Chapter 11: Securing TCP/IP Flashcards

1
Q

Plaintext/Cleartext

A

Data that is in an easily read or viewed format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Symmetric-Key Algorithm

A

Any encryption method that uses the same key for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Assymetric-Key Algorithm

A

Any encryption method that uses different keys for encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Block Cipher

A
  • An encryption algorithm in which data is encrypted in “chunks” of a certain length at a time.
  • Popular in wired networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stream Cipher

A

An encryption method that encrypts a single bit at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rivest Cipher 4 (RC4)

A

Was the dominant stream cipher for a time, but now is not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Advanced Encryption Standard (AES)

A

A block cipher that uses a 128-bit block size and 128, 192, or 256 bit key size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the most popular form of email encryption?

A

Public-Key Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rivest Shamir Adleman (RSA)

A

An improved asymmetric cryptography algorithm that enables secure digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPsec

A

The Network layer encryption protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Integrity

A

The process that guarantees that the data received is the same as originally sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Secure Hash Algorithm (SHA)

A

The primary family of cryptographic hash functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Two unsafe algorithms

A

SHA-1 and Message-Digest Algorithm version 5 (MD5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Nonrepudiation

A

The receiver of info has a very high confidence that the sender of a piece of info truly is who the receiver thinks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital Signature

A

An encrypted hash of a private encryption key that verifies a sender’s identity to those who receive encrypted data or messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Certificate

A

A standardized type of digital signature that includes the digital signature of a third party (like GoDaddy) that guarantees that who is passing out this certificate truly is who they say they are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Public-Key Infrastructure (PKI)

A

The system for creating and distributing digital certificates using sites like GoDaddy, VeriSign, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Authentication

A

The process of positively identifying users trying to access data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Authorization

A

Defines what an authenticated user can do with data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Network Access Control (NAC)

A

Control over information, people, access, machines, and everything in between

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Access Control List (ACL)

A

A clearly defined list of permissions that specifies what an authenticated user may perform on a shared resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Mandatory Access Control (MAC)

A

Authorization method in which every resource is assigned a label that defines its security level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Discretionary Access Control (DAC)

A

Authorization method based on the idea that there is an owner of a resource who may at his or her discretion assign access to that resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Role-Based Access Control (RBAC)

A

Authorization method that defines a user’s access to a resource based on the roles the user plays in the network environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Point-to-Point Protocol (PPP)

A

Enables two point-to-point devices to connect, authenticate, and negotiate the network protocol the two devices will use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The 5 Distinct Phases to a PPP Connection

A

1) Link Dead: No link yet.
2) Link Establishment: Link Control Protocol (LCP) communicates with the LCP on the other side of the PPP link.
3) Authentication: Username/Password
4) Network layer protocol: LCP uses a protocol called Network Control Protocol (NCP) to make proper connections
5) Termination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In a point-to-point connection, the side asking for the connection is the _______ and the other side is the ________.

A

Initiator, Authenticator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Password Authentication Protocol (PAP)

A

The oldest and most basic form of authentication.

Sends the passwords in cleartext!!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Challenge Handshake Authentication Protocol (CHAP)

A

A remote access authentication protocol that has the serving system challenge the remote client, which must provide an encrypted password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

MSCHAP

A

The most common authentication method for dial up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Authentication, Authorization, and Accounting (AAA)

A

A security philosophy based upon the three words it is named with, ya know?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Remote Authentication Dial-In User Service (RADIUS)

A
  • An AAA standard created to support ISP’s with hundreds or thousands of modems in hundreds of computers to connect to a single central database.
  • Either UDP 1812/1813 or UDP 1645/1646
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

3 Devices of RADIUS

A

1) Radius Server that has access to usernames/passwords
2) Network Access Servers (NAS) that control the modems
3) A group of systems that dial into the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the Microsoft RADIUS server?

A

Internet Authentication Service (IAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the Linux RADIUS server?

A

FreeRADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Terminal Access Controller Access Control System Plus (TACACS+)

A
  • A protocol developed by Cisco to support AAA in a network with many routers and switches.
  • TCP port 49
  • Similar to RADIUS, but separates authorization, authentication and accounting.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Kerberos

A

An authentication standard designed to allow different operating systems and applications to authenticate each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Key Distribution Center (KDC)

A

System for granting authentication in Kerberos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Two processes of KDC

A

1) Authentication Server (AS)

2) Ticket Granting Service (TGS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

In Windows, the security token is called a __________.

A

Security Identifier (SID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

EAP-PSK

A
  • Most popular form of authentication in wireless networks.

- Uses a shared secret code (password or whatever) stored on the WAP and the clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

EAP-TLS

A
  • A protocol that defines the use of a RADIUS server as well as mutual authentication, requiring certificates on both the server and every client.
  • Only used on wireless networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

EAP-TTLS

A

A protocol similar to EAP-TTLS, but only uses a single server-side certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

LEAP

A

Proprietary EAP used almost exclusively by Cisco wireless products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

802.1X

A
  • A port-authentication network access control mechanism for networks.
  • Uses EAP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Tunnel

A
  • An encrypted link between two programs on two separate computers
  • SSH creates encrypted tunnels
47
Q

SSL vs. TLS

A

SSL is limited to a few applications, whereas TLS is not limited (for the most part)

48
Q

IPsec

A

An authentication and encryption protocol suite that works at the Internet/Network layer

49
Q

Transport Mode of IPsec

A

Only the actual payload of the IP packet is encrypted, and the IP header info is readable.

50
Q

Payload

A

The primary data that is sent from a source network device to a destination network device.

51
Q

Tunnel Mode of IPsec

A

Entire IP packet is encrypted and encapsulated into another packet.

52
Q

Authentication Header (AH)

A

IPsec protocol for authentication

53
Q

Encapsulating Security Payload (ESP)

A

IPsec protocol involved in authentication and encryption

54
Q

Internet Security Association and Key Management Protocol (ISAKMP)

A

IPsec protocol used for establishing security associations that define things like the protocol used for exchanging keys.

55
Q

Two widely used key exchanging protocols

A

Internet Key Exchange (IKE) and Kerberized Internet Negotiation of Keys (KINK)

56
Q

Secure Copy Protocol (SCP)

A

One of the first protocols used to transfer data securely between two hosts.

57
Q

Secure FTP (SFTP)

A

Designed as a replacement for FTP after SCP was discovered to suck.

58
Q

OpenSSH

A

A series of secure programs developed to fix SSH’s limitation of only being able to handle one session per tunnel.

59
Q

Simple Network Management Protocol (SNMP)

A
  • A set of standards for communication with network devices in order to manage them.
  • UDP port 161
60
Q

Management Information Base (MIB)

A

SNMP’s version of a server

61
Q

Cacti

A

An SNMP tool that enables you to query an SNMP-capable device for info.

62
Q

Lightweight Directory Access Protocol (LDAP)

A
  • Tool that programs use to query and change a database

- TCP port 389

63
Q

Network Time Protocol (NTP)

A
  • Gives the current time

- UDP port 123

64
Q

WANs connect nodes, such as workstations, servers, printers, and other devices, in a small geographical area on a single network.​
(A) True
(B) False

A

Answer : (B)

65
Q

A bus topology WAN is often the best option for an organization with only a few sites and the capability to use dedicated circuits.​
(A) True
(B) False

A

Answer : (A)

66
Q

The carrier’s endpoint on a WAN is called the Data Communications Equipment (DCE)​.
(A) True
(B) False

A

Answer : (A)

67
Q

T-1 cables cannot utilize straight through cables using the same wiring scheme as LAN patch cables.​
(A) True
(B) False

A

Answer : (B)

68
Q

In a PON setup, the system is considered passive because no repeaters or other devices intervene between the carrier and the customer.
(A) True
(B) False

A

Answer : (A)

69
Q

The customer’s endpoint device on the WAN is called the __________________.​

A

Answer : Data Terminal Equipment (DTE)

70
Q

Multiplexing enables a single ____________ circuit to carry 24 channels, each capable of 64 Kbps throughput.​

A

Answer : T-1

71
Q

The ________________ distributes signals to multiple endpoints via fiber-optic cable, in the case of FTTP, or via copper or coax cable.​

A

Answer : Optical Network Unit (ONU)

72
Q

If the line between the carrier and the customer experiences significant errors on a T-1, a ____________ will report this fact to the carrier.​

A

Answer : smart jack

73
Q

In ATM, a packet is called a _____________ and always consists of 48 bytes of data plus a 5 byte header.Answer : cell

