Bridging course Flashcards

1
Q

exploit

A

takes advantage of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

origin authentication

A

message is not a forgery and comes from who it is stated to come from, HMAC (hash message authentication code) is used for this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CSMA/CD

A
  1. device listens to ensure channel is idle
  2. device sends RTS message to AP
    3a. receives CTS message from AP
    3b. if no CTS received, waits random amt of time and sends again, repeats as necessary
  3. device transmits data
  4. each transmission acknowledged, if not ack receiveed transmission restarts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Frequency channel saturation techniques

A

Direct-sequence spread spectrum (DSSS)- modulation technique to spread signal over a larger frequency band - used by 802.11b devices

Frequency hopping spread spectrum: rapidly transmites between various channels, devices must be synced in order to work. 802.11 used this, so do walkie talkies and bluetooth

orthogonal Frequency Division multiplexing this is a subset of frequency division multiplexing in which a single channel uses multiple channels on adjacent frequencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

data-integrity

A

guaruntees the message was not altered, MD5 is SHA hashing algorithms are used for this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

name and describe the three categories of APIs

A

open API or public API: publicly available, some API providers require the client to get a free key. this is to help control the API request received and processed

internal or private APIs: used by and organization organizations organization

partner APIs: between a company and its business partners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

wireless standards

A
  1. 11 2.4 ghz speed 2 mbs
  2. 11a 5 ghz speed 54 mbs
  3. 11b 2.4 ghz speed 11 mbs
  4. 11g 2.4 ghz 54mbs
  5. 11n 2.4/5 ghz 150-600 mbs
  6. 11 ac 6 ghz 1.3 gbps
  7. 11 ax 2.4/5 ghz knows as high efficency wireless, capable of 1/7 GHZ as well, newest standard
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

JSON

A

popular format used by web services to provide public data. can be used with most modern programming languages including python

syntax rules:
hierarchical structure
braces to hold objects and brackets for arrays
data is written as key/value pairs

keys are marked by double quotation marks, multiple key and value pairs are separated by commas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

dynamic ARP inspection

A

requires DHCP snooping binding table to operate
can inpect source mac, dest mac, and IP address
to enable all must be entered on same command line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

URI

A

Uniform resource identifier

makes up the entire https/https request to include the protocol, hostname, path and file name, and the fragment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

wireless security methods

A

WEP: no longer secure
WPA: uses TKIP, more secure than WEP
WPA2: uses AES for encryption, standard for security
WPA3: introduced in 2018, mitigation against dictionary attacks, individualized encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

client/server client operations

A

post - create
get -read
put/patch-update
delete - delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

name common data formats

A

JSON
XML
YAML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

JSON-RPC

A

javascript object notation -remote procedure call

rpc is when one system requests and another system executes code and returns information

strengths: simplicity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

assets

A

anything of value to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

intent based networking

A

translation: what does the business want, and how do those translate into actual polices

Activation: this is the installation of the policies created in translation onto the physical devices.

assurance: this is a constant process to ensure the intent is being met through verification and validation loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CAPWAP

A

IEEE standard protocol that enables WLC to manage mult WLCs, encapsulates and fowards traffic bt ap and WLC

can use IPV4 or IPV6 but uses IPV4 by default

can use UDP port 5246 and 5347
CAPWAP tunnles use different ip protocols IPv4 uses protocol 17 and ipv6 uses protocol 136

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

vulnerabiltiy

A

weakness in a system, that could be exploited by a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DHCP snooping

A

deliniates between trusted and untrusted sources on ports, if untrusted DHCP traffic is limited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

mitigation

A

counter-measure to reduce potential threat or risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

threat

A

potential danger to the company’s assets

22
Q

passive and active discover mode

A

passive: normal function, router sends beacon with SSID sec settings and supported standards
active: client sends SSID and supported standards to AP then receives access

23
Q

XML

A

similar to HTML
self descriptive use of tags
unlike html no predefined tags or structure

24
Q

XML-RPC

A

extensible markup language- remote procedure call

protocol developed prior to SOAP, later evolved into what became SOAP

strengths: well established simplicity

25
Q

overlay v underlay in IBN

A

overlay is the logical fabric

underlay is the physical topology of the network

26
Q

XML-RPC

A

extensible markup language- remote procedure call

27
Q

symmetric encryption algorithms

A

DES, uses stream cypher
3DES repeats DES three times
AES. more efficient that 3DES, popular symmetric alogrimth
software optimized enc algortihtm, alternative to those above, less CPU intesive
Rivest ciphers series RC, RC4 is most popular variation, used to encrypt HTTPS and TLS

28
Q

RESTCONF

A

rest- like API for managing and configuring network devices using http. Uses Yang data modelling and netconf defined datastores

29
Q

TFTP

A

simpler than FTP but less capable, does not offer authentication or directory visibility

message categories:
RRQ- request to read
WRQ- request to write 
DATA- contains block file of data
ACK -used by peer to ack each block of data
Error- used to indicate error
30
Q

split MAC architecture

A

AP MAC functions: beacons and probe responses, packet acks and retransmissions, frame queing and packet prioritization, mac layer data enc and decr

WLC functions: authentication, association and re assocaiton of clients, frame translation to other protocols, termination of 802.11 traffic onto a wired interface.

