CISSP (Domain 2 - Telecommunications and Network Security) Flashcards

1
Q

Physical Layer (OSI)

A
  • Bits converted to electrical signal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Link Layer (OSI)

A
  • Switching
  • MAC Address
  • Breaks data into frames for correct technology
  • Error detection
  • ARP, RARP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.5

A

Token Ring, FDDI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.11

A

Wireless CSMA/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.3

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

A

Sends message, if collision detected, wait random time and resubmit (Ethernet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

A

Sends message out to wire to see if its open, if open, send message (Wireless)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network Layer (OSI)

A
  • Routing
  • IP, ICMP, RIP, OSPF, BGP, IGMP
  • Inserts information into the packet header for routing
  • Only layer to provide confidentiality, authentication, and integrity with IPsec
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Transport Layer (OSI)

A
  • End to End transfer
  • Error control and recovery
  • Assembled into a stream
  • SSL, TCP, UDP, and SPX
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Session Layer (OSI)

A
  • E2E communication between applications
  • Session setup and tear down
  • DNS, NFS, SQL, and RPC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Presentation Layer (OSI)

A
  • Translate message into a standard format
  • GIF, TIFF, JPG
  • Encoding: ASCII and EBCDIC
  • E2E encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Application Layer (OSI)

A
  • Closest to users
  • Provides message exchange, terminal sessions, …
  • Only layer to provide non-repudiation (if encryption is enabled)
  • HTTP, FTP, SMTP, POP, IMAP, Telnet, SNMP, TFTP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OSI to DoD TCP/IP

A
  • Application, Presentation, Session: Application
  • Transport: Host to Host
  • Network: Internet
  • Data Link, Physical: Network Interface
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCP Encapsulation

D/SD/PSD/FPSD-FCS

A
  • Data
  • Segment, Data
  • Packet, Segment, Data
  • Frame, Packet, Segment, Data, FCS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to attack TCP/IP

A
  • SYN flood (fill up buffer) during 3 way handshake

- Guessing TCP sequence number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to attack UDP

A

DoS with floods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IPv6 IP Format Rules (3)

A
  • First half is network address, second part is host address
  • Can be shortend by eliminating leading zero’s
  • Adjacent blocks of zero’s can be replace with ::; but only once
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Synchronous Transmission

A
  • Stream of data, no start and stop bits

- Used to transfer large amounts of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Asynchronous Transmission

A
  • Bits are sent sequentially
  • Used to transfer small amounts of data
  • Start and stop bits used
  • Modems and dial-up connections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Baseband Signal

A

Cable only uses one channel

- Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Broadband Signal

A

Cable uses several channels at once

- T1, T3, DSL, ISDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Bus Topology

A
  • Single cable where computers are connected to drops
  • Each computer sees each packet
  • Line is the single point of failure
  • If one pc has problem, all other computers impacted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Ring Topology

A
  • Series of computers and devices connected by unidirectional transmission links
  • Each computer is dependent on the preceding computer
  • If one goes down, it can take down all systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Star Topology

A
  • All computers connected to a central hub or switch

- Hub is the single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Mesh Topology (2 types)
- Full Mesh: Every device is connected to every other device, expensive - Partial Mesh: Enough interconnections to eliminate single points of failure
26
3 Transmission Methods | UMB
- Unicast: One to one relationship - Multicast: One to many relationship - Broadcast: One to all relationship
27
Address Resolution Protocol (ARP)
- Maps IP address to MAC address | - MAC is only used to forward frames on same network segment
28
Reverse Address Resolution Protