Chapter 11 Secure Network Architecture Flashcards

1
Q

Describe encapsulation in the OSI model.

A

Communication between layers happens through encapsulation and decapsulation. Encapsulation adds a header, and possibly a footer. At each new layer, the previous layer’s header and payload becomes the new payload. Encapsulation goes from Application to Physical. The opposite happens with decapsulation.

–The application layer receives data from software. It adds information, usually only a header.
–Each layer adds information until the message reaches the physical layer.
–At the physical layer, the message is converted into electrical impulses that represents bits, and transmitted over a physical connection.
–The receiving computer captures the bits and recreates the message in the physical layer.
–The data goes to the data link layer, which strips the header.
–This continues until the application layer, which transfers the data to software.

Each layer contains instructions, checksums, etc that only the peer layer understands. This is known as peer level communication.

The data sent to the protocol stack at the application layer is encapsulated into a network container. The protocol data unit (PDU) goes to presentation and then to session. For those three layers, it is a PDU. Once it goes to Transport, it is a segment if TCP, or datagram if UDP. At layer 3, it is a packet. At layer 2, it is a frame. At layer 1, it becomes bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the application layer do?

A

Responsible for interfacing user applications, network services, or the OS with the protocol stack. The protocols and services required to transmit files, exchange messages, connect to remote terminals, etc, are found here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the presentation layer do?

A

Responsible for transforming data into a format that any system following the OSI model can understand. It imposes a common structure, and is also responsible for encryption and compression. However, on TCP/IP networks, there is not an actual Presentation layer. There is no need to reformat data for network transport, and compression only occurs in concert with some encryption operations. Encryption can occur in at least five locations:

–pre-network encryption before entering the application layer
–Transport layer encryption typically performed by TLS
–VPN encryption, which can happen at layer 2 (L2TP), layer 3 (IPsec), or layer 4 (Open VPN)
–wireless encryption at the data link layer
–bulk encryption at the physical layer via a device external to the NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the session layer do?

A

Responsible for establishing, maintaining, and terminating communications sessions between two computers. It manages dialog discipline or dialog control, establishes checkpoints for grouping and recovery, and retransmits PDUs that have been lost since the last verified checkpoint. There is no Session layer on TCP/IP networks; the transport layer handles it for TCP, and it doesn’t happen for UDP.

Sessions happen in one of three control modes: simplex is one-way communication, half duplex is two-way communication but only one way can send at a time, and full duplex is two-way simultaneous communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the transport layer do?

A

Responsible for managing the integrity of a connection and controlling the session. It establishes communications between nodes (also known as devices), and defines the rules of a session. The rules specify how much data each segment can contain, how to verify message integrity, and how to determine whether data has been lost. Session rules are established through a handshake. The layer establishes a logical connection between two devices and provides end to end transport services to ensure data delivery. This includes mechanisms for segmentation, sequencing, error checking, controlling the flow of data, error correction, multiplexing, and network service optimization. Includes TCP, UDP, and TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the network layer do?

A

Responsible for logical addressing and performing routing. Logical addressing occurs when an address is assigned and used by software or a protocol rather than being provided and controlled by hardware. The packet header has the source and destination IP address.The network layer is responsible for providing routing or delivery guidance but is not responsible for verifying delivery. It also does error detection and node data traffic. Routers operate at layer 3, determining the best logical path for the transmission of packets.

Non-IP protocols exist but have become the purview of special purpose networks such as IPX, AppleTalk, and NetBEUI. Most firewalls cannot perform filtering on their headers. Block this traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe interior and exterior routing protocols.

A

Two categories of interior routing protocols: distance vector and link state.

–Distance vector routing protocols maintain a list of destination networks along with metrics of direction and distance measured in hops. Examples are Routing Information Protocol and Interior Gateway Routing Protocol.
–Link state routing protocols gather router characteristics such as speed, latency, error rates, and monetary cost for use. Examples are Open Shortest Path First and Intermediate System to Intermediate System. Enhanced Interior Gateway Routing Protcol is a replacement for IGRP.

The main category of exterior routing protocols is path vector. These make next hop decisions based on the entire remaining path. This is different from interior protocols, which only look at the next hop. Border Gateway Protocol is the main form of path vector protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the data link layer?

A

Responsible for formatting the packet for transmission. The proper format is determined by the hardware, topology, and the technology of the network, such as Ethernet.

