CISSP ch 12 Flashcards

1
Q

PPP

A

Point-to-point Protocol,

An encapsulation protocol designed to support the transmission of IP traffic over dial-up or point-to-point links

Data link layer (layer 2) protocol that allows for multivendor interoperability of WAN devices supporting serial links

Rarely found on typical ethernet networks today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SLIP

A

Serial Line Internet Protocol (SLIP), replaced by PPP

offered no authentication, supported only half-duplex communications, no error detection, required manual link establishment and teardown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PPP communication services

A

Assignment and management of IP addresses

Management of synchronous communications

Standardized encryption

Multiplexing

Link configuration

Link quality testing

Error detection

Feature or option negotiation (such as compression)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PPP authentication options

A

PAP, CHAP, EAP and EAP derivatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

EAP derivatives

A

LEAP, PEAP, EAP-SIM, EAP-FAST, EAP-MD5, EAP-POTP, EAP-TLS, EAP-TTLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PAP

A

Password Authentication Protocol

Transmits usernames and passwords in cleartext

Offers no encryption, simply transports logon credentials from the client to the authentication source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CHAP

A

Challenge Handshake Authentication Protocol

Based on MD5 and no longer considered secure

Performs authentication using a challenge-response dialogue that cannot be replayed

Challenge is a random number issued by the server, which the client uses along with the password hash to compute the one-way function derived response

Periodically reauthenticates

MS-CHAPv2 uses updated algorithms and is preferred over the original CHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EAP

A

Extensible Authentication Protocol

Framework for authentication, not an actual protocol

Allows customized authentication security solutions, such as supporting smartcards, tokens and biometrics

Originally designed for use of physically isolated channels / assumed secured pathways

Some EAP methods use encryption, others do not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

LEAP

A

Lightweight Extensible Authentication Protocol

CISCO proprietary alternative to TKIP for WPA

Now a legacy solution to be avoided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PEAP

A

Protected Extensible Authentication Protocol

Encapsulates EAP in a TLS tunnel

Preferred to EAP

Support mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EAP-SIM

A

EAP – Subscriber Identity Module

A means of authenticating mobile devices over the Global System for Mobile Communications (GSM) network

Uses each device/subscriber’s subscriber identity module (SIM) card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EAP-FAST

A

EAP – Flexible Authentication via Secure Tunneling

A Cisco protocol proposed to replace LEAP which is now obsolete, given the development of WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EAP-MD5

A

Now deprecated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

EAP-POTP

A

EAP – Protected One-Time Password

Supports the use of OTP tokens in multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EAP-TLS

A

EAP – Transport Layer Security

An open IETF standard that is an implementation of the TLS protocol for use in protecting authentication traffic

Most effective when both client and server have a digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EAP-TTLS

A

EAP – Tunneled Transport Layer Security

An extension of EAP-TLS that creates a VPN-like tunnel between endpoint prior to authentication

Ensures that even client’s username is never transmitted in cleartext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IEEE 802.1X

A

an authentication technology that can be used anywhere authentication is needed that Defines EAP

“Port Based Network Access Control”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

QoS

A

Quality of Service

The oversight and management of the efficiency and performance of network communications

Items to measure:

Throughput rate

Bit rate

Packet loss

Latency

Jitter

Transmission delay

Availability

Throttling or shaping can be implemented on a protocol or IP basis to set maximum use or consumption limit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

PTSN / POTS

A

Public Switched Telephone Network = plain old telephone service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

PBX

A

Private branch exchange

A telephone switching or exchange system deployed in private organizations in order to enable multistation use of a small number of external PSTN lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DISA

A

Type of telephony, Direct inward system access

Adds authentication requirements to all external connections to the PBX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Vishing

A

Voice based phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Phreakers

A

malicious attackers who abuse phone systems in much the same way that hackers abuse computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

VPC

A

Virtual private cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

VDI

A

Virtual desktop interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

VMI

A

Virtual mobile interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Remote access techniques

A

Service specific remote access

Remote control remote access

Remote node operation

Screen scraper/scraping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Service specific remote access

A

Gives users the ability to remotely connect to and manipulate or interact with a single service, such as email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Remote control remote access

A

Grants a remote user the ability to fully control another system that is physically distant from them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Remote node operation

A

When a remote client establishes a direct connection to a LAN, such as with wireless, VPN or dial-up connectivity

Remote system connects to a remote access server, which provides the remote client with network services and possible internet access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Screen scraper/scraping

A

Could refer to remote control, remote access or remote desktop services (virtual applications/desktops). The screen on the target machine is scraped and shown to the remote operator

Also a technology that allows an automated tool to interact with a human interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Load balancing

A

obtaining more optimal infrastructure utilization, minimize response time, maximize throughput, reduce overloading and eliminate bottlenecks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Load balancer

A

used to spread or distribute network traffic in a variety of situations

Common implementation is spreading a load across multiple members of a server farm or cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Scheduling

A

load balancing methods = means by which a load balancer distributes the work, requests or loads among the devices behind it:

Random choice

Round robin

Load monitoring

Preferencing or weighted

Least connections/traffic/latency

Locality based (geographic)

Locality based (affinity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Random choice (scheduling, load balancing)

A

Each packet or connection is assigned a destination randomly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Round robin (scheduling, load balancing)

A

Each pack or connection is assigned the next destination in order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Load monitoring (scheduling)

A

Each packet or connection is assigned a destination based on the current load of capacity of the targets

The device/path with the lowest current load receives the next packet or connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Preferencing or weighted (scheduling, load balancing)

A

Each packet or connection is assigned a destination based on a subjective preference or known capacity difference

E.g., one system can handle twice the capacity of other systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Least connections/traffic/latency (scheduling, load balancing)

A

Each packet or connection is assigned a destination based on the least number of active connections, traffic load or latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Locality based (geographic) (scheduling, load balancing)

A

Each packet or connection is assigned a destination based on the destination’s relative distance from the load balancer

Used when cluster members are geographically separated or across numerous router hops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Locality based (affinity) (scheduling, load balancing)

A

Each packet or connection is assigned a destination based on previous connections from the same client, so subsequent requests go to the same destination to optimize continuity of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

TLS offloading

A

process of removing the TLS-based encryption from incoming traffic to relieve a web server of the processing burden of decrypting and/or encrypting traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Virtual IP addresses

A

Sometimes used in load balancing

When the IP address is not actually assigned to a physical machine – communications received at the IP address are distributed in a load-balancing schedule to the actual systems operating on some other set of IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Persistence / Affinity (load balancing)

A

when a session between a client and a member of a load-balanced cluster is established and subsequent communication from the same client are sent to the same server, thus supporting persistence or consistency of communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Active-active system (load balancing)

A

a form of load balancing that uses all available pathways or systems during normal operations

Used when traffic levels or workload during normal operations need to be maximized, but reduced capacity will be tolerated during adverse conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

active-passive system (load balancing)

A

a form of load balancing that keeps some pathways or systems in an unused dormant state during normal operations to that if one active element fails, then a passive element is brought online and takes over the workload

Used when the level of throughput or workload needs to be consistent between normal states and adverse conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Open relay agent or relay agent

A

an SMTP server that does not authenticate senders before accepting and relaying mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Closet relays

A

authenticated relays = SMTP server that authenticates senders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

S/MIME

A

Secure Multipurpose Internet Mail Extensions

An email security standard that offers authentication and confidentiality to email through public key encryption, digital envelopes and digital signatures

Authentication is provided by X.509 digital certificates issued by trusted third-party CAs (certificate authorities)

Privacy is provided through the use of Public Key Cryptography Standard (PKCS) compliant encryption

Signed message = provides integrity, sender authentication and nonrepudiation

Enveloped message = provides recipient authentication and confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

PGP

A

Pretty good privacy

A peer-to-peer public-private key-based email system that uses a variety of encryption algorithms to encrypt files and email messages

Not a standard, but an independently developed product with wide support, elevating its proprietary certificates to de facto standard status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

DKIM

A

DomainKeys Identified Mail

A means to assert that valid mail is sent by an organization through verification of domain name identity

52
Q

SPF

A

Sender Policy Framework

Checks that inbound messages originate from a host authorized to send messages by the owners of the SMTP origin domain

53
Q

DMARC

A

Domain Message Authentication Reporting and Conformance

A DNS-based email authentication system

Intended to protect against business email compromise (BEC), phishing and other email scams

Email servers can verify if a received message is valid by following the DNS-based instructions; if invalid, the email can be discarded, quarantined or delivered anyway

54
Q

STARTTLS

A

Secure SMTP over TLS = explicit TLS or opportunistic TLS for SMTP

Attempt to set up an encrypted connection with the target email server in the event that it is supported. If not supported, sent as plaintext

Not a protocol, but an SMTP command

Takes place on TCP port 587

55
Q

SMTP

A

Simple Mail Transfer Protocol (SMTP) is a technical standard for transmitting electronic mail (email) over a network

56
Q

Implicit SMTPS

A

TLS-encrypted form of SMTP, which assumes the target server supports TLS

If it does, then an encrypted session is negotiated

If not, then the connection is terminated because plaintext is not accepted

TCP port 465

57
Q

VPN concentrator

A

dedicated hardware device designed to support a large number of simultaneous VPN connections, often hundreds or thousands = VPN server, gateway, firewall, remote access server (RAS), device, proxy or appliance

58
Q

Tunneling

A

network communications process that protects the contents of protocol packets by encapsulating them in packets of another protocol = VPN protocol acts like a security envelope that provides special delivery capabilities as well as security mechanisms

Enables communications between otherwise disconnected systems (e.g., encapsulates LAN traffic in whatever communication protocol is used by a temporary connection with non LAN)

59
Q

Transport mode links/VPNs

A

host-to-host VPN = end-to-end encrypted VPN

Anchored or end at the individual hosts connected together

IP Header and IPSec Header left unencrypted

Only used within a trusted network between individual systems

60
Q

Tunnel mode links/VPNs

A

Terminate at VPN devices on the boundaries of the connected networks

Encrypts IP header, only leaving IPSec header unencrypted

Should be used when crossing untrusted networks or linking multiple systems

61
Q

Remote access VPN

A

variant of site-to-site VPN = link encryption VPN

Encryption is only provided when the communication is in the VPN link or portion of the communication; there may be network segments before and after the VPN which are not secured by the VPN

62
Q

Always-on VPN

A

VPN that attempts to auto-connect to the VPN service every time a network link becomes active

63
Q

Split tunnel

A

a VPN configuration that allows a VPN-connected client systems to access both the organizational network over the VPN and the internet directly at the same tim

64
Q

Full tunnel

A

a VPN configuration in which all of the client’s traffic is sent to the organizational network over the VPN link, and then any internet-destined traffic is routed out of the organizational network’s proxy or firewall interface to the internet

65
Q

VPN Protocols

A

PPTP

L2TP

GRE

SSH

OpenVPN

IPsec

66
Q

PPTP

A

Point-to-Point Tunneling Protocol

Obsolete encapsulation protocol

TCP Port 1723

Offers same authentication protocols as PPP (point-to-point protocol)

PAP = Password Authentication Protocol

CHAP = Challenge Handshake Authentication Protocol

EAP = Extensible Authentication Protocol

MS-CHAPv2 = Microsoft Challenged Handshake Authentication Protocol

Initial tunnel negotiation process is not encrypted

67
Q

L2TP

A

Layer 2 Tunneling Protocol

An internet standard (RF 2661)

Can support almost any layer 3 networking protocol

Uses UDP port 1701

Can rely on PPP’s supported authentication protocols, specifically IEEE 802.1X, a derivative of EAP

Does not offer native encryption, but supports the use of payload encryption protocols

Often deployed using IPSec’s ESP for payload encryption

68
Q

GRE

A

Generic Routing Encapsulation

A proprietary Cisco tunneling protocol

Provides encapsulation but not encryption

69
Q

SSH

A

Secure Shell

A secure replacement for Telnet (TCP port 23)

Operates over TCP Port 22

All SSH transmission (both authentication and data exchange) are encrypted

Limited to transport mode

If S is the prefix of a secure protocol (e.g., SFTP), encryption is provided by SSH. If S is in the suffix (e.g., HTTPS), encryption is provided by TLS.

70
Q

OpenVPN

A

Based on TLS

Provides an easy-to-configure but robustly secured VPN option

Can use either pre-shared passwords or certificates for authentication

71
Q

IPsec

A

Internet Protocol Security

A standard of IP security extension used as an add-on for IPv4 and integrated into IPv6

Primary use is for establishing VPN links between internal and/or external hosts or networks

Works only on IP networks and provides for secured authentication as well as encrypted data transmission

AH = Authentication Header

ESP = Encapsulating Security Payload

HMAC = Hash-based Message Authentication Code

IPComp = IP Payload Compression

Uses public-key cryptography and symmetric cryptography to provide encryption, secure key exchange, access control, nonrepudiation and message authentication

IKE = Internet Key Exchange = mechanism IPsec uses to manage cryptography keys

72
Q

AH (IPsec)

A

Authentication Header

Provides assurances of message integrity and nonrepudiation

Primary authentication function for IPsec, implements session access control and prevents replay attacks

73
Q

ESP (IPsec)

A

Encapsulating Security Payload

Provides confidentiality and integrity of payload contents

Provides encryption, offers limited authentication, and prevents replay attacks

Uses AES encryption

Can operate in either transport or tunnel mode

74
Q

HMAC (IPsec)

A

Hash-based Message Authentication Code

Primary hashing or integrity mechanism used by IPsec

75
Q

IPComp (IPsec)

A

IP Payload Compression

A compression tool used by IPsec to compress data prior to ESP encrypting it in order to attempt to keep up with wire speed transmission

76
Q

IKE (IPsec)

A

Internet Key Exchange = mechanism IPsec uses to manage cryptography keys

OAKLEY

SKEME = Secure Key Exchange Mechanism

ISAKMP = Internet Security Association and Key Management Protocol

77
Q

OAKLEY (IKE)

A

A key generation and exchange protocol similar to Diffie-Hellman

78
Q

SKEME (IKE)

A

Secure Key Exchange Mechanism

A means to exchange keys securely, similar to a digital envelope

Modern IKE implementations may also use ECDHE (elliptic curve Diffie-Hellman exchange) for key exchange

79
Q

ISAKMP (IKE)

A

Internet Security Association and Key Management Protocol

Used to organize and manage the encryption keys that have been generated and exchanged by OAKLEY and SKEME

Security association = agreed-on method of authentication and encryption used by two entities

Used to negotiate and provide authenticated keying material for security associations in a secured manner

Each IPsec VPN uses two security associations, one for encrypted transmission and the other for encrypted reception; thus, each IPsec VPN is composed of two simplex communication channels that are independently encrypted

80
Q

Switches - four primary functions

A

Learning

Forwarding

Dropping

Flooding

81
Q

CAM table

A

Content Adressable Memory table = used to map MAC addresses and physical port numbers

If a destination MAC address is present in the switch’s CAM table, frame is forwarded to the appropriate port

82
Q

Learning (switch)

A

How a switch first becomes aware of its local network

83
Q

Forwarding (switch)

A

CAM table = Content Adressable Memory table = used to map MAC addresses and physical port numbers

If a destination MAC address is present in the switch’s CAM table, frame is forwarded to the appropriate port

84
Q

Dropping

A

If the destination MAC address came from associated port, frame is dropped

85
Q

Flooding

A

If the destination MAC is not present in the CAM table, then the frame is flooded/sent out to all ports

86
Q

VLAN

A

virtual local area network

A hardware-imposed network segmentation created by switches. Used to segment a network logically without altering its physical topology. Can have software-based implementations

By default, all ports on a switch are part of VLAN 1, can be reassigned on a port-by-port basis

VLAN management is most commonly used to distinguish between user traffic and management traffic

VLAN 1 is typically the designated management traffic VLAN

87
Q

VLAN management

A

use of VLANs to control traffic for security or performance reasons

88
Q

Distributed virtual switches

A

used in cloud and virtual environments

89
Q

Port isolation / private ports

A

private VLANs that are configured to use a dedicated or reserved uplink port

Members of a private VLAN or a port-isolated VLAN can interact only with each other and over the predetermined exit port or uplink port

Commonly implemented in hotels

90
Q

Port mirror

A

duplicates traffic one or more other ports out a specific port

91
Q

SPAN port

A

Switched Port Analyzer port = duplicates the traffic for all other ports, or any port can be configured as the mirror, audit, IDS or monitoring port for one or more other ports

92
Q

Port tap

A

a means to eavesdrop on network communications, especially when a switch’s SPAN function isn’t available or doesn’t meet the current interception needs

93
Q

Trunk port

A

a dedicated port with higher bandwidth capacity than the other standard access ports, used to link multiple switches together

94
Q

VLAN tags

A

modify the standard construction of an Ethernet frame header to include a VLAN tag value

95
Q

MAC flooding attack

A

an intentional abuse of a switch’s learning function to cause it to get stuck flooding by flooding a switch with Ethernet frames with randomized source MAC addresses; once the CAM table is filled with false MAC addresses, the switch is unable to properly forward traffic, so it reverts to flooding mode (attacker on network will also receive a copy of the communication)

96
Q

FIFO (switches)

A

first-in, first-out queue, how a CAM table makes room for new MAC addresses

97
Q

MAC limiting

A

defense against MAC flooding that restricts the number of MAC addresses that will be accepted into the CAM table from each jack/port

98
Q

MAC spoofing

A

changing the default MAC address to some other value

99
Q

MAC cloning

A

impersonating another system, often a valid or authorized network device, to bypass port security or MAC filtering limitations

100
Q

NAT

A

network address translation

Hides the IPv4 configuration of internal clients and substitutes the IPv4 configuration of the proxy server’s own public external NIC in outbound requests; effectively prevents external hosts from learning the internal configuration of the network

Translates the IPv4 addresses of your internal clients to leased addresses outside your environment

One-to-one basis – a single leased public IPv4 address can only allow a single internal system to access the internet

Usually also refers to PAT

101
Q

PAT / NPT/ NAPT

A

port address translation = overloaded NAT = network and port address translation (NPAT) = network address and port translation (NAPT)

Allows a single public IPv4 address to host up to 65,536 simultaneous communications from internal clients

102
Q

SNTA / Stateful NAT / Dynamic NAT

A

Source Network Address Translation = NAT = Stateful NAT or Dynamic NAT

NAT that maintains a mapping between requests made by internal clients, a client’s internal IP address and the IP address of the internet service contacted

NAT changes source address in outgoing packet from client’s to NAT server’s; this change is recorded in the NAT mapping database along with destination address

Once a reply is received from the internet server, NAT matches the reply’s source address to an address stored in its mapping database

103
Q

NAT-T

A

NAT Traversal = RFC 3947

Designed specifically to support IPsec (normally not compatible with NAT because of changes NAT makes to packet headers) and other tunneling VPN protocols, such as L2TP

104
Q

Static NAT / DNAT

A

reverse proxy = port forwarding = destination network address translation (DNAT)

Allows an external entity to initiate communication with an internal entity behind a NAT by using a public socket that is mapped to redirect to an internal system’s private address

Not usually a secure solution, may be useful for systems in a screened subnet or extranet, but not for accessing systems in the internal private LAN

105
Q

Private IPv4 addresses

A

Private IPv4 addresses = defined in RFC 1918

10.0.0.0 – 10.255.255.255

Full Class A range

172.16.0.0 – 172.32.255.255

16 Class B ranges

192.168.0.0 – 192.168.255.255

256 Class C ranges

106
Q

APIPA

A

Automatic Private IP Addressing = link-local address assignment = 169.254.0.01 to 169.254.255.254

Defined in RFC 3927

Assigns an IP address to a system in the event of a Dynamic Host Configuration Protocol (DHCP) assignment failure

A feature of Windows

Assigns each failed DHCP client an IP address from the range of 169.254.0.01 to 169.254.255.254 along with the default Class B subnet mask of 255.255.0.0

Allows the system to communicate only with other APIPA-configured clients within the same broadcast domain but not with any system across a router or with a correctly assigned IP address

107
Q

Loopback address

A

127.0.0.1

Purely a software entity

An IP address used to create a software interface that connects back to itself via TCP/IP

Allows for the testing of local network setting in spite of missing, damaged or nonfunctional network hardware and related device drivers

Entire 127.x.x.x network is reserved for loopback use, though only the 127.0.0.1 address is widely used

108
Q

ISA

A

Interconnection security agreement

A formal declaration of the security stance, risks and technical requirements of a link between two organizations’ IT infrastructures

109
Q

Circuit switching

A

Originally developed to manage telephone calls over the public switched telephone network

A dedicated physical pathway is created between the two communicating parties

Grants exclusive use of a communication path to the current communication partners

110
Q

Packet switching

A

The message or communication is broken up into small segments (fixed-length cell or variable-length packets) and sent across the intermediary networks to the destination

Each segment of data has its own header that contains source and destination information

Header is read by each intermediary system and is used to route each packet to its intended destination

Each channel or communication path is reserved for use only while a packet is actually being transmitted over it; as soon as the packet is sent, the channel is made available for other communications

111
Q

Virtual circuit

A

A logical pathway or circuit created over a packet-switched network between two specific endpoints

112
Q

PVC

A

Permanent virtual circuits

Like a dedicated leased line; the logical circuit always exists and is waiting for the customer to send data

113
Q

SVC

A

Switched virtual circuits

Has to be created each time it is needed using the best paths currently available before it can be used and then disassembled after the transmission is complete

114
Q

Dedicated line = leased line = point-to-point link

A

A line that is continually reserved for use by a specific customer

Always on and waiting for traffic to be transmitted over it

Connects two specific endpoints and only those two endpoints

Types (mostly been replaced by fiber optic-based solutions):

T1 = Telephone line 1 [1.64 Mbps capacity]

TS3 or DS3 = Digital Service 3 [44.7 Mbps capacity]

X.25

ATM = Asynchronous Transfer Mode

Frame Relay

115
Q

Nondedicated line

A

Line that requires a connection to be established before data transmission can occur

116
Q

DSL

A

Digital Subscriber Line

A technology that exploits the upgraded telephone network to grant customers speeds from 144 Kbps to 20 Mbps (or more)

Formats (varies downstream and upstream bandwidth provided):

ADSL

xDSL

CDSL

HDSL

SDSL

RASDSL

IDSL

VDSL

117
Q

ISDN

A

Integrated Services Digital Network

Planned replacement for PSTN, but did not gain widespread adoption

118
Q

SDH

A

Synchronous Digital Hierarchy

A fiber-optic high-speed networking standard by the International Telecommunications Union (ITU)

Uses synchronous time-division multiplexing (TDM) to high-speed duplex communications with minimal need for control and management overhead

Supports a foundational speed of 51.48 Mbps

Synchronous Transport Modules (STM) = levels of SDH

119
Q

SONET

A

Synchronous Optical Network

A fiber-optic high-speed networking standard by the American National Standards Institute (ANSI)

Uses synchronous time-division multiplexing (TDM)

Synchronous Transport Signals (STS) = Optical Carrier (OC) = levels of SONET

120
Q

STM

A

Synchronous Transport Modules (STM) = levels of SDH

STS-768/OC-768 = STM-256 = 39.813 Gbps

121
Q

STS and OC

A

Synchronous Transport Signals (STS) = Optical Carrier (OC) = levels of SONET

STS-768/OC-768 = STM-256 = 39.813 Gbps

122
Q

Transmission logging

A

a form of auditing focused on communications

Records the particulars about source, destination, time stamps, identification codes, transmission status, number of packets, size of message and so on

123
Q

Transmission error correction

A

a capability built into connection- or session-oriented protocols and services

if it is determined that a message was corrupted, altered or lost, a request can be made for the source to resend the message

124
Q

CRC

A

cyclic redundancy check = check for communication integrity?

125
Q

Modification attacks

A

captured packets are altered and then played against a system