network without the company's knowledge. Along with this issue, his team also discovered that two DNS servers had no record replication restrictions and the servers were caching suspicious name resolution data.
31π§π· Which of the following is the best action John's team should take to protect themselves from improper caching issues?
A. PKI
Bπ§π· DHCP-Snooping
Cπ§π· ARP Protection
D. DNSSEC
A
31.Dπ§π· When a DNS server receives an invalid (potentially malicious) name resolution response, it caches it and makes it available to all hosts it serves, unless DNSSEC is implemented. If DNSSEC were enabled on a DNS server, upon receiving a response, the server would validate the digital signature of the message before accepting the information to ensure that the response came from an authoritative DNS server.
296
q
Layer 3 and 4 switches
A
I want my switch to do everything, even muffins.
Layer 2 switches only have the intelligence to forward a frame based on its MAC address and do not have a better understanding of the network as a whole. A Layer 3 switch has the intelligence of a router. Not only can you forward packets based on their IP addresses, but you can also choose routes based on availability and performance. A Layer 3 switch is essentially a router on steroids, as it offloads route-finding functionality to the more efficient switching hardware layer.
297
q
Network services and protocols
A
Some protocols like UDP, TCP, IP, and IGMP have been covered in the previous sections. Networks are made up of these and many other types of protocols that provide a variety of capabilities. Networks are also made up of many different services, such as DHCP, DNS, email, and others. Services provided by network infrastructure components directly support the functionality required by network users. Protocols often provide these services with a communication channel that allows them to do their job. Networks are complex because there are layers of protocols and services that work together simultaneously and hopefully seamlessly. We will cover some of the most important protocols and services used in all networks today.
298
q
Autonomous System (AS)
A
A collection of associated IP routing prefixes under the control of one or more operators that provide a well-defined, common routing policy for the Internet. They are clearly identified on the Internet as individual networks.
299
q
Border Gateway Protocol (BGP)
A
The protocol that makes important routing decisions on the Internet. It maintains a table of IP networks or "prefixes" that indicate the accessibility of the network between Autonomous Systems (AS).
300
q
session hijacking
A
Attack method that allows an attacker to circumvent and control a communication session between two systems.
301
q
Carrier sense multiple access with collision avoidance
A
A media access control method that uses a carrier sniffing scheme. A system wishing to transmit data must first listen to the channel for a predetermined period of time to determine whether or not another system is transmitting on the channel. If the channel is recognized as "inactive", the system can start the transmission process. If the channel is detected as "busy", the system defers its transmission for a random period of time.
302
q
data transfer rate
A
NOTICE Bandwidthrefers to the number of electrical pulses that can be transmitted over a connection in one second, and these electrical pulses carry individual bits of information. Bandwidth is the data transmission capacity of a connection and is commonly associated with the number of frequencies available and the speed of a connection.data transfer rateis the actual amount of data that can be transferred over this connection. Data transfer rate values ββcan be higher than bandwidth values ββwhen compression mechanisms are implemented. However, when connections are heavily congested or experiencing interference issues, throughput values ββmay be lower. Both bandwidth and data transfer rate are measured in bits per second.
303
q
smurf attack
A
A type of DDoS attack on a computer that floods the target system with bogus ICMP broadcast packets.
304
q
Filtered subnet:
A
β’ The external router filters (intercepts) the traffic before it enters the subnet. Traffic destined for the internal network is routed through two firewalls.
305
q
modems off
A
modems offprovide high-speed Internet access up to 50 Mbps over existing coaxial and fiber optic lines. The cable modem provides up and down conversions.
306
q
Domain Name System (DNS)
A
A hierarchical distributed naming system for computers, services, or other resources connected to an IP-based network. It associates various data with the domain names assigned to each of the participating entities.
307
q
TCP/IP Model
A
Transmission Control Protocol/Internet Protocol (TCP/IP)It is a set of protocols that regulate how data is transmitted from one device to another. In addition to the two main protocols of the same name, TCP/IP includes other protocols that we will discuss in this chapter.
308
q
Summary of tunneling protocols: Secure Sockets Layer (SSL):
A
- It works at the transport layer and primarily protects web-based traffic.
- Granular access control and configuration is available
- Easy to implement as SSL is already built into web browsers
- It can only protect a small number of protocol types, so it is not an infrastructure-level VPN solution.
309
q
Distanzvektor-Routing-Protokoll
A
A routing protocol that calculates routes based on distance (or number of hops) and a vector (an address).
310
q
28There are common models of cloud computing services. _______________ often requires companies to implement their own operating systems, applications, and software in addition to the infrastructure provided. _________________ is the software environment that runs on the infrastructure. In the __________ model, the provider typically provides customers with web-based access to a single copy of an application.
A.Platform as a Service, Infrastructure as a Service, Software as a Service
B.Platform as a Service, Platform as Software, Application as a Service
C.Infrastructure as a Service, Application as a Service, Software as a Service
D.Infrastructure as a Service, Platform as Software, Software as a Service
Extended questions:
A
RIGHTD.The most common cloud service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
INCORRECTAis incorrect because these elements are not in the correct order. With infrastructure as a service (IaaS), cloud providers offer the infrastructure environment of a traditional data center in an on-demand delivery method. Companies implement their own operating systems, applications, and software on top of this provided infrastructure and are responsible for its maintenance.
INCORRECTBis incorrect as the most common cloud service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). There are no Platform as Software or Application as a Service models. Those are distractors. Platform as a Service (PaaS) is when cloud providers provide a computing platform that can include an operating system, database, and web server as a holistic execution environment. Where IaaS is the "raw IT network", PaaS is the software environment that runs on the IT network.
INCORRECTCis incorrect as the most common cloud service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). There is no model called Platform as Software. With Software as a Service (SaaS), the provider gives users access to certain application software (CRM, email, games). The provider offers customers web-based access to a single copy of an application designed specifically for SaaS distribution and consumption.
311
q
Media Access Control (MAC)
A
A sublayer of the data communications protocol of the data link layer specified in the OSI model. It provides hardware addressing and channel access control mechanisms that allow multiple nodes to communicate over a multi-access network containing a shared medium.
312
q
H.323
A
A standard that addresses call signaling and control, multimedia transport and control, and bandwidth control for point-to-point and multipoint conferencing.
313
q
Characteristics of application-level proxy firewalls vs. circuit-level proxy firewalls: Characteristics of application-level proxy firewalls:
A
- Each protocol to monitor must have a unique proxy.
- Offers more protection than line-level proxy firewalls.
- They require more processing per packet and are therefore slower than a line-level proxy firewall.
314
q
WLAN ad-hoc
A
aWLAN ad-hocdoes not have access points; Wireless devices communicate with each other through their wireless network cards rather than through a centralized device. To build an ad hoc network, wireless client software is installed on the contributing hosts and configured for peer-to-peer mode of operation. Then, on a Windows platform, the user clicks on My Network Places and the software searches for other hosts that operate in this similar mode and displays them to the user.
315
q
Routing-Informationsprotokoll
A
RIP is a standard that describes how routers exchange routing table information and is considered a distance vector protocol; h calculates the shortest distance between the source and the destination. It is considered a legacy protocol due to its slow performance and lack of functionality. It should only be used in small networks. RIP version 1 has no authentication and RIP version 2 sends passwords in clear text or with MD5 hashes.
316
q
static mapping
A
The NAT software has a set of public IP addresses configured. Each private address is statically mapped to a specific public address. Therefore, computer A always gets the public address x, computer B always gets the public address y, and so on. This is typically used for servers that must always maintain the same public address.
317
q
network topology
A
How are we supposed to connect all these devices together?
The physical arrangement of computers and devices is known asnetwork topologyπ§π· Topology refers to the way a network is physically connected and shows the layout of resources and systems. There is a difference between the physical network topology and the logical topology. A network can be configured as a physical star but logically function as a ring, as in token ring technology.
318
q
bluetooth inalambrico
A
obluetooth inalambricothe technology is actually based in part on the 802.15 standard. It has a transmission speed of 1 to 3 Mbit/s and works in a range of around ten meters. If you have a Bluetooth-enabled cell phone and a PDA with a calendar function, you can update them without having to physically connect them. For example, if you have added some information to your phone's contact list and task list, simply place the phone next to your PDA. The PDA would detect that the other device was nearby and try to establish a network connection with it. Once connected, a synchronization would take place between the two devices and the PDA would add the new contact list and the to-do list data. Bluetooth works in the frequency band of other 802.11 (2.4 GHz) devices.
319
q
Protocol
A
A network protocol is a standard set of rules that governs how systems communicate on networks. Two different systems using the same protocol can communicate and understand each other despite their differences, just as two people using the same language can communicate and understand each other.
320
q
Bypassed VoIP security measures: Hackers can intercept incoming and outgoing calls, perform DoS attacks, spoof phone calls, and eavesdrop on confidential conversations. Many of the countermeasures for this type of attack are the same as in traditional data-driven networks:
A
- Keep patches up to date on all network devices involved in VoIP transmissions:
- Identify unidentified or malicious phone devices:
- install and wait
- Disable unnecessary ports and services on routers, switches, PCs, and IP phones.
- Implement real-time monitoring that looks for attacks, tunneling, and abusive call patterns through IDS/IPS.
321
q
application level proxies
A
application level proxiesExamine the packet through the application layer. Whereas a line-level proxy only has information up to the session layer, an application-level proxy understands the packet as a whole and can make access decisions based on the content of the packets. Understand different services and protocols and the commands they use. For example, an application-layer proxy can distinguish between an FTP GET command and an FTP PUT command and make access decisions based on this granular level of information; On the other hand, packet-filtering firewalls and circuit-level proxies can only allow or deny FTP requests as a whole, not through the commands used in the FTP protocol.
322
q
stateless inspection
A
Packet filtering is also known as stateless inspection because the device does not understand the context in which the packets operate. This means that the device cannot understand the "big picture" of communication between two systems, but can only focus on the individual properties of the packet. As we will see in a later section, stateful firewalls understand and track an entire communication session, not just the individual packets that make it up. Stateless firewalls make their decisions for each packet based solely on the data contained in that single packet. Dynamic firewalls collect data about the packets they see and use that data to try to match incoming and outgoing packets to determine which packets can be part of the same network communication session. By evaluating a packet in the broader context of a network communication session, a stateful firewall has much richer information than a stateless firewall and can therefore more easily detect and reject packets that might be part of a packet. state based attack.
323
q
virtual local talk (VLAN)
A
A group of hosts that communicate as if they were connected to the same broadcast domain, regardless of their physical location. VLAN membership can be configured using software instead of physically moving devices or links, allowing for easier centralized management.
324
q
Multiprotocol Label Switching (MPLS)
A
A network technology that routes data from one network node to the next based on short route names instead of long network addresses, avoiding complex lookups in a routing table.
325
q
Quality of Service (QoS)
A
Quality of Service Quality of Service (QoS)It is a capability that allows a protocol to distinguish between different classes of messages and assign priority levels. Some applications, such as Applications such as video conferencing, are time sensitive, which means that delays can cause unacceptable application performance. A technology that provides QoS allows an administrator to assign a priority level to time-sensitive traffic. The protocol then ensures that this type of traffic has a minimum or specified rate of transmission.
