Chapter 4: Communications & Network Security Flashcards

1
Q

What is TKIP ?

A

Temporal Key Integrity Protocol. Wifi security protocol, now considered insecure. PEAP or EAP-TLS are better options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is 802.11ac ?

A

AKA Wi-Fi 5: a wireless local area network (WLAN) standard introduced in 2013. It operates in 5 GHz & offers higher throughput than 802.11n.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the RST flag in TCP?

A

Reset or disconnect a session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List the standard TCP flags.

A

SYN, ACK, FIN, RST, URG, PSH.

Less common: WND, CHK, SEQ, CWR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List the common wifi standards from slowest to fastest.

A

802.11a and 802.11g are capable of 54Mbps.
802.11n can do 600Mbps.
802.11ac can reach 3.4Gbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is associated with layer 3 of the OSI model?

A

IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is CHAP ?

A

Challenge-Handshake Authentication Protocol. Encrypts username and password, and periodically re-authenticates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is LEAP ?

A

Authentication Protocol for WEP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is PAP and what’s wrong with it?

A

Authentication Protocol, but it doesn’t encrypt passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What protocol should be enabled and required to secure VoIP?

A

SIPS, the secure version of the session initialization protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What term describes a routing protocol that maintains a list of destination networks w/metrics including distance in hops?

A

A distance-vector protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which is a real thing: link-state protocol, destination metric protocol, link-distance protocol?

A

Link-state protocol (for routing).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is FCoE ?

A

Fiber channel over internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is SDWAN ?

A

Software-defined wide area network (SD-WAN) is a networking technology that uses software to manage and optimize wide area networks (WANs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Zigbee ?

A

standards-based wireless mesh network used widely in building automation, lighting, smart city, medical and asset tracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is MOSS ?

A

MOSS is a Protocol that uses the MIME multipart/signed and multipart/encrypted framework to apply digital signature and Encryption services to MIME objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is PEM ?

A

Privacy-Enhanced Mail (PEM) is a file format and internet security standard for storing and sending cryptographic keys, certificates, and other data to secure emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is DKIM ?

A

DomainKeys Identified Mail (DKIM) is a standard email authentication method that adds a digital signature to outgoing messages to verify their authenticity.

19
Q

What is “WPA2 in PSK mode?”

A

WPA2-PSK works by using a pre-shared key, or password, to authenticate devices and the network access point. It encrypts data and requires a unique password for access, which helps prevent unauthorized people from joining the network and stealing sensitive information.

20
Q

What is “WPA3 in SAE mode?”

A

WPA3 Simultaneous Authentication of Equals (SAE) is an authentication method that improves encryption and authentication for WPA3-Personal.

21
Q

What is “WPA2 in Enterprise mode?”

A

A security protocol developed by the Wi-Fi Alliance that uses 802.1x authentication to provide enterprise-grade security for corporate and government networks.

22
Q

What is MPLS ?

A

Multiprotocol Label Switching, a converged protocol for routing.

23
Q

What are 3 concerns with multilayer protocols ?

A

Can bypass filte, conceal covert channels, and extend past logical network boundaries.

24
Q

What features can IPsec provide?

A

Encryption, access control, Non-repudiation, and message authentication using public key. NOT authorization, protocol convergence, content distribution.

25
Q

What are 3 security functions that can be provided by 4g wireless?

A

Encryption, device-based authentication, and SIM-based authentication.

26
Q

List 10 Layer 7 protocols.

A

Application Layer:
SOAP, TCAP, Universal Plug and Play, DHCP, DNS, BOOTP, HTTP, HTTPS, NFS, POP3
SMTP, SNMP, FTP,NTP, IRC, Telnet, SSH, IMAP

27
Q

List 3 Layer 6 protocols.

A

Presentation Layer:
TLS, SSL, AFP (Apple File Protocol), X.25 PAD

28
Q

List 5 Layer 5 protocols.

A

Session Layer:
ADSP, ASP, H.245, NetBIOS, NetBEUI, NCP, PAP, RPC, RTCP, SDP, SMB, SMPP, SOCKS, ZIP (AppleTalk)

29
Q

List 5 Layer 4 protocols.

A

Transport Layer:
AEP (AppleTalk), AH, DCCP, ESP, FCP, iSCSI, NBF, SPX,
NBP {for AppleTalk}, TCP, UDP

30
Q

List 5 Layer 3 protocols.

A

Network Layer:
IPX, NAT, AppleTalk DDP, HSRP, VRRP, IP, ICMP, ARP, RIP, OSPF, IPSEC

31
Q

List 10 Layer 2 protocols.

A

DataLink Layer:
ARCNet, ATM, CHAP, Ethernet, FDDI, Frame Relay, WiFi, WiMax, LocalTalk, MAC, PPP, PPTP, PAP, SLIP, StarLAN, Spanning Tree, Token Ring, VLAN

32
Q

What is the IEEE standard for port-based network access control (PNAC) authentication mechanism for devices that want to connect to a wired or wireless local area network?

A

802.1x

33
Q

What is the IEEE standard for Ethernet?

A

802.3

34
Q

What was the original IEEE standard for Bluetooth?

A

802.15.1

35
Q

List 4 common VPN protocols.

A

PPTP, L2F, L2TP, IPsec

36
Q
A

A - Transport Layer

37
Q

What is the max speed for each of:
Cat5e
Fiber
Cat6
Coax ?

A

Cat5e - 1 gigabit
Fiber - 10 gigabit
Cat6 - 10 gigabit
Coax - 1 gigabit

38
Q

What is an MTU mismatch?

A

A maximum transmission unit (MTU) mismatch occurs when a sender tries to transmit a packet that is too large for the receiver to handle.

39
Q
A

C - AES

40
Q
A

C - CAM table flooding. Port security is focused on hardware (MAC) addresses.

41
Q

What does the Application Plane of an SDN do?

A

The application plane of an SDN is where applications run that use APIs to communicate about needed resources.

42
Q

List advantages of 5g over 4g for security.

A

New mutual authentication capabilities, enhanced subscriber identity protection, and additional security mechanisms.

43
Q

MAC Address belongs to which OSI layer?

A
  1. Data Link