Comprehensive OSI Model, Protocols, and Networking Devices Overview

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/242

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

243 Terms

1
New cards

MAC addresses

Used at the Data Link layer.

2
New cards

OSI model developer

International Organization for Standardization (ISO).

3
New cards

Logical addressing and routing

Handled by the Network layer.

4
New cards

Encapsulating application data layers

Transport, Application, Session, Presentation.

5
New cards

Translation and formatting of data

Handled by the Presentation layer.

6
New cards

Device operating at the Network layer

Router.

7
New cards

Entry point for applications

Provided by the Application layer.

8
New cards

Dialogue control layer

Session layer.

9
New cards

Switching associated layers

Data Link and Network (some switches are 'Layer 3 switches').

10
New cards

TCP and UDP operation layer

Transport layer (connectionless/connection-oriented).

11
New cards

Physical hardware devices layers

Physical, Data Link, Network.

12
New cards

Layer adding header and footer

Data Link layer.

13
New cards

Ethernet operation layer and MAC method

Data Link layer: CSMA/CD.

14
New cards

Final destination data delivery layer

Network layer.

15
New cards

Non-Network layer protocol

IMAP (It is Application layer).

16
New cards

Guaranteed delivery layer

Transport layer; connection-oriented.

17
New cards

Cabling and topology layers

Physical and Data Link.

18
New cards

Layers without exclusive TCP/IP protocols

Physical, Data Link, Session, Presentation.

19
New cards

Layer using port numbers

Transport layer.

20
New cards

OSI layers top-to-bottom order

Application, Presentation, Session, Transport, Network, Data Link, Physical.

21
New cards

Devices operating at the Physical layer

Repeaters, Hubs.

22
New cards

Device translating between OSI stacks

Gateway.

23
New cards

Firewall description

A device located between two networks that enables administrators to restrict traffic.

24
New cards

Firewall method using port numbers

Service-dependent filtering.

25
New cards

Low-cost LAN security method

Install a personal firewall on each computer.

26
New cards

True statements about hubs and switches

All devices on a hub share a collision domain; switches provide separate ones.

27
New cards

Switch type forwarding frames after lookup

Cut-through.

28
New cards

Unique to stateful firewalls

Scan Transport layer headers for SYN floods.

29
New cards

IDS detection methods

Anomaly-based, Behavior-based, Signature-based.

30
New cards

Another term for multiport bridge

Switch.

31
New cards

True about switches and routers

Routers = Network layer; Switches = Data Link.

32
New cards

Systems collecting IDS info

SIEM.

33
New cards

LAN splitting with a router benefits

Reduces broadcast traffic, Reduces unicast traffic.

34
New cards

True about bridges and switches

Data Link devices using MAC addresses.

35
New cards

Correct term for a traditional switch

Multiport bridge.

36
New cards

Router

Network layer devices using IP

37
New cards

Router requirement

Must support the Network layer protocol used

38
New cards

Router port

Each router port = separate broadcast domain

39
New cards

False statement about routers

Routers store and maintain route information in a local text file.

40
New cards

Firewall installation location

Between the Internet access router and the rest of the private internetwork

41
New cards

Proxy server OSI layer

Application

42
New cards

NGFW feature

Deep packet inspection (DPI)

43
New cards

Content filtering

Content filters examine the data carried within packets for potentially objectionable materials.

44
New cards

Load balancing criterion

Which server has the fastest processor

45
New cards

Device managing multiple APs

Wireless controller

46
New cards

Load balancer type

Router

47
New cards

Device with DPI and IPS capabilities

NGFW

48
New cards

Proxy server security benefit

The proxy server uses a public IP address, and the client computers use private addresses.

49
New cards

Traffic monitoring device

IDS

50
New cards

IDS feature for switched networks

Port mirroring

51
New cards

SAN protocol sharing with LAN

iSCSI

52
New cards

Another SAN protocol

FCoE

53
New cards

Protocol not used in SANs

VoIP

54
New cards

Protocol for locating iSCSI targets

iSNS

55
New cards

Max Fibre Channel speed

128 Gbps

56
New cards

NAS similarity

File server

57
New cards

NAS vs. SAN access type

NAS = file-level access; SAN = block-level access

58
New cards

NAS filesystem provision

NAS provides a filesystem; SAN does not

59
New cards

FCoE advantages

FCoE is less expensive

60
New cards

FCoE traffic sharing

FCoE can share IP network traffic

61
New cards

FCoE hardware usage

FCoE uses standard Ethernet hardware

62
New cards

Application layer protocols for NAS

CIFS

63
New cards

Another application layer protocol for NAS

NFS

64
New cards

iSCSI client term

Initiator

65
New cards

Protocols in iSCSI packet

Ethernet, IP, TCP

66
New cards

Protocols in Fibre Channel packet

None of the above

67
New cards

Protocol with layered model not matching OSI

Fibre Channel

68
New cards

Protocols in FCoE packet

Ethernet

69
New cards

Ralph's Internet access solution

The primary objective and one of the secondary objectives

70
New cards

Not a method of load balancing

VPN headend

71
New cards

Not a typical UTM feature

Network-attached storage

72
New cards

Multilayer switches operation layers

Physical, Data link, Network

73
New cards

Control plane policing

QoS

74
New cards

Device connecting internal VoIP

VoIP gateway

75
New cards

True definition of modem

A device that converts analog signals to digital signals and back again

76
New cards

VoIP device terms

Endpoint, Terminal

77
New cards

Use analog phone over IP

VoIP gateway

78
New cards

Prevents endless packet routing

Time to live (TTL)

79
New cards

CDN stands for

Content Delivery Network

80
New cards

Cloud model allowing OS installation

IaaS

81
New cards

Cloud model for email service

SaaS

82
New cards

Model with most control

IaaS

83
New cards

Cloud architectures Alice is using

IaaS, Public cloud

84
New cards

Model where org is both provider & consumer

Private cloud

85
New cards

Cloud bursting definition

Cloud bursting

86
New cards

Outlook.com service model

SaaS

87
New cards

True about cloud delivery models

A hybrid cloud enables administrators to migrate services between public and private resources.

88
New cards

IaaS

Service model Ed wants (Windows server, install app)

89
New cards

Potential security risk

Multitenancy pros/cons

90
New cards

Reduces overhead

Multitenancy pros/cons

91
New cards

Possible bandwidth competition

Multitenancy pros/cons

92
New cards

Cloud direct connection

Best hybrid connection to avoid bottlenecks

93
New cards

NFV ISG

Not a component of NFV

94
New cards

Public cloud is easier to expand

True statements about datacenter options

95
New cards

Public cloud has better physical security

True statements about datacenter options

96
New cards

Role-based access control

Alice using a security group for permissions is an example of

97
New cards

Security lists

Contain ingress and egress rules that apply to all of the virtual network interface cards (VNICs) in a subnet

98
New cards

NAT gateway

Allows traffic from the VNC to reach the Internet but does not allow Internet traffic into the VNC

99
New cards

Internet gateway

Allows VNC traffic both to and from the Internet

100
New cards

POP3 email client default ports

110 and 25