Chapter 15: Secure Communications Channels Flashcards

1
Q

PSTN

A

public switched telephone network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

public switched telephone network

A

uses circuit switching instead of packet routing to connect calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SS7

A

Signaling System 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Signaling System 7 protocol

A

used for establishing and terminating calls in the PSTN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

main components of a PSTN network

A

signal switching points (SSPs) terminate subscriber loops, signal transfer points (STPs) which interconnect SSPs and other STPs to route calls through the network, and service control points (SCPs) to control advanced features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SSP

A

signal switching points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

STPs

A

signal transfer points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SCPs

A

service control points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DSL

A

digital subscriber line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

digital subscriber line

A

high-speed communications technology which simultaneously transmits analog voice and digital data between a home or business and a PSTN service provider’s central office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ADSL

A

Asymmetric DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Asymmetric DSL

A

can only support distances of a mile from the central office without signal boosters; data rates of up to 24 Mbps downstream and 1.4 Mbps upstream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VDSL

A

Very high-data-rate DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Very high-data-rate DSL

A

higher-speed version of ADSL (up to 300 Mbps upstream and 100 Mbps upstream)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

G.fast

A

DSL running over fiber-optic cable from the central office to a distribution point near the home and uses legacy copper wires for the last few hundred feet to the home or office; can deliver data rates of up to 1 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ISDN

A

Integrated Services Digital Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Integrated Services Digital Network

A

obsolescent pure digital technology using legacy phone lines for both voice and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BRI

A

Basic Rate Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BRI ISDN

A

supports a single user with two channels each with data throughput of 64 Kbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

PRI

A

Primary Rate Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

PRI ISDN

A

23 usable channels, 64 Kbps each, equivalent to a T1 leased line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cable modems

A

high-speed access to the Internet through existing cable coaxial and fiber lines; the shared nature of these media result in inconsistent throughputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IP

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IP telephony

A

describes carrying telephone traffic over IP networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Voice over IP aka

A

IP telephony

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Jitter

A

irregularity in arrival times of consecutive packets; problematic for interactive voice and video communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

H.323 recommendation

A

standard for audio and video calls over packet-based networks

28
Q

SIP

A

Session Initiation Protocol

29
Q

Session Initiation Protocol

A

application layer protocol used for call setup and teardown in IP telephony, video and multimedia conferencing, instant messaging, and online gaming

30
Q

RTP

A

Real-time Transport Protocol

31
Q

Real-time Transport Protocol

A

session layer protocol which carries data in media stream format (audio and video); used in VoIP, telephony, video conferencing, and other multimedia streaming technologies

32
Q

RTCP

A

RTP Control Protocol

33
Q

RTP Control Protocol

A

used with RTP and also a session layer protocol; provides out-of-band statistics and control information for feedback on QoS levels of individual streaming multimedia sessions

34
Q

multimedia collaboration

A

remotely and simultaneously sharing any combination of voice, video, messages, telemetry, and files in an interactive session

35
Q

Telepresence

A

application of technologies to allow people to be virtually present somewhere other than where they physically are

36
Q

UC

A

Unified communications

37
Q

unified communications

A

integration of real-time and non-real-time communications technologies in one platform

38
Q

always-on VPN

A

system configuration which automatically connects the device to the VPN with no user interaction

39
Q

VPN kill switch

A

system configuration which automatically cuts off Internet access unless a VPN session is established

40
Q

VPN split tunnel

A

configuration which routes certain traffic through VPN while allowing other traffic to access the Internet directly

41
Q

PAP

A

Password Authentication Protocol

42
Q

Password Authentication Protocol

A

obsolete and insecure authentication protocol which sends user credentials in plaintext and should not be allowed

43
Q

CHAP

A

Challenge Handshake Authentication Protocol

44
Q

Challenge Handshake Authentication Protocol

A

challenge/response mechanism using password as an encryption key to authenticate the user instead of having the user send a password over the wire

45
Q

EAP

A

Extensible Authentication Protocol

46
Q

Extensible Authentication Protocol

A

framework which enables many types of authentication techniques to be used when establishing network connections

47
Q

Desktop virtualization technologies

A

remote desktops and virtual desktops; allow users to remotely interact with computers as if they were physically using them

48
Q

Two common remote desktops

A

Microsoft’s Remote Desktop Protocol (RDP; open-source Virtual Network Computing (VNC) system

49
Q

VDI

A

Virtual desktop infrastructure

50
Q

virtual desktop infrastructure

A

tech which hosts multiple virtual desktops centrally and makes them available to authorized users

51
Q

SSH

A

Secure Shell

52
Q

Secure Shell

A

secure tunneling mechanism which provides terminal-like access to remote computers

53
Q

network socket

A

endpoint for a data communications channel, defined by five parameters: source address, source port, destination address, destination port, and protocol (TCP or UDP)

54
Q

Remote procedure calls

A

a program in your network can execute a function or procedure on some other host

55
Q

Type of networks where SS7 protocol is used

A

PSTN; Public switched telephone network to set up, control, and disconnect calls

56
Q

SIP

A

Session Initiated Protocol

57
Q

Session Initiated Protocol

A

application layer protocol used in online gaming communications, instant messaging, multimedia conferencing

58
Q

consumer-grade products

A

lack security controls and management features to properly secure multimedia collaboration platforms

59
Q

unified communication rely on …

A

a central hub which integrates, coordinates, and synchronizes various technologies; ensure the hub is adequately protected against physical and logical threats

60
Q

best authentication protocol for VPN connections

A

EAP (Extensible Authentication Protocol) is more secure than both PAP (insecure) and CHAP. SIP does not provide authentication mechanisms

61
Q

VPN configurations to enable

A

Split tunneling for staff using printers on their home networks; some traffic will go to the local network or to the Internet directly

62
Q

Best protection for confidentiality of sensitive research data

A

VDI (Virtual desktop infrastructure); sensitive data remains in protected network while users work with it over a virtual desktop; prevents data from being stored on the remote user’s computer

63
Q

Secure remote procedure calls (RPC) with …

A

Tunnel RPC through Transport Layer Security (TLS); RPC lacks security controls and TLS will authenticate hosts and encrypt RPC traffic

64
Q

Advantages of virtual desktops

A

helpful in regulated environments for data retention, configuration management, and incident response through persistent and nonpersistent sessions

65
Q

Disadvantage of virtual desktop

A

VDI relies on VMs in a data center; there is not a computer which a user could physically log in