4 Network Flashcards

1
Q

protocols at layer 2

FRAMES

A
802.2 LLC
TokenRing
Ethernet
FDDI Fiber Distributed Data Interface
l2TP
PPP
PPTP
ARP
802.11 WLAN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

protocols at layer 2

FRAMES

A
802.2 LLC
TokenRing
Ethernet
FDDI Fiber Distributed Data Interface
l2TP
PPP
PPTP
ARP
802.11 WLAN
Frame Relay
PPP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

protocols at layer 4

SEGMENT

A

TCP
UDP
SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

protocols at layer 4

SEGMENT

A

TCP

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

protocols at layer 5

DATA

A
SSL/TLS
SQL
RPC
DNS
NFS
iSCI
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

protocols at layer 7

USER DATA

A
SNMP
SET
S-RPC
FTP
TFTP
SSH
IMAP
POP
HTTP
TELNET
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

firewall layers

A

GEN I stateless: Layer 3
GEN III stateful: Layer 5
GEN V: Application (Proxy): Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FCoE

A
Fibre Channel over Ethernet
Layer 3
encapsulates FC communications over Ethernet
payload of Layer 2
-> not location independent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

iSCI

A

Layer 5, based on TCP

Location independent file storage over LAN/Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MPLS

A

not limited to IP

saves time by using short path labels instead of long addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

802.11

A

wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

802.15

A

bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WEP

A

weak IV in clear text

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WPA

A

based on LEAP and TKIP (Key Integrity Protocol - weak). RC4
backward compatible
Radius support (Enterprise)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WPA2

802.11i

A

CCMP (Counter Mode CBC) based on AES-128
not backward compatible
Radius support (Enterprise)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.1X

A

port pased NAC (Layer 2)
includes EAP Framework
allows use of Radius, Tacacs

17
Q

types of EAP

A

LEAP: Cisco, weak

EAP-TLS: encapsulates EAP in TLS, uses PKI, client + server cert required, very secure but complex

EAP-TTLS: encapsulates EAP in TLS, only server cert, secure and less complex

PEAP: encapsulates EAP in TLS, like EAP-TTLS, only server cert, secure and less complex (RSA,Microsoft,Cisco)

18
Q

FDDI

Fibre Distributed Data Interface

A

token with two rings

before Ethernet

19
Q

802.3

20
Q

Email-Sec

A

S/MIME - offers CIA
PKI

MOSS - offers CIA + nonrep
MD5,RSA,DES
PKI

PEM - offers CIA + nonrep
RSA,DES,X.509
PKI

PGP - offers CIA + nonrep
IDEA,RSA, Web of trust, independently

21
Q

PPP authentication

A

CHAP - use this!
offers encryption, authentication, reauthentication

PAP -. weak!
user/pw in cleartext, no encryption

22
Q

SWIPE

A

Software IP Encryption
Layer 3
offers CIA

23
Q

SSL

Secure Socket Layer

A
offers CI
replaced by TLS
Layer 4
128Bit key
SSL-VPNs easier to use than IPSEC, no privileges required, easy to firewall
24
Q

SSL

Secure Socket Layer

A
offers CI
replaced by TLS
Layer 5
128Bit key
SSL-VPNs easier to use than IPSEC, no privileges required, easy to firewall
25
TLS | Transport Layer Security
Layer 5 two way authentication using certificates used by OpenVPN, easy
26
Radius
encrypts only PW combines authentication and authorization based on UDP 1645/1646 OR 1812/1813
27
TACACS+
supports two factor auth encrypt entire payload separates authentication and authorization based on TCP 49
28
VPNa
PPTP - weak - no native encryption l2F - weak - no native encryption L2TP - ok - no native encryption, Tacacs + Radius possible IPSEC - safe - native encryption - multiple simultaneous connections possible
29
virtual circuit
logical pathway over siwtched network PVC - permanent SVC - startet when needed
30
VoIP attacks
caller ID spoofing vishing SPIT Spam over IP-Telephony switch hopping
31
Network attacks
Smurf: uses ICMP-directed broadcast with faked sender IP on Layer 3 ---> block distributed broadcasts on routers! Fraggle: similar to Smurf, but UPD Layer 4 Land: source and dest in packet are equal ---> circular Ping of death: ping that violates MTU Tear drop: sending malformed packet, the system cannot reassemble (Layer 3) Ping Flooding: overwhelming a system with lots of pings
32
Network attacks
Smurf: uses ICMP-directed broadcast with faked sender IP on Layer 3 ---> block distributed broadcasts on routers! Fraggle: similar to Smurf, but UPD Layer 4 Land: source and dest in packet are equal ---> circular Ping of death: ping that violates MTU Tear drop: sending malformed packet, the system cannot reassemble (Layer 3) Loki: ICMP-tunneling Ping Flooding: overwhelming a system with lots of pings
33
SSH
``` includes SFTP (SSH FTP) and SCP Port 22 ```
34
Frame Relay
Layer 2 WAN no error recovery multiplexes multiple logical connections over single physical -> virtual circuit PVC/SVC
35
DNP3
open standard offering interoperability between SCADA and mart grid apps multilayer, carried over IP PKI
36
SRTP
Secure Real Time Transport for VoIP AES, SHA1 offers CIA
37
PPP
Layer 2 provides confidentiality, integrity, authentication uses CHAP
38
Remote Desktop
VNC:5900 RDP:3389
39
802.5
Token Ring