326
q
Dynamic packet filtering
A
When an internal system needs to communicate with an entity outside of its trusted network, it must choose a source port so that the receiving system knows how to respond appropriately. Ports up to 1023 are known as well-known ports and are reserved for server-side services. The sending system must choose a dynamic port greater than 1023 when connecting to another entity. The dynamic packet filter firewall creates an ACL that allows the external entity to communicate with the internal system through this high port. If this option were not available for your dynamic packet filtering firewall, you would have to allow "holes" in your firewalls for all ports above 1023 because the client side chooses these ports dynamically and the firewall would never know exactly where to allow the port traffic or prohibit.
327
q
transmission protocols
A
RTP is a session layer protocol that carries data in a streaming media format, such as audio and video, and is widely used in VoIP, telephony, video conferencing, and other streaming media technologies. It provides end-to-end delivery services and typically runs on top of the UDP transport layer protocol.Control Protocol RTP (RTCP)it is used in conjunction with RTP and is also considered a session layer protocol. It provides out-of-band statistics and monitoring information to provide feedback on the QoS levels of individual streaming media sessions.
328
q
marry a T
A
marry a TThey are dedicated lines capable of transporting voice and data information through trunks. They were developed by AT&T and originally implemented in the early 1960s to support pulse code modulation (PCM) voice transmission. This was first used to digitize voice over a dedicated high-capacity two-point trunk. The most used T carriers are T1 lines and T3 lines. Both are digital circuits that multiplex multiple individual channels into one high-speed channel.
329
q
Fiber Distributed Data Interface (FDDI)
A
Fiber Distributed Data Interface (FDDI)Developed by the American National Standards Institute (ANSI), the technology is a high-speed media access and token transfer technology. FDDI has a data rate of up to 100 Mbit/s and is generally used as a backbone over fiber optic cables. FDDI also provides fault tolerance by providing a second counter-rotating fiber ring. The main ring has data that moves in a clockwise direction and is used for regular data transmission. The second ring carries data in a counterclockwise direction and is only called if the main ring fails. The sensors look for the main ring and when it goes down they call a ring break so that the data is moved to the second ring. Each node in the FDDI network has relays connected to both rings, so that if the ring breaks, the two rings can be merged.
330
q
SSL-Tunnel-VPN
A
A person uses a web browser to securely access various network services, including non-web based applications and protocols, through an SSL tunnel. This often requires custom programming for the services to be accessible through a web-based connection.
331
q
Sean is the new security administrator at a large financial institution. There are several issues that Sean will become aware of in his first week in his new role. First, the rogue packets appear to reach critical servers, even though every network has well-configured firewalls at every gateway location to control traffic to and from those servers. One of Sean's team complains that the current firewall logs are too large and contain useless data. He also tells Sean that the team needs to use rules that are less permissive than the current All rule type. Sean also discovered that some members of the team want to implement tarpits on some of the most commonly attacked systems.
34π§π· Which of the following statements best describes why Sean's team wants to apply the above countermeasure to the most frequently attacked systems?
Aπ§π· Prevent the hijacking of production systems
Bπ§π· Reduces the impact of DoS attacks
Cπ§π· Collect statistics during an attack
Dπ§π· Increase forensic skills
A
34.Bπ§π· A tarpit is usually software configured to emulate a vulnerable running service. Once the attackers start sending packets to this "service", the connection to the victim's system appears to be up, but the victim's system is slow to respond and the connection may time out. Most attacks and scanning activities are done through automated tools that require quick responses from victim systems. If the victim's systems are not responding or responding very slowly, the automated tools may not work properly because the protocol connection has expired. This can reduce the effects of a DoS attack.
332
q
6.In dialing situations, several different tunneling protocols can be used. Which of the following is the best VPN tunneling solution?
A.L2P
B.PPTP
C.IPSec
D.L2TP
Extended questions:
A
RIGHTB.A virtual private network (VPN) is a private, secure connection over a public network or unsecured environment. It is a private connection since encryption and tunneling protocols are used to guarantee the confidentiality and integrity of the data during transmission. It is important to remember that VPN technology requires a tunnel to work and assumes encryption. The protocols that can be used for VPNs are Point-to-Point Tunneling Protocol (PPTP), IPSec, and L2TP. Point-to-Point Tunneling Protocol (PPTP), a Microsoft protocol, allows remote users to establish a PPP connection with a local ISP and then set up a secure VPN at their destination. PPTP has been the industry standard tunneling protocol for years, but the new de facto standard for VPNs is IPSec. PPTP is designed for client/server connectivity, creating a single point-to-point connection between two computers. It operates at the data link layer and only transmits over IP networks.
INCORRECTAis incorrect since L2P does not exist. This is a distracting answer.
INCORRECTCis incorrect because although IPSec is one of the three main VPN tunneling protocols, it is not used on dial-up connections. It only supports IP networks and works at the network layer, providing security in addition to IP. IPSec handles multiple connections simultaneously and provides secure authentication and encryption.
INCORRECTDis incorrect because L2TP is not a tunneling protocol that works over a dial-up connection. L2TP is a tunneling protocol that can extend a VPN over different types of WAN networks (IP, X.25, Frame Relay). A hybrid of L2F and PPTP, L2TP operates at the data link layer and transmits over many types of networks, not just IP. However, it must be combined with IPSec for security reasons, so it is not considered a standalone VPN solution.
333
q
single point of interaction
A
If the UTM was successfully hacked, there may not be other layers of protection.
334
q
Multi-Station Access Unit (MAU)
A
como ethernet,Token Ringis a LAN media access technology that enables communication and sharing of network resources. Token Ring technology was originally developed by IBM and later defined by the IEEE 802.5 standard. It uses token-passing technology with a star-configured topology. The ring part of the name refers to how the signals are transmitted, which is a logical ring. Each computer is connected to a central hub calledMulti-Station Access Unit (MAU)π§π· Physically, the topology may be a star, but the signals and transmissions are transmitted in a logical ring.
335
q
VLAN hopping
A
An exploit that allows an attacker on one VLAN to gain access to traffic on other VLANs that are normally inaccessible.
336
q
Password Authentication Protocol (PAP)
A
Password Authentication Protocol (PAP)used by remote users to authenticate PPP connections. It provides identification and authentication of the user trying to access a network from a remote system. This protocol requires the user to enter a password before being authenticated. The password and username are sent over the network to the authentication server after a connection is established via PPP. The authentication server maintains a database of user credentials that are checked against the supplied credentials to authenticate users.
337
q
Amenazas DNS
A
As mentioned above, not all DNS servers know the IP address of every hostname it is supposed to resolve. When a hostname-to-IP address mapping request arrives at a DNS server (Server A), the server examines its resource records to see if it has the information it needs to fulfill that request. If the server does not have a resource record for that hostname, it forwards the request to another DNS server (Server B), which in turn examines its resource records and, if it has the mapping information, sends the mapping information. back to the server. A. Server A stores, uses this hostname to allocate IP addresses in its memory (if another client requests it), and sends the information to the requesting client.
338
q
Synchronous Data Link Control (SDLC)
A
Synchronous Data Link Control (SDLC)It is a protocol used in networks that use dedicated and leased lines with permanent physical connections. It is primarily used to communicate with IBM hosts within a Systems Network Architecture (SNA). Developed by IBM in the 1970s, SDLC is a bit-oriented synchronous protocol that evolved into other communication protocols such as HDLC, Link Access Procedure (LAP), and Link Access Procedure Balanced (LAPB).
339
q
modem off
A
Device that allows bidirectional data communication over radio frequency channels in cable television infrastructures. Cable modems are primarily used to provide broadband Internet access to homes.
340
q
Bluesnarfing
A
NOTE blues narrationis unauthorized access to a wireless device through a Bluetooth connection. This gives access to a calendar, contact list, email and text messages, and on some phones users can copy private photos and videos.
341
q
High Bit Rate DSL (HDSL)
A
It offers T1 speeds (1.544 Mbps) over standard copper cable without the use of repeaters. It requires two twisted pairs of wire, which many voice-grade UTP lines do not have.
342
q
sixteenπ§π· What happens at the data link layer?
Aπ§π· End-to-end connection
Bπ§π· Dialog control
Cπ§π· Marco
Dπ§π· Data syntax
A
sixteen.Cπ§π· The data link layer is, in most cases, the only layer that comprises the environment in which the system operates, be it Ethernet, Token Ring, wireless, or connecting to a WAN link. This layer adds the necessary headings and endings to the frame. Other systems on the same type of network using the same technology only understand the specific header and trailing format used in their data link technology.
343
q
IEEE 802.1AR
A
oIEEE 802.1ARThe standard specifies unique device identifiers (DevIDs) and the management and cryptographic binding of a device (router, switch, access point) to its identifiers. A unique and verifiable device identity allows devices to be trusted and therefore facilitates secure device deployment.
344
q
Media Access Control (MAC)
A
The data link layer is divided into two functional sublayers: theLogical Connection Control (LLC)is inMedia Access Control (MAC)π§π· LLC, defined in the IEEE 802.2 specification, communicates with the protocol immediately above it, the network layer. The MAC has protocols correctly loaded to interact with the physical layer protocol requirements.
345
q
Constant bit tasa (CBR)
A
A connection-oriented channel that provides consistent data throughput for time-sensitive applications such as voice and video. Clients indicate the necessary bandwidth requirements in the connection settings.
346
q
media sharing
A
There are 150 devices on this network. How can everyone use this single network line correctly?
Regardless of the type of media access technology used, the primary resource that all systems and devices on the network must share is the network transmission channel. This transmission channel can be Token Ring over coax, Ethernet over UTP, FDDI over fiber, or Wi-Fi over spectrum. Methods must be in place to ensure that every system has access to the channel, that system data is not corrupted in transit, and that there is a way to control traffic during peak hours.
347
q
Network Address Translation (NAT)
A
However, IP addresses have become scarce (until IPv6 is fully adopted) and expensive. So some smart people came up withNetwork Address Translation (NAT), which allows a network that does not follow the Internet addressing scheme to communicate over the Internet.
348
q
Wireless communication
A
When two people talk to each other, they use wireless communication because their vocal cords change radio waves, which are signals that are transmitted without wires attached to another person. In wireless communication, signals are transmitted through the air and space using radio waves, which also change radio waves.
349
q
Layer 2 security standards
A
When frames are transmitted from one network device to another, attackers can eavesdrop on the data; change headers; divert traffic; bogus traffic; perform man-in-the-middle attacks, DoS attacks, and replay attacks; and engage in other malicious activities. It has become necessary to protect network traffic at the frame level, which is Layer 2 of the OSI model.
350
q
permanent virtual circuit (PVC)
A
Frame Relay (and X.25) send frames over virtual circuits. These circuits can be persistent, which means they are programmed in advance, or switched, which means the circuit can be built quickly when needed and taken down when no longer needed. EITHERpermanent virtual circuit (PVC)it operates as a private line for a customer with an agreed bandwidth availability. When a customer decides to pay the promised rate, a PVC is scheduled for that customer to ensure that they always get a certain amount of bandwidth.
351
q
Intranets y Extranets
A
We trust you, but not really. Take us to the extranet.
Web technologies and their uses have skyrocketed in functionality, power, and popularity. Companies create internal websites for centralized business information such as employee phone numbers, policies, events, news, and operating instructions. Many companies have also implemented web-based endpoints that allow employees to complete their daily tasks, access core databases, conduct transactions, collaborate on projects, access global calendars, use video conferencing tools, and whiteboard applications. , and obtain technical or commercial data.
352
q
transmission methods
A
A packet may need to be sent to a single workstation, to a group of workstations, or to all workstations on a particular subnet. If a package needs to go from the source computer to a specific system, aunicasttransmission method used. If the packet needs to go to a specific set of systems, the sending system uses themulticastMethod. If a system wants all computers on its subnet to receive a message, it uses thestreamMethod.
353
q
router
A
routerThey are layer 3 or network layer devices that are used to connect similar or dissimilar networks. (For example, they could connect two Ethernet LANs or an Ethernet LAN to a Token Ring LAN.) A router is a device with two or more interfaces and a routing table that determines how packets get to their destinations. You can filter traffic based on access control lists (ACLs) and fragment packets if necessary. Because routers are more knowledgeable at the network level, they can perform higher-level functions such as B. Calculating the shortest and least expensive path between sending and receiving hosts.
354
q
firewall
A
firewallThey are used to restrict access to a network from another network. Most companies use firewalls to restrict access to their networks from the Internet. You can also use firewalls to prevent one internal network segment from accessing another internal segment. For example, if the security administrator wanted to ensure that employees cannot access the research and development network, they would put a firewall between that network and all other networks and configure the firewall to allow only the type of traffic that they deem acceptable. .
355
q
DiafonΓa
A
A signal on one channel of a transmission creates an undesirable effect on another channel when it interacts with it. The signal from one cable "spills out" to another cable.
356
q
Host-Bastion
A
A highly exposed device that is likely to be the target of attacks and therefore needs to be properly locked down.
357
q
Exchange
A
Dedicated links have only one way to go; Therefore, there is no complexity when it comes to determining how packets arrive at different destinations. Only two reference points are needed when a packet leaves one network and goes to another. It gets a lot more complicated when there are thousands of networks interconnected, which often happens when the switch is deployed.
358
q
BRI-ISDN
A
This implementation operates over existing copper cables in the local loop and provides digital voice and data channels. It uses two B channels and one D channel with a combined bandwidth of 144 Kbps and is typically used for residential customers.
359
q
SYN flood
A
DoS attack in which an attacker sends a series of SYN packets to overload the victim's system from responding to legitimate traffic.
360
q
IPSec
A
IPSecIt's covered in Chapter 7 from an encryption perspective, so here we'll cover it from a VPN perspective. IPSec is a suite of protocols designed to specifically protect IP traffic. IPv4 has no built-in security, so IPSec was designed to "combine" with IP and protect the data carried by the protocol. While PPTP and L2TP work at the data link layer, IPSec works at the network layer of the OSI model.
361
q
Available Bit Rate (ABR)
A
A connection-oriented channel that allows bit rate adjustment. Customers receive the remaining bandwidth after a guaranteed rate of service has been met.
362
q
Tunnel Literation
A
IPSec can be configured for deploymenttransportation district, which means that more than one security protocol (ESP and AH) is used in a VPN tunnel. IPSec can also be configured for deploymentTunnel Literation, in which an IPSec tunnel is tunneled through another IPSec tunnel, as shown in the following diagram. Iterative tunneling would be used when traffic needs different levels of protection at different junctions in its path. For example, if the IPSec tunnel is started from an internal host to an internal border router, it might not require encryption, so only the AH protocol is used. However, when this data is transmitted from this edge router to another network over the Internet, the data must be protected more strongly. Therefore, the first packets go through a semi-secure tunnel until they are ready to access the Internet, and then they go through a second, highly secure tunnel.
363
q
PRI-RDSI
A
This implementation has up to 23 B channels and 1 D channel at 64 Kbps per channel. The total bandwidth corresponds to a T1 with 1,544 Mbit/s. This would be more suitable for a business that needs higher bandwidth compared to BRI ISDN.
364
q
Postprotocolo (POP)
A
A standard Internet protocol used by email clients to retrieve email from a remote server, supporting simple download and delete requests to access remote mailboxes.
365
q
wide area network (WAN)
A
LAN technologies provide communication capabilities in a small geographic area.wide area network (WAN)Technologies are used when communication needs to take place over a larger geographic area. LAN technologies cover how a computer transmits its data over a network cable, the rules and protocols, how that information is formatted and transmitted, how errors are handled, and how the destination computer collects that information from the cable. When a computer on a network needs to communicate with a network across the country or in a completely different country, WAN technologies come into play.
366
q
DSL SimΓ©trico (SDSL)
A
Data is transmitted upstream and downstream at the same speed. The bandwidth can vary between 192 Kbit/s and 1.1 Mbit/s. It is mainly used for commercial applications that require high speeds in both directions.
367
q
Simple Mail Transfer Protocol (SMTP)
A
A standard Internet protocol for transmitting electronic mail (email) over IP-based networks.
368
q
Reverse Address Resolution Protocol (RARP) and Boot Protocol (BootP)
A
Network protocols that host computers use to request the IP address of an administrative configuration server.
369
q
Session Initiation Protocol (SIP)
A
The signaling protocol that is often used to control communications, e.g. B. Voice and video calls on IP-based networks.
370
q
PP replacedSerial Line Internet Protocol (SLIP), an older protocol used to encapsulate data to be sent over serial link connections. PPP has several features that SLIP does not:
A
- Implements data and header compression for efficiency and better bandwidth utilization
- implement bug fix
- Supports various authentication methods.
- Can encapsulate protocols beyond IP
- Does not require both ends to be assigned an IP address before data transfer can take place
371
q
physical head
A
ophysical head, Layer 1, converts the bits to voltage for transmission. As mentioned above, the signals and voltage schemes have different meanings for different LAN and WAN technologies. When a user sends data through their dial-up software and from their modem to a phone line, the data format, electrical signals, and control functionality are very different than when that user sends data through the NIC and to unshielded twisted pair (UTP). )- Cable for LAN communication. The mechanisms that control this data, which travels over the phone line or UTP cable, work at the physical layer. This layer controls timing, data rates, line noise, and transmission techniques. Physical layer specifications include timing of voltage changes, voltage levels, and physical connections for electrical, optical, and mechanical transmission.
372
q
High Level Data Link Control (HDLC)
A
High Level Data Link Control (HDLC)is a protocol that is also a bit-oriented link layer protocol and is used for serial WAN communication between devices. HDLC is an extension of SDLC, which was mainly used in SNA environments. SDLC essentially died out when mainframe environments with SNAs drastically decreased in number. HDLC has been maintained and evolved.
373
q
Secrecy-Regel
A
Do not allow access to firewall software from unauthorized systems.
374
q
doors
A
Creation of software that enables the specific communication of applications or services between systems on a network. Ports are divided into categories: well-known (0-1023), registered (1024-49151), and dynamic (49152-65535).
375
q
bus topology
A
The systems are connected with a single transmission channel (eg network cable) and form a linear construction.
376
q
Don is a security manager for a large medical facility. One of his groups develops proprietary software that provides distributed computing through a client/server model. He discovered that some of the systems running proprietary software suffered from semi-open denial of service attacks. Some of the software is outdated and still uses basic remote procedure calls, which made disguised attacks possible.
24π§π· Which of the following is an economic countermeasure that Don's team should implement?
Aπ§π· Stateful-Firewall
Bπ§π· Network Address Translation
C. Proxy-SYN
D. IPv6
A
24.Cπ§π· A half-open attack is a type of DoS also known as a SYN flood. To prevent this type of attack, you can use SYN proxies that limit the number of open and dropped network connections. The SYN proxy is software that sits between the sender and receiver and only sends TCP traffic to the receiving system if the TCP handshake process has completed successfully.
377
q
Fourth generation (4G)
A
- Based on an all-IP packet-switched network
- Data exchange at 100Mbps-1Gbps
378
q
Access methods with operator detection and token passing
A
In general, bearer-aware access methods are faster than token-passing access methods, but bearer-aware access methods have the problem of collisions. A network segment with many devices can cause many collisions and degrade network performance. Token passing technologies don't have collision issues, but they don't work at the speed of carrier sensing technologies. Network routers can significantly help isolate network resources for both CSMA/CD and token transfer methods.
379
q
14Which of the following categories of routing protocols make up a network topology database?
A.Dynamic
B.distanciavektor
C.connection status
D.Static
Extended questions:
A
RIGHTC.Routing protocols determine how routers communicate. Routing protocols circulate information that allows routers to choose a path between two nodes on a network. Routers then choose a route using a routing algorithm. Each router knows the networks to which it is directly connected. This information is shared with immediate neighbors and then across the network via a routing protocol. This is how routers learn about the network topology. Two main types of routing protocols are used: distance vector and link state routing. Link-state routing protocols create a more accurate routing table than distance vector protocols because they create a database of network topology. Link-state routing protocols look at more variables than just the number of hops between two destinations. They use packet size, link speed, delay, load, and reliability as variables in their algorithms to determine the best paths for packets.
INCORRECTAis incorrect because a dynamic routing protocol does not create a network topology database. However, a link-state routing table (which creates a network topology database) is classified as a dynamic routing protocol because it recognizes routes and creates a routing table. Routers use these tables to make decisions about the best route for incoming packets. A dynamic routing protocol can change routing table entries based on changes that occur on different routes. When a router using a dynamic routing protocol detects that a route is down or congested, it sends an update message to the other routers in the area. The other routers use this information to update their routing table to provide efficient routing functionality.
INCORRECTBis incorrect because distance vector routing protocols do not create a network topology database. Routing protocols are classified as either distance vector or link state. Distance vector routing protocols make their routing decisions based on distance (or number of hops) and a vector (an address). The protocol takes these variables and uses them with an algorithm to determine the best route for a packet. Distance vector routing protocols create a routing table that is less accurate than link state because distance vector routing protocols use fewer variables to determine the best path.
INCORRECTDis incorrect because a static routing protocol does not create a network topology database. Routing protocols can be dynamic or static. While a dynamic routing protocol can discover routes and create a routing table, a static routing table requires the administrator to manually configure the router's routing table.
380
q
22π§π· An effective way to protect networks from unauthenticated DHCP clients is to use ___________ on network switches.
Aπ§π· DHCP-Snooping
Bπ§π· DHCP Protection
Cπ§π· DHCP Shield
D. Hidden-DHCP
A
22.Aπ§π· DHCP Snooping ensures that DHCP servers can only assign IP addresses to select systems identified by their MAC addresses. Additionally, advanced network switches now have the ability to direct clients to legitimate DHCP servers to obtain IP addresses and prevent rogue systems from becoming DHCP servers on the network.
381
q
public switched telephone network (PSTN)
A
Multi-service access technologiescombining different types of communication categories (data, voice, and video) in one transmission line. This results in higher performance, lower operating costs, and more flexibility, integration, and control for administrators. The normal telephone system is based on a circuit-switched network centered on the voice calledpublic switched telephone network (PSTN)π§π· PSTN uses circuit switching instead of packet switching. When a phone call is made, it is placed on the PSTN interface, which is the user's phone. This telephone is connected to the subscriber line of the telephone company through a copper cable. Once the signals from that phone call reach the phone company's central office (the end of the subscriber line), they are part of the phone company's circuit-switched world. A connection is established between the source and the destination, and data flows through the same switches while the call is in session.
382
q
17Which of the following statements best describes why email spoofing is easy to do?
A.SMTP lacks a proper authentication mechanism.
B.Administrators often forget to set up an SMTP server to prevent incoming SMTP connections to domains it doesn't serve.
C.Keyword filtering is technically out of date.
D.Blacklists are unreliable.
Extended questions:
A
RIGHTA.Email spoofing is easy to do as SMTP does not have a proper authentication mechanism. An attacker can spoof email sender addresses by sending a TELNET command to port 25 of an email server, followed by multiple SMTP commands. Spammers use email spoofing to hide your identity. Often the alleged sender of a spam email is actually another spam victim whose email address was sold or obtained by a spammer.
INCORRECTBis incorrect as the answer alludes to open mail relay servers. Not configuring an SMTP server to prevent SMTP connections to domains that it doesn't work with is not a common mistake. It is well known that open mail relay allows spammers to hide their identities and is an important tool in spreading spam. Therefore, open mail relays are considered a sign of system mismanagement. Email spoofing does not require an open relay.
INCORRECTCis incorrect because keyword filtering is a countermeasure that can help suppress spam. Keyword filtering used to be popular in its own right, but it's no longer an effective countermeasure when used alone. Keyword filtering is prone to false positives, and spammers have found creative ways around it. For example, keywords may be misspelled on purpose, or one or two letters of a common word may be replaced with a special character.
INCORRECTDis incorrect because blacklists include open mail relay servers that are known to send spam. Administrators can use blacklists to prevent delivery of email originating from these hosts to suppress spam. However, blacklists do not offer complete protection, as they are usually managed by private organizations and individuals according to their own rules.
383
q
Password Authentication Protocol (PAP)
A
Password Authentication Protocol (PAP)used by remote users to authenticate PPP connections. It provides identification and authentication of the user trying to access a network from a remote system. This protocol requires the user to enter a password before being authenticated. The password and username are sent over the network to the authentication server after a connection is established via PPP. The authentication server maintains a database of user credentials that are checked against the supplied credentials to authenticate users.
384
q
Statistical Time Division Multiplexing (STDM)
A
Transfer multiple types of data at the same time over a single transmission line. STDM technologies analyze statistics related to the typical workload of each input device and make real-time decisions about how much time each device should allocate for data transfer.
385
q
telecommunications
A
telecommunicationsIt is the electrical transmission of data between systems, whether through analog, digital, or wireless modes of transmission. Data can flow through copper wires; coaxial cable; air waves; the public switched telephone network (PSTN) of the telephone company; and fiber optic cables, switches, and routers from a service provider. There are clear limits between the means used for transmission, the technologies, the protocols and the devices used. However, the ultimate boundaries become blurred when you watch data created on a user's workstation flow in a matter of seconds through a complex path of Ethernet cables to a router that separates the corporate network and the rest of the world. via Asynchronous Transfer Mode (ATM). ) provided by the service provider, to the various switches, the packets traverse the ATM cloud, to another company's network, through their routers, and to another user's workstation. Every piece is interesting, but when they all come together and work together, it's amazing.
386
q
types of doors
A
Port numbers up to 1023 (0 to 1023) are calledknown ports, and almost every computer in the world has the exact same protocol assigned to the same port number. That's why they're called acquaintances: they all follow the same standardized approach. This means that almost all computers have port 25 assigned to SMTP, port 21 assigned to FTP, port 80 assigned to HTTP, etc. This mapping between lower-numbered ports and specific protocols is a de facto standard, which means we all do it and we don't have any rules that it absolutely has to be done that way. The fact that almost everyone follows this approach leads to greater interoperability between systems around the world.
387
q
DHCPOFFER message
A
This message is a response to a DHCPDISCOVER message and is sent by one or more DHCP servers.
388
q
Orthogonal Frequency Division Multiple Access (OFDMA)
A
Orthogonal Frequency Division Multiple Access (OFDMA)It is derived from a combination of FDMA and TDMA. In earlier FDMA implementations, the different frequencies for each channel were widely spaced to allow the analog hardware to separate the different channels. In OFDMA, each of the channels is divided into a set of closely spaced orthogonal frequencies with narrow bandwidths (subchannels). Each of the various sub-channels can be simultaneously transmitted and received in a MIMO (multiple input/output) manner. The use of orthogonal frequencies and MIMO allows signal processing techniques to reduce the effects of interference between different sub-channels and correct for channel imperfections such as noise and frequency selective fading. 4G requires the use of OFDMA.
389
q
Synchronous Optical Networks (SONET) and Synchronous Digital Hierarchy (SDH)
A
Standardized multiplexing protocols that transmit multiple digital bit streams over fiber optics, allowing the simultaneous transport of many different circuits from different sources in a single frame protocol.
390
q
Simple Authentication and Security Layer (SASL)
A
POP has gone through a few version upgrades and is currently on POP3. POP3 can be integratedSimple Authentication and Security Layer (SASL)π§π· SASL is a protocol-independent framework for performing authentication. This means that any protocol that can interact with SASL can use its various authentication mechanisms without having to build the authentication mechanisms into their code.
391
q
email authorization
A
POP has gone through a few version upgrades and is currently on POP3. POP3 can be integratedSimple Authentication and Security Layer (SASL)π§π· SASL is a protocol-independent framework for performing authentication. This means that any protocol that can interact with SASL can use its various authentication mechanisms without having to build the authentication mechanisms into their code.
392
q
Asynchronous Transfer Mode (ATM)
A
Asynchronous Transfer Mode (ATM)it is a different switching technology, but instead of being a packet switching technique, it uses a cell switching technique. ATM is a high-speed network technology used for LAN, MAN, WAN, and service provider connections. Like Frame Relay, it is a connection-oriented switching technology and creates and uses a fixed channel. IP is an example of connectionless technology. Within the TCP/IP protocol suite, IP is connectionless and TCP is connection-oriented. This allows IP segments to be routed and changed quickly and easily, without each router or switch having to worry about whether the data actually reaches its destination; that is the job of TCP. TCP works on both the source and destination sides to ensure that data was transmitted correctly, and forwards data that has encountered a problem and is not transmitted correctly. When using ATM or Frame Relay, the devices between the source and destination must ensure that the data gets to where it is supposed to go, as opposed to a purely connectionless protocol.
393
q
beginning
A
Hillis a general term for software running on a device that connects two different environments, often acting as a translator for them or limiting their interactions. A gateway is usually needed when one environment speaks a different language, that is, it uses a specific protocol that the other environment does not understand. The gateway can convert Internetwork Packet Exchange (IPX) protocol packets to IP packets, accept email from one type of email server and format it so that another type of email server can accept and understand it, or Combine different data connection technologies and convert like FDDI to Ethernet.
394
q
Network Basics
A
We really need to connect all of these functions together.
Most users on a network must use the same type of resource, e.g. B. Print servers, portals, file servers, Internet connections, etc. Why not connect all the systems together and make these resources available to everyone? Good idea! Let's call it networks!
395
q
what's in a name : The terms βIP telephonyβ and βVoice over IPβ are used interchangeably:
A
- The term "VoIP" is often used to refer to the actual services on offer: caller ID, QoS, voicemail, etc.
- IP telephony is a collective term for all real-time applications over IP, including voice over instant messaging (IM) and video conferencing.
396
q
20Brad is the security manager for Thingamabobs Inc. He is preparing a presentation to executives at his company about the risks of using instant messaging (IM) and his reasons for wanting to ban its use on the company network. Which of the following should not be included in his presentation?
A.Sensitive data and files can be transferred from one system to another via instant messaging.
B.Users can receive information, including malware, from an attacker posing as a legitimate sender.
C.Instant messaging usage can be stopped simply by blocking specific ports on network firewalls.
D.A security policy that establishes restrictions on the use of instant messaging is required.
Extended questions:
A
RIGHTC.Instant messaging (IM) allows people to communicate through a kind of personal chat room in real time. Notifies people when someone on their "friend list" has accessed the intranet/internet so they can send and receive text messages in real time. The technology also enables the transfer of files from one system to another. The technology consists of clients and servers. The user installs an instant messaging client (AOL, ICQ, Yahoo Messenger, etc.) and receives a unique identifier. This user provides this unique identifier to the people they want to communicate with via IM. Blocking specific ports in firewalls is generally not effective, as IM traffic may use common ports that need to be opened (HTTP port 80 and FTP port 21). Many instant messaging clients will configure themselves to work on a different port if the default port is not available and is blocked by the firewall.
INCORRECTAis incorrect because instant messaging allows file transfer from one system to another in addition to text messages. These files may contain sensitive information that puts the company at legal and commercial risk. And of course, sharing files via IM can consume network bandwidth and, as a result, affect network performance.
INCORRECTBis false because the statement is true. Due to the lack of strong authentication, accounts can be spoofed so that the recipient accepts information from a malicious user instead of the legitimate sender. There have also been several malformed packet and buffer overflow attacks that have been successful with various instant messaging clients. These attacks are usually carried out with the goal of gaining unauthorized access to the victim's system.
INCORRECTDIt's wrong because Brad was supposed to include in his presentation the need for a security policy that would place restrictions on the use of instant messaging. This is just one of several best practices to protect an environment from security breaches related to instant messaging. Other best practices include deploying a built-in antivirus/firewall product on all computers, configuring firewalls to block instant messaging traffic, updating instant messaging software to more secure versions, and deploying instant messaging servers. so that internal employees can only communicate within the company network. .
397
q
Multiplexen
A
A method of combining multiple data channels on a single transmission line.
398
q
personal care
A
SONET is self-healing, which means that if a line breaks, it can use a redundant backup ring to ensure transmission continues. All SONET lines and rings are fully redundant. The redundant line is waiting in the wings in case something happens to the main ring.
399
q
session layer
A
I don't want to talk to another computer. I want to talk to an app.
When two applications need to communicate or transfer data, it may be necessary to establish a connection between them. EITHERsession layer, Layer 5, is responsible for establishing a connection between the two applications, maintaining it during data transmission, and handling the interruption of this connection. A good analogy for the functionality of this layer is a telephone conversation. When Kandy wants to call a friend, she uses the phone. The circuits and protocols of the phone network establish the connection through the phone lines and maintain that communication path, and when Kandy hangs up, they release the resources they used to keep that connection open.
400
q
Data Link β Protocols at the data link layer convert data into LAN or WAN frames for transmission and define how a computer accesses a network. This layer is divided into Logical Link Control (LLC) and Media Access Control (MAC) sublayers. Some protocols that operate at this level include the following:
A
- Address Resolution Protocol (ARP)
- Reverse Address Resolution Protocol (RARP)
- Point to Point Protocol (PPP)
- Serial Line Internet Protocol (SLIP)
- ethernet
- Token Ring
- FDDI
- money machine
401
q
bus topology
A
in an easy waybus topology, a single cable runs the entire length of the network. The nodes connect to the network through drop points on this cable. Data transmissions are transmitted the length of the medium, and all nodes can "see" each transmitted packet. Each node decides whether to accept or ignore the packet, based on the destination address of the packet.
402
q
Secure Sockets Layer (SSL)
A
Newer VPN technology isSecure Sockets Layer (SSL), which operates at even higher layers in the OSI model than the VPN protocols discussed above. SSL works at the transport and session layers of the network stack and is primarily used to secure HTTP traffic. SSL capabilities are already built into most web browsers, so implementation and interoperability issues are minimal.
403
q
Digital Subscriber Line with very high data rate (VDSL)
A
VDSL is basically ADSL with much higher data rates (13 Mbit/s down and 2 Mbit/s up). It is capable of supporting high-bandwidth applications such as HDTV, telephone service (Voice over IP), and general Internet access through a single connection.
404
q
Metropolitan Area Network (MAN)
A
A network, typically spanning a city or large campus, that connects multiple LANs using high-capacity backbone technology and provides uplink services to the WAN or the Internet.
405
q
Ringtopologie
A
Each system is connected to two other systems and forms a single unidirectional network path for signals, creating a ring.
