WGU D315 Network and Security Foundation

0.0(0)
studied byStudied by 2 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/69

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

70 Terms

1
New cards

Which OSI layer is related to the IP protocol

Network 3

2
New cards

Which OSI layer is organizing the bits over the physical layer between devices in the same collision domain?

Data Link 2 - They are in the same Frame

3
New cards

Which OSI layer is a Switch at?

Data Link 2

4
New cards

Which OSI layer is a WAP (Wireless Access Point) at?

Data Link 2

5
New cards

Which OSI layer is a router at

Network (3)

6
New cards

TCP protocol is on what OSI layer

Transport (4)

7
New cards

OSI layer 1

Physical Layer (Cable, Hubs, Repeaters)

8
New cards

OSI layer 2

Data Link Layer (Frame, Switch, PPP, Ethernet)

9
New cards

OSI layer 3

Network Layer (Moves packets, IP)

10
New cards

OSI layer 4

Transport Layer (TCP, end to end connection)

11
New cards

OSI Layer 5

Session Layer (API, Sockets, Synch and send to port)

12
New cards

OSI layer 6

Presentation layer (Syntax and encryption layer, SSL, SSH, JPEG)

13
New cards

OSI layer 7

Application layer (end user layer, http, applications)

14
New cards

Network Typology point to point

Two devices connect directly

15
New cards

Network Typology bus

All devices connect to a central main line

16
New cards

Network Typology Ring

All devices have two connections and form an endless ring

17
New cards

Network Typology Star

All devices connect to a central point

18
New cards

Network Typology Tree

Multiple devices connect together (on a switch) and then the switches are connected with each other

19
New cards

Network Typology Mesh

All devices connect directly to each other

20
New cards

Network Typology Hybrid

Multiple Network Typology within the network

21
New cards

Cloud - where do I manage the OS Iaas or Paas?

Iaas

22
New cards

What do I manage on Paas (2)

Application and Data

23
New cards

Name the 3 CIA triades

Integrity, Availability and Confidentiality

24
New cards

What is the CIA Triade Integrity?

Detects alteration in storage, transit and process

25
New cards

What is the CIA Triade Availability?

Ensure Authorized Access, Performance and Backup

Keeping unauthorized users out is not in this triade.

26
New cards

What is the CIA Triade Confidentiality?

Protect from unauthorized access and use, protecting data access in storage, transit and process

27
New cards

100m long Cat 5 cable supports speeds up to

100 Mb/s

28
New cards

100m long Cat 5e cable supports speeds up to

1000 Mb/s or 1 Gb/s

29
New cards

100m long Cat 6 cable supports speeds up to

10 Gb/s

30
New cards

100m long Cat 6a cable supports speeds up to

10 Gb/s

31
New cards

Does a firewall provide two way protection?

Yes, it protects ingress and egress data

32
New cards

Firewall that only checks the address label

Packet Filter

33
New cards

On what OSI level is a Packet Filter operating

Transport (checks TCP/UDP prot numbers) and Network (checks source and destination IP)

34
New cards

What is a circuit level gateway

A firewall that conceals the true identity of the protected network (hides IP) on the transport (4) layer

35
New cards

What does state in stateful mean?

It refers to the connection state between two computers

36
New cards

Why do we need the 5th layer on a Stateful Inspection

In this connection, the firewall is creating temporary rules per session to permit communication (TCP) back to the sender.

37
New cards

What is a stateful inspection

It reduces the amount of firewall rules. Firewall vendors implemented a feature that only needs one rule to allow the initial communication.

38
New cards

How do we protect the application level with a firewall

With a proxy server, Middle man or Layer 7 firewall

39
New cards

Can a packet filter firewall scan the packet content?

No, a layer 7 or proxy is needed

40
New cards

What is a IDS

Intrusion Detection system. A system for detecting attempting intrusion. Related to intrusion prevention systems (IPS) that block suspected attacks

41
New cards

What is IPS

Intrusion Prevention System that can block traffic if a malicious anomaly is detected

42
New cards

Cyber Attack - Ransomware

Encrypts data. Attacker sells the key. Prevent with Virus scanner

43
New cards

Cyber Attack - Man in the Middle

Eaves dropping. The data flows thru the middle man. The attacker can stop/change the data

44
New cards

Cyber Attack - Zero Day exploit

New unheard vulnerability. Needs to be patched

45
New cards

Cyber Attack - DNS tunneling

An attacker creates a bad server and connects it to the attacked domain name system. If now a request comes to the attacked server, the attacker can tunnel into the client and since dns connections are rarely monitored, the attacker stays hidden.

46
New cards

Cyber Attack - XXS attack

Cross Site Scripting uses a web form to inject malicious code.

47
New cards

Cyber Attack - Social engineering

Convince someone to give a you access to sensitive information

48
New cards

Cyber Attack - DoS and DDos

Denial of Service attacks flood a server with too much traffic

49
New cards

Cyber Attack - SQL Injection

A technique to add a string of sql code to a query to gain access to the targeted database

50
New cards

Cyber Attack - ARP Poisoning / ARP Spoofing

LAN attack that sends malicious Address Resolution Protocol packets to a default gateway in order to change the IP to MAC pairings

51
New cards

Cyber Attack - Phishing

Malicious link that often spoofs a valid site

52
New cards

Cyber Attack - Malware

Software that is designed to disrupt, steal and open backdoors.

53
New cards

Virus

Software that can replicate itself. Can't be controlled remotely. Main goal is to modify information

54
New cards

Worm

Software that can replicate itself and can be controlled remotely. Main goal is to eat system resources

55
New cards

Trojan Horse

Malicious software inside desirable software. Can not replicate but can be controlled remotely. Main goal is to steal information

56
New cards

What is AES 256

Advanced Encryption Standard with a symmetric key used in most enterprise applications (i.e. banking). Fastest encryption method

57
New cards

What is SSL

Secure Sockets Layer encryption with an asymmetric key. Formerly used in https, but now replaced by TSL

58
New cards

What is TSL

Transport layer security, an asymmetric key that replaced SSL. used in https

59
New cards

What is IPsec

Internet Protocol Security used to encrypt data in flight with an asymmetric key commonly used in VPN's

60
New cards

Where are public keys used

Asymmetric encryption uses public and private keys

61
New cards

Private Cloud

Single Tenant use. Often in one data center and the owner holds the responsibility

62
New cards

Public Cloud

AWS or MS Azure that offer multiple solutions. Data owner often does not know where the data is stored (building, rack, disk)

63
New cards

Hybrid Cloud

Mix of different clouds

64
New cards

Community cloud

A cloud that is open only to specific organizations that have common concerns.

65
New cards

What is the highest WLAN security protocol commonly used

WAP2 encrypted with AES (WAP3 was released in 2018 but not yet widely adapted).

66
New cards

What is the risk on unsecured public WLAN

Fake Access. An attacker wants you to connect to their WLAN to gain access to the sent and received data. Always use a VPN on unsecured networks

67
New cards

What are the 3 AAA stand for

Authentication, Authorization and Accounting

68
New cards

AAA - Authentication

Process of confirming a users identity. i.e. Active Directory, MFA

69
New cards

AAA - Authorization

Once the Authentication process is completed, the Authorization determines what resources the user can access

70
New cards

AAA -Accounting

Accounting or Auditing is a constant check to make sure that the restrictions in place are working as expected and no attempt of breaching is made