CISSP-D2-Telecommunications Flashcards
Name the seven layers of the OSI Model
Application, Presentation, Session, Transport, Network, Data-Link, Physical
What is half duplex?
Data transmission that can either be received or sent, however, only one at a time
What is full duplex?
Data transmission that be sent and recieved at the same time
What is CSMA/CD ?
Carrier Sense Multiple Access with Collision Detection
What is the purpose of CSMA/CD ?
Allows a network device to either send or receive data, but not at the same time. It also provides a way for the network device to detect a collision and provides a protocol for retransmitting the data until the frame is successfully transmitted.
What is a repeater?
Is a hardware device that regenerates electrical signals, sending all frames from physical cable segment to another. This is a Layer 1 device.
What is a hub?
A layer 1 device that takes a signal that it receives from one connected device and passes it along or repeats it to all other connected devices. A hub cannot look at MAC addresses or data in an Ethernet frame.
What is a bridge?
A bridge can break up collision domains, and operates at layer 2. It can learn MAC addresses. It can forward frames, and can control traffic.
Spanning Tree Protocol
Is a protocol that selectively disables forwarding on individual ports of a bridge or switch to ensure that the network topology is loop free. This prevents forwarding storms.
What is a switch?
A switch is a layer 2 device that enables full duplex data transmission. Switches can read layer 2 frames and build MAC address tables. Switches can also create virtual LANs (vLANs).
What is a router?
A router is a layer 3 device. A router stores network location information in a routing table. Routers can change layer 2 data whenever they route data.
What is a pattern matching IDS?
Traffic patterns that match signatures. It does well with known attacks, however it cannot detect new attacks.
What is an anomaly detection IDS?
A traffic baseline is established. Any traffic that deviates from the baseline will trigger an alert. The challenge is establishing “normal” traffic, which is easier on smaller less complex networks. However, is more of a challenge on larger more complex networks.
What is the difference between HIDS and HIPS?
HIDS is “Host Intrustion Detection System”. It only detects and alerts on intrustion attempts on the server or workstation host. HIPS is “Host Intrustion Prevention System”. It can detect, alert, and prevent host intrusion attempts on the server or workstation hosts.
What are some whitelisting techniques used on the endpoint?
Binaries that are signed with a trusted code signing certificate, that match a known good cryptographic hash, known trusted path and name (also the weakest approach).
What is a TCP SYN flood attack?
it is a common type of “Denial of Service” attack. An attacker attempts to subvert the TC 3-Way Handshake by sending SYNs and never responding with ACKs. This in turn fills the victims half-open table, where eventually no new connections (legitimate business users or customers) can be completed.
What is a LAND attack?
It is a single packet denial of service attack where the host IP address & application port is forged to confuse the server. Such as a webserver on port 80. The attacker will forge a request to the webserver on port 80, as if it was coming from itself on port 80.
What is a SMURF attack?
It is a denial of service attack where the attacker sends out a broadcast request such as an ICMP echo request, where the source is address is forged to be the “victims” host address. When everyone replies, all requests will go to the victims host address and not the attacker.
What is a fraggle attack?
It is similar to a Smurf attack, where UDP echo requests are made in place ICMP echo requests. The source IP address is the victim address. This attack targets UNIX ports 7 (UDP Echoes) & 19 (characters are sent to sender).
What is a tear drop attack?
A denial of service attack, which relies on fragmentation reassembly. Multiple overlapping large IP fragments are sent to the victim.
Good security design assumes that a network eavesdropper will do what?
Sniff all packets between the client and authentication server.
What is PAP?
Password Authentication Protocol. It sends the userid and password in clear text to the authentication server. It is a very weak authentication protocol and should not be used.
What is CHAP?
Challenge handshake authentication protocol. It is a more secure authentication protocol that does not expose the password in clear text and is not susceptible to replay attacks.
Explain the CHAP three-way authentication process? What takes place first before the three-way authentication process?
The client first sends an unauthenticated connection to the auth server via the LCP (Link Control Protocol).
- Then the CHAP server sends a challenge (nonce), which is a random string
- The client then uses a hashing algorithm (e.g. MD5), and hashes the challenge & password
- The server then hashes the string & received password. if the value matches the hash received from the client then the client is authenticated.
What are the drawbacks to using CHAP?
The CHAP server stores the clients passwords in clear text. So, if an attacker can compromise the server, then all the passwords are compromised.
What is the difference between 802.1X and 802.11?
802.1X is Port-Based Network Access Control and works with EAP. 802.11is a wireless.