CH11 Network Design Flashcards

1
Q

What are the 7 layers of OSI Model?

A

Please - Physical
Do - Data Link
Not - Network
Throw - Transport
Sausage - Session
Pizza - Presentation
Away - Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a physical layer?

A

Represents the actual network cables and radio waves used to carry data over a network
Data carried over the network at the Physical Layer is known as bits.

Example : Network Cables, (fiber optic, copper, or coaxial), radio waves (Wi-Fi or Bluetooth), Hub or repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Data Link layer?

A

Describes how a connection is established, maintained, and transferred over the physical layer and uses physical addressing (MAC address).

Bits are grouped into Frames, and then sent over the network.

Examples are : MAC addresses, switches, and bridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Network Layer?

A

Logical address to route or switch information between hosts, the network, and the internetworks.

Frames are grouped into packets. Example : IP Address, Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Transport layer?

A

Manages and ensures transmission of the packets occurs from a host to a destination using either TCP (connection-ful protocol. Has 3 way handshake) or UDP (Connection-less Protocol. Fire and forget)

Packets are now grouped into segments for TCP, or Datagrams for UDP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Session Layer?

A

Manages the establishment, termination, and synchronization of a session over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Presentation layer?

A

Translates the information into a format that the sender and receiver both understand.

Ex: is it ASCII or UTF-8 encoding?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Application layer?

A

Layer from which the message is created, formed and originated

Consists of high-level protocols like HTTP, SMTP, and FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a switch?

A

Switches are the combined evolution of hubs and bridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 3 types of attack for switches ?

A

MAC Flooding,
MAC Spoofing,
Physical Tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is MAC Flooding?

A

Attempt to overwhelm the limited switch memory set aside to store the MAC addresses for each port

If a switch is flooded, it can fail-open when flooded and begin to act like a hub and broadcasting data out every single port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is MAC Spoofing?

A

Occurs when an attacker masks their own MAC address to pretend they have the MAC address of another device.

MAC Spoofing is often combined with an ARP (Address Resolution Protocol) spoofing attack. ARP relies on the MAC addresses as a way of combining what MAC address goes to which IP, and which IP goes to which MAC address. Attacker often combines a MAC address spoof with an APR spoof as an attempt to be able to have the attacker appear that they are the destination that somebody is trying to send information to, and use that as a way to steal that information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the ways to prevent MAC Spoofing?

A
  • Configure your switch to accept limited number of static MAC addresses
  • Limit duration of time for ARP entry on hosts.
  • Conduct ARP inspection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Physical Tampering in regards to attack on switches?

A

occurs when an attacker attempts to gain physical access to the switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Router?

A

It is used to connect two or more networks to form an internetwork. They rely on a packet’s IP Addresses to determine the proper destination. Access Control List (ACL) can be configured on the router’s interface to control the flow of traffic into or out of a certain part of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What layer in OSI model does Router operate on ?

A

Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is ACL ?

A

ACL = Access Control List

An ordered set of rules that a router uses to decide whether to permit or deny traffic based upon given characteristics.

18
Q

What is IP Spoofing?

A

IP Spoofing is used to trick a router’s ACL. If they can spoof the IP, they can trick the access control list to think they’re on the approved list and let them in or let them out.

In order to prevent IP Spoofing, you need to configure the router properly. Changing default username and pw, default routing tables, changing those default IP internal addresses.

19
Q

What are Network Zones?

A

breaking up your network into multiple security zones. It can be further broken up into sub-zones through the use of subnetting, ACLs, firewall rules, and other isolation methods that will help us prevent the flow of data between the different portions of our network.

20
Q

What are the 3 different zones that a networks can be segmented into?

A

LAN, WAN, and DMZ

LAN can be secured using private Ips, using anti-malware programs, and placing your clients behind a router and it associated ACLs.

WAN – should be monitored and firewalled to secure your network against the threats that those contain.
Any traffic you wish you keep confidential crossing the internet should use a VPN.

DMZ – focused on providing controlled access to publicly available servers that are hosted within your organizational network.

Sub-zones can be created to provide additional protection for some servers.

21
Q

What is Extranet?

A

Specialized type of DMZ that is created for your partner organizations to access over a wide area network. It acts like DMZ, but it’s not publicly accessible.

22
Q

What is intranet?