One part of the processing is adding the source and destination hardware address to the frame. This is the MAC address, which is a 48 bit binary address. Also known as the physical address, the NIC address, and the Ethernet address. The first 24 bits are the organizationally unique identifier (OUI). The last 24 bitts are a unique number for that interface. Some manufacturers encode info like make and model into that part of the MAC address.

ARP is the main protocol. Network hardware at layer 2 includes switches and bridges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the physical layer?

A

Converts a frame into bits for transmission. NICs, hubs, repeaters, concentrators, and amplifiers function here. These devices perform hardware-based signal operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name important ports.

A

Telnet–TCP Port 23. Does not support file transfer. Don’t use.

FTP-TCP: Port 20 (data connection) and Port 21 (control connection). Don’t use

Trivial File Transfer Protocol: UDP Port 69. Exchange of files without authentication. Supports multicasting. Don’t use.

SMTP: TCP Port 25. Used to send emails from the server to a client and then deletes them. Also server to server. Only use with TLS

POP3: TCP Port 110. Pulls messages from inbox to the client. Only use with TLS

IMAP4: TCP Port 143. Server to the email client; unlike SMTP, it saves them. Also can retrieve only headers and delete off the email server. Only use with TLS.

DHCP: UDP Ports 67 (server listens) and 68 (client listens). Centralized control of TCP/IP settings assigned to systems upon bootup.

HTTP: TCP Port 80. TLS can be used but only for server to server communications.

HTTPs: TCP Port 443

Line Printer Daemon (LDP): TCP Port 515. Spools print jobs and sends to the printer. Consider enclosing it in a VPN.

X Window: TCP Ports 6000-6063. GUI API for command-line OS. Consider enclosing it in a VPN.

Network File System (NFS): TCP Port 2049. Network service used to support file sharing between dissimilar systems. Consider enclosing it in a VPN.

SNMP: UDP Port 161, Port 162 for trap messages. Used SNMPv3 only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the different types of ports?

A

Connections via the transport layer are done via ports. They are 16 digit binary numbers, so there are 65,536 possible ports. An IP address plus a port number is a socket.

First 1024 ports are ““well known.”” Reserved for servers. Up to 49,151 are registered software ports. Softwware products register these with IANA. The rest are known as random, dynamic, or ephemeral. Clients often use them as a source port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between a FIN and a RST packet?

A

FIN for graceful shutdown, RST is sudden.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the basics of DNS.

A

Domain name is a temporary human friendly name, IP address is a temporary logical address.

DNS is a hierarchial naming system. In www.google.com, com is the TLD, Google is the registered domain, and www is the subdomain. registered domain name is registered with approved domain registrars. Total length of a FQDN, including the dots. must be 253 or fewer characters. No single section can exceed 63 characters. Only letters, numbers, and hyphens are permitted.

Every registered domain must have an authoritative name server. The primary one hosts the original editable zone file; secondary ones have read-only copies. A zone file is the collection of resource records or details about the specific domain. Originally there was a static local file, but a dynamic DNS query system has replaced it.

When a client points to a FQDN, it first checks the local cache to see whether the answer is already known. The cache has pre-loaded local hosts and any DNS query results. If the answer isn’t there, a DNS query is sent to the DNS server.

TCP Port 53 is used for zone transfers, which are zone file exchanges between DNS servers, special manual queries, or responses exceeding 512 bytes. UDP Port 53 is used for most DNS queries.

DNSSEC is a security improvement that provides mutual certificate authentication and encrypts sessions. It only applies to DNS servers, not clients performing queries. Non-DNS servers should use DNS over HTTPS. Oblivious DoH adds a DNS proxy between the client and resolver to protect the identity of the requesting client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is DNS poisoning and how do you protect against it?

A

Act of falsifying DNS information used by a client to reach a desired system. It can happen in various ways:

–Rogue DNS serer. Can listen in on network traffic for DNS queries and send back a response with false information. Once the client receives a response, it will close the query and ignore the real response. DNS queries contain a 16-bit value known as the query ID. Rogue DNS responses must include the QID.

