Domain 4: Communication and Network Security Flashcards

1
Q

Personal Area Network or PAN

A

• Typically, a range of 100 meters or much less
• Low-power wireless technologies such as Bluetooth use PANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Local Area Network or LAN

A

• A comparatively small network
• Typically confined to a building or an area within one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Metropolitan Area Network or MAN

A

Typically confined to a city, a zip code, a campus, or office park

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wide Area Network or WAN

A

Typically covering cities, states, or countries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Global Area Network or GAN

A

A global collection of WANs, also called the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Demilitarized Zone or DMZ

A

A partially controlled area between the internet and a fully protected intranet
• Used when a section of your intranet is public-facing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Packet-Switched Networks

A

• Instead of using dedicated circuits, data is broken into packets, each sent individually
• If multiple routes are available between two points on a network, packet switching can choose the best route, and fall back to secondary routes in case of failure
• Packets may take any path (and different paths) across a network, and are then reassembled by the receiving node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OSI Model

A

1 - Phyiscal
2 - Data Link
3 - Network
4 - Transport
5 - Session
6 - Presentation
7 - Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OSI Layer 1

A

Physical
• Describes units of data such as bits represented by energy (such as light, electricity, or radio waves) and the medium used to carry them (such as copper or fiber optic cables)
• Cabling standards such as Thinnet, Thicknet, and Unshielded Twisted Pair (UTP) exist at layer 1, among many others
• Layer 1 devices include hubs and repeaters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OSI Layer 2

A

Data Link
• Handles access to the physical layer as well as local area network communication
• An Ethernet card and its MAC (Media Access Control) address are at Layer 2, as are switches and bridges.
• Divided into two sub-layers:
• - Media Access Control (MAC) - transfers data to and from the physical layer - touches Layer 1
• - - 12-digit long number – prefix or first 6 assigned to
manufacturers by IEEE, second half represent serial number
• - Logical Link Control (LLC) -handles LAN communications - touches Layer 3
• - - Facilitates node-to-node flow control and error management (ARQ – Automatic Repeat Request)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OSI Layer 3

A

Network
• Describes routing: moving data from a system on one LAN to a system on another
• IP addresses and routers
• Protocols include BGP, RIP, IPv4, IPv6, ICMP, and OSPF among others.
• Fragmentation – the subdivision of a packet into a manageable or allowable size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Border Gateway Protocol or BGP

A

• Autonomous System (AS) is a large network or group of networks managed or controlled by a single entity or organization
• BGP is a path-vector routing protocol used between separate ASs; external BGP (eBGP) used between ASs (eg. ISPs), internal BGP (iBGP) used within a single autonomous system
• Chooses the shortest path through the internet by navigating the least number of ASs along the route;
• Routing Information Base (RIB) stores multiple paths across the internet, and can silently update/remove routes without notifying peers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Internet Control Message Protocol (ICMP)

A

• 3 field that distinguish the type and code of the ICMP packet and those values never change in transit.
• Uses include manual troubleshooting (ping utility), network diagnostics (traceroute utility) and system-generated error messages during IP transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OSI Layer 4

A

Transport
• Handles packet sequencing, flow control, and error detection
• TCP and UDP are Layer 4 protocols
• Resending or re-sequencing packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OSI Layer 5

A

Session
• Manages sessions, providing maintenance on connections
• Remote Procedure Calls (RPCs)
• A good way to remember the session layer’s function is
“connections between applications”
• Simplex, half-duplex, and full-duplex communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OSI Layer 6

A

Presentation
• Presents data to the application (and user) in a comprehensible way
• Concepts include data conversion, characters sets such as ASCII, and image formats such as GIF (Graphics Interchange Format), JPEG (Joint Photographic Experts Group), and TIFF (Tagged Image File Format)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OSI Layer 7

A

Application
• Where you interface with your computer application
• Web browser, word processor, and instant messaging clients exist at Layer 7
• Protocols Telnet and FTP

18
Q

TCP/IP Model

A

1 - Network Access Layer
2 - Internet Layer
3 - Transport Layer
4 - Application Layer

19
Q

TCP/IP Layer 1

A

• Combines layers 1 (Physical) and 2 (Data Link) of the OSI model
• Describes Layer 1 issues such as energy, bits, and the medium used to carry them (copper, fiber, wireless, etc.)
• Also describes Layer 2 issues such as converting bits into
protocol units such as Ethernet frames, MAC (Media Access Control) addresses, and Network Interface Cards (NICs)

20
Q

TCP/IP Layer 2

A

Internet Layer
• Aligns with the Layer 3 (Network) layer of the OSI model
• IP addresses and routing
• IPv4, IPv6, ICMP, and routing protocols (among others)
• IP (Internet Protocol) governs the Internet layer. (All packets go through IP!

