3 - Network- & Transport-Layer Security (Scanning) Flashcards

1
Q

What are the tasks of the Network Layer?

A
  • Forwarding packets from the sender to the intended receiver(s)
  • Addressing (IP)
  • Routing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the tasks of the Transport Layer?

A
  • End-to-end communication services (Reliability, Flow Control, Congestion Control, …)
  • Connection-less and connection-oriented communication
  • Port Multiplexing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain IP.

A

32-bit address used to identify a host in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain ARP.

A

Address Resolution Protocol converts and IP address to a MAC address to communicate in a local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain ICMP.

A

Internet Control Message Protocol is used to communicate network-level information, such as error reporting, network status, ping, etc…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Differentiate TCP and UDP.

A

Transmission Control Protocol offers reliable conection-oriented data transfer.

User Datagram Protocol offers unreliable conection-less data transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to perform scanning of a local network?

A

Using ping or nmap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does nmap works?

A

Nmap tries to connect to ports for each target IP address. It resets the connection before the OS report the failed connection setup to the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the general rule for mitigation of scanning?

A

General rule: never respond to echo protocols (such as ping).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is port knocking? Explain.

A

Port knocking is a mitigation technique for scanning. It consists of the client sending a secret sequence to the server to open a port and accept one incoming connection. The secret can be enconded in port sequence, packet payload or inter-arrival time of packets (not practical).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is port knocking implemented and why is it dangerous?

A

It is usually implemented as a application-layer daemon and it poses a risk because creates a single point of failure (in the case of the daemon crashing, the whole server is unreachable).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly