CISSP-D2-Telecommunications Flashcards

1
Q

Name the seven layers of the OSI Model

A

Application, Presentation, Session, Transport, Network, Data-Link, Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is half duplex?

A

Data transmission that can either be received or sent, however, only one at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is full duplex?

A

Data transmission that be sent and recieved at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is CSMA/CD ?

A

Carrier Sense Multiple Access with Collision Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of CSMA/CD ?

A

Allows a network device to either send or receive data, but not at the same time. It also provides a way for the network device to detect a collision and provides a protocol for retransmitting the data until the frame is successfully transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a repeater?

A

Is a hardware device that regenerates electrical signals, sending all frames from physical cable segment to another. This is a Layer 1 device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a hub?

A

A layer 1 device that takes a signal that it receives from one connected device and passes it along or repeats it to all other connected devices. A hub cannot look at MAC addresses or data in an Ethernet frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a bridge?

A

A bridge can break up collision domains, and operates at layer 2. It can learn MAC addresses. It can forward frames, and can control traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spanning Tree Protocol

A

Is a protocol that selectively disables forwarding on individual ports of a bridge or switch to ensure that the network topology is loop free. This prevents forwarding storms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a switch?

A

A switch is a layer 2 device that enables full duplex data transmission. Switches can read layer 2 frames and build MAC address tables. Switches can also create virtual LANs (vLANs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a router?

A

A router is a layer 3 device. A router stores network location information in a routing table. Routers can change layer 2 data whenever they route data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a pattern matching IDS?

A

Traffic patterns that match signatures. It does well with known attacks, however it cannot detect new attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an anomaly detection IDS?

A

A traffic baseline is established. Any traffic that deviates from the baseline will trigger an alert. The challenge is establishing “normal” traffic, which is easier on smaller less complex networks. However, is more of a challenge on larger more complex networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between HIDS and HIPS?

A

HIDS is “Host Intrustion Detection System”. It only detects and alerts on intrustion attempts on the server or workstation host. HIPS is “Host Intrustion Prevention System”. It can detect, alert, and prevent host intrusion attempts on the server or workstation hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some whitelisting techniques used on the endpoint?

A

Binaries that are signed with a trusted code signing certificate, that match a known good cryptographic hash, known trusted path and name (also the weakest approach).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a TCP SYN flood attack?

A

it is a common type of “Denial of Service” attack. An attacker attempts to subvert the TC 3-Way Handshake by sending SYNs and never responding with ACKs. This in turn fills the victims half-open table, where eventually no new connections (legitimate business users or customers) can be completed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a LAND attack?

A

It is a single packet denial of service attack where the host IP address & application port is forged to confuse the server. Such as a webserver on port 80. The attacker will forge a request to the webserver on port 80, as if it was coming from itself on port 80.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a SMURF attack?

A

It is a denial of service attack where the attacker sends out a broadcast request such as an ICMP echo request, where the source is address is forged to be the “victims” host address. When everyone replies, all requests will go to the victims host address and not the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a fraggle attack?

A

It is similar to a Smurf attack, where UDP echo requests are made in place ICMP echo requests. The source IP address is the victim address. This attack targets UNIX ports 7 (UDP Echoes) & 19 (characters are sent to sender).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a tear drop attack?

A

A denial of service attack, which relies on fragmentation reassembly. Multiple overlapping large IP fragments are sent to the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Good security design assumes that a network eavesdropper will do what?

A

Sniff all packets between the client and authentication server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is PAP?

A

Password Authentication Protocol. It sends the userid and password in clear text to the authentication server. It is a very weak authentication protocol and should not be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is CHAP?

A

Challenge handshake authentication protocol. It is a more secure authentication protocol that does not expose the password in clear text and is not susceptible to replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Explain the CHAP three-way authentication process? What takes place first before the three-way authentication process?

A

The client first sends an unauthenticated connection to the auth server via the LCP (Link Control Protocol).

  1. Then the CHAP server sends a challenge (nonce), which is a random string
  2. The client then uses a hashing algorithm (e.g. MD5), and hashes the challenge & password
  3. The server then hashes the string & received password. if the value matches the hash received from the client then the client is authenticated.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the drawbacks to using CHAP?

A

The CHAP server stores the clients passwords in clear text. So, if an attacker can compromise the server, then all the passwords are compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the difference between 802.1X and 802.11?

A

802.1X is Port-Based Network Access Control and works with EAP. 802.11is a wireless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is EAP?

A

Extensible Authentication Protocol. It operates at Layer 2 and authenticates a client before an IP address can be granted. It is available for both wired and wireless networks, but most commonly used on WLANs.

27
Q

What are the major 802.1X roles?

A

Supplicant - An 802.1X Client
AS - Authenticating Server that authenticates a supplicant
Authenticator - A device such as an access Point that authenticates a supplicant and grants connection

28
Q

Describe EAP-MD5?

A

This is the weakest forms of the EAP. It supports client –> server authentication only. All others support mutual authentication. This version of EAP is susceptible to man in the middle attacks, and password cracking.

29
Q

Describe EAP-LEAP.

A

EAP-lightweight extensible authentication protocol. it was developed by Cisco, and has significant security flaws and should not be used.

30
Q

Describe EAP-TLS.

A

EAP-Transport layer Security. Uses PKI, and uses client side and server side certificates. This is very secure but complex and costly due to PKI.

31
Q

Describe EAP-FAST.

A

EAP-Flexible Authentication via Secure Tunneling. It was designed by Cisco to replace LEAP. It uses PAC (Protected Access Credential) which acts as a pre-shared key.

32
Q

Describe EAP-TTLS.

A

EAP-Tunneled transport layer security. It was developed by Funk Software and simplifies EAP-TLS by dropping the client side certificate. However it is less secure as a result.

33
Q

Describe PEAP.

A

Protected EAP. Which was developed by Microsoft, Cisco, and RSA Security. It is similar to EAP-TTLS (and competitor to) by dropping the client side certificate requirement.

34
Q

What is PPP?

A

Point to Point Protocol. It is a Layer 2 protocol. It has replaced SLIP (Serial Line internet Protocol). It provides confidentiality, integrity, and authentication via Point to Point links. PPP supports synchronous links such as T1’s.

35
Q

What is SLIP?

A

Serial Line internet protocol, which is a layer 2 protocol. It supports asynchronous links such as modems. It provides no confidentiality, integrity, and authentication. it has been replaced by PPP.

36
Q

What is PPTP?

A

Point to Point tunneling protocol which tunnels PPP over IP. TCP is used for control.

37
Q

What is L2TP?

A

Layer 2 Tunneling Protocol. L2TP focuses on authentication, and it does not provide confidentiality. It uses IPSec to provide encryption. Unlike PPTP, it can also operate on non-IP networks such as ATM.

38
Q

Describe IPSec:

A

It is a suite of protocols. The 2 major protocols are ESP (Encapsulating Security Protocol) and AH (Authentication Header). ESP is protocol 50 and AH is protocol 51. IPSec provides confidentiality, integrity, and authentication.

39
Q

What are the three IPSec Architectures?

A

Host-to-Gateway, Gateway-to-Gateway, Host-to-Host.

  • > Host-to-Gateway is used to connect one system running IPSec software to an IPSec gateway
  • > Gateway-to-Gateway connects one IPSec gateway to another, and acts as a shared network connection like a T1.
  • > Host-to-Host connects two host systems such as file servers. Operating Systems such as Windows 7 or Ubuntu have IPSec to allow Host-to-Host and Host-to-Gateway connections.
40
Q

Describe IPSec tunnel mode:

A

This mode provides confidentiality (ESP) and/or authentication (AH) to the entire original IP packet, including the IP headers. New IP Headers are added which include the source/destination of the IPSec gateways.

41
Q

Describe IPSec transport mode:

A

This mode protects only the IP Data (Layers 4-7). The original IP Header is left unprotected. IPSec does add either and ESP and/or AH header.

42
Q

Describe the VoIP protocol RTP:

A

Real-Time transport Protocol, which is designed to carry streaming audio and video. Protocols carried by RTP include SIP (Session Initiation Protocol) and H.323.

43
Q

Describe VoIP protocol SRTP:

A

Secure Real-Time Transport Protocol. It secure VoIP communications. It provides confidentiality, integrity, and secure authentication. It uses AES for confidentiality and SHA-1 for integrity.

44
Q

How can you secure VoIP traffic transmitted across unsecured networks?

A

Use SRTP (Secure Real-Time Transport Protocol) or IPSec.

45
Q

What are two methods of sending traffic over a radio band?

A

FHSS (Frequency Hopping Spread Spectrum) and DSSS (Direct Sequence Spread Spectrum).

46
Q

What is an ISM band?

A

Industrial, Scientific, & Medical. Which are set aside for unlicensed use. Wireless devices such as cordless phones, 802.11 wireless, and Bluetooth use ISM bands.

47
Q

Describe the difference between 802.11, a, b, g, n:

A
  • 802.11 was the original wireless speed which operated at 2Mbps using the 2.4 GHz frequency.
  • 802.11b supplanted the original 802.11 and operates at 11Mbps on the 2.4 GHz frequency.
  • 802.11g was designed to be backwards compatible with 802.11b and provides speeds up to 54 Mbps and operates at 2.4 GHz frequency.
  • 802.11a operates at 54Mbps on the 5GHz frequency.
  • 802.11n operates at speeds of 144Mbps & higher by operating at 2.4GHz & 5GHz frequencies using Multiple-Input, Multiple-Output (MIMO).
48
Q

Describe the difference between 2.4GHz and 5GHz frequencies:

A

2.4GHz frequencies are more crowded (# of devices on the 2.4GHz frequency) and susceptible to more interference (e.g. Microwave can cause interference). 2.4GHz waves can penetrate walls.

5GHz frequencies are less crowded, and not as susceptible to interference. 5GHz waves cannot penetrate walls.

49
Q

What are the four modes that an 802.11 Wireless NIC can operate in:

A

Managed, Master, AD-Hoc, Monitor Mode.

50
Q

Describe 802.11 managed mode:

A

In this mode, wireless clients can only communicate with the Access Point to which they are connected. They cannot directly communicate with other wireless clients.

51
Q

Describe 802.11 Master mode:

A

Also known as “Infrastructure Mode”. Wireless access points operate in this mode. A wireless card in this mode can talk directly to other wireless clients operating in managed mode.

52
Q

Describe 802.11 ad-hoc mode:

A

This is a peer-to-peer mode where there is no central access point. A wireless client operating in this mode can advertise itself for internet connection sharing.

53
Q

Describe the 802.11 monitor mode:

A

This mode is read-only and is used for sniffing WLANs.

54
Q

True or False. An SSID cannot be sniffed if it’s broadcast has been disabled?

A

False. An SSID can be discovered if someone sniffs WLANs using 802.11 “monitor mode”.

55
Q

True or False: MAC addresses are exposed in cleartext on WLANs and can be sniffed?

A

True. Using wireless MAC filtering provides “limited” security as a result. As these addresses can be spoofed.

56
Q

What are the three Bluetooth class devices and their transmit distance?

A

Class 3 - Less than 10 Meters
Class 2 - 10 Meters
Class 1 - 100 Meters

57
Q

What type of encryption does Bluetooth use?

A

128-bit E0 symmetric streaming cipher. It is a weak cipher.

58
Q

Describe WAP (Wireless Application Protocol):

A

It was designed to provide secure web services to handheld wireless devices such as smartphones & PDAs. It is based on HTML and includes Handheld Device Markup Language (HDML). Authentication is provided by Wireless Transport Layer Security (WTLS).

59
Q

True or False. A WAP browser is a full browser.

A

False. A WAP browser is a micro-browser which is simpler than a full web browser, requires fewer resources, and connects to a WAP gateway, which is a proxy. The microbrowser accesses sites written in (or converted to) Wireless Markup Language (WML).

60
Q

Robust Security Network is also known as:

A

WPA2 (Wi-Fi Protected Access 2), a full implementation of 802.11i.

61
Q

Describe SDSL:

A

Symmetric Digital subscriber line, which provides matching speeds for download and uploads.

62
Q

Describe ADSL:

A

Asymmetric Digital subscriber line, which provides faster download speeds than upload speeds.

63
Q

Describe VDSL:

A

Very-high Rate Digital Subscriber Lines, which provide faster speeds than ADSL.

64
Q

The closer a site is to a CO (Central Office)….The faster OR slower the connection?

A

Faster.

65
Q

What is the difference between ISDN BRI & PRI?

A

Basic Rate Interface provides two 64k digital channels, and one 16K signaling channel. Primary Rate Interface provides 23 64K digital channels, and one 16K signaling channel.