21
Q

The TCP Handshake

A

• Exchange of these four flags is performed in three steps: SYN, SYN-ACK, ACK
• The client chooses an initial sequence number, set in the first SYN packet
• The server also chooses its own initial sequence number, set in the SYN/ACK packet
• Each side acknowledges each other’s sequence number by incrementing it: this is the acknowledgement number
• Once a connection is established, ACKs typically follow for each segment
• The connection will eventually end with a RST (reset or tear down the connection) or FIN (gracefully end the connection)

22
Q

User Datagram Protocol (UDP)

A

• A simpler and faster cousin to TCP with no handshake, session, or reliability
• Has a simpler and shorter 8-byte header
• Fields include:
• Source IP
• Destination IP
• Packet length (header and data)
• Simple (and optional) checksum - if used, the checksum provides limited integrity to the UDP header and data
• Operates at Layer 4

23
Q

TCP/IP Layer 3

A

Host-to-host or Transport Layer same as OSI Layer 4 (Transport)
• Sometimes called either “Host-to-Host” or, more commonly, “Transport” alone
• Connects the Internet Layer to the Application Layer
• Where applications are addressed on a network, via ports
• TCP and UDP are the two Transport Layer protocols

24
Q

TCP/IP Layer 4

A

Application Layer
• Combines Layers 5 though 7 (Session, Presentation, and
Application) of the OSI mode
• Most of these protocols use a client-server architecture, where a client (such as ssh) connects to a listening server (called a daemon on UNIX systems) such as sshd
• Protocols include SSH, Telnet and FTP, among many others

25
Q

Encapsulation (Networking)

A

• Takes information from a higher layer and adds a header to it, treating the higher layer information as data
• “One layer’s header is another layer’s data.”

26
Q

MAC Addresses

A

• Unique hardware address of an Ethernet network interface card (NIC)
• Typically, “burned in” at the factory
• Two halves: the first 24 bits form the Organizationally Unique Identifier (OUI). Last 24 bits form a serial number (formally called an extension identifier)

27
Q

Firewall Types

A

o Static packet filtering firewall: “screening router”, very fast, simple, easiest to bypass/least secure.
o Application-level firewall: “gateway” or “proxy”; slow, complex, very secure.
o Stateful inspection firewall: Like a static packet filtering firewall but maintains “state”. Fast, harder to bypass, doesn’t see data.
o Circuit-level firewall: Operates like a stateful inspection firewall. No data inspection, semi-proxy (traffic appears as though it comes from the gateway).

28
Q

Repeaters, Concentrators, and Amplifiers

A
  • Operate at the Physical Layer (Layer 1) and connect two networks of the same kind together. Same collision domain, collision domains are segmented at Layer 2 (coming up). A hub is a multiport repeater and a security risk.
  • NO traffic filtering, what comes in one port goes out the other(s).
  • No more than four repeaters in a row (RoT), 5-4-3 rule (5 segments, 4 repeaters, 3 have additional connections.
29
Q

Bridges and Switches

A

Operate at the Data Link Layer (Layer 2) and connect two networks of the same protocol together, can connect different physical types & speeds. A switch is a multiport bridge.
o Repeat/regenerate the signal (takes care of attenuation).
o Filters traffic based on MAC address (aka physical address).
o Breaks the collision domain, but broadcast domain remains (Layer 3).

30
Q

Switches

A

Operate a Layer 2 and there are NO ROUTING capabilities. Switches can segment networks using VLANs but cannot route between VLANs without a router. VLANs are created by “tagging” ports in the switch.

31
Q

Routers

A

Operate at the Network Layer (Layer 3) and connect two networks of the same protocol together, can connect different physical types, speeds, and layer 2 technologies (Ethernet, Token Ring, etc.).
o Repeat/regenerate the signal (takes care of attenuation).
o Filters traffic based on IP address (aka logical address).
o Breaks the collision domain and the broadcast domain.
o Determines the best route (path) through a network. Routing table built manually or with a routing protocol (BGP, OSPF, IGRP, EIGRP, RIP, etc.)

32
Q

Gateways

A

Can operate at all Layers (1 – 7) and connect two networks of different protocols together. Also called “protocol translators”.
o Repeat/regenerate the signal (takes care of attenuation).
o Many types, including data, mail, application, internet, etc.
o Breaks the collision domain and the broadcast domain.

33
Q

Static packet filtering firewall

A
  • “screening router”, very fast, simple
  • easiest to bypass/least secure.
  • Sits between OSI Layer 3 and 4 (Network & Transport)
34
Q

Application-level firewall

A

“gateway” or “proxy”; slow, complex, very secure
- Operates at Layer 7 (Application) of OSI

35
Q

Stateful inspection firewall

A
  • Like a static packet filtering firewall but maintains “state”.
  • Fast, harder to bypass, doesn’t see data
  • Sits between OSI layer 3 & 4 (Network & Transport)
36
Q

Circuit-level firewall

A
  • Operates like a stateful inspection firewall.
  • No data inspection, semi-proxy (traffic appears as though it comes from the gateway).
  • Operates at Layer 5 (Session)
37
Q

Proxies

A
  • A type of gateway that does not translate protocols
  • Operates at all 7 layers
  • Acts on behalf of host/s
  • Network Address Translation (NAT) server that breaks the collision and broadcast domains.
38
Q

Secure Multipurpose Internet Mail Extensions (S/MIME)

A

Used for sending digitally signed and encrypted messages. Uses public key encryption and digital signatures to enable authentication and confidentiality for emails. X.509 digital certificates are used to provide authentication.
Two types of messages:
o Signed messages: To provide integrity, sender authentication, and nonrepudiation of the sender
o Enveloped messages: To provide integrity, sender authentication, and confidentiality

39
Q

Remote Authentication Dial-In User Service or “RADIUS”

A

o A RADIUS Client (or Network Access Server) is a networking device (like a VPN concentrator, router, switch) that is used to authenticate users.
o A RADIUS Server is a background process that runs on a UNIX or Windows server. It lets you maintain user profiles in a central database. Hence, if you have a RADIUS Server, you have control over who can connect with your network

40
Q

Diameter Protocol

A

Evolved from RADIUS.
Uses TCP/SCTP and it is reliable.