9.1 IP and Protocols Flashcards

1
Q

What does DHCP stand for and what is it for

A

The Dynamic Host Configuration Protocol (DHCP) is a
client-server based protocol on your local network
responsible for managing and providing these IPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False

DHCP is dynamic, because most devices have fixed IP addresses.

A

DHCP is dynamic, because most devices do not have fixed IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False

DHCP is a Layer 7: Application protocol that uses two UDP ports:

67

68

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the DHCP Request and Receive Four-Step Process?

A

Step 1: DHCP Discover - client finds the server.

Step 2: DHCP Offer - The server checks available IPs, selects one, and sends it back over the network.

Step 3: DHCP Request - Client sends a message accepting the IP.

Step 4: mDHCP ACK - Server tells the client the IP is valid for the DHCP lease time, after which it can be sent to another machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does NAT stand for and what is it for?

A

Network Address Translation (NAT) is a method of mapping a private IP address to a public IP address and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NAT

Mapping gets stored in a _____________________

A

Mapping gets stored in a network address Translation Table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False

NAT tables are managed by the router, considered the gateway between private and public networks.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False

NAT touches several OSI layers, but it’s main task is IP address translation, so it primarily works on Layer 2

A

False

NAT touches several OSI layers, but it’s main task is IP address translation, so it primarily works on Layer 3: Network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DHCP Attacks

True or False

DHCP servers only have a limited amount of IP addresses they can distribute to devices on a LAN.

A

If an attacker is able to access the LAN, they can send a large number of DHCP messages over the network requesting IP addresses from the DHCP server.

If the number of requests is large enough, the DHCP server can run out of IPs, and new, legitimate users won’t be able to receive an IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is DHCP starvation?

A
If it sounds familiar, this is because it’s a type of denial
of service (DoS) attack. This attack impacts the availability concept of the CIA triad.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do you prevent DHCP Starvation?

A

One way to prevent DHCP starvation is to set a maximum threshold. This threshold is the number of DHCP requests a server can accept per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is DHCP spoofing?

A

After a DHCP starvation attack occurs, an attack can potentially set up a fraudulent DHCP server.

The fraudulent server can send spoof messages, assigning clients to a malicious router.

The attacker can use this router to capture sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you prevent DHCP Spoofing?

A

DHCP snooping

DHCP snooping is a process implemented on a network switch that inspects packets to confirm that they’re legitimate DHCP offers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Routing Schemes

What is Unicast?

A

A single device delivers a message to another single specific device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Routing Schemes

What is Unicast?

A

A single device delivers a message to another single specific device.

Ex. A phone call between two people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Routing Schemes

What is Broadcast?

A

A single device broadcasts a message to all devices on that same network.

Ex. DHCP offer message that is broadcast across an entire LAN.

17
Q

Routing Schemes

What is Multicast?

A

A device sends a message to devices that have expressed interest in receiving the message.

Ex. A subscription-based service sends network traffic to its subscribers. Like Twitch

18
Q

What’s the disadvantage of Unicast?

A

If the message has to reach multiple destinations, many unicast messages must be sent.

19
Q

What’s the disadvantage of Broadcast?

A

Since broadcast messages are sent to everyone on a network, they can cause unnecessary traffic.

20
Q

What’s the disadvantage of Multicast?

A

Intended recipients will need to be updated and maintained to make sure they’re accurate.

21
Q

Routing Techniques

Networks use two primary routing techniques to
determine the path: ______ and ______ routing.

A

Networks use two primary routing techniques to

determine the path: static and dynamic routing.

22
Q

What is Static routing?

A

Static routing is the manual configuration of a network route, typically done by a network administrator.

Usually used on smaller networks.

Advantages: lower CPU on the router, network administrator has full control of their network’s routing behavior.

Disadvantages: fault tolerance, meaning if a device on a manually created path fails, the route can’t be adjusted.

23
Q

What is dynamic routing

A

Dynamic Routing prevents fault tolerance issues by allowing the network to act autonomously in order to avoid network blockages.

Network is adaptive and data gets forwarded on a different route depending on the network conditions.

Primary routing technique used over the internet.

Uses routing protocols to determine the best route.

24
Q

There are several dynamic routing protocols used to determine the path traffic takes to reach its final destination.

The two primary criteria are _____ and ______.

A

The two primary criteria are distance and speed.

25
Q

True or False

Distance is the number of hops (devices) it takes to get from the source to the destination.

A

True

Dynamic routing protocols that use distance as criteria are distance-vector routing protocols.

Protocols include:

Routing Information Protocol (RIP)

Enhanced Interior Gateway Routing Protocol (EIGRP)

26
Q

Devices that use WiFi have a standard called ________

A

Devices that use WiFi have a standard called 802.11.

27
Q

Wireless access points (WAPs) broadcast a signal called a _________ that computers detect and tune into.

A

Wireless access points (WAPs) broadcast a signal called a beacon that computers detect and tune into.

28
Q

Wireless Networking

When a WAP needs to broadcast its signal, it must identify itself with a ___________.

A

When a WAP needs to broadcast its signal, it must identify itself with a Basic Service Set Identifier (BSSID).

29
Q

These BSSIDs are not easily recognizable.

For example: 00-A4-22-01-53-45.

So WAPs also broadcast _____________.

A

So WAPs also broadcast Service Set Identifiers (SSID). For example:

30
Q

How do you secure WiFi?

A

First, there was Wired Equivalent Privacy (WEP), a security protocol using encryption to provide protection and privacy to wireless traffic.

Major vulnerabilities made WEP obsolete, replaced by a more secure, sophisticated protocol called WiFi Protected Access (WPA).

Finally, an even more secure protocol, WPA2, came along. This is currently the most commonly used protocol. 2006

31
Q

What is Aircrack-ng?

A

Decrypts WEP-encrypted wireless traffic.

32
Q

What are the ways cyber criminals can find weak wireless secuirty routers?

A

Wardriving: Driving around an area with a computer and a wireless antenna to find wireless LANs that may be vulnerable.

Warchalking: Marking locations with chalk so sites can be exploited these access points at a later time.

Warflying: Using drones to find vulnerable access points.

33
Q

What is an evil twin?

A

Cybercriminals can also create a fake WAP called an evil twin: When using an evil twin, an attacker can make a fake SSID to trick unsuspecting users into connect to the attacker’s wireless access point.