100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
GSEC_ can _be_ test Questions and Answers Latest Updated 2024 $18.49   Add to cart

Exam (elaborations)

GSEC_ can _be_ test Questions and Answers Latest Updated 2024

 2 views  0 purchase
  • Course
  • GFACT
  • Institution
  • GFACT

Exam of 111 pages for the course GFACT at GFACT (GSEC_ can _be_ test)

Preview 4 out of 111  pages

  • November 3, 2024
  • 111
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • GFACT
  • GFACT
avatar-seller
julianah420
GSEC_ can _be_ test

What are the layers of the OSI Model from top to bottom? - answer Application,
Presentation, Session, Transport, Network, Data Link and Physical

What are the layers of the TCP/IP Model from top to bottom? - answer Application,
Transport, Internet and Link Layer

What is the address space used for loopback addressing? - answer127.0.0.0 -
127.255.255.255

What is the address space used when a DHCP server is not available? -
answer169.254.0.1 - 169.254.255.255

What are the private IP ranges? - answer10.0.0.0 - 10.255.255.255, 172.16.0.0 -
172.31.255.255, 192.168.0.0 - 192.168.255.255

What protocols are used in the Data Link Layer? - answer Ethernet, Point to Point
Protocol (PPP) and ADCCP (Advanced Data Communication Control Protocol)

What protocols is utilized in the Network Layer? - answer Internet Protocol (IP)

What protocols are utilized in the Transport Layer? – answer UDP and TCP

What protocols are utilized on the Session Layer? - answer NetBIOS

What types of formats are used at the presentation layer? – answer XML and JPEG

What layer of the OSI model does encrypting and decrypting take place? - answer
Presentation Layer

What protocols are utilized at the Application Layer? – answer SMTP, IMAP, POP, NTP
and HTTP

What protocols are utilized inside the Link Layer? - answer Ethernet

What layers does the Link layer correspond to in the OSI Model? - answer Physical and
Data Link

What protocols are utilized inside the Internet layer? - answerInternet Protocol (IP)

,What protocols are utilized inside the Transport layer of the TCP/IP Model?? -
answerTCP and UDP

What protocols are utilized within the Application Layer of the TCP/IP model? -
answerTelnet, Simple Network Management Protocol (SNMP), HTML, LDAP, FTP, SSH

What layers of the OSI Model comprise the TCP/IP layers Application Layer? -
answerSession, Presentation and Application

What protocol is a support protocol within the TCP/IP Suite? - answerInternet Control
Message Protocol (ICMP)

What range is the Class A IP Range? - answer0.0.0.0-127.255.255.255

What range is the Class B IP Range? - answer128.0.0.0-191.255.255.255

What range is the Class C IP Range? - answer192.0.0.0-223.255.255.255

What range is the Class D IP Range? - answer224.0.0.0-239.255.255.255

What range is the Class E IP Range? - answer240.0.0.0 - 254.255.255.255

Name some physical network topologies. - answerBus, Star, Rings, Star-Bus Hybrid,
Mesh

What network model uses a lot of cable because you need to use home runs back to
the switch or hub? - answerStar

In general peer-to-peer networks are often? - answerMesh Networks

TOR is a peer-to-peer network that provides anonymity for its users by doing what? -
answerMasking the original source IP address from the destination

What makes a Full Mesh topology different than a Mesh topology? - answerA full mesh
topology does not have have nodes that are minimally connected to the rest of the
network. In a full mesh topology every node is connected to every other node

A Token Ring network topology makes use of what device to make the network behave
like a ring in spite of being labeled like a star? - answerMultistation Access Unit (MAU)

What device allows messages to move around on layer 2 of the OSI model? -
answerSwitch

What messages are limited to the local area network only and would never be used to
look up information outside of the local network? - answerARP

,What "transfer mode" is utilized primarily in large-scale networks to facilitate getting
messages to destination quickly? - answerAsynchronous Transfer Mode (ATM)

What are the two types of virtual circuits? - answerPermanent Virtual Circuit (PVC) and
Switched Virtual Circuit (SVC)

What makes PVC's different than SVC's? - answerPermanent Virtual Circuits (PVC's)
are permanent and need to be configure manually, while Switched Virtual Circuits
(SVC's) are dynamic in nature and a device in the network would have to request one to
be configured

How do switches make packet sniffing harder? - answerYou cannot plug into a switch
port and see all of the traffic passing through it like you can on a hub

What does the CIA triad stand for? - answerConfidentiality, Integrity and Availability

This router is often used to do a broad level of filtering of traffic that just shouldn't be
hitting your network, like that sourced from private addresses. - answerBorder Router

What does a router base its routing decisions off of? - answerDestination IP Address
aka the Destination Address in the network or the layer 3 header

A first match firewall will perform the action specified based on what? - answerThe rule
that is matched first

A best match firewall will perform the action specified based on what? - answerIt will
find the best or most specific match in the rules to perform its action

What two modes does the File Transfer Protocol utilize? - answerActive and Passive

A firewall that does deep packet inspection is consider to be? - answerProtocol Aware

What are examples of Application Layer Gateways? - answerProxy Server or Web
Proxy

Firewalls often perform what function? - answerNetwork Address Translation (NAT)

What are some protocols Network Address Translation (NAT) can cause problems for?
- answerVoIP protocols like SIP and FTP

What is a true positive? - answerAn alert that happens that is real and accurate

What is a True negative? - answerA case where an alert didn't get triggered because
nothing happened

, What is a False Positive? - answerA case where an alert happens that isn't real or
accurate

What is a False Negative? - answerA case where an alert didn't happen but an intrusion
did happen

IDS's cannot detect any malicious behavior on encrypted traffic without sitting in the
middle of what? - answerEncryption Session

What can cause problems for intrusion detection systems (IDS)? - answerCompression
and Encryption

You are implementing a star topology on your local network. What cabling are you most
likely to use? - answerFiber Optic

When you are deploying an intrusion prevention system on your network, what is the
most important criterion? - answerLow Latency

Your IDS sends an alert about an incident on your network. The alert indicated that
there was a packet that had the same source and destination. This might normally
indicate an attempt at a Land attack, which is a very old attack. After investigating, you
see that the source address is 0.0.0.0 and the destination is 224.0.0.1. What would you
consider this alert to be? - answerFalse Positive

You have been asked to implement a security solution on your network to protect
against employees browsing facebook during the work day. What would you
implement? - answerProxy Server

You are seeing a lot of ARP responses with no corresponding ARP request. What are
you most likely seeing? - answerARP Spoofing

You would implement an intrusion detection system to perform the following: -
answerDetect Intrusions

A border router would implement the following security control? - answerAccess control
lists to block broad categories of traffic

This type of routing protocol uses the same algorithm as the navigation system in your
car. - answerDistance vector

A good example of a network using a mesh topology is? - answerThe internet

These can be challenges for intrusion detection systems? - answerCompression and
Encryption

Authentication is the act of? - answerProving you are who you say you are

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $18.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

85169 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$18.49
  • (0)
  Add to cart