406
q
split DNS
A
Organizations must implementsplit DNS, which means that a DNS server in the DMZ will handle external hostname to IP resolution requests, while an internal DNS server will only handle internal requests. This ensures that the internal DNS has layers of protection and is not exposed via the "internet". The internal DNS server should only contain resource records for internal computer systems, and the external DNS server should only contain resource records for systems that the organization wants the outside world to be able to connect to. If the external DNS server is compromised and has the resource records for all internal systems, the attacker now has a lot of "inside knowledge" and can carry out targeted attacks. External DNS servers should only contain information about systems within the DMZ that the organization intends to communicate with others on the Internet (web server, external mail server, etc.).
407
q
Lance has been hired as the new security officer for a large medical device company. He was informed that many of the firewalls and IDS products were not configured to filter IPv6 traffic; Therefore, many attacks occurred without the knowledge of the security team. Although the network team has tried to implement an automatic tunneling feature to fix this issue, they are still encountering problems with the NAT device on the network. Lance also discovered that caching attacks against the company's public DNS server were successful. Lance also noted that while current LDAP requests require additional authentication, current technology only offers password-based authentication options.
40π§π· Which of the following technologies should Lance's team investigate to increase authentication overhead?
Aπ§π· Handshake Protocol Challenge
Bπ§π· Simple authentication and security layer
C. IEEE 802.2 AB
D. EAP-SSL
A
40.Bπ§π· Simple Authentication and Security Layer is a protocol-agnostic authentication framework. This means that any protocol that can interact with SASL can use its various authentication mechanisms without having to build the authentication mechanisms into their code.
408
q
Instant messaging spam (SPIM)
A
Instant messaging spam (SPIM)it is a type of spam used by instant messengers for this malicious act. Although this type of spam is not as common as email spam, it is certainly increasing over time. The fact that firewalls couldn't block SPIM made it more attractive to spammers. One way to prevent SPIM is to enable the option to only receive instant messages from a known list of users.
409
q
mesh topology
A
network in which each system must not only collect and disseminate its own data, but also serve as a link to other systems; That is, they must work together to propagate the data across the network.
410
q
Copper Distributed Data Interface (CDDI)
A
A version of the FDDI,Copper Distributed Data Interface (CDDI), it can work with UTP cabling. While FDDI would be used more like MAN, CDDI can be used in a LAN environment to connect network segments.
411
q
Fiber Distributed Data Interface
A
Ring-based token network protocol derived from the IEEE 802.4 token bus time token protocol. It can be deployed in LAN or MAN environments and offers fault tolerance through a dual-ring architecture.
412
q
domain name service
A
I don't understand the numbers. I understand words
Imagine how difficult it would be to use the Internet if we had to remember real specific IP addresses to access different websites. EITHERDomain Name Service (DNS)is a method of resolving hostnames to IP addresses so that the names can be used instead of IP addresses in network environments.
413
q
authentication protocols
A
Hey, how do I know you are who you say you are?
Password Authentication Protocol (PAP)used by remote users to authenticate PPP connections. It provides identification and authentication of the user trying to access a network from a remote system. This protocol requires the user to enter a password before being authenticated. The password and username are sent over the network to the authentication server after a connection is established via PPP. The authentication server maintains a database of user credentials that are checked against the supplied credentials to authenticate users.
414
q
IEEE 802. 1AR
A
Standard that specifies unique device identifiers (DevID) and the management and cryptographic binding of a device (router, switch, access point) to its identifiers.
415
q
Network Address Translation (NAT)
A
The process of changing the IP address information in the headers of packets in transit through a traffic routing device to reduce the demand for public IP addresses.
416
q
20π§π· _____________ is a signaling protocol defined by the IETF that is commonly used to control multimedia communication sessions such as voice and video calls over IP.
Aπ§π· Conversation log
Bπ§π· Transport log in real time
C. SS7
D. VoIP
A
20.Aπ§π· Session Initiation Protocol (SIP) is a signaling protocol defined by IETF that is commonly used to control multimedia communication sessions, such as voice and video calls over IP. The protocol can be used to create, modify, and terminate two-part (unicast) or multi-part (multicast) sessions that consist of one or more media streams.
417
q
proxy server
A
System that acts as an intermediary for customer requests seeking resources from other sources. A client connects to the proxy server and requests a service, and the proxy server evaluates the request against its filter rules and connects on behalf of the client. Proxies can be open or perform forward or backward functions.
418
q
Carrier Sense Multi-Access and Collision Avoidance (CSMA/CA)
A
Carrier Sense Multi-Access and Collision Avoidance (CSMA/CA)is a method of sharing media in which each computer signals its intention to transmit data before doing so. This tells all other computers on the network not to transmit any data at this time, as this could cause a collision. Basically, a system listens to the shared medium to determine if it is busy or free. Once the system recognizes that the "edge is clear" and you can get your data on the line, it broadcasts to all other systems that it will relay information. It's like saying, "Everybody shut up. I'll talk now." Each system waits a period of time before attempting to transmit data to ensure that collisions do not occur. 802.11 wireless LAN technology uses CSMA/CA for its media access functionality.
419
q
Internet Group Management Protocol (IGMP)
A
Used by adjacent systems and routers on IP networks to establish and maintain membership in a multicast group.
420
q
Ethernet is defined by the following properties:
A
- Competitive technology (all functions share the same means of communication)
- It uses broadcast and collision domains.
- Uses Carrier Sense Multi-Access with Collision Detection (CSMA/CD)
- Supports full duplex communication
- You can use coaxial, twisted pair, or fiber optic cable types
- It is defined by the IEEE 802.3 standard.
421
q
Network Address Translation
A
I have an address that I would like to share with everyone!
When computers need to communicate with each other, they must use the same type of addressing scheme so that they all understand how to find and communicate with each other. The Internet uses the IP addressing scheme discussed earlier in this chapter, and any computer or network that wants to communicate with other users on the network must conform to this scheme; otherwise, that computer is in a virtual space that only it can talk to.
422
q
Frequency Division Multiple Access (FDMA)
A
Frequency Division Multiple Access (FDMA)it was the first multiple access technology to be put into practice. The available frequency range is divided into sub-bands (channels) and each subscriber (mobile phone) is assigned a channel. The subscriber has exclusive use of this channel while the call is being made or until the call is terminated or transferred; No further calls or conversations can be made on this channel during this call. Using FDMA in this way allows multiple users to share the frequency band without risk of interference between simultaneous calls. FMDA was used in the first generation (1G) of cellular networks. Several 1G mobile implementations, such as the Advanced Mobile Phone System (AMPS), the All Access Communication System (TACS), and the Nordic Mobile Telephone (NMT), used FDMA.
423
q
3.Robert is responsible for implementing a common architecture to be used when clients need to access sensitive information over Internet connections. Which of the following statements best describes this type of architecture?
A.two-layer model
B.selected host
C.three layer model
D.Public and private DNS zones
Extended questions:
A
RIGHTC.Many of today's e-commerce architectures use a three-tier architecture approach. The three-tier architecture is a client-server architecture in which the user interface, functional process logic, and data storage run as separate components, often developed and maintained on separate platforms. The three-tier architecture, due to its modularity, allows each of the tiers to be updated or modified as needed without affecting the other two. In the case of e-commerce, the presentation tier is a front-end web server with which users interact. It can serve both static and cached dynamic content. At the business logic level, the request is reformatted and processed. This is typically a server-level application that generates and processes dynamic content. Data storage is where sensitive data is kept. It is a back-end database that contains the data and the database management system software used to manage and provide access to the data. Separate tiers can be connected to middleware and run on separate physical servers.
INCORRECTAis incorrect because two-tier or client-server describes an architecture in which a server provides services to one or more clients that request those services. Many of today's business applications and Internet protocols use the client-server model. This architecture uses two systems: a client and a server. The client is one tier and the server is another tier, hence the two-tier architecture. Each instance of the client software is connected to one or more servers. The client sends its request for information to a server, which processes the request and returns the data to the client. A three-tier architecture is a better approach to protect sensitive information when requests come from the Internet. It provides an additional layer that an attacker must exploit to gain access to sensitive data stored on the backend server.
INCORRECTBis incorrect since a protected host architecture means that there is a firewall to protect a server, which is basically a one-tier architecture. A publicly accessible external firewall filters requests from untrusted networks such as the Internet. If one layer, the single firewall, is compromised, an attacker can gain access to sensitive data residing on the server relatively easily.
INCORRECTDis incorrect because while the separation of DNS servers into public and private servers does provide protection, it is not an actual architecture used for the purpose requested in the question. Organizations should implement split DNS (public and private), which means that a DNS server in the DMZ handles external resolution requests while an internal DNS server only handles internal requests. This ensures that the internal DNS has layers of protection and is not exposed to Internet connections.
424
q
digital characters
A
Binary digits are represented and transmitted as discrete electrical impulses. Compared to analog signaling, signaling enables higher data rates and high data integrity.
425
q
Frequency Multiplexing (FDM)
A
Divide the available bandwidth into several non-overlapping frequency subbands, which are then assigned to each communication source and user pair. FDM is inherently an analog technology.
426
q
source routing
A
It allows the sender of a packet to specify the path the packet will take through the network, as opposed to routers determining the path.
427
q
21π§π· Which of the following phases is not part of the DHCP lease process?
UEπ§π· Discover
yoπ¬π§ Offer
iiiπ§π· Request
4π§π· Detection
Aπ§π· All of them
Bπ§π· None of those
Cπ§π· yo
D. ii, iii
A
21.Bπ§π· The four-step DHCP lease process is:
β’DHCPDISCOVER messageThis message is used to request an IP address lease from a DHCP server.
β’DHCPOFFER messageThis message is a response to a DHCPDISCOVER message and is sent by one or more DHCP servers.
β’DHCPREQUEST messageThe client sends a DHCP Request message to the initial DHCP server that responded to its query.
β’DHCPACK messageThe DHCP acknowledgment message is sent from the DHCP server to the DHCP client and is the process by which the DHCP server assigns the IP address lease to the DHCP client.
428
q
network layer
A
The main tasks ofnetwork layer, Layer 3, needs to put information in the packet header so that it can be correctly addressed and forwarded, and then route the packets to the correct destination. In a network, many routes can lead to a destination. Network layer protocols must determine the best path for the packet. Routing protocols create and maintain their routing tables. These tables are maps of the network, and when a packet needs to be sent from computer A to computer M, the protocols examine the routing table, add the necessary information to the packet header, and forward the packet.
429
q
Redundancy protocol for virtual routers
A
VRRP is used in networks that require high availability, where routers as sources of failure cannot be tolerated. It is designed to increase the availability of the default gateway by advertising a "virtual router" as the default gateway. Two physical routers (primary and secondary) are mapped to one virtual router. If one of the physical routers fails, the other router takes over the workload.
430
q
Packet Forwarding:
A
- Packets can take many different dynamic routes to reach the same destination.
- Traffic is usually gusty.
- Variable delays.
- It usually loads data oriented data.
431
q
Always connected
A
Unlike dial-up modems and ISDN connections, DSL lines and cable modems are constantly connected to the Internet and "live." No dialing steps required. This can cause a security issue, as many hackers only look for these types of connections. Systems using these types of connections are always online and available for scanning, probing, hacking, and attack. These systems are also commonly used in DDoS attacks. Because systems are always on, attackers install Trojans that remain dormant until the attacker receives the command to launch an attack against the victim. Many DDoS attacks use systems like DSL and cable modems as accomplices, and often the computer owner has no idea that his or her system is being used to attack another system.
432
q
Border Gateway Protocol (BGP)
A
The external routing protocols used by routers connecting different ASs are commonly known asExternal Gateway Protocols (EGP). oBorder Gateway Protocol (BGP)allows routers in different ASs to share routing information to ensure effective and efficient routing between different AS networks. Internet service providers often use BGP to route data from one place on the Internet to another.
