CSEC 701 Final Review

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/214

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:09 AM on 12/8/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

215 Terms

1
New cards

Transport Layer Function

Provides process-to-process delivery

2
New cards

Data Link Layer Function

Provides node-to-node delivery

3
New cards

Network Layer Function

Provides host-to-host delivery

4
New cards

Port Numbers

16-bit addressing space that allows multiple simultaneous connections

5
New cards

Well-Known Ports

Port numbers 0–1023

6
New cards
7
New cards

NAPT Purpose

Translates internal private IP/port pairs to a public IP/port pair

8
New cards

NAT Translation Table

Maintains WAN-side to LAN-side IP:port mappings

9
New cards

NAT Handling Outgoing Traffic

Rewrites source IP/port to public IP/port and updates table

10
New cards

NAT Handling Incoming Replies

Uses translation table to rewrite destination IP/port back to internal host

11
New cards
12
New cards

UDP Reliability

Unreliable with no guaranteed delivery or ordering

13
New cards

UDP Transmission Control

Provides no flow control or congestion control

14
New cards

UDP Characteristics

Connectionless and low-overhead

15
New cards

UDP Uses

Used by DHCP

16
New cards
17
New cards

TCP Reliability

Reliable in-order byte stream using ACKs and retransmissions

18
New cards

TCP Flow Control

Prevents sender from overwhelming receiver

19
New cards

TCP Congestion Control

Slows sending rate when network is congested

20
New cards

TCP Connection-Oriented

Requires handshake setup and teardown

21
New cards
22
New cards

TCP Connection Setup

Three-way handshake using SYN and ACK flags

23
New cards

TCP Connection Termination

Four-way termination process

24
New cards
25
New cards

DNS Purpose

Provides human-readable names instead of numeric IP addresses

26
New cards

DNS Manual Method

Host file with static mappings

27
New cards

DNS Centralized Method

Stores all mappings in a single machine

28
New cards

DNS Hierarchical Method

Distributes the database across multiple servers

29
New cards
30
New cards

DNS Default Name Server

ISP or organization-run resolver for local users

31
New cards

DNS Transport Protocol

Uses UDP or TCP on port 53

32
New cards

DNS UDP Use Case

Used for responses smaller than 512 bytes

33
New cards

DNS TCP Use Case

Used when responses exceed 512 bytes

34
New cards
35
New cards

Authoritative DNS Servers

Provide official hostname-to-IP mappings

36
New cards

DNS Caching

Non-authoritative answers stored after learning mappings

37
New cards

TLD Server Caching

Commonly cached locally

38
New cards
39
New cards

Non-Persistent HTTP

Opens and closes a TCP connection for each object

40
New cards

Persistent HTTP

Uses one TCP connection to send multiple objects

41
New cards
42
New cards

HTTP/1.1 Pipelining

Allows multiple pipelined GETs over one connection

43
New cards

HOL Blocking (HTTP/1.1)

Small objects wait behind large ones due to FCFS processing

44
New cards

Loss Impact in HTTP/1.1

Retransmissions stall object transmission

45
New cards
46
New cards

HTTP/2 Frame Interleaving

Splits objects into frames and interleaves them to reduce blocking

47
New cards

HTTP/2 Effect

Allows quick delivery of small objects even if larger ones are delayed

48
New cards
49
New cards

HTTP/2 Limitation

Packet loss still stalls all object transmissions

50
New cards

Protocol Layering Issue

HTTP+TLS+TCP+IP stack limits performance

51
New cards
52
New cards

HTTP/3 (QUIC)

HTTP runs over QUIC which replaces TLS and TCP

53
New cards

QUIC Characteristics

Implements reliability in application layer instead of OS TCP

54
New cards

QUIC Origin

Developed by Google starting in 2012

55
New cards
56
New cards

Protocols Vulnerable to Sniffing

HTTP

57
New cards

Hub Behavior

Broadcasts traffic to all ports

58
New cards

Switch Behavior

Unicasts traffic to correct port

59
New cards

SPAN Port

Mirrored port that receives copies of all packets

60
New cards
61
New cards

Sniffer Layer

Operates at the Data Link layer

62
New cards

OSI Isolation

Upper layers do not detect sniffing occurring at lower layers

63
New cards
64
New cards

MAC Flooding Attack

Floods switch with bogus MAC mappings to force broadcast mode

65
New cards

macof Tool

Generates large numbers of random MAC source addresses to overflow CAM table

66
New cards
67
New cards

Switch Port Stealing

Attacker sends fake ARP replies faster to bind victim’s MAC to attacker port

68
New cards

Effect of Port Stealing

Redirects traffic intended for the target to attacker

69
New cards
70
New cards

Gratuitous ARP

ARP reply sent without request to update forwarding info

71
New cards

Fake Gratuitous ARP Effect

Causes conflicts and lets attacker race to control MAC binding

72
New cards
73
New cards

ARP Spoofing at Switch

Floods ARP table causing switch to behave as a hub

74
New cards

ARP Cache Poisoning

Inserts forged IP–MAC pairs into victim’s ARP cache

75
New cards
76
New cards

Dynamic ARP Inspection

Drops ARP packets with MAC mismatch using DHCP snooping table

77
New cards

ARP Spoofing Detection Tools

Xarp

78
New cards
79
New cards

MAC Duplication

Attacker reuses victim’s MAC address to receive traffic

80
New cards

MAC Duplication Result

Switch forwards traffic to multiple ports enabling impersonation

81
New cards
82
New cards

MAC Spoofing Defense

Use DHCP Snooping

83
New cards

Secure MAC Retrieval

Get MAC directly from NIC instead of OS

84
New cards
85
New cards

DHCP Process

DISCOVER → OFFER → REQUEST → ACK

86
New cards

DHCP Starvation Attack

Attacker sends many DHCP requests to exhaust IP leases

87
New cards

DHCP Starvation Tools

dhcpstarv and Yersinia

88
New cards
89
New cards

Rogue DHCP Server

Attacker responds to DHCP requests with fake configuration

90
New cards

Rogue DHCP Effects

Wrong IP

91
New cards
92
New cards

DHCP Attack Defense

Use port security and DHCP snooping

93
New cards
94
New cards

IRDP Purpose

Hosts discover local routers through ICMP Router Solicitation and Advertisement

95
New cards

IRDP Spoofing

Attacker sends fake router advertisements to change victim’s default router

96
New cards
97
New cards

Local DNS Spoofing

Attacker on LAN sniffs DNS requests and replies with forged answers

98
New cards

Internet DNS Spoofing

Trojan changes victim’s DNS server to attacker-controlled address

99
New cards

Proxy DNS Poisoning

Trojan modifies browser proxy settings to redirect traffic

100
New cards

DNS Cache Poisoning

Inserts forged DNS records into resolver cache to redirect users