Network and Security - Foundations - C172 - Most Import Materials for Final Objective Assessment Test complete questions with expert solutions + rationales

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/46

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

47 Terms

1
New cards

802.11a/Wireless-A

wireless 5GHz - 54Mbps - 75ft

2
New cards

802.11b/Wireless-B

wireless 2.4GHz - 11Mbps - 100-150ft

3
New cards

802.11g/Wireless-G

2.4GHz - 54Mbps - 150ft

4
New cards

802.11ac/Wireless-AC

5GHz - 1.3Gbps

5
New cards

802.11n/Wireless-N

2.4GHz - 200+Mbps

6
New cards

2.4GHz

Frequency ranges of 802.11G/802.11B

7
New cards

5GHz

Frequency ranges of 802.11AC/802.11A

8
New cards

Application Layer

Layer 7 in the OSI model. Support for applications. Examples: HTTP, FTP, SMTP

9
New cards

Presentation Layer

Layer 6 in the OSI model. Protocol conversion, data translation. Examples: ASCII, JPEG

10
New cards

Session Layer

Layer 5 in the OSI model. Establishes, manages, and terminates sessions. Examples: NFS, SQL

11
New cards

Transport Layer

Layer 4 in the OSI model. Ensures error-free packets. Examples: TCP, UDP

12
New cards

Network Layer

Layer 3 in the OSI model. Provides routing decisions. Examples: IP, IPX

13
New cards

Data Link Layer

Layer 2 in the OSI model. Provides for the flow of data. Examples: MAC addresses.

14
New cards

Physical Layer

Layer 1 in the OSI model. Signals and media. Examples: NICs, twisted-pair cable, fiber.

15
New cards

OSI model

Application, Presentation, Session, Transport, Network, Data Link, Physical. (Please Do not Through Sasuage Pizza Away)

16
New cards

Application Layer (TCP/IP)

Defines the applications used to process requests and which ports and sockets are used

17
New cards

Transport Layer (TCP/IP)

Defines the type of connection established between hosts and how acknowledgements are sent

18
New cards

Internet Layer (TCP/IP)

Defines the protocols used for addressing and routing the data packets

19
New cards

Network interface Layer (TCP/IP)

Defines how the host connects to the network

20
New cards

The well-known ports

TCP/IP Ports 1-1023

21
New cards

Registered ports

TCP/IP Ports 1024-49,151

22
New cards

Private ports

TCP/IP Ports 49,152-65,535

23
New cards

Social Engineering

A process by which an intruder obtains enough information from people to gain access to the network

24
New cards

Password Cracking

An attack in which the attacker tries to guess the user's password

25
New cards

Dictionary Attack

An attack that uses known passwords and many variations (upper- and lowercase and combinations) to try to log in to an account

26
New cards

Brute-Force Attack

An attack in which the attacker uses every possible combination of characters to guess the password

27
New cards

Packet Sniffing

A technique in which the contents of data packets are watched

28
New cards

Man-in-the-Middle Attack/MITM

An attack in which an attacker can seamlessly place itself in the middle of a conversation between others in order to become the recipient of all information sent by victim computers

ARP Cache Poisoning

29
New cards

ARP Cache Poisoning Attack

An attack in which an attacker changes the MAC addresses of the ARP cache, or "poisons the ARP cache" of victims to the MAC address of the attacker so that conversations get redirected to the attacker

30
New cards

Evil Twin Attack

A situation in which a rogue wireless access point poses as a legitimate one by broadcasting a legitimate SSID and eavesdrops on the wireless network

31
New cards

Session Hijacking

Exploiting web session control by stealing a session cookie and using it to establish a session with a remote server that still thinks the session is valid

32
New cards

Buffer Overflow

A situation that occurs when a program tries to put more data into a buffer than it was configured to hold

33
New cards

Zero-Day Attack

An attack that exploits a software vulnerability that is unknown to the developer

34
New cards

Denial of Service Attack/DoS

An attack in which service is denied to a computer, network, or server

35
New cards

Permanent DOS Attack/PDoS

A malicious attack that aims to sabotage hardware and render it useless

36
New cards

14

Amount of channels implemented with 802.11 DSSS

37
New cards

3

Non overlapping 802.11 DSSS channels in america

38
New cards

10.X, 172.16.X-172.32.X, 192.168.X

Private Addresses Range

39
New cards

SAN

Block level storage

40
New cards

NAS

File level storage

41
New cards

HSM/Hardware Security Module

A hardware security module is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing

42
New cards

Wiretapping

This exploit actually breaches the physical medium or uses devices to monitor signals from outside the physical medium itself.

43
New cards

CAT 5e

Supports 1000Mbps transmission speeds at 100-meter segments. Bandwidth: 100MHz

44
New cards

CAT 5

Supports 100Mbps transmission speeds at 100-meter segments. Bandwidth: 100MHz

45
New cards

CAT 6

Supports 1000Mbps transmission speeds at 100-meter segments. Bandwidth: 250+MHz

46
New cards

CAT 6a

Supports 10Gbps transmission speeds at 100-meter segments. Bandwidth: 500+MHz

47
New cards

Proxy Server

This firewall feature can be used to authenticate users on behalf of another secure system