A

Answer : cell

74
Q
In what type of topology is each site connected to two other sites, ​providing redundancy?
 (A) ​bus topology 
(B) ​ring topology 
(C) ​star topology 
(D) ​circle topology
A

Answer : (B)

75
Q

What is the maximum throughput of a DS3 connection?​ (A) ​1.544
(B) ​3.152
(C) ​44.736
(D) ​274.176

A

Answer : (C)

76
Q
How many channels exist in a T1 connection?​
 (A) ​1 
(B) ​24
(C) ​48 
(D) ​96
A

Answer : (B)

77
Q
In an ISDN connection, what is the size throughput did a single B channel provide?​ 
(A) ​32 Kbps 
(B) ​48 Kbps 
(C) ​64 Kbps 
(D) ​96 Kbps Answer : (C)
A

Answer : (C)

78
Q
In a PON system, an OLT contains a splitter that splits each port into how many logical channels?​ 
(A) ​16 
(B) ​32 
(C) ​64 
(D) ​96
A

Answer : (B)

79
Q
What is the size of an ATM packet?​ 
(A) ​48 bytes 
(B) ​53 bytes 
(C) ​64 bytes 
(D) ​84 bytes
A

Answer : (B)

80
Q

Which option below is an advantage of leasing a frame relay circuit over leasing a dedicated circuit?
(A) ​You are guaranteed to receive the maximum amount of bandwidth specified in the circuit contract (B) ​You pay only for the bandwidth you’ve used.
(C) ​The paths that your data will take are always known.
(D) ​Frame relay is a newly established network technology with more features than other technology.

A

Answer : (B)

81
Q
What xDSL standard is the most popular?​ 
(A) ​VDSL 
(B) ​G.Lite 
(C) ​ADSL 
(D) ​HDSL
A

Answer : (C)

82
Q
What xDSL version provides a maximum throughput of 24 Mbps downstream and 3.3 Mbps upstream? 
(A) ​VDSL 
(B) ​ADSL 
(C) ​ADSL2+M 
(D) ​HDSL
A

Answer : (C)

83
Q
​The DTE or endpoint device for a leased line is known as which device below? 
(A) ​CSU/DSU 
(B) ​cable modem 
(C) ​DSL modem 
(D) ​ISDN modem
A

Answer : (A)

84
Q
What OC level is primarily used as a regional ISP backbone, and occasionally by very large hospitals, universities, or other major enterprises?​ 
(A) ​OC-3 
(B) ​OC-12
(C) ​OC-48 
(D) ​OC-96
A

Answer : (C)

85
Q
What is the maximum amount of throughput provided by an OC-12?​ 
(A) ​51.84 Mbps 
(B) ​155.52 Mbps 
(C) ​622.08 Mbps 
(D) ​1244.16 Mbps
A

Answer : (C)

86
Q
​What is the frequency range of the C-band that is used by satellites? 
(A) ​1.5 - 2.7 GHz
 (B) ​2.7 - 3.5 GHz 
(C) ​3.4 - 6.7 GHz 
(D) ​12 - 18 GHz
A

Answer : (C)

87
Q

​What Layer 3 technology is employed by distance-vector routing protocols in which a router knows which of its interfaces a routing update and will not retransmit, or advertise, that same update on the same interface? (A) split horizon​
(B) ​round robin
(C) ​reverse path check
(D) ​spanning tree protocol

A

Answer : (A)

88
Q
What protocol is commonly used to aggregate / bond T-1 / T-3 lines? 
(A) ​STP 
(B) ​MLPPP 
(C) ​MPLS
(D) ​PPTP
A

Answer : (B)

89
Q
When copper cabling is used to carry T-1 traffic, what kind of connector is used? 
(A) ​RJ-11 
(B) ​RJ-25 
(C) ​RJ-45 
D) ​RJ-48
A

Answer : (D)

90
Q
​When using frame relay, what is the name of the identifier that routers use to determine which circuit to send frames to? 
(A) ​SVC identifier 
(B) ​data link connection identifier 
(C) ​PVC identifier 
(D) ​frame path identifier
A

Answer : (B)

91
Q
​Which version of DOCSIS provides 38 Mbps per channel and requires a minimum of 4 channels to be used?
(A) ​DOCSIS 1 
(B) ​DOCSIS 2 
(C) ​DOCSIS 3 
(D) ​DOCSIS 4
A

Answer : (C)