–DNS cache poisoning. DNS poisoning is attacking DNS servers and placing false information into the zone file or cache. This is aimed to alter the primary record in the zone file. This typically gets noticed very quickly. An alternative is cache poisoning. A caching DNS server is any DNS sytem deloyed to cache DNS information from other DNS servers. This conttent is not generally monitored because they are for local users. May not get noticed.
–DNS pharming. Malicious redirection of a URL or IP address to a fake Web site. Typically occurs by modifying the local hosts file or by poisoning or spoofing DNS resolution.
–Altering the hosts file. Modifying the hosts file by placing false data into it. When the system boots up, it will be read into memory and take precedence. It is effective but highly targeted.
–Corrupt the IP configuration. Can result in a client having false DNS server definition. The DNS server address is typically distributed via DHCP but can be assigned statically. Attacks try to alter DHCP or through a script.
–DNS query spoofing. When a hacker eavesdrops on a client’s query and sends back a false result.
–Use proxy falsification. Could be implemented via DNS if the proxy’s domain name has been resolved by the client to use the proxy. A rogue proxy server can modify traffic packets to go wherever the hacker wants.

Limit zone transfers from internal DNS servers to external servers. Do this by blocking inbound TCP Port 53 and UDP Port 53.

Require internal clients to resolve all domain names through internal DNS. Block outbound UDP Port 53 but allow TCP Port 53.

Limit the external DNS servers from which DNS servers pull zone transfers.

Deploy a NIDS to watch for unusual DNS traffic.

Properly harden all DNS, server, and client systems in your network.

use DNSSEC.

Use DoH or ODoH.

A split DNS uses one DNS server for public use and one for private use.

A DNS sinkhole attempts to provide false responses to malware to protect C2 systems, and protect users from accessing known malicious sites.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can IPv4 and IPv6 exist on the same network?

A

There are three ways for IPv4 and IPv6 to exist on the same network.

Dual stack means having systems operate both and using the protocol for each.

Tunneling allows most systems to operate on one, and use an encapsulation tunnel to access systems on the others.

NAT Protocol Translation (NAT-PT) can be used to convert between IPv4 and IPv6, similar to how it converts between internal and external addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What numbers go with each IP class?

A

Class A: 1-126
Class B: 128-191
Class C: 192-223
Class D: 224-239
Class E: 240-255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How many hosts does each type of class support?

A

Class A supports 16,777,214 hosts. Class B supports 65,534 hosts. Class C supports 254 hosts. D is used for multicasting and E is reserved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is IGMP?

A

Internet Group Management Protocol allows systems to support multicasting. This is the transmission of data to multiple specific recipients. It is used to manage a host’s dynamic multicast group management. With IGMP, s single initial signal is multiplied at the router if divergent pathways exist to the intended recipients. Multicasting can be assisted by a TFTP systtem to host or cache content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is ARP? What is ARP poisoning?

A

ARP is used to resolve IP addresses into 48-bit MAC addresses. Traffic on a network segment is directed from source to destination via MAC addresses. ARP is carried as the payload on an Ethernet frame and is a dependent Layer 2 protocol. It uses caching and broadcasting to perform its operations. If the needed information is already present in the ARP cache, it is used. Otherwise, there is an ARP broadcast. If the system is on the subnet, it will respond; otherwise, the system will use its gateway MAC address.

ARP cache poisoning or spoofing is caused by an attacker responding with false replies. The ARP cache is updated each time an ARP reply is received. Content usually remains for 10 minutes. Another form is ARP poisoning is gratuitous ARP or unsolicited ARP replies. This occurs when a system announces its MAC-to-IP mapping withoutt being asked. A third form of ARP cache poisoning is to create static ARP entries. This is done via the ARP command and must be done locall; however it can be done with a malicious script.

The best defense against ARP-based attacks is port security on the switch. Switch port security can prohibit communications with unknown, unauthorized, rogue devices and may be able to determine which system is responding to all ARP queries and block it. A local or software firewall, HIDS, or special endpoint security products can also help. One tool is arpwatch. Static ARP entries can also be used as a defense (not just as an attack), but you lose flexibility, and will have to redo after each reboot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the implications of multilayer protocols?

A

TCP/IP is a multilayer protocol. For a typical web connection, HTTP is encapsulated in TCP, which is encapsulated in IP, which is encapsulated in Ethernet.

[Ethernet [IP [TCP [HTTP [Payload] ] ] ] ]

You can add additional layers of encapsulation, such as with TLS encryption

[Ethernet [IP [TCP [TLS [HTTP [Payload] ] ] ] ] ]

You can then add network layer encryption

[Ethernet [IPSec [IP [TCP [TLS [HTTP [Payload] ] ] ] ] ]]

This is not always used for benign purposes. Covert channel communications use encapsulation to hide an unauthorized protocol inside an authroized one. Filters can be bypassed. Logically imposed network segment boundaries can be overstepped.

