WGU D315 Network and Security Foundation 4.7 (3 reviews) Students also studied Terms in this set (70) Western Governors UniversityD 426 Save
WGU D315 - PRE-ASSESSMENT: NET...
205 terms Mira_PakPreview Network and Security- Foundations...162 terms MsSerenity92 Preview WGU C172 Network and Security - F...233 terms kamerasheree Preview
D315 PA
189 term Pla Practice questions for this set Learn1 / 7Study using Learn Network Typology Hybrid Which OSI layer is related to the IP protocolNetwork 3 Which OSI layer is organizing the bits over the physical layer between devices in the same collision domain?Data Link 2 - They are in the same Frame Choose an answer 1 Single Network Typology across the network 2 Uniform Network Typology throughout the network 3Isolated Network Typologies4 Multiple Network Typology within the network Don't know?
Which OSI layer is a Switch at?Data Link 2 Which OSI layer is a WAP (Wireless Access Point) at? Data Link 2 Which OSI layer is a router atNetwork (3) TCP protocol is on what OSI layerTransport (4) OSI layer 1Physical Layer (Cable, Hubs, Repeaters) OSI layer 2Data Link Layer (Frame, Switch, PPP, Ethernet) OSI layer 3Network Layer (Moves packets, IP) OSI layer 4Transport Layer (TCP, end to end connection) OSI Layer 5Session Layer (API, Sockets, Synch and send to port) OSI layer 6Presentation layer (Syntax and encryption layer, SSL, SSH, JPEG) OSI layer 7Application layer (end user layer, http, applications) Network Typology point to pointTwo devices connect directly Network Typology busAll devices connect to a central main line Network Typology RingAll devices have two connections and form an endless ring Network Typology StarAll devices connect to a central point Network Typology TreeMultiple devices connect together (on a switch) and then the switches are connected with each other Network Typology MeshAll devices connect directly to each other Network Typology HybridMultiple Network Typology within the network Cloud - where do I manage the OS Iaas or Paas? Iaas What do I manage on Paas (2)Application and Data Name the 3 CIA triadesIntegrity, Availability and Confidentiality What is the CIA Triade Integrity?Detects alteration in storage, transit and process What is the CIA Triade Availability?Ensure Authorized Access, Performance and Backup Keeping unauthorized users out is not in this triade.
What is the CIA Triade Confidentiality?Protect from unauthorized access and use, protecting data access in storage, transit and process 100m long Cat 5 cable supports speeds up to100 Mb/s 100m long Cat 5e cable supports speeds up to1000 Mb/s or 1 Gb/s 100m long Cat 6 cable supports speeds up to10 Gb/s 100m long Cat 6a cable supports speeds up to10 Gb/s Does a firewall provide two way protection?Yes, it protects ingress and egress data Firewall that only checks the address labelPacket Filter On what OSI level is a Packet Filter operatingTransport (checks TCP/UDP prot numbers) and Network (checks source and destination IP) What is a circuit level gatewayA firewall that conceals the true identity of the protected network (hides IP) on the transport (4) layer What does state in stateful mean?It refers to the connection state between two computers Why do we need the 5th layer on a Stateful Inspection In this connection, the firewall is creating temporary rules per session to permit communication (TCP) back to the sender.What is a stateful inspectionIt reduces the amount of firewall rules. Firewall vendors implemented a feature that only needs one rule to allow the initial communication.How do we protect the application level with a firewall With a proxy server, Middle man or Layer 7 firewall Can a packet filter firewall scan the packet content? No, a layer 7 or proxy is needed What is a IDSIntrusion Detection system. A system for detecting attempting intrusion. Related to intrusion prevention systems (IPS) that block suspected attacks What is IPSIntrusion Prevention System that can block traffic if a malicious anomaly is detected Cyber Attack - RansomwareEncrypts data. Attacker sells the key. Prevent with Virus scanner Cyber Attack - Man in the MiddleEaves dropping. The data flows thru the middle man. The attacker can stop/change the data Cyber Attack - Zero Day exploitNew unheard vulnerability. Needs to be patched
Cyber Attack - DNS tunnelingAn attacker creates a bad server and connects it to the attacked domain name system. If now a request comes to the attacked server, the attacker can tunnel into the client and since dns connections are rarely monitored, the attacker stays hidden.Cyber Attack - XXS attackCross Site Scripting uses a web form to inject malicious code.Cyber Attack - Social engineeringConvince someone to give a you access to sensitive information Cyber Attack - DoS and DDosDenial of Service attacks flood a server with too much traffic Cyber Attack - SQL InjectionA technique to add a string of sql code to a query to gain access to the targeted database Cyber Attack - ARP Poisoning / ARP SpoofingLAN attack that sends malicious Address Resolution Protocol packets to a default gateway in order to change the IP to MAC pairings Cyber Attack - PhishingMalicious link that often spoofs a valid site Cyber Attack - MalwareSoftware that is designed to disrupt, steal and open backdoors.VirusSoftware that can replicate itself. Can't be controlled remotely. Main goal is to modify information WormSoftware that can replicate itself and can be controlled remotely. Main goal is to eat system resources Trojan HorseMalicious software inside desirable software. Can not replicate but can be controlled remotely. Main goal is to steal information What is AES 256Advanced Encryption Standard with a symmetric key used in most enterprise applications (i.e. banking). Fastest encryption method What is SSLSecure Sockets Layer encryption with an asymmetric key. Formerly used in https, but now replaced by TSL What is TSLTransport layer security, an asymmetric key that replaced SSL. used in https What is IPsecInternet Protocol Security used to encrypt data in flight with an asymmetric key commonly used in VPN's Where are public keys usedAsymmetric encryption uses public and private keys Private CloudSingle Tenant use. Often in one data center and the owner holds the responsibility Public CloudAWS or MS Azure that offer multiple solutions. Data owner often does not know where the data is stored (building, rack, disk) Hybrid CloudMix of different clouds