433
q
IEEE 802. 1AE (MACSec)
A
A standard that specifies a set of protocols to meet security requirements for protecting data transmitted over an Ethernet LAN.
434
q
Infrastructure as a Service (IaaS)
A
β’Infrastructure as a Service (IaaS)Cloud providers offer the infrastructure environment of a traditional data center in an on-demand delivery method. Companies implement their own operating systems, applications, and software on top of this provided infrastructure and are responsible for its maintenance.
435
q
Instant Messaging (IM)
A
Instant Messaging (IM)allows people to communicate in real time through a two-way exchange. Instant messaging allows instant transmission of text messages between people using shared client software. Most communications are in text format, but some instant messaging programs also allow the transmission of voice and video data. Several instant messaging services offer video calling, voice over IP, and web conferencing capabilities. Many instant messaging applications offer features such as file transfers, contact lists, and the ability to have multiple conversations at the same time.
436
q
Wide Area Network (WAN)
A
A telecommunications network that covers a wide area and allows a business to carry out its daily operations effectively, regardless of its location.
437
q
lead the war
A
A common attack on wireless networks islead the warThis occurs when one or more people walk or drive with a wireless device equipped with the necessary equipment and software to identify and hack access points. Traditionally, this activity is carried out using a laptop and driving in close proximity to buildings with WiFi networks in place, but today even smartphones can be used for this type of attack.
438
q
Fire Protection Class Cable
A
This wire has a strange smell when it burns.
Just as buildings must comply with certain fire safety codes, so must wiring schematics. Many companies install their network cabling in dropped ceilings (the space between the ceiling and the next floor) or under raised floors. This hides the cables and prevents people from tripping over them. However, if cables are placed in such places, they are more likely to catch fire without anyone knowing. In the event of a fire, some cables produce dangerous gases that would quickly spread throughout the building. Network cabling placed in such areas, calledfull space, it must meet a certain fire class to ensure that no harmful chemicals are produced or released in the event of a fire. The components of a ventilation system are usually found in this open area. So if toxic chemicals get into this area, they can easily spread throughout the building in minutes.
439
q
communication functions
A
- synchronous
- Asynchronous
440
q
bus topology
A
in an easy waybus topology, a single cable runs the entire length of the network. The nodes connect to the network through drop points on this cable. Data transmissions are transmitted the length of the medium, and all nodes can "see" each transmitted packet. Each node decides whether to accept or ignore the packet, based on the destination address of the packet.
441
q
11Angela wants to group the computers by department to make it easier to share network resources. Which of the following allows you to group computers logically?
A.VLAN
B.open network architecture
C.intranet
D.DELIVERY TRUCKS
Extended questions:
A
RIGHTA.Virtual LANs (VLANs) allow computers to be logically separated and grouped based on resource requirements, security, or business needs, despite the standard physical location of the systems. This technology allows Angela to logically place all computers in the same apartment on the same VLAN, allowing all users to receive the same broadcast messages and access the same types of resources, regardless of their physical location. This means that computers can be grouped together even if they are not on the same network.
INCORRECTBis incorrect because Open Networking describes technologies that can form a network. It is one that is not proprietary to a vendor, is non-proprietary, and can easily integrate multiple technologies and vendor implementations of those technologies. The OSI model provides a framework for developing products that work in an open network architecture. Providers use the OSI model as a blueprint and develop their own protocols and interfaces to create functionality that differs from that of other providers. However, because these vendors use the OSI model as a starting point, integration with other vendors' products is an easier task and interoperability issues are less onerous than if the vendors built their own network fabric from scratch.
INCORRECTCis incorrect because an intranet is a private network that a company uses when it wants to use the Internet and web-based technologies for internal networks. The company has web servers and client computers that use web browsers and use the TCP/IP protocol suite. Web pages are written in HTML or XML and are accessed over HTTP.
INCORRECTDis incorrect because a value-added network (VAN) is an electronic data interchange (EDI) infrastructure developed and maintained by a service bureau. Here's an example of how a VAN works: A retail store like Target tracks its inventory by having employees scan barcodes on individual items. When an item, such as garden hoses, runs out, an employee requests more garden hoses. The request goes to a drop box in a VAN that Target pays to use, and then the request is sent to the garden hose supplier. Since Target manages thousands of vendors, using a VAN simplifies the ordering process. No need to manually search for the right supplier and place an order.
442
q
Frequency Hopping Spread Spectrum (FHSS)
A
Frequency Hopping Spread Spectrum Frequency Hopping Spread Spectrum (FHSS)it takes the entire bandwidth (spectrum) and divides it into smaller sub-channels. The transmitter and receiver operate on one of these subchannels for a period of time and then switch to another subchannel. The transmitter places the first data on one frequency, the second on a different frequency, and so on. The FHSS algorithm determines which individual frequencies are used and in what order, and this is called the transmitter and receiver hop sequence.
443
q
light detector
A
Converts the light signal back into an electrical signal
444
q
packet filtering
A
packet filteringis a firewall technology that makes access decisions based on protocol header values ββat the network level. The device that performs the packet filtering processes is configured with ACLs that dictate the type of traffic allowed into and out of specific networks.
445
q
Value Network (VAN)
A
AValue Network (VAN)It is an EDI infrastructure developed and maintained by a service bureau. A Wal-Mart store tracks its inventory by having associates scan barcodes on individual items. When an item is running low, a Wal-Mart employee submits a request for more of that particular item. This request goes to a drop box on a VAN that Wal-Mart pays to use, and the request is sent to a vendor who ships this type of inventory to Wal-Mart. Because Wal-Mart (and other stores) manage thousands of vendors, using a VAN simplifies the ordering process: instead of requiring a staff member to locate the correct vendor and place an order, it all happens in seconds to through an automated EDI network managed by a company VAN is managed for use by other companies.
446
q
Port Address Translation (PAT)
A
The company owns and uses only one public IP address for all systems that need to communicate outside of the internal network. How is it possible that all the computers are using the exact same IP address? Good question. Here is an example: The NAT device has the IP address 127.50.41.3. When Computer A needs to communicate with a system on the Internet, the NAT device documents that computer's private address and source port number (10.10.44.3; port 43.887). The NAT device changes the IP address in the computer's packet header to 127.50.41.3 with source port 40000. If Computer B also needs to communicate with a system on the Internet, the NAT device documents the private address and address number. source port (10.10.1). 44.15; port 23.398) and change the header information to 127.50.41.3 with the origin port Origin 40.001. So, when a Computer A in the system responds, the packet first goes to the NAT device, which looks for port number 40000 and sees that it maps to Computer A's real information. The NAT device then changes the header information to address 10.10. 44.3 and port 43887 and sends them to computer A for processing. A business can save much more money by using PAT because the business only has to purchase a few public IP addresses that are used by all systems on the network.
447
q
Network: The responsibilities of the network layer protocol include networking, addressing, and routing. Below is a list of some protocols that work at this level:
A
- Internet Protocol (IP)
- Internet Control Message Protocol (ICMP)
- Internet Group Management Protocol (IGMP)
- Routing Information Protocol (RIP)
- Open Shortest Path First (OSPF)
- Internetwork Packet Exchange (IPX)
448
q
29____________ is a set of DNS extensions that provides DNS data origin authentication to DNS clients (resolvers) to reduce the threat of DNS poisoning, spoofing, and similar types of attacks.
A.resource records
B.zone transfer
C.DNSSEC
D.resource transfer
Extended questions:
A
RIGHTC.DNSSEC is a set of DNS extensions that provides DNS clients (resolvers) with DNS data origin authentication to reduce the threat of DNS poisoning, spoofing, and similar types of attacks. DNSSEC is a set of Internet Engineering Task Force (IETF) specifications for securing the services provided by DNS as used over IP networks.
INCORRECTAis incorrect because a DNS server contains records that map host names to IP addresses called resource records. When a user's computer needs to resolve a hostname to an IP address, it looks up its DNS server in its network settings. The computer then sends a request for the hostname to the DNS server for resolution. The DNS server looks up its resource records and finds the record with that particular hostname, gets the address, and replies to the computer with the proper IP address.
INCORRECTBis incorrect because the primary and secondary DNS servers synchronize their information through a zone transfer. Once changes are made to the primary DNS server, those changes must be replicated to the secondary DNS server. It is important to configure the DNS server to only allow zone transfers between specific servers.
INCORRECTDit's wrong because it's a distracting answer.
449
q
Internet Security Association and Key Management Protocol (ISAKMP)
A
C.Internet Security Association and Key Management Protocol (ISAKMP)provides a framework for creating security associations and exchanging keys.
450
q
DNS Division
A
Organizations must implementsplit DNS, which means that a DNS server in the DMZ will handle external hostname to IP resolution requests, while an internal DNS server will only handle internal requests. This ensures that the internal DNS has layers of protection and is not exposed via the "internet". The internal DNS server should only contain resource records for internal computer systems, and the external DNS server should only contain resource records for systems that the organization wants the outside world to be able to connect to. If the external DNS server is compromised and has the resource records for all internal systems, the attacker now has a lot of "inside knowledge" and can carry out targeted attacks. External DNS servers should only contain information about systems within the DMZ that the organization intends to communicate with others on the Internet (web server, external mail server, etc.).
451
q
Time Division Multiple Access (TDMA)
A
Time Division Multiple Access (TDMA)increases the speed and efficiency of the cellular network by taking channels from the radio frequency spectrum and dividing them into time slots. In different periods, multiple users can share the same channel; Systems within the cell change from user to user, effectively reusing available frequencies. TDMA has increased speeds and quality of service. A common example of TDMA in action is a conversation. One person speaks for a while, then pauses, and then another person speaks. In TDMA systems, time is divided into frames. Each box is divided into slots. TDMA requires that both the source and destination know the start and end time of each slot. Mobile communication systems such as the Global System for Mobile Communications (GSM), Digital AMPS (D-AMPS), and Personal Digital Cellular (PDC) use TDMA.
452
q
Grace is a security administrator for a medical facility and is responsible for several different teams. One team reported that three critical systems went offline when their primary FDDI link failed, even though the link was supposed to provide redundancy. Grace is also expected to advise her staff on the type of fiber to be deployed for building-to-building connectivity on campus. Because it is a medical school, many surgeries are videotaped and this data must be continuously transmitted from building to building. Another thing Grace has been told is that DoS attacks against specific servers within the internal network occur regularly. The attacker sends excessive ICMP ECHO REQUEST packets to all hosts on a given subnet, pointing to a given server.
26π§π· Which of the following is likely the problem Grace's team faced when their systems went offline?
Aπ§π· Three critical systems have been connected to a double link station.
Bπ§π· Three critical systems have been connected to a single connected station.
Cπ§π· FDDI's secondary ring was overloaded with traffic, bringing down all three critical systems.
Dπ§π· The FDDI ring is shared in a metropolitan environment and allows each company to connect only a certain number of systems to the two rings.
A
26.Bπ§π· A single connection station (SAS) is only connected to one ring (the main one) through a hub. If the primary ring fails, it does not connect to the secondary backup ring. A dual link station (DAS) has two ports, with each port providing a connection to the primary and secondary rings.
453
q
Broadband ISDN (BISDN)
A
This implementation can handle many different types of services simultaneously and is mainly used in backbone networks of telecom operators. When using BISDN in a backbone network, ATM is typically used to encapsulate data at the data link layer in cells traveling over a SONET network.
454
q
10π§π· Which of the following technologies pre-integrates independent security solutions with the goal of providing simplicity, centralized control and streamlined processes?
Aπ§π· Network convergence
Bπ§π· Security as a service
Cπ§π· uniform hazard management
Dπ§π· Integrated convergence management
A
10.Cπ§π· It has become very difficult to manage the long list of security solutions that almost every network must have. The list includes firewalls, antimalware, antispam, IDS/IPS, content filtering, data loss prevention, VPN capabilities, and continuous monitoring and reporting, among others. Unified Threat Management (UTM) appliance products have been developed that provide all (or many) of these functionalities in a single network appliance. The goals of UTM are simplicity, simplified installation and maintenance, centralized control, and the ability to understand the security of a network from a holistic perspective.
455
q
Transmission Control Protocol (TCP)
A
The core protocol of the TCP/IP suite that provides reliable, connection-oriented, end-to-end network connectivity.
456
q
Symbol
A
AToken passing technologyis one in which a device cannot transfer data to the network cable without having oneSymbol, a control framework that moves in a logical circle and "picks up" when a system needs to communicate. This differs from Ethernet, where all devices try to communicate with each other at the same time. For this reason, Ethernet is called "Chat Protocol" and is collision-sensitive. Token Ring does not support collisions as only one system can communicate at a time, but this also means communication is slower compared to Ethernet.
457
q
Below we dive into the top three firewall architectures that are
A
- selected host
- apartment building
- filtered subnet
458
q
star topology
A
In onestar topologyall nodes connect to a central device such as a switch. Each node has a dedicated connection to the central device. The central device must provide enough throughput so that it does not become an adverse bottleneck for the network as a whole. Because a central device is required, it presents a potential single point of failure, so redundancy may need to be implemented. The switches can be configured in flat or tiered deployments to allow larger organizations to use them.
459
q
Presentation: Presentation layer services perform translation to standard formats, compress and decompress data, and encrypt and decrypt data. Protocols at this level do not work, only services. The following is a list of some presentation layer patterns:
A
- American Standard Code for Information Interchange (ASCII)
- Extended Binary Coded Decimal (EBCDIC) mode of exchange
- Marked Image File Format (TIFF)
- Joint Photographic Experts Group (JPEG)
- Cinema Experts Group (MPEG)
- Musical Instrument Digital Interface (MIDI)
460
q
7π§π· Which of the following proxies cannot make access decisions based on protocol commands?
Aπ§π· Registration
Bπ§π· Packet filtering
Cπ§π· the hippodrome
Dπ§π· civic
A
7.Cπ§π· Application and circuit are the only types of proxy-based firewall solutions listed here. The others do not use proxies. Circuit-based proxy firewalls make decisions based on header information, not the protocol's command structure. Application-based proxies are the only ones that understand this level of granularity over individual protocols.
461
q
shielded twisted pair
A
Twisted pair cables are often shielded to prevent RFI and EMI. This shielding can be applied to individual pairs or to the aggregation of pairs.
462
q
8.The DNS is a popular target for attackers due to its strategic role on the Internet. What type of attack uses recursive queries to poison a DNS server's cache?
A.DNS spoofing
B.Host file manipulation
C.Social development
D.domain dispute
Extended questions:
A
RIGHTA.The DNS plays a strategic role in the transmission of data traffic on the Internet. DNS directs traffic to the correct address by mapping domain names to corresponding IP addresses. DNS queries can be classified as either recursive or iterative. With a recursive query, the DNS server typically forwards the query to another server and sends the appropriate response back to the requester. In an iterative query, the DNS server replies with an address to another DNS server that can answer the query, and the client proceeds to query the new DNS server. Attackers use recursive queries to poison a DNS server's cache. This allows attackers to direct systems to a website they control that contains malware or some other form of attack. How it works: An attacker sends a recursive query to the victim's DNS server, requesting the IP address of the domain www.logicalsecurity.com. The DNS server forwards the request to another DNS server. However, before the other DNS server responds, the attacker inserts his own IP address. The victim's server accepts the IP address and stores it in its cache for a period of time. The next time a system requests the server to resolve www.logicalsecurity.com to its IP address, the server will redirect users to the attacker's IP address. This is known as DNS spoofing or DNS poisoning.
INCORRECTBis incorrect because host file manipulation does not use recursive queries to poison a DNS server's cache. A client first queries a hosts file before sending a query to a DNS server. Some viruses add invalid IP addresses of antivirus vendors to the hosts file to prevent downloading and detection of virus definitions. This is an example of how to manipulate the hosts file.
INCORRECTCis incorrect because social engineering does not involve querying a DNS server. Social engineering refers to the manipulation of people to gain unauthorized access or information. Social engineering takes advantage of people's desire to be helpful and/or trustworthy. It is a non-technical attack that can use technology to execute itself. For example, an attacker could impersonate a user's administrator and send them a fake email requesting an application password. The user who wants to help out and keep their admin's favor will probably provide the password.
INCORRECTDIt's wrong because domain disputes aren't about poisoning a DNS server's cache. Domain names are subject to trademark risk, including temporary unavailability or permanent loss of an established domain name. A damaged business can lose its entire Internet presence as a result of a domain dispute. Organizations concerned about the possibility of trademark disputes related to their domain names should have contingency plans. For example, a company can set up a second, unrelated domain that can still represent the company name.
463
q
Lance has been hired as the new security officer for a large medical device company. He was informed that many of the firewalls and IDS products were not configured to filter IPv6 traffic; Therefore, many attacks occurred without the knowledge of the security team. Although the network team has tried to implement an automatic tunneling feature to fix this issue, they are still encountering problems with the NAT device on the network. Lance also discovered that caching attacks against the company's public DNS server were successful. Lance also noted that while current LDAP requests require additional authentication, current technology only offers password-based authentication options.
38π§π· Based on the scenario information, what should the network team implement regarding IPv6 tunneling?
Aπ§π· Teredo must be configured on IPv6-enabled hosts that are behind the NAT device.
Bπ§π· 6to4 must be configured on IPv6 capable hosts located behind the NAT device.
Cπ§π· The intra-site auto-tunneling routing protocol must be configured on IPv6-enabled hosts located behind the NAT device.
Dπ§π· IPv6 must be disabled on all systems.
A
38.Aπ§π· Teredo encapsulates IPv6 packets in UDP datagrams with IPv4 addressing. IPv6-enabled systems behind the NAT device can be used as Teredo tunnel endpoints even if they do not have a dedicated public IPv4 address.
464
q
value networks
A
Many different types of businesses use EDI for internal communications and to communicate with other businesses. A very common implementation is between a company and its provider. For example, some supplier companies ship inventory to many different companies, such as Target, Wal-Mart, and Kmart. Many of these consumables are made in China and then shipped to a warehouse in a specific country, e.g. B. The United States complied. When Wal-Mart needs to order more inventory, it submits its request over an EDI network, which is basically an electronic form in our paper-based world. Instead of using paper orders, receipts and forms, EDI delivers all of these digitally.
465
q
Filtered Subnet Architecture
A
When two filter devices are used to create a DMZ. The external device inspects the traffic entering the DMZ network, and the internal filter device inspects the traffic before it enters the internal network.
466
q
telecommunication development
A
On the eighth day, God created the telephone.
Telephone systems have been around for about 100 years, starting as copper-based analog systems. Central exchanges connected individual telephones first manually (by human operators) and then to electronic switching equipment. Once two phones were connected, they had an end-to-end connection (end-to-end circuit). Multiple phone calls have been split and placed on the same line, known as multiplexing.MultiplexenIt is a method of combining multiple data channels into a single transmission path. The transmission is so fast and efficient that the ends do not realize that they are sharing the line with many other entities. They think they have the line to themselves.
467
q
Disadvantages of using application-level proxy firewalls:
A
- They are generally not suitable for high-bandwidth or real-time applications.
- They tend to be limited in terms of compatibility with new applications and network protocols.
- Creating performance issues due to the processing requirements required per package.
468
q
How do they work together?
A
If you are new to the world of networking, it may be difficult for you to understand how the OSI model, analog and digital, synchronous and asynchronous, baseband and broadband technologies are related and different. You can think of the OSI model as a framework for creating different languages. If you and I speak English, we must follow the rules of that language in order to understand each other. When we speak French we still have to follow the rules of the language (OSI model), but the individual letters that make up the words are in a different order. The OSI model is a general framework that can be used to define many different "languages" in which devices can communicate. Since we have agreed that we will communicate in English, I can convey my message to you, so that my words travel through continuous (analog) radio waves. Or I can send my message to it via morse code using individual (digital) discrete values. I can send all my words without pauses or punctuation (synchronous) or insert pauses and punctuation (asynchronous). If I'm the only one talking to you at the same time, that would be analogous to baseband. If you had ten friends talking to you at the same time, that would be broadband.
469
q
Wired Equivalent Privacy (WEP)
A
When an AP is configured to use SKA, the AP sends a random value to the wireless device. The device encrypts and returns this value with its cryptographic key. The AP decrypts and extracts the response, and if it matches the original value, the device is authenticated. With this approach, the wireless device authenticates itself to the network and proves that it has the required encryption key. This method is based onWired Equivalent Privacy (WEP)Protocol that also allows encryption of data transmissions.
470
q
wireless mobile communication
A
Mobile wireless technology has become a trillion dollar industry with more than 4.5 billion subscriptions, driven by a range of new technologies and agreements on industry standards and international standards.
471
q
Protocolo Bootstrap (BOOTP)
A
oProtocolo Bootstrap (BOOTP)it was developed after RARP to improve the functionality that RARP provides for diskless workstations. The diskless workstation can obtain its IP address, the address of the name server for future name resolution, and the default gateway address of the BOOTP server. BOOTP generally provides more functionality for diskless workstations than RARP.
472
q
Viewing computers as a purchasable service rather than a physical box can provide the following benefits:
A
- Organizations have more flexibility and agility in terms of IT growth and functionality.
- The calculation costs can be reduced because it is a shared deployment model. (Includes reduced real estate, electrical, operating and labor costs.)
- Location independence can be achieved because data processing is not centralized or tied to a physical data center.
- Applications and features can be more easily migrated from one physical server to another as environments become virtualized.
- Higher reliability for business continuity and disaster recovery can be achieved without the need for dedicated backup sites.
- Scalability and elasticity of resources can be achieved through near real-time automation.
- Performance may increase when processing is offloaded to available systems during peak loads.
473
q
High Level Data Link Control (HDLC)
A
High Level Data Link Control (HDLC)is a protocol that is also a bit-oriented link layer protocol and is used for serial WAN communication between devices. HDLC is an extension of SDLC, which was mainly used in SNA environments. SDLC essentially died out when mainframe environments with SNAs drastically decreased in number. HDLC has been maintained and evolved.
474
q
Unshielded Twisted Pair (UTP)
A
Twisted pair cabling consists of insulated copper wires encased in a protective outer covering. If the cable has an outer foil shield, it is calledshielded twisted pair (STP), which provides additional protection against radio frequency interference and electromagnetic interference. Twisted pair cabling that does not have this additional external shield is called twisted pair cabling.Unshielded Twisted Pair (UTP).
475
q
domestic uses
A
A firewall can take the form of software installed on a common computer with a common operating system, or a dedicated hardware device that has its own operating system. The second option is usually more secure, since the provider uses a simplified version of an operating system (usually Linux or BSD Unix). Operating systems are full of code and features that a firewall doesn't need. This added complexity opens the door for vulnerabilities. If a hacker can exploit and destroy a company's firewall, the company is highly exposed and at risk.
