Chapter 11 Flashcards
This category of routing protocols maintain a list of destination networks along with metrics of direction and distance as measured in hops
Distance vector routing protocols
this category of routing protocols gather routing characteristics, such as speed, latency, etc to make a next hop routing decision
Link State Routing protocols
Examples of vector routing protocols
RIP, IGRP
Examples of link state routing protocols
OSPF, IS-IS, EIGRP
this category of routing protocols make next hop decisions based on the entire remaining path to the destination, and is a kind of exterior routing protocol
path vector
what is an example of a path vector routing protocol?
BGP
This is an insecure terminal emulation network application that supports remote connectivity for executing commands and running applications but does not support transfer of files.
Telnet, TCP/23
This is an insecure network application that supports an exchange of files that requires anonymous or specific authentication.
FTP, TCP/20&21
This is an insecure network application that supports an exchange of files that does not require authentication. Used to host network device configuration files and can support multicasting.
TFTP, UDP/69
This is a protocol used to transmit email messages from a client to an email server and from one email server to another.
SMTP, TCP/25
This is a protocol used to pull email messages from an inbox on an email server down to an email client (aka client archiving).
POP3, TCP/110
This is a protocol used to pull email messages from an inbox on an email server down to an email client.
IMAP4, TCP/110
This protocol provides for centralized control of TCP/IP configuration settings assigned to systems upon bootup.
DHCP, UDP/67,68
This is the protocol used to transmit web page elements from a web server to web browsers in cleartext.
HTTP, TCP/80
This is the TLS-encrypted version of HTTP.
HTTPS, TCP/443
This is a network service that is used to spool print jobs and send print jobs to printers. Consider enclosing in a VPN for use.
LPD, TCP/515
This is a GUI API for command-line operating systems. Consider enclosing in a VPN for use.
X Window, TCP/6000-6063
This is a network service used to support file sharing between dissimilar systems. Consider enclosing in a VPN for use.
NFS, TCP/2049
This is a network service used to collect network health and status information from a central monitoring station.
SNMP, UDP 161, 162
combination of IP and port
socket
ports that have one or more networking software products specifically registered with IANA
registered software ports
1024-49151
ports used randomly and temporarily by clients as a source port
random, dynamic, ephemeral ports (49152-65535)
3 steps of a TCP handshake
SYN
SYN/ACK
ACK
this name server hosts the original editable zone file for the domain
primary authoritative name server
these name servers host read-only copies of the zone file
secondary authoritative name server
a security improvement to DNS; provides mutual certificate authentication and encrypted sessions between devices
DNSSEC
this system protects clients during DNS transactions by creating an encrypted session with a DNS server using HTTPS
DNS over HTTPS (DoH)
this system protects clients during DNS transactions by adding a DNS proxy between the client and the DNS resolver thus providing anonymity and privacy to DNS queries
Oblivious DoH (ODoH)
a malicious device that responds to DNS queries with false IP information
rogue DNS server
putting incorrect information into a DNS server’s zone file or cache
DNS Cache Poisoning
malicious redirection of a valid website’s URL to a fake website by modifying the local hosts file on a system
DNS Pharming
when a client has a false DNS server definition
corrupting the IP configuration through DHCP or a script
when an attacker sends back a DNS response with false information
DNS query spoofing
protecting against DNS poisoning methods
block inbound TCP 53
block outbound UDP 53
NIDS
use DNSSEC
use DoH or ODoH
regularly audit DNS and DHCP servers
use split DNS
deploying separate DNS servers for public and private use
split DNS
defensive use of DNS spoofing to prevent users from visiting malicious sites
DNS Sinkhole
malicious action of changing the registration of a domain name without the authorization of the valid owner
domain hijacking
displaying a link that looks like a well-known product that redirects the user to an alternate location
URL Hijacking
IPv6 new features
scoped addresses, autoconfiguration, QoS
since IPv6 does not support NAT, will this reduce security or privacy?
Privacy, because a systems local IP address will not be masked
having systems operate both IPv4 and IPv6
dual stack
systems operate a single stack of either IPv4 or IPv6 and use an encapsulation tunnel to access systems of the other protocol
tunneling
used to convert between IPv6 and IPv4 network segments similarly to how NAT converts between internal and external adresses
NAT-PT
this router protocol allows systems to support multicasting
IGMP - Internet Group Management Protocol
this protocol resolves IP addresses into MAC addresses
ARP