Business data networks and security Flashcards

1
Q

Who funded the ARPANET?

A

Defense Advanced Research Projects Agency (DARPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What year for ARPA created?

A

1958

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What organization spawned the Network Working Group?

A

members of ARPANET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the Network Working Group do?

A

Create standards to be used for networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a Network WOrking Group “Request for Comments” (RFC) do

A

The RFC is the recommendation for a standard. All standard in networking are RFC, but not all RFC are standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the standards body IETF acronym stand for?

A

Internet Engineering Task Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When was the standards body IETF founded?

A

late 1960s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

was the IETF faster at producing standards than OSI?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a network standard?

A

rules of operation that specify how two pieces of hardware/software work together to exchange messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the important standards agencies?

A

Internet Engeneering Task Force (IETF)
International Organization of Standardization (ISO)
International Telecommunications Union- Telecommunications Standards Sector (ITU-T)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What standards agency creates internet standards

A

IETF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What other agencies work together to create network standards

A

ISO and ITU-T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a standards architecture?

A

Similar to software architecture, it is how the standards are designed to make sense and function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a standards architecture layer?

A

a sub-set of the standards architecture that describes a feature of how the standards architecture operates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the OSI Architecture layers in order from 1-7

A
Physical
data link
network
Transport
session
presentation
Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the TCP/IP (IETF) layers from 1-4

A

Subnet Access Protocol
Internet
Transport
Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the Hybrid TCP/IP-OSI layers 1-5

A
Physical
Data link
Internet
Transport
Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the TCP/IP architecture Subnet Access Protocol (SNAP)

A

Basically says “Use OSI standards here”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Does a standards agency dominate in the application layer?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

with regards to the TCP/IP-OSI architecture, what is the function of layer 5

A

Application layer governs how two applications work with eachother

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

with regards to the TCP/IP-OSI architecture, what is the function of layer 4

A

Transport Layer standards govern aspects of end-to-end communication between two end hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

with regards to the TCP/IP-OSI architecture, what is the function of layer 3

A

Internet link layer governs the transmission of packets across the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

with regards to the TCP/IP-OSI architecture, what is the function of layer 2

A

The data Link layer govern the transmission of frames across a single switched network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

with regards to the TCP/IP-OSI architecture, what is the function of layer 1

A

Physical layer govern transmission between adjacent devices connected by a medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what is carried inside of a frame

A

packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How is the three-step opening performed?

A

1: Host A sends a TCP SYN to Host B
2: Host B sends a TCP SYN/ACK to Host A
3: Host A sends aback a pure TCP ACK segment to Host B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the three TCP control Segments?

A

SYN
ACK
FIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

in TCP protocol what are the three general parts of a message

A

Header
data fields
frame trailer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a threat environment?

A

The types of attacks that are commonly used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is malware?

A

malicious software that is typically infiltrated into a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Describe what the spear phishing attack is?

A

The attacker personalizes an e-mail message for a particular recipient so that information is exfiltrated or malware is infiltrated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are the three types of malware

A

Viruses
Worms
Trojan Horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a virus malware?

A

A piece of malware (typically a script) that leverages vulnerabilities in software which already exists within the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a worm malware?

A

Worms are full programs that can be propagated between computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a Trojan Horse?

A

A malware which disguises itself as a legitimate, and must be placed in a network by another piece of malware, or attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is a malware payload?

A

A piece of code that performs the malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

With regards to a cyber attack, what is an APT?

A

Advanced Persistant Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

With regard to the OSI model, at what layers do wireless LANs operate?

A

physical and data link layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the distinction between WI-FI and 802.11?

A

Wi-Fi steams from the Wi-Fi Alliance, which is an industry consortium of 802.11 compliant product vendors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

with regards to Wi-Fi, what is a service band?

A

A range of frequencies used for a specific purpose. This is comprised of multiple channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

With regards to Wi-Fi, what is a channel?

A

A subset of Service band frequencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

With regards to Wi-Fi, what is the range of frequencies used in the 2.4GHz service band?

A

2.4GHz -> 2.4835GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

With regards to Wi-Fi, what is the frequency range of the 5GHz service band?

A

5GHz -> 5.725GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

With regards to the 802.11 standard, what is roaming?

A

The hand-off between multiple access points, while a user is moving between them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What OSI layer are switched and wireless networks governed?

A

Layer 1 and Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

With regards to a router, what is an interface?

A

The physical connector for a wired connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

With regards to a switch, what is a port?

A

The physical connector for a wired connection

48
Q

Explain the network adage “Switch where you can; route where you must”

A

This is used to describe the idea that for the same amount of network traffic, a router is much more expensive than a switch

49
Q

With regards to the Internet, what is a network?

A

collection of routers and data links owned by a recognized organization

50
Q

With regards to Ethernet, what is a network

A

A collection of hosts and clients connected to a single datalink and router

51
Q

With regards to TCP/IP networking, what are the parts of the hierarchical Addressing?

A

network, subnet, host

52
Q

With regards to TCP/IP networking, what is the network part of the hierarchical IPv4 address?

A

The network part is the first 8 to 24 bits of a network address. This identifies the host’s recognized network on the internet

53
Q

With regards to TCP/IP networking, what is the subnet part of the hierarchical IPv4 address?

A

The 8 bits after the network address. This is used to subdivide an organization’s networks into smaller units

54
Q

With regards to TCP/IP networking, what is the host part of the hierarchical IPv4 address?

A

The remaining bits that are not a part of the network or the subnet in the address. This is used to identify the specific host in the subnet

55
Q

Just looking at a IPv4 address, can you determine the network, subnet, host?

A

No

56
Q

What does a border router do?

A

Routes between different networks

57
Q

What does an internal router do?

A

connect different subnets

58
Q

with regards to TCP/IP, how do masks work?

A

A mask is applied as a binary and with the address to determine the network or subnet.

59
Q

with regards to TCP/IP, what is routing?

A

The process of getting a packet closer to its destination host.

60
Q

With regards to TCP/IP, what is a Routing Table

A

A table of routes, that a router uses to determine the best route to send a packet.

61
Q

With regards to IPv4, how many bits are in the version field?

A

4

62
Q

With regards to IPv4, how many bits are in the internet header length?

A

4

63
Q

With regards to IPv4, how many bits are in the differentiated Service Control Point?

A

6

64
Q

With regards to IPv4, how many bits are in the ECN?

A

2

65
Q

With regards to IPv4, how many bits are in the Total Length?

A

16

66
Q

With regards to IPv4, how many bits are in the Identification?

A

16

67
Q

With regards to IPv4, how many bits are in the flags?

A

3

68
Q

With regards to IPv4, how many bits are in the Fragment Offset?

A

13

69
Q

With regards to IPv4, how many bits are in the time to live?

A

8

70
Q

With regards to IPv4, how many bits are in the Protocol

A

8

71
Q

With regards to IPv4, how many bits are in the Header Checksum

A

16

72
Q

With regards to IPv4, how many bits are in the Source IP Address

A

32

73
Q

With regards to IPv4, how many bits are in the destination IPv4 Address?

A

32

74
Q

With regards to IPv4, what is the ECN?

A

Explicit Congestion Notification, used to notify the receiver of congestion

75
Q

With regards to IPv4, what fields govern transmission quality?

A

Differentiated Services Control Point

Explicit Congestion Notification (ECN)

76
Q

With regards to the IPv4 header Protocol Field, what is the value for TCP?

A

6

77
Q

With regards to the IPv4 header Protocol Field, what is the value for UDP?

A

17

78
Q

With regards to the IPv4 header Protocol Field, what is the value for ICMP?

A

1

79
Q

With regards to TCP/IP, what role does the ICMP protocol provide?

A

This is used for the internet layer supervisory messages

80
Q

While IPv4 is very common today, what is the largest issue presented to its use?

A

The Internet Assigned Numbers Authority ran out of unique address.

81
Q

With regards to TCP/IP wahat is the Canonical Text Notation?

A

RFC 5952, it is used to create a human readable notation for an IP address

82
Q

With regards to TCP/IP, what is the notation used for IPv6?

A

Hexadecimal notation

83
Q

With regards to IPv$, what is the notation used

A

dotted decimal notation

84
Q

with regards to IPv4 what are the two addresses that hosts cannot have?

A

all 1’s

all 0’s

85
Q

with regards to IPv6, what are the three parts of an address?

A

routing prefix
subnet ID
interface ID

86
Q

with regards to IPv6, what is the IPv4 equivalent to the routing prefix?

