4 Network Flashcards

1
Q

protocols at layer 2

FRAMES

A
802.2 LLC
TokenRing
Ethernet
FDDI Fiber Distributed Data Interface
l2TP
PPP
PPTP
ARP
802.11 WLAN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

protocols at layer 2

FRAMES

A
802.2 LLC
TokenRing
Ethernet
FDDI Fiber Distributed Data Interface
l2TP
PPP
PPTP
ARP
802.11 WLAN
Frame Relay
PPP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

protocols at layer 4

SEGMENT

A

TCP
UDP
SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

protocols at layer 4

SEGMENT

A

TCP

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

protocols at layer 5

DATA

A
SSL/TLS
SQL
RPC
DNS
NFS
iSCI
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

protocols at layer 7

USER DATA

A
SNMP
SET
S-RPC
FTP
TFTP
SSH
IMAP
POP
HTTP
TELNET
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

firewall layers

A

GEN I stateless: Layer 3
GEN III stateful: Layer 5
GEN V: Application (Proxy): Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FCoE

A
Fibre Channel over Ethernet
Layer 3
encapsulates FC communications over Ethernet
payload of Layer 2
-> not location independent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

iSCI

A

Layer 5, based on TCP

Location independent file storage over LAN/Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MPLS

A

not limited to IP

saves time by using short path labels instead of long addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

802.11

A

wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

802.15

A

bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WEP

A

weak IV in clear text

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WPA

A

based on LEAP and TKIP (Key Integrity Protocol - weak). RC4
backward compatible
Radius support (Enterprise)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WPA2

802.11i

A

CCMP (Counter Mode CBC) based on AES-128
not backward compatible
Radius support (Enterprise)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.1X

A

port pased NAC (Layer 2)
includes EAP Framework
allows use of Radius, Tacacs

17
Q

types of EAP

A

LEAP: Cisco, weak

EAP-TLS: encapsulates EAP in TLS, uses PKI, client + server cert required, very secure but complex

EAP-TTLS: encapsulates EAP in TLS, only server cert, secure and less complex

PEAP: encapsulates EAP in TLS, like EAP-TTLS, only server cert, secure and less complex (RSA,Microsoft,Cisco)

18
Q

FDDI

Fibre Distributed Data Interface

A

token with two rings

before Ethernet

19
Q

802.3

A

Ethernet

20
Q

Email-Sec

A

S/MIME - offers CIA
PKI

MOSS - offers CIA + nonrep
MD5,RSA,DES
PKI

PEM - offers CIA + nonrep
RSA,DES,X.509
PKI

PGP - offers CIA + nonrep
IDEA,RSA, Web of trust, independently

21
Q

PPP authentication

A

CHAP - use this!
offers encryption, authentication, reauthentication

PAP -. weak!
user/pw in cleartext, no encryption

22
Q

SWIPE

A

Software IP Encryption
Layer 3
offers CIA

23
Q

SSL

Secure Socket Layer

A
offers CI
replaced by TLS
Layer 4
128Bit key
SSL-VPNs easier to use than IPSEC, no privileges required, easy to firewall
24
Q

SSL

Secure Socket Layer

A
offers CI
replaced by TLS
Layer 5
128Bit key
SSL-VPNs easier to use than IPSEC, no privileges required, easy to firewall
25
Q

TLS

Transport Layer Security

A

Layer 5
two way authentication using certificates
used by OpenVPN, easy

26
Q

Radius

A

encrypts only PW
combines authentication and authorization
based on UDP 1645/1646 OR 1812/1813

27
Q

TACACS+

A

supports two factor auth
encrypt entire payload
separates authentication and authorization
based on TCP 49

28
Q

VPNa

A

PPTP - weak - no native encryption

l2F - weak - no native encryption

L2TP - ok - no native encryption, Tacacs + Radius possible

IPSEC - safe - native encryption - multiple simultaneous connections possible

29
Q

virtual circuit

A

logical pathway over siwtched network
PVC - permanent
SVC - startet when needed

30
Q

VoIP attacks

A

caller ID spoofing
vishing
SPIT Spam over IP-Telephony
switch hopping

31
Q

Network attacks

A

Smurf: uses ICMP-directed broadcast with faked sender IP on Layer 3 —> block distributed broadcasts on routers!

Fraggle: similar to Smurf, but UPD Layer 4

Land: source and dest in packet are equal —> circular

Ping of death: ping that violates MTU

Tear drop: sending malformed packet, the system cannot reassemble (Layer 3)

Ping Flooding: overwhelming a system with lots of pings

32
Q

Network attacks

A

Smurf: uses ICMP-directed broadcast with faked sender IP on Layer 3 —> block distributed broadcasts on routers!

Fraggle: similar to Smurf, but UPD Layer 4

Land: source and dest in packet are equal —> circular

Ping of death: ping that violates MTU

Tear drop: sending malformed packet, the system cannot reassemble (Layer 3)

Loki: ICMP-tunneling

Ping Flooding: overwhelming a system with lots of pings

33
Q

SSH

A
includes SFTP (SSH FTP) and SCP
Port 22
34
Q

Frame Relay

A

Layer 2 WAN
no error recovery
multiplexes multiple logical connections over single physical -> virtual circuit

PVC/SVC

35
Q

DNP3

A

open standard offering interoperability between SCADA and mart grid apps
multilayer, carried over IP
PKI

36
Q

SRTP

A

Secure Real Time Transport for VoIP
AES, SHA1
offers CIA

37
Q

PPP

A

Layer 2
provides confidentiality, integrity, authentication
uses CHAP

38
Q

Remote Desktop

A

VNC:5900
RDP:3389

39
Q

802.5

A

Token Ring