The advantage of multilayer protocols is a wide range of protocols can be used at higher layers; encryption can be incorporated at various layers; and there is supported flexibility in complex network structures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Describe converged protocols.

A

The merging of specialty or proprietary protocols with standard protocols, such as those from the TCP/IP suite. this allows existing TCP/IP network infrastructure to host special services without needing unique deployments.

–Storage Area Networks: Secondary network used to consolidate and manage various storage devices into a single network-accessible storage container. Used to enhance hard drives, drive arrays, optical jukeboxes, and tape libraries so they appear to servers to be local.

–Fibre channel over Ethernet (FCoE): A form of network-data storage solution (SAN or NAS) that allows for high-speed file transfers upward of 128 GBps. It operates at layer 2. Although FC typically needs its own wiring FCoE can use existing network infrastructure (assuming you have 10 Gbps Ethernet). It will operate at layer 3. Fiber Channel over IP (FCIP) is the SAN equivalent of VOIP.

–Multiprotocol Label Switching (MPLS): A high-throughput high performance network technology that directs data across a network based on short path labels instead of longer network addresses. This saves significant time. It can handle many protocols.

–Internet Small Computer System Interface (iSCSI): A networking storage standard based on IP that operates at layer 3. Can be used to enable location-independent file storage, transmission, and retrieval. Low-cost alternative to FCoE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is microsegmentation?

A

Networks are usually segmented or subdivided into smaller organizational units. Segmentation can boost performance, reduce congestion, and provide security by isolating traffic and user access.

Segments can be created using switch-based VLANs, routers, or firewalls. A private LAN or intranet, screened subnet, and an extranet are examples of network segments.

Out of band pathways create a separate and distinct network structure for traffic that would otherwise interfere with the production network or be put at risk on the production network. Secondary network paths may be created to support data storage traffic, VoIP, backup data, patch distribution, and management operations.

Microsegmentation is dividing an internal network into numerous subzones, potentially as small as a single device. This could be a high-value server or client. Each zone is separated by internal segmentation firewalls (ISFWs), subnets, VLANs, or other virtual networking solutions. All communications between zones are required to authenticate, require session encryption, and may be subject to allowlisting and blocklisting. In some cases, communication must be encapsulated for egress.

Virtual eXtensible LAN (VXLAN) is an encapsulation protocol that allows VLANs to be stretched across subnets and geographic distances. VLANs are typically restricted to layer 2 network areas and are not able to include members from other networks. VXLAN allows for up to 16 million virtual networks, whereas traditonal VLANs only support 4,096. Defined in RFC 7348.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the generations of wireless?

A

802.11: 2 Mbps, 2.4 GHZ
a: Wi-Fi 2, 54 Mbps, 5 GHz
b: Wi-Fi 1, 11 Mbps, 2.4 GHz
g: Wi-Fi 3, 54 Mbps, 2.4 GHz
n: Wi-Fi 4, 200 plus Mbps, either
ac: Wi-Fi 5, 1 Gbps, 5 GHz
ax: Wi-Fi 6 or 6E, 9 Gbps, 1-5/1-6 Ghz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the wireless deployment modes?

A

Wi-Fi can be deployed in either ad hoc mode/peer to peer Wi Fi or infrastructure mode.

Ad hoc means any two wireless devices can communicate without a centralized control authority (base station or AP). WiFi Direct is an upgraded version that supports WPA2 and WPA3; original only supported WEP.

Infrastructure mode requires a WAP. It has several variations, including standalone, wired extension, enterprise extended, and bridge.

—Standalone is when there is a WAP connecting wireless clients to one another but not any wired devices.
—Wired Extension Mode is when the WAP acts as a connection point to link the wireless clients to the wired network.
—Enterprise extended mod is when multiple WAPs are used to connect a large physical area to the same network. Each WAP will use the same extended SSID so that clients can roam the area while maintaining network connectivity, even while their wireless NICs change associations from one WAP to another.

A bridge mode deployment is when a wireless connection links wired networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the difference between thin and fat access points?

A

A fat access point is a base station that is a fully managed wireless system, which operates as a standalone wireless solution.

A thin access point is a transmitter/receiver that is accessed from a separate console called a wireless controller. The benefit of thin access points is that management, security, routing, filtering, etc is centralized.