A

network part of the address

87
Q

with regards to IPv6, what is the IPv4 equivalent to the subnet ID?

A

the subnet part of the address

88
Q

with regards to IPv6, what is the IPv4 equivalent to the interface ID?

A

The host part of the address

89
Q

With regards to 802.11, what is war driving?

A

When an attacker uses the wireless signal of the access points to collect information from a victim. In unsecured networks, this could even lead to man in the middle attacks

90
Q

with regards to 802.11, do public hot-spots protect your transmission

A

No

91
Q

What does the 802.11i standard provide?

A

This standard provides encrypted wireless communication between an access point and a host

92
Q

With regards to cybersecurity, what does the CIA acronym stand for?

A

Confidentiality
Integrity
Authentication

93
Q

With regards to 802.11, why does turning off the periodic broadcast of the access point SSID not provide protection

A

If there is communication to that access point and a host, each packet header contains an unencrypted SSID for the network.

94
Q

With regards to 802.11, why does whitelisting the EUI-48 addresses not provide additional security?

A

During communication between the access point and the host, the EUI-48 is unencrypted in each packet header

95
Q

With regards to 802.11i, what layer is protected?

A

The 802.11 standard is focused on protecting the data-link layer

96
Q

What are some data-link security standards that existed prior to 802.11i?

A

Advanced Encryption Standard (AES)
Wired Equivalent Privacy (WEP)
Wireless Protected Access (WPA)

97
Q

With regards to 802.11, Why is WEP no longer used?

A

It is easily compromised, due to design level issues.

98
Q

With regards to 802.11 data-link security, which is superior 802.11i or WPA?

A

802.11i

99
Q

With regards to cyber-security, what is end-to-end encryption?

A

Encryption that spans from client to target server

100
Q

With regards to 802.11i, what is the initial authentication?

A

The wireless client is the supplicant, which must prove its identity before the access point will allow the client to connect.

101
Q

With regards to 802.11i, what are the two methods for initial authentication?

A

Pre-Shared Key (for use in home networks)

802.1X (for use in enterprises)

102
Q

With regards to 802.11i, how does the pre-shard key (PSK) for initial authentication work?

A

The wireless host sends a request to the access point

The access point sends an unencrypted challenge message to the host

The host uses the PSK to encrypt the challenge message and sends it to the access point

The access point can decrypt the challenge message and allow access or not

103
Q

With regards to 802.11i, what is the pairwise session key?

A

This is the key used for subsequent communication to the access point.

104
Q

With regards to 802.11i, what are some threats?

A

The PSK is too publicly known.

An ex-employee can still have the PSK when they leave

105
Q

With regards to 802.11i, what is the minimum password length for a strong Pre-Shared Key(PSK)?

A

20 characters

106
Q

with regards to 802.11i, how is the 802.1X initial authentication performed?

A

The wireless host contacts the Access point

The access point notifies the 802.1X server

The 802.1X server sends requirements for authentication to the access point

The access point sends the requirements to the wireless host

The wireless hosts sends credentials to access point

The access point sends the credentials to the 802.11X server to perform credentials check

The 802.11X server sends an authorization message to the wireless access point

The wireless access point authorizes the connection to the wireless client, and passes the authorization message

107
Q

With regards to 802.11i, what are two types of attacks that can occur?

A

Rogue access point

evil twin attack

108
Q

With regards to 802.11i, what is the evil twin attack

A

a man-in-the-middle attack in which the evil twin intercepts traffic passing between a wireless hosts and a legit access point

109
Q

with regards to 802.11, what defeats an evil twin attack?

A

A VPN will defeat an evil twin attack

110
Q

With regards to networking, what is the Simple Network Management Protocol (SNMP) used for?

A

Management of access points

111
Q

with regards to networks, what are 4 categories of Quality of Service (QoS)?

A

Speed
Errors
Availability
Latency

112
Q

with regards to 802.3, what are the OSI standard layers impacted?

A

Datalink

Physical

113
Q

With regards to 802.3, what is a workgroup switch?

A

A switch to connect individual hosts to the network

114
Q

With regards to 802.3, what is a core switch?

A

A switch to connect to other switches

115
Q

With regards to 802.3, what is an access link?

A

A physical connection between host and switch

116
Q

With regards to 802.3, what is a Trunk link?

A

A physical connection between switches