Skip to content

Chapter 11 Secure Network Architecture and Components

Domain 4 & 7

Written Lab

  1. Name the layers of the OSI model and their numbers from top to bottom.

    • Layer 7: Application

    • Layer 6: Presentation

    • Layer 5: Session

    • Layer 4: Transport

    • Layer 3: Network

    • Layer 2: Data Link

    • Layer 1: Physical

  2. Name three problems with cabling and the methods to counteract those issues.

    • Attenuation (use repeaters or don't violate distance recommendations).
    • Using the wrong category of cable (check the cable specifications against throughput requirements, and err on the side of caution).
    • Interference (use cable shielding, use cables with higher twists per inch, or switch to fiber-optic cables).
    • Eavesdropping (maintain physical security over all cable runs or switch to fiber-optic cables).
  3. What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies?

    Some of the frequency spectrum-use technologies are spread spectrum, Frequency Hopping Spread Spectrum (FHSS), Direct Sequence Spread Spectrum (DSSS), and Orthogonal Frequency-Division Multiplexing (OFDM).

  4. Discuss methods used to secure 802.11 wireless networking.

    p.531

  5. Name eight Application-layer protocols and their ports (indicate whether the ports are TCP or UDP).

    p.506