Most fat access points require device by device configuration. Controller-base WAPs are thin access points; standalone WAPs are fat access points.

26
Q

What is the difference between 2.4 Ghz and 5 Ghz?

A

2.4 ghz are 22 MHz wide and 5 MHz apart.

5GHz are 20 MHz wide and 20 MHz apart.

2.4 provides good coverage over a distance but is slower; 5 is preferred for internal networks because it has high throughout but it does not penetrate solid objects.

Mesh WiFi is based on 5 Ghz and uses 3 or more mini WAP to povide optimized coverage.

6GHz will support up to 7 160 Mhz channels more than the 5 GHz.

27
Q

Describe Bluetooth threats.

A

–Bluesniffing is network packet capturing

–Bluesmacking is a DoS attack against a Bluetooth device

–Bluejacking is sending unsolicited messages to Bluetooth-capable devices.

–Bluesnarfing is the unauthorized access of data via a Bluetooth connection. Typically occurs over a paired link between the hacker’s system and the target. Also possible against nondiscoverable devices if their MAC addresses are known.

–Bluebugging grants an attacker remote control over your hardware and software of your devices over a Bluetooth connection.

28
Q

What is the difference between rogue access points and evil twins?

A

May be planted for convenience, installed internally by an intruder, or operated externally. Unauthorized WAPs are generally not configured for security.

One approach is to duplicate the SSID, MAC, or wireless channel of a valid WAP, but operate at a higher power rating. Clients that may have connected to the valid WAP may instead connect to the rogue WAP.

Another possibility is to set the SSID to be the same as the valid one to attract new clients.

For evil twins, Hacker operates a false AP that clones a legit one. Each time a device connects to the wireless network, it retains a profile in its history. When it sees the network, it tries to reconnect. so if you clone the MAC and SSID, it will try to connect. This can lead to an attempt to eavesdrop on communications, which could lead to session hijacking, data manipulation, and identity theft.

Difference with rogue APs is that it’s not attached to original network.

29
Q

What is a Zigbee?

A

IoT equipment communications concept based on Bluetooth. Has lower power consumption and low throughout, and requires close proximity. Uses a 128-bit encryption mechanism.

30
Q

What are content distribution networks?

A

Collection of resource services deployed in numerous data centers acoss the Internet to provide low latency, high performance, and high availability of hosted content. They provide the desired multimedia performance quality. Rather than having all media hosted in a single location, it is distributed to numerous geographic pre-staged locations. This results in geographic and logical load-balancing. No one server or cluster of services will be strained. The result is lower latency and higher quality throughput. Cloudflare, Akamai, Amazon Cloudfront, CacheFly, and Level 3 communications are major CDN providers.

Client-based CDN is also possible. This is known as P2P. BitTorrent is the most prominent.

31
Q

What is a screened subnet?

A

A screened subnet (previously known as a DMZ) is a special purpose extranet designed specifically for low-trust and unknown users to access specific systems,, such as the public accessing a web server. It can be implemented with two firewalls or one multihomed firewall. It positions one firewall between the screened subnet and the Internet, and the second between the subnet and the intranet. With a multihorned firewall, one interface connects to the internet, one to subnet, and one to the intranet.

32
Q

What is a screened host?

A

A screened host is a firewall-protected system logically positioned just inside a network segment. All inbound traffic is routed to the screened host, which acts as a proxy for all the trusted systems within the private network. It is responsible for filtering traffic coming into the private network and protecting the identity of the internal system.

33
Q

What is the difference between north-south and east-west traffic?

A

East-west traffic is traffic flow within a specific network, data center, or cloud environment. North-south traffic referres to inbound/outbound traffic.

34
Q

What is a collision domain?

A

A collision domain is the group of networked systems that could cause a collision if any two or more systems transmit simultaneously. Collision domains are divided by using any layer 2 or higher device.

35
Q

What is a broadcast domain?

A

A broadcast occurs when a single systems transmit data to all possible recipients. A broadcast domain is the group of networked systems in which all other members receive a broadcast signal when one member transmits it. Usually, the term broadast domain is used to refer specifically to Ethernet broadcast domains. Ethernet broadcast domains are divided by any layer 3 or higher device.

36
Q

What are repeaters, concentrators, and amplifiers?

A

Repeaters, Concentrators, and Amplifiers: Used to strengthen the communication signal over a cable segment, and to connect network segments that use the same protocol. They operate at OSI layer 1. Systems on either side of an RCA are part of the same collision domain and broadcast domain.

37
Q

What are hubs?

A

Hubs: Used to connect multiple systems and connect network segments that use the same protocol. They are multiport repeaters. They operate at layer 1. Systems on either side are part of the same collision and broadcast domains.

38
Q

What are modems?

A

Modems: Modulator/demodulator. Traditional ones converted between analog carrier signals and digital information. Note: most modern devices labeled modems are really routers, because they are not performing modulation.

39
Q

What are bridges?

A

Bridges: Used to connect two different networks together, even networks of different topologies, cabling types, and speeds, in order to connect network segments that use the same protocol. A bridge forwards traffic from one network to another. If there are different transmission speeds, it may have a buffer to store packets until they can bbe forwarded. This is known as store-and-forward. Operate at layer 2. Used to connect hub networks; largely replaced by switches.

40
Q

What are switches?

A

Switches: Manage the transmission of frames via MAC address. Can also create separate broadcast domains when used to create VLANs. They primarily operate at Layer 2. When they have additional features, such as routing among VLANs, they can also operate at Layer 3.

41
Q

What are routers?

A

Routers: Used to control traffic flow on networks. Often used to connect similar networks and control traffic flow between them. They manage traffic based on logical IP addressing. Can use static routing tables or dynamic routing. Operate at Layer 3.

42
Q

What is a jump server?

A

Jumpbox: A jump server or jumpbox is a remote access system deployed to make accessing a specific system or network easier or more secure. Often deployed in extranets, screened subnets, or cloud networks where a standard direct link is not available or considered safe. It can be deployed to receive an in-band VPN connecton, but most are configured to receive out-of-band connections such as direct dial-up or Internet origin broadband links. Make sure only encrypted connections are employed.

43
Q

What is a System on a Chip?

A

System on a Chip (SoC): Integrated circuit (IC) or chip that has all of the elements of a computer on a single chip. This includes the CPU, RAM, a GPU, WiFi, wired networking, peripheral interfaces, and power management. In some cases, the only thing missing compared with a full computer is bulk storage. Often a bulk storage devices must be attached to store its programs. It usually only has enough memory to retain its own firware or OS. Security risks include that the firmware is minimal, so not much room for security features. May be able to filter input (by length or to escape metacharacters), reject unsigned code, provide basic firewall filtering, use communication encryption, and offer secure authentication. But not available on all SoC products. Raspberry Pi, fitness trackers, smart watches, and some smartphones use SoC.

44
Q

What is a bastion host?

A

A system is considered a bastion host if it is a highly exposed device that is most likely to be targeted by attackers. The closer any system is to an untrusted network, such as the Internet, the more it is considered a target candidate since it has a smaller number of layers of protection guarding it. If a system is on the public side of a DMZ or is directly connected to an untrusted network, it is considered a bastion host; thus, it needs to be extremely locked down.

45
Q

What is a proxy firewall?

A

A proxy firewall stands between a trusted network and an untrusted network and makes the connection, each way, on behalf of the source. What is important is that a proxy firewall breaks the communication channel; there is no direct connection between the two communicating devices. Where a packet-filtering device just monitors traffic as it is traversing a network connection, a proxy ends the communication session and restarts it on behalf of the sending system.

A forward proxy is most common, and acts as an intermediary for queries of external resources. A reverse proxy handles inbound requests. It is similar to port forwarding and static NAT. It is sometimes used on screened subnets in order to use private IP addresses on resource servers but allow for visitors from the public Internet.

If a client is not configured to send packets to the proxy but the network sends them anyway, it is a transparent proxy. A nontransparent proxy means the client is configured to send queries to the proxy. This can be set manually, or a proxy auto-config file (PAC) can be implemented via script or via DHCP.

46
Q

What is a static firewall?

A

AKA screening router. Analyzes packets based on an individual basis against the filtering ACLs or rules. The context of the packet (aka any previous packets) is not used to make an allow or deny decisions.

This is also a stateless firewall, since each firewall is not used to make an allow or deny decision.

47
Q

What is an application firewall?

A

Filters traffic based on a single Internet service, protocol, or application, They operate at layer 7. An example is a Web application firewall (WAF). They can be stateful or stateless.

A WAF is an appliance, server add-on, virtual service, or system filter that defines a strict set of communication rules for communications to and from a web site.

48
Q

What is a circuit-level firewall?

A

AKA circuit proxies. Used to establish communications between trusted partners. Theoretically operate at Level 5, although in reality they operate at Layer 4 because they use TCP sessions. SOCKS (Socket Secure) is a common implementation. They focus on the establishment of a circuit, aka session, not the content of traffic, based on simple rules for IP and port, using captive portals, requiring port authentication via 802.1X, or more complex elments of access control. They are stateless.

49
Q

What is a TCP wrapper?

A

Application that can serve as a basic firewall by restricting access to ports and resources based on user IDs or system IDs. This is a form of port-based access control.

50
Q

What is a stateful firewall?

A

Aka dynamic packet filtering. Evaluate the state, session, or context of network traffic. By examining source and destination IP addresses, application usage, source of origin (local or remote, physical port, or routed path/vector), and the relationship between current packets and previous packets, they are able to grant a broader range of access for authorized users and activities.

They operate at Layer 3 and above. They are aware that any valid outbound communication will trigger a corresponding response. So they automatically create a temporary response rule that last as long as the conversation is taking place.

Additionally, stateful firewalls can return knowledge of previous packets to detect unwanted or malicious traffic. This is known as context analysis. They may also perform deep packet inspection, which is the analysis of the payload of the payload.

51
Q

What is a next-generation firewall?

A

Has security features in addition to a firewall, including application filtering, DPI, TLS offloading or inspection, domain and URL filtering, IDS, IPS, web content filtering, Qos management, bandwidth throttling/management, NAT, VPN anchoring, authenication services, identity management, and AV/malware scanning.

52
Q

What is a host-based firewall?

A

One installed on the client. Protects the local system, and can often limit communications of installed applications and protocols. It can be a static filtering firewall, do stateful inspection, or be a NGFW.

53
Q

What is endpoint detection and response?

A

EDR is a security mechanism that is an evolution of traditional antimalware, IDS, and firewall solutions. It seeks to detect, record, evaluate, and respond to suspicious activities and events. Some use an on-device analysis engine; others report back to a central server or the cloud. The ogal is to detect more advanced threats than what AV or HIDS can detect.

Related concepts are managed detection and response (MDR), which is not limited to endpoints but tries to monitor the whole IT environment and may include SIEM, network traffic analysis, EDR, and IDS; endpoint protection platform (EPP), which is a variation of EDR like IPS is a variation of IDS, with a focus on predict and prevent, not just detect; and extended detection and response (XDR), which is EDR, EMDR, EPP, and maybe NTA, NIDS, and NIPS.

MSSPs may provide XDR solutions that are centrally managed. They can be fully on-prem, fully cloud, or a hybrid.

54
Q

Describe coaxial cable.

A

Was popular in the 1970s and 1980s. Declined in the 1990s because of the popularity of twisted pair wiring. It has a center core of copper wire surrounded by insulation. That in turn is surrounded by conductive braided shielding. The center core copper and braided shielded layer act as two independent conductors, allowing two-way communications. It was fairly resistant to electromagnetic interference and able to support high bandwidth relative to other contemporary tech. It also offers longer usable lengths that twisted pair. However, twisted pair was cheaper and easier to install. coax requires segment terminators. Also bulkier and has a larger minimum arc (how much it can be bent before being damaged).

Two types: thinnet and thicknet. Thinnet (10Base2) was common for connecting systems to backbone trunks. It can span 185 meters and provide throughput of 10 Mbps. Thicknet (10Base5) can span 500 meters and is used for backbone trunks, same bandwidth.

55
Q

What is the difference between baseband and broadband cable?

A

Naming convention is XXyyyyZZ. XX is the maximum speed, yyyy is the baseband or broadband, and ZZ is either the distance of the cable or a reference to the technology. So 10Base2 was a preference to 200 meters (rounded). T or TX is for twisted pair.

Baseband cables can transmit a single signal at a time, and broadband cables can transmit multiple signals. Most networking cables are baseband.

Baseband uses a current applied to a cable. Current at a higher level is 1, lower level is 0. Ethernet is a baseband technology.

Broadband uses frequency modulation to support numerous channels. It is a form of analog. Cable television and cable modems, DSL, T1, and T3 are broadband technologies.

56
Q

Describe twisted pair cable.

A

Thin and flexible compared to coaxial cable. It consists of four pairs of wires twisted around each other and sheated with a PVC insulator. If there is a metal foil wrapper, it is shield twisted pair (STP); othewise it is UTP. The twisting provides protection from external radio frequencies and electirc and magnetic interference, and reduces crosstalk. Each pair is twisted at a different rate. The tighter the twist, the more rresistant to inteference and the higher bandwidth.

Categories:
–Cat 1: 1 Mbps. Primarily for voice. Not suitable for networks but ok for modems
–Cat 2: 4 Mbps. Original token ring networks and host-to terminal connections on mainframes
–Cat 3: 10 Mbps. Primarily used in Ethernet and as telephone cables
–Cat 4: 16 Mbps. Primarily used in token ring networks
–Cat 5: 100 Mbps. used in 100BaseTX, FDDI, and ATM networks
–Cat 5e: 1 Gbps. Gigabit Ethernet (1000BaseT)
–Cat 6: 1 Gbps. Gigabit Ethernet (10G Ethernet with 55-meter distance limit)
–Cat 6a: 10 Gbps. Gigabit Ethernet (10G Ethernet)
–Cat 7: 10 Gbps. Gigabit Ethernet (10G Ethernet)
–Cat 8: 40 Gbps. 10G+ Ethernet

Main problems: using the wrong category of twisted pair for high-throughput networking; deploying twisted pair longer than 100 meters; and using UTP in environments with significant interference

57
Q

What is the 5-4-3 rule?

A

Used whenever Ethernet or other shared access networks are deployed using hubs and repeaters in a tree topology. This dfines the number of repeaters or concentrators you should use. Between any two nodes, there can be a max of five sgements, with four repeaters/concentrators; and only three of the five segments can be populated (have connections to other hosts or networking devices). Does not apply to switched networks or the use of bridges or routers.

58
Q

Describe fiber optic cables.

A

Transmit pulses of light instead of electricity. This means they are very fast and nearly impervious to tapping and interference. Can be single mode (single light signal) or multimode (multiple light signals). Single mode has a thinner core, lower attenuation, and potentially unlimited distance. It uses a 1310 nm or 1550 nm wavelength laser, can be deployed in runs of 10km without repeaters, and typically sheated in yellow. Multimode typically uses 850 nm or 1300 nm lasers, has a max run of 400meters without repeaters, and is typically sheathed in blue.

59
Q

What is the difference between analog and digital?

A

Analog is a continuous signal that varies in frequence, amplitude, phase, voltage, etc. The variance produces a wave shape. Digital communication occurs through a discontinuous electical signal and a state change or on-off pulses. Square shape.

Digital signals are more reliable over long distances or when interference is present. This is because their information storage is definitive; either there is signal or there is not. Attenuation causes analog signals to become corrupted, and there are an infinite number of variations. So extracting the signal becomes more difficult.

60
Q

What is the difference between synchronous and asynchronous communications?

A

Synchronous communications rely on a timing or clocking mechanism, either using a clock or a time stamp in the data stream. They typically can support very high rates of data transfer.

Asynchronous communications rely on a stop and start delimeter bit to manage transmission. These are better suited for smaller data streams, like PSTN modems.

61
Q

How to prevent collisions?

A

There are at least five technologies used to avoid or prevent collisions.

Carrier-Sense Multiple Access (CSMA): Host listens to determine whether it’s in use. If not, it transmits. It waits for an acknowledgement. If it doesn’t get one, it re-transmits. It does not directly address collisions.

Carrier-Sense Multiple Access with Collision Detection (CSMA/CD): Starts the same way, but it listens for collisions. If it hears one, it transmits a jam signal. All hosts stop transmitting and wait a random period of time before trying again. Collisions still happen; there is about a 40 percent loss of throughput with this technology (which is what Ethernet uses).

CSMA with Collision Avoidance (CSMA/CA: Hoss have two connects to the LAN media; they listen on an inbound connection and transmit on the outbound connection. When they are ready to transmit, they request permission. If not granted after a time-out period, they start again. Otherwise they transmit. They wait for an acknowledgement. If no acknowledgement, they start again. 802.11 uses this.

Token Passing: This is passing possession of the token ring, such as with Token Ring and Fiber Distributed Data Interface (FDDI). There are no collisions.

Polling: Communications using a primary/secondary configuration. One system is primary, and all others are secondary. The primary system pools each secondary system whether it has a need to transmit data. If yes, it grants permission. It then moves to the next secondary system. Also possible to give certain systems preference, ie use an order of 1,2,1,3,1,4 instead of 1,2,3,4.