A

used when only one company is involved. It allows you to expand your internal network within your organization across multiple areas

23
Q

What is Internet-facing Host ?

A

Any host that accepts inbound connections from the internet

24
Q

What is DMZ ?

A

a segment isolated from the rest of the private network by one or more firewalls that accepts connections from the internet over designated ports

25
Q

What are Bastion Hosts ?

A

Hosts or servers in the DMZ which are not configured with any services that run on the local network.

Any kind of hosts you put in the DMZ should really be what we consider a Bastion Host.

26
Q

What is a Jumpbox ?

A

Jumbox is a hardened server that provides access to other hosts within the DMZ.

To configure devices in the DMZ, a Jumpbox is utilized.

An administrator connects to the jumpbox and the jumpbox connects to hosts in the DMZ.

The jumpbox and management workstation should only have the minimum required software to perform their job and be well hardened.

27
Q

What is NAC?

A

NAC = Network Access Control.

It is used to protect your network from both known and unknown devices.

With NAC, a device is scanned to determine its current state of security prior to it being allowed access to your network. If a device passes the examination, it’s allowed to enter and receive access to all of the organizational resources that are provided by your network. If the device fails the inspection, it’s placed into a digital quarantine area, and it awaits remediation.

NAC can be used as a hardware or software solution.

IEEE 802.1x – standard is used in port-based NAC.

28
Q

What are 2 types of agenst that NAC can run as ?

A

NAC = Network Access Control.

NAC solutions can be run either using Persistent or Non-Persistent agents.

Persistent Agents – piece of software that’s installed on a device that’s requesting access to the network.

Non-Persistent Agents – uses a piece of software that scans the device remotely or is installed and subsequently removed after the scan.

29
Q

What is VLAN?

A

VLAN = Virtual Local Area Networks

VLANS are implemented to segment our network, reduce collisions, organize our networks, boost performance and increase security

30
Q

What is VLAN Hopping?

A

VLAN Hopping allow attackers to break out of our VLANs and access other VLAN data

31
Q

What are 2 of the ways that attacker can perform VLAN hopping?

A
  1. Switch Spoofing – Attacker configures their device to pretend it is a switch and uses it to negotiate and trunk link to break out of a VLAN.

To prevent this, you can disable dynamic trunking protocol (DTP) on all your switch ports, place all your unplugged ports into an unused VLAN, explicitly forward frames, and avoid default VLAN names.

  1. Double Tagging – Attacker adds an additional VLAN tag to create an outer and inner tag.

Prevent double tagging by moving all ports out of the default VLAN group.

32
Q

What is subnetting?

A

Act of creating subnetworks logically through the manipulation of IP addresses

33
Q

what are the benefits of subnetting?

A

Compartmentalizes the IP address space and make efficient usage of them.
It reduces broadcast traffic and number of collisions

Subnet’s policies and monitoring can aid in the security of your network

34
Q

What is NAT?

A

NAT = Network Address Translation

process of changing an IP address while it transits across a router

35
Q

What is PAT?

A

PAT = Port Address Translation

PAT is the most commonly used type of NAT (Network Address Translation).

This is where we have a single public IP address assigned to a router and all of its private IP Addresses that are assigned inside to our host.

Router keeps track of requests from internal hosts by assigning them random high number ports for each request

36
Q

What are private IP ranges?

A

Class A – Anything that start with 10: 10.0.0.0 through 10.255.255.255
Class B – IP addresses that starts 172.16 through 172.31: 172.16.0.0 through 172.31.255.255
Class C – 192.168.0.0 to 192.168.255.255

37
Q

What is telephony?

A

devices that provide voice communication to users

38
Q

What is modem?

A

a device that could modulate digital information into an analog signal for transmission over a standard dial-up phone line

39
Q

What is War Dialing?

A

when an attacker starts dialing random phone numbers to see if any modem would answer on the other side.

Protect dial-up resources by using the callback feature

40
Q

What is PBX ?

A

PBX = Private Branch Exchange

It is an Internal phone system used in large organizations.

Attackers target PBX to get free long distance. To secure PBX system, mount it in a locked room. Disable remote access to that PBX

41
Q

What is VOIP ?

A

VOIP = Voice Over Internet Protocol

Digital phone service provided by software or hardware devices over a data network.

You would want to have a separate network for data and another for VoIP network.

If you want to combine the two to save cost, then put VoIP devices and their own subnet