476
q
ICMP attacks
A
ICMP attacksThe ICMP protocol is used to send status messages, not to store or transmit user data. But someone figured out how to get some data into an ICMP packet that can be used to communicate with an already compromised system. Loki is actually a client/server program used by hackers to create backdoors into systems. The attacker targets a computer and installs the server portion of the Loki software. This part of the server "listens" on a port that is the back door through which an attacker can gain access to the system. To access this computer and open a remote shell, an attacker sends commands in ICMP packets. This is usually successful as most routers and firewalls are configured to allow ICMP traffic in and out of the network based on the assumption that it is safe to do so as ICMP is designed not to carry data or payloads. .
477
q
network convergence
A
The combination of server, storage, and network resources in a single fabric that reduces data center cost and complexity. Converged infrastructures offer the ability to pool resources, automate resource provisioning, and rapidly scale processing power up and down to meet the demands of dynamic workloads.
478
q
John is the head of his company's security team. He discovered that the attackers had installed trackers on the network without the company's knowledge. Along with this issue, his team also discovered that two DNS servers had no record replication restrictions and the servers were caching suspicious name resolution data.
30π§π· Which of the following unauthorized activities is likely to have occurred in this situation?
Aπ§π· Dragon Area
B. Identity fraud
Cπ¬π§ fragile
Dπ§π· Zone delivery
A
30.Dπ§π· Primary and secondary DNS servers sync their information through a zone transfer. Once changes are made to the primary DNS server, those changes must be replicated to the secondary DNS server. It is important to configure the DNS server to only allow zone transfers between specific servers. Attackers can perform zone transfers to gather useful network information from victims' DNS servers. Unauthorized zone transfers can occur when DNS servers are not configured correctly to restrict this type of activity.
479
q
simplex
A
Communication is one way.
480
q
Integrated Digital Services Network (ISDN)
A
Integrated Digital Services Network (ISDN)It is a technology provided by telephone companies and ISPs. This technology and the required equipment allow data, voice, and other traffic to be transmitted digitally over a medium previously only used for analog voice transmission. Phone companies went completely digital many years ago, with the exception of local loops, which are copper wires that connect homes and businesses to their carriers' headquarters. These exchanges are where the telephone company's switching equipment resides, and this is where the transformation from analog to digital occurs. However, the exchange line is always analog and therefore slower. ISDN was developed as a replacement for the old analog telephone systems, but it has not yet reached the expected level.
481
q
DNSSEC
A
A set of DNS extensions that provides DNS clients (resolvers) with DNS data origin authentication to reduce exposure to DNS poisoning, spoofing, and similar types of attacks.
482
q
asynchronous and synchronous
A
It's all about time.
Analog and digital transmission technologies deal with the format in which data is transmitted from one system to another. The asynchronous and synchronous transfer types are similar to the cadence rules we use for conversation synchronization. Synchronous and asynchronous network technologies provide synchronization rules to control how systems communicate with each other. If you've ever talked on a satellite phone, chances are you've had communication timing issues. You and the other person speaking do not take into account the necessary delay that satellite communication requires, so you "talk" to each other. Once you know about the connection delay, resynchronize your time so that only one person's (voice) data is transmitted at a time, allowing each person to correctly understand the entire conversation. Appropriate pauses frame your words so they are understandable.
483
q
One VPN solution is not necessarily better than another; They only have their own focused purposes:
A
- PPTP is used when a PPP connection needs to be extended over an IP-based network.
- L2TP is used when a PPP connection needs to extend over a non-IP based network.
- IPSec is used to secure IP-based traffic and is commonly used in gateway-to-gateway connections.
- SSL VPN is used when it is necessary to protect a specific type of traffic at the application layer.
484
q
Orthogonal Frequency Division Multiple Access (OFDMA)
A
Orthogonal Frequency Division Multiple Access (OFDMA)It is derived from a combination of FDMA and TDMA. In earlier FDMA implementations, the different frequencies for each channel were widely spaced to allow the analog hardware to separate the different channels. In OFDMA, each of the channels is divided into a set of closely spaced orthogonal frequencies with narrow bandwidths (subchannels). Each of the various sub-channels can be simultaneously transmitted and received in a MIMO (multiple input/output) manner. The use of orthogonal frequencies and MIMO allows signal processing techniques to reduce the effects of interference between different sub-channels and correct for channel imperfections such as noise and frequency selective fading. 4G requires the use of OFDMA.
485
q
Demand Dial Routing (DDR)
A
The BRI service is common for home use and PRI, which has 23 B channels and one D channel, is used more in businesses. ISDN is not usually the main telecommunications connection for businesses, but it can be used as a backup if the main connection fails. A company can also choose to implement itDemand Dial Routing (DDR), which can work over ISDN. DDR allows an organization to send WAN data over its existing phone lines and use the public circuit-switched network as a temporary type of WAN connection. It is typically deployed by organizations that send little WAN traffic and is a much more cost-effective solution than a true WAN deployment. The connection is activated when it is needed and then becomes inactive.
486
q
tie layers
A
Remove all those logs from the ground and place them in a pile β a net pile.
The OSI model serves as the framework for many network-based products and is used by many types of providers. Different types of devices and protocols work in different parts of this seven-layer model. The main reason that a Cisco switch, a Microsoft web server, a Barracuda firewall, and a Belkin wireless access point can communicate successfully on a network is that they all work within the OSI model. They don't have their own ways of sending data; following a standardized communication path that enables interoperability and allows a network to be a network. If a product does not follow the OSI model, it cannot communicate with other devices on the network because the other devices do not understand its proprietary form of communication.
487
q
Shared Key Authentication (SKA)
A
The wireless device can authenticate to the AP in two ways:Open System Authentication (OSA)miShared Key Authentication (SKA)π§π· OSA does not require the wireless device to prove to the AP that it has a specific cryptographic key for authentication purposes. In many cases, the wireless device only needs to provide the correct SSID value. In OSA implementations, all transactions are clear as encryption is not involved. Thus, an attacker can sniff the traffic, capture the necessary authentication steps, and follow the same steps to authenticate and associate with an AP.
488
q
User Datagram Protocol (UDP)
A
An unreliable, connectionless transport layer protocol considered a "best effort" protocol.
489
q
point to point protocol
A
Point to Point Protocol (PPP)It is similar to HDLC in that it is a data link protocol that performs framing and encapsulation for point-to-point links. A peer-to-peer connection means that there is a connection between one device (peer) and another device (peer). If the systems on your LAN use the Ethernet protocol, what if a system needs to communicate with a server at your ISP to connect to the Internet? This is not an Ethernet connection. So how do systems know how to communicate with each other if they can't use Ethernet as their data link protocol? They use a data link protocol that they understand. Telecommunications devices generally use PPP as their data link protocol.
490
q
physical head
A
It all ends up being an electrical signal anyway.
ophysical head, Layer 1, converts the bits to voltage for transmission. As mentioned above, the signals and voltage schemes have different meanings for different LAN and WAN technologies. When a user sends data through their dial-up software and from their modem to a phone line, the data format, electrical signals, and control functionality are very different than when that user sends data through the NIC and to unshielded twisted pair (UTP). )- Cable for LAN communication. The mechanisms that control this data, which travels over the phone line or UTP cable, work at the physical layer. This layer controls timing, data rates, line noise, and transmission techniques. Physical layer specifications include timing of voltage changes, voltage levels, and physical connections for electrical, optical, and mechanical transmission.
491
q
Private Branch Exchange (PBX)
A
Telephone companies use switching technology to transfer telephone calls to their destinations. At the headquarters of a telephone company are the switches that connect cities and metropolitan areas through the use of fiber optic rings. For example, when Dusty calls from his house, the call arrives first at the local operator of the telephone company that serves Dusty, and then the operator at that office decides whether the call is local or long distance. He call and where to go from there. APrivate Branch Exchange (PBX)is a private telephone exchange on the company's premises. This switch performs some of the same switching tasks as the telephone company switch. The PBX has a dedicated connection to the switchboard of the local telephone company where the most intelligent changes are made.
492
q
Transport: The protocols in the transport layer are responsible for the transmission and segmentation of a data flow from end to end. The following protocols work at this layer:
A
- Transmission Control Protocol (TCP)
- User Datagram Protocol (UDP)
- SSL (Secure Sockets Layer)/TLS (Transport Layer Security)
- Sequenced Packet Exchange (SPX)
493
q
18π§π· What best describes the IP protocol?
Aπ§π· A connectionless protocol that handles the creation, maintenance and destruction of dialogs
Bπ§π· A connectionless protocol that handles packet forwarding and addressing
Cπ§π· A connection-oriented protocol that handles the addressing and forwarding of packets
Dπ§π· A connection-oriented protocol that handles sequencing, error detection, and flow control
A
18.Bπ§π· The IP protocol is connectionless and works at the network layer. Adds source and destination addresses to a packet as it goes through the data encapsulation process. IP can also make routing decisions based on the destination address.
494
q
network layer
A
Many roads lead to Rome.
The main tasks ofnetwork layer, Layer 3, needs to put information in the packet header so that it can be correctly addressed and forwarded, and then route the packets to the correct destination. In a network, many routes can lead to a destination. Network layer protocols must determine the best route for the packet. Routing protocols create and maintain their routing tables. These tables are maps of the network, and when a packet needs to be sent from computer A to computer M, the protocols examine the routing table, add the necessary information to the packet header, and forward the packet.
495
q
RJ-45
A
It is commonly used to terminate twisted pair cables in Ethernet environments.
496
q
Firewall-Proxy
A
meet my lawyer He will be our mediator.
Alawyeris an intermediary. Intercepts and examines messages before forwarding them to the intended recipients. Suppose you have a box and a message to deliver to the President of the United States. You couldn't just go to the president and deliver these items. Instead, he would have to contact an intermediary, most likely the Secret Service, who would take the box and the message and examine the box thoroughly to make sure there was nothing dangerous inside. That's what a proxy firewall does: it accepts messages entering or leaving a network, examines them for malicious information, and if it decides the messages are correct, forwards the data to the destination computer.
497
q
amplitudes
A
The signals are measured in frequency and amplitude. The frequency of a signal determines how much data it can carry and how far. The higher the frequency, the more data the signal can carry, but the higher the frequency, the more susceptible the signal is to atmospheric interference. A higher frequency can transmit more data, but over a shorter distance.
498
q
E-Carrier
A
E-CarrierThey are similar to T-bar telecommunications links, where a single pair of physical wires can be used to carry many simultaneous voice calls through time division multiplexing. Within this technology, 30 channels interleave eight data bits in one frame. Although the T-Carrier and E-Carrier technologies are similar, they are not interoperable. Electronic carriers are used by European countries.
499
q
Stateful Inspection Firewall Features β Here is a list of some important features of a stateful inspection firewall:
A
- It maintains a state table that keeps track of each communication session.
- It provides a high level of security and does not experience the performance degradation experienced by application proxy firewalls.
- It is scalable and transparent to users.
- Provides data to track unconnected protocols such as UDP and ICMP
- Stores and updates the state and context of data in packets
500
q
instant message
A
Instant Messaging (IM)allows people to communicate in real time through a two-way exchange. Instant messaging allows instant transmission of text messages between people using shared client software. Most communications are in text format, but some instant messaging programs also allow the transmission of voice and video data. Several instant messaging services offer video calling, voice over IP, and web conferencing capabilities. Many instant messaging applications offer features such as file transfers, contact lists, and the ability to have multiple conversations at the same time.