Chapter 11 Secure Network Architecture and Components
Domain 4 & 7
Written Lab
-
Name the layers of the OSI model and their numbers from top to bottom.
-
Layer 7: Application
-
Layer 6: Presentation
-
Layer 5: Session
-
Layer 4: Transport
-
Layer 3: Network
-
Layer 2: Data Link
-
Layer 1: Physical
-
-
Name three problems with cabling and the methods to counteract those issues.
- Attenuation (use repeaters or don't violate distance recommendations).
- Using the wrong category of cable (check the cable specifications against throughput requirements, and err on the side of caution).
- Interference (use cable shielding, use cables with higher twists per inch, or switch to fiber-optic cables).
- Eavesdropping (maintain physical security over all cable runs or switch to fiber-optic cables).
-
What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies?
Some of the frequency spectrum-use technologies are spread spectrum, Frequency Hopping Spread Spectrum (FHSS), Direct Sequence Spread Spectrum (DSSS), and Orthogonal Frequency-Division Multiplexing (OFDM).
-
Discuss methods used to secure 802.11 wireless networking.
p.531
-
Name eight Application-layer protocols and their ports (indicate whether the ports are TCP or UDP).
p.506