31
Q

network configuration tools

A

Ansible: programming lang= python or YAML
agentless, any device cab be controller, creates playbooks
Puppet: programming lang Ruby, supports both agent-based and agentless, devices are manged as puppet master, creates manifest
Chef: programming lang ruby, agent-based, devices are managed Chef Master, creates cookbook
SalstStack : uses python, supports both, devices managed using salt master, creates pillar

32
Q

FTP

A

uses TCP

port 21 is used for the control connection
port 20 is used for the data connection

uses client server model

4 steps:

  1. request- intitated by client
  2. response- server says it is ready
  3. Transfer- transaction occurs
  4. Terminate - success terminate, unsuccessful terminate. ends
33
Q

DTLS

A

protocol that provides security between the AP and WLC
enabled by default to secure CAPWAP control channel, but disabled on the data channel

data ecryption is enabled on a per AP basis, requires a DTLS liscence to be installed on WLC

34
Q

data non-repudiation

A

guarantess sender cannot deny they sent the message, implemented through digital signature or certificates

35
Q

YAML

A

like JSON, considered a superset of JSON
easiest to read and write of the formats studied
uses indentation to define structure

key value pairs are exasperated by a colon
hyphens are used to separate elements in a list

36
Q

BSS ESS

A

Basic service set: single ap interconnecting wireless clients.
extended service set: connectes disparete BSSs, allows clients to roam

37
Q

restful API applications

A

developer website: made by the API developer as sort of a how to guide with examples on how to use the API

postman: program for testing and using REST APIs, can be used in browser or standalone
python: APIs can be called from within an python program
network operating system: netconf protocol and restconf protocol are ways the network administrator can interact with the network using python scripts and cisco DNA

38
Q

URN

A

Uniform resource name

identifies the name space of the resource (www. .html)

39
Q

what are the menu options in cisco’s DNA center

A

design: model of the network
policy: uses policies to automate and simplify network management
provision: provide new services to users
assurance: proactive monitoring and insights to predict problems and solve them more quickly
platform: uses apis to integrate the preferred it systems to create end-to-end solutions and support for multi-vendor devices

40
Q

802.11 frame structure

A

frame control: type of wireless frame
duration: remaining duration needed to receive next frame
Address 1-3: 1-MAC of receiving device, 2- MAC of trasmitting device, 3- sometimes contains MAC of destination device such as router to which AP is attached
sequence control: sequence info for fragments
address 4: only used in ad hoc mode
payload: contains data
FCS: layer 2 error control

41
Q

name the types of web service APIs covered in the course

A

SOAP, REST, XML-RPC, JSON-RPC

42
Q

data confidentiality

A

only authorized users can read the message, this is implemented through symetric and asymetric encription algorithms

43
Q

vlan attack mitigation technieques

A

port security: can prevent mac address flooding attacks and DHCP starvation attacks

DHCP snooping: prevnets dhcp starvation and spoofing attacks

dynamic arp inpection: prevents arp spoofing and posioning attacks

ip source guard: prevents mac and ip address spoofing attacks

44
Q

REST

A

representational state transfer

can use XML, JSON, or YAML
strengths: flexible formatting, most widely used, less verbose

45
Q

name and describe the three different parts of the API request

A

API Server: the URL for the server that answers the REST request
resources :specifies the API that is being requested, the server may have more than one API, this specifies which one.
query: format-JSON, YAML, XML
Key- the authorization token if required
Parameters- details of the request, what needs to be returned

46
Q

Asymmetric encryption algorithms

A

Diffie hellman: allows two parties on a key to send each other
Digital signature standard/algorithm DSS/DSA : DSA is a public key
RSA: public key crytopgraphy can be used for both signing an ecrytption, widely uesed in e commerce
Elgammal: based on the DH key agreement, message is 2x the size after encryption
Elliptical curve techniques: advantage is key can be much smaller

47
Q

agent based v agentless

A

agent based is pull based, agent on the managed device periodically connects with master for its configuration information. changes are made to master and pulled down and executed by the device.

agentless is push based. a config script is run on the master, master connects to the device and executes tasks in the script

48
Q

risk

A

likelihood of a threat to exploit the vulnerability of the asset. measured by the probability of occurrence.

49
Q

Flex connect APs

A

connected mode- WLC is reachable, this is normal mode and WLC and remote APs function as expected

standalone mode- occurs when connection between WLC and Aps are lost. AP may assume some duties such as switching traffic locally and performing auth locally

50
Q

JSON-RPC

A

javascript object notation -remote procedure call

rpc is when one system requests and another system executes