92
Q

​The best 802.11n signal can travel approximately how far? (A) ​1 mile
(B) ​1/2 mile
C) ​1/4 mile
(D) ​300 feet

A

Answer : (C)

93
Q
In metro settings, end-to-end, carrier-grade Ethernet networks can be established via what protocol?​ 
(A) ​Metro Carrier Transport 
(B) ​Carrier Ethernet Transport 
(C) ​Intra-city Ethernet 
(D) ​Ethernet SONET
A

Answer : (B)

94
Q
A MAN connection is also known as which two terms below?​ 
(A) ​Ethernet MAN 
(B) ​Metro Ethernet 
(C) ​Carrier Ethernet 
(D) ​Packet MAN
A

Answer :

95
Q

True or False: A WAN link is a connection between one WAN site and another site.

A

Answer: True

96
Q

WANs that use the ____ topology are only practical for connecting fewer than four or five locations.

a. tiered
b. ring
c. star
d. mesh

A

Answer: B

97
Q

In the point-to-multipoint structure of a PON, the single endpoint at the carrier’s central office is known as which of the following?

a. OLT
b. PON
c. ONU
d. FTTP

A

Answer: A .

98
Q

True or False: PVCs are dedicated, individual links.

A

Answer: False

99
Q

A ____ converts the T-Carrier frames into frames the LAN can interpret and vice versa.

a. smart jack
b. CSU
c. DSU
d. terminal adapter

A

Answer: C

100
Q

True or False: Broadband cable relies on the PSTN for transmission medium.

A

Answer: False

101
Q

____ communication occurs when the downstream throughput is higher than the upstream throughput.

a. DSU
b. CSU
c. Symmetrical
d. Asymmetrical

A

Answer: D

102
Q

____ sets ATM apart from Ethernet.

a. Fixed packet size
b. Security
c. Wiring
d. Throughput

A

Answer: A

103
Q

True or False: An advantage of SONET is its fault tolerance.

A

Answer: True

104
Q

____ orbiting satellites are the type used by the most popular satellite Internet access service providers.

A

Answer: Geosynchronous

105
Q
What is the lowest layer of the OSI model at which LANs and WANs support the same 
protocols? 
A. Layer 2 
B. Layer 3 
C. Layer 4 
D. Layer 5
A

Answer: B. Layer 3

106
Q

An organization can lease a private, _________________ that is not shared with other users,
or a _________________ that can be physically configured over shared lines in the carrier’s
cloud.
A. Permanent virtual circuit (PVC), switched virtual circuit (SVC)
B. Switched virtual circuit (SVC), dedicated line
C. Dedicated line, virtual circuit
D. Switched virtual circuit (SVC), permanent virtual circuit (PVC)

A

Answer: C. Dedicated line, virtual circuit

107
Q
Which WAN topology always sends data directly from its origin to its destination? 
A. Bus topology 
B. Ring topology 
C. Star topology 
D. Mesh topology
A

Answer: D. Mesh topology

108
Q
What protocol is used to bond multiple T-1s? 
A. LACP 
B. MLP 
C. TCP/IP 
D. SSH
A

Answer: B. MLP

109
Q
What kind of device can monitor a connection at the demarc but cannot interpret data? 
A. CSU/DSU 
B. NID 
C. NIU 
D. Smart jack
A

Answer: D. Smart jack

110
Q
What specification defined the standards for broadband cable? 
A. ATM 
B. Digital signal 
C. ANSI 
D. DOCSIS
A

Answer: D. DOCSIS

111
Q
What technology allows a user to access the Internet through the wiring of a home? 
A. Ethernet over HDMI 
B. Broadband over power line 
C. Ethernet over power line 
D. Ethernet over SONET
A

Answer: C. Ethernet over power line

112
Q
\_\_\_\_\_\_\_\_\_\_\_\_\_\_ in SONET are analogous to the \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ of T-carriers. 
A. Throughput, digital signal levels 
B. OC levels, digital signal levels 
C. QoS levels, OC levels 
D. OC levels, carrier levels
A

Answer: B. OC levels, digital signal levels

113
Q
What IEEE committee established WiMAX technologies? 
A. 802.11 
B. 802.3 
C. 802.5 
D. 802.16
A

Answer: D. 802.16

114
Q
What method do ISPs use to purposely slow down bandwidth utilization by customers? 
A. Fair access 
B. Throttling 
C. Blocking 
D. Net neutrality
A

Answer: B. Throttling