Chapter 4: Communications & Network Security Flashcards
What is TKIP ?
Temporal Key Integrity Protocol. Wifi security protocol, now considered insecure. PEAP or EAP-TLS are better options.
What is 802.11ac ?
AKA Wi-Fi 5: a wireless local area network (WLAN) standard introduced in 2013. It operates in 5 GHz & offers higher throughput than 802.11n.
What is the RST flag in TCP?
Reset or disconnect a session.
List the standard TCP flags.
SYN, ACK, FIN, RST, URG, PSH.
Less common: WND, CHK, SEQ, CWR
List the common wifi standards from slowest to fastest.
802.11a and 802.11g are capable of 54Mbps.
802.11n can do 600Mbps.
802.11ac can reach 3.4Gbps.
What is associated with layer 3 of the OSI model?
IP addresses.
What is CHAP ?
Challenge-Handshake Authentication Protocol. Encrypts username and password, and periodically re-authenticates.
What is LEAP ?
Authentication Protocol for WEP.
What is PAP and what’s wrong with it?
Authentication Protocol, but it doesn’t encrypt passwords.
What protocol should be enabled and required to secure VoIP?
SIPS, the secure version of the session initialization protocol.
What term describes a routing protocol that maintains a list of destination networks w/metrics including distance in hops?
A distance-vector protocol.
Which is a real thing: link-state protocol, destination metric protocol, link-distance protocol?
Link-state protocol (for routing).
What is FCoE ?
Fiber channel over internet.
What is SDWAN ?
Software-defined wide area network (SD-WAN) is a networking technology that uses software to manage and optimize wide area networks (WANs).
What is Zigbee ?
standards-based wireless mesh network used widely in building automation, lighting, smart city, medical and asset tracking.
What is MOSS ?
MOSS is a Protocol that uses the MIME multipart/signed and multipart/encrypted framework to apply digital signature and Encryption services to MIME objects.
What is PEM ?
Privacy-Enhanced Mail (PEM) is a file format and internet security standard for storing and sending cryptographic keys, certificates, and other data to secure emails.
What is DKIM ?
DomainKeys Identified Mail (DKIM) is a standard email authentication method that adds a digital signature to outgoing messages to verify their authenticity.
What is “WPA2 in PSK mode?”
WPA2-PSK works by using a pre-shared key, or password, to authenticate devices and the network access point. It encrypts data and requires a unique password for access, which helps prevent unauthorized people from joining the network and stealing sensitive information.
What is “WPA3 in SAE mode?”
WPA3 Simultaneous Authentication of Equals (SAE) is an authentication method that improves encryption and authentication for WPA3-Personal.
What is “WPA2 in Enterprise mode?”
A security protocol developed by the Wi-Fi Alliance that uses 802.1x authentication to provide enterprise-grade security for corporate and government networks.
What is MPLS ?
Multiprotocol Label Switching, a converged protocol for routing.
What are 3 concerns with multilayer protocols ?
Can bypass filte, conceal covert channels, and extend past logical network boundaries.
What features can IPsec provide?
Encryption, access control, Non-repudiation, and message authentication using public key. NOT authorization, protocol convergence, content distribution.
What are 3 security functions that can be provided by 4g wireless?
Encryption, device-based authentication, and SIM-based authentication.
List 10 Layer 7 protocols.
Application Layer:
SOAP, TCAP, Universal Plug and Play, DHCP, DNS, BOOTP, HTTP, HTTPS, NFS, POP3
SMTP, SNMP, FTP,NTP, IRC, Telnet, SSH, IMAP
List 3 Layer 6 protocols.
Presentation Layer:
TLS, SSL, AFP (Apple File Protocol), X.25 PAD
List 5 Layer 5 protocols.
Session Layer:
ADSP, ASP, H.245, NetBIOS, NetBEUI, NCP, PAP, RPC, RTCP, SDP, SMB, SMPP, SOCKS, ZIP (AppleTalk)
List 5 Layer 4 protocols.
Transport Layer:
AEP (AppleTalk), AH, DCCP, ESP, FCP, iSCSI, NBF, SPX,
NBP {for AppleTalk}, TCP, UDP
List 5 Layer 3 protocols.
Network Layer:
IPX, NAT, AppleTalk DDP, HSRP, VRRP, IP, ICMP, ARP, RIP, OSPF, IPSEC
List 10 Layer 2 protocols.
DataLink Layer:
ARCNet, ATM, CHAP, Ethernet, FDDI, Frame Relay, WiFi, WiMax, LocalTalk, MAC, PPP, PPTP, PAP, SLIP, StarLAN, Spanning Tree, Token Ring, VLAN
What is the IEEE standard for port-based network access control (PNAC) authentication mechanism for devices that want to connect to a wired or wireless local area network?
802.1x
What is the IEEE standard for Ethernet?
802.3
What was the original IEEE standard for Bluetooth?
802.15.1
List 4 common VPN protocols.
PPTP, L2F, L2TP, IPsec
A - Transport Layer
What is the max speed for each of:
Cat5e
Fiber
Cat6
Coax ?
Cat5e - 1 gigabit
Fiber - 10 gigabit
Cat6 - 10 gigabit
Coax - 1 gigabit
What is an MTU mismatch?
A maximum transmission unit (MTU) mismatch occurs when a sender tries to transmit a packet that is too large for the receiver to handle.
C - AES
C - CAM table flooding. Port security is focused on hardware (MAC) addresses.
What does the Application Plane of an SDN do?
The application plane of an SDN is where applications run that use APIs to communicate about needed resources.
List advantages of 5g over 4g for security.
New mutual authentication capabilities, enhanced subscriber identity protection, and additional security mechanisms.
MAC Address belongs to which OSI layer?
- Data Link