MIS 460 FINAL EXAM Study Guide
MIS 460 FINAL EXAM Study Guide
Exam 1:
Be able to match the OSI layer number with its name. Describe the function of each of
the 7 layers and what devices operate at each layer, if any.
Understand what data are called at each layer of the OSI model.
- Application
- Presentation
- Session
- Transport - Segments
- Network - Packets
- Data Link - Frames
- Physical - Bits
- Segment
- Datagram
- Packet
- Frame
- Bits
Understand differences between switches, routers, and hubs, and indicate the layer at
which they operate and why.
- Switch: connect computers == in the data link layer == bc they utilize MAC addresses in
network cards to communicate
- Routers: connect networks == in the Networking layer == because they use packets
- Hub operates at physical layer == only understands binary
- The primary advantage of IPv6 compared to IPv4 is support for more IP addresses
Be able to identify the masking portion of a subnet (both decimal and binary).
Identify the host ID and network ID portion of an IP address given its subnet mask.
-
Be able to identify IPv4 address classes and their default subnet masks.
Be able to explain a port, identify the common port numbers used (not the huge list), and
the protocols that use those ports.
Be able to explain the difference between UDP and TCP, including the data terms for each.
Describe and explain NAT, why it’s useful and how it works.
Exam 2:
- Hashing is a one way process that is nonreversible and is used for secure
storage of data or passwords
- Encryption: Is a way of encrypting plain text that can then be reversed to the
original message, used for transferring credit card info or communication
Backups - Full, Differential, and Incremental
- An Attacker sends a SYN Request and the server responds with a SYN-ACK. The
Attacker never sends their ACK. This is a Ddos attack as the attacker sends so
many unclosed SYN that the server becomes exhausted and can not operate.
- Demilitarized zone is an area behind one firewall but with more firewalls behind
it so it has some protection but not as much. You do not want FTP HTTP inside
your company but in the DMZ area
- Mantrap: is an entry to a building where two or more locking doors are present it
acts as a buffer for between an untrusted area and a trusted area.
- Key card Access: Requirement of an electronic card system to allow entry into
an area. Tracks who enters a building and only one person present at a time.
- Biometrics: Use a unique physical characteristic to verify identity. Highly secure
but a more capital intensive security.
- Job Rotation: Having other employees be able to and take over the role of a
fellow employee for a period of time. Creates security that company is not
dependent on any one employee and creates accountability
- Separation of Duties: Requiring multiple employees to be involved in the process
of one action like writing a check.
• Symmetric vs Asymmetric algorithms (why use one vs. the other, how they
differ)
o symmetric - uses the same key for encryption and decryption; faster but
more risk
o asymmetric - public key for encryption and public key for decryption; slower
but better security
• How to mitigate SQL injection attacks
o input validation: sanitizing user inputs to remove malicious code:
parameterized queries: using placeholders to separate data from commands
o least privilege: limiting database user accounts to only the necessary
permissions
• How to use the Vigenere cipher
• Describe the importance of the port ranges and how they are typically used
o Below 1024 - essential network functions
o 1024-49151 - registered (loosely) ports.
o 49152-65535 - cannot be registered and are generally designated for private
use
• Differentiate MTTF from MTBF from MTTR
o 1. Mean Time To Failure: average time before a non-repairable device fails:
Hard Drive Disk
o 2. Mean Time Between Failures: average time between failures of a
repairable device: phone battery
o 3. Mean Time To Recover/Repair: average time take to restore or replace a
failed system: average time for a screen repair is 1 hour
• Differentiate IDS’s from IPS’s
o Intrusion Detection System: passively monitors network traffic for suspicious
activity, alerting administrators
o Intrusion Prevention System: actively monitors traffic and takes action to
block or mitigate threats in real-time
• Describe when to use MTTF vs MTBF
o MTBF when items can be repaired, MTTF when items cannot be repaired
• Differentiate RTO from RPO 1. Recovery Time Objective - Maximum amount of
time allowed to restore a system after an outage 2. Recovery Point Objective:
point and time where data loss is acceptable (how far back is your backup
required to be)
• Understand how to calculate MTTR (what are the components that comprise
MTTR) Something you have, something you are,
o MTTR: detection + diagnosis + repair + verification
o MTTR = Total Downtime / Number of Incidents
- A machine used in world war 2 to encrypt and decrypt messages. Had multiple
rotors with 26 positions and a plugboard that allowed for swapping individual
letters. Used to Encrypts messages by Germany in WW2
• Identify hashes
Firewall Rules
Firewall Throughput
- The maximum amount of data a fire wall can handle at a time. Firewalls must be
able to handle a lot of data so there are no significant latency issues.
- Provides a DMZ where you can isolate the public facing servers behind one wall
but an internal system protected by a second fire wall
- Secure remote connections by encrypting traffic between remote users and the
network.
- Site-to-Site VPN: Secures communication between two networks.
- Client-to-Site VPN: Allows remote users to connect securely to the network
- Ingress: Traffic entering; rules applied protect the internal from the external
- Egress: Traffic leaving the network; rules applied to prevent the internal from
accessing dangerous external content
- The firewall drops traffic from a specific IP address or ranges without responding
effectively making the source disappear to the attacker
- Prevents a DDoS attack by dropping malicious traffic
- It directs traffic to a null orute or unreachable destination.
Exam 3: