Chapter 11 - Secure Network Architecture and Securing Network Components Flashcards
Which OSI model layer manages communications in simplex, half-duplex, and full-duplex modes?
Session Layer
Cable is the least resistant to EMI
10Base-T UTP
Which networking technology is based on the IEEE 802.3 standard?
Ethernet
Which of the following statement correctly describes one way SSL authentication between a client (e.g browser) and a server (e.g. webserver)?
In one way authentication only server needs to be authenticated where as in mutual authentication both the client and the server needs to be authenticated.
Familiar with first bit of the IP address of different class of network
Each Class A network address has a 8-bit network prefix, with the first bit of the ipaddress set to zero. See the diagram below for more details.
The first bit of the IP address would be set to one and the second bit set to zero would be a Class B network address.
The first two bits of the IP address would be set to one, and the third bit set to zero, would be a Class C network address.
Class D & E have the first three bits set to 1.
Class D the 4th bit is 0 and for
Class E the 4th bit to 1.
See diagram below from the 3COM tutorial on everything you ever wanted to know about IP addressing:
https://www.freepracticetests.org/images/classful_IP_address_format.jpg
At which layer of the OSI model do sniffers operate?
Layer 2
WPA2 features
WPA2 implements IEEE 802.11i standards, uses AES encryption and is currently comes in two versions:
WPA2 Personal: AKA PSK Pre-shared key (Password)
WPA2 Enterprise: Requires a RADIUS Authentication Server and supports multiple accounts for each user
Static keys was an unfortunate feature of WEP which was partly to blame for its relatively short lifespan and quick replacement by WPA.
SRTP
SRTP - Secure Real-time Transport Protocol provides protection against sniffing and replay attacks but also provides message authentication and integrity. (VoIP)
SRTP uses AES - Advanced Encryption Standard as the default cipher.
Be familiar with IP protocol field number
The protocol field of the IP packet dictates what protocol the IP packet is using.
TCP=6, ICMP=1, UDP=17, IGMP=2
Popular protocol number for ssh, Kerberos,netbooks, leap, http s, secure ldap
SSH - 22 Kerberos - 88 NetBIOS - 137 LDAP - 389 HTTPS - 443 Secure LDAP - 636
functionality of the CHAP protocol
CHAP is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients. CHAP periodically verifies the identity of the client by using a three-way handshake. This happens at the time of establishing the initial link, and may happen again at any time afterwards. The verification is based on a shared secret (such as the client user’s password).
After the completion of the link establishment phase, the authenticator sends a “challenge” message to the peer.
The peer responds with a value calculated using a one-way hash function on the challenge and the secret combined.
The authenticator checks the response against its own calculation of the expected hash value. If the values match, the authenticator acknowledges the authentication; otherwise it should terminate the connection.
At random intervals the authenticator sends a new challenge to the peer and repeats steps 1 through 3.
functionality of the CHAP protocol
CHAP is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients. CHAP periodically verifies the identity of the client by using a three-way handshake. This happens at the time of establishing the initial link, and may happen again at any time afterwards. The verification is based on a shared secret (such as the client user’s password).
After the completion of the link establishment phase, the authenticator sends a “challenge” message to the peer.
The peer responds with a value calculated using a one-way hash function on the challenge and the secret combined.
The authenticator checks the response against its own calculation of the expected hash value. If the values match, the authenticator acknowledges the authentication; otherwise it should terminate the connection.
At random intervals the authenticator sends a new challenge to the peer and repeats steps 1 through 3.
the only two parts of a packet which changes between sending host and the receiving host while in transit?
TTL - Time to Live. It’s that part of the IP Header that prevents packets from wandering around the internet forever looking for the destination. When a packet crosses a layer 3 routing device its TTL field (Byte Offset 8) is decremented by one and once that value reaches 0 a “TTL Expired in Transit” ICMP error message is sent back to the originator alerting it that the packet could not find its destination.
- MAC - Media Access Control Address: MAC Addresses are local only to the network you are on. The moment it hits the first router or switch the Source and Destination MAC Addresses change to the next hop in the path. This happens at each device it crosses. (See more about Ethernet.)
How many bits are in the TTL Field of an IP Header?
In an IP Header in Byte Offset 8 there are 8 bits yielding 255 possible maximum hops before any packet expires.
What is the IPv6 equivalent of ARP?
With IPV6, ARP is known as Neighbor Discovery Protocol and is also a layer 2 protocol responsible for auto-configuration of nodes on a link and how they find and communication with one another.
Identify the OSI layer from the following description:
a. Responsible for Establishing the connection between applications
b. Maintain the connection during transfer of data
c. Control the release of connection
Session Layer
Which of the following layer of an OSI model ensures that messages are delivered error-free, in sequence, and with no losses or duplications?
Transport Layer
Message Switching
Message switching is a network switching technique in which data is routed in its entirety from the source node to the destination node, one hope at a time. During message routing, every intermediate switch in the network stores the whole message. If the entire network’s resources are engaged or the network becomes blocked, the message-switched network stores and delays the message until ample resources become available for effective transmission of the message.
X.25 is an ITU-T standard protocol suite for packet switched wide area network (WAN) communication. X.25 is a packet switching technology which uses carrier switch to provide connectivity for many different networks.
X.25 is an ITU-T standard protocol suite for packet switched wide area network (WAN) communication. X.25 is a packet switching technology which uses carrier switch to provide connectivity for many different networks.
ATM
Asynchronous Transfer Mode (ATM)
Uses Cell switching method
High speed network technology used for LAN, MAN and WAN
Like a frame relay it is connection oriented technology which creates and uses fixed channel
Data are segmented into fixed size cell of 53 bytes
Some companies have replaces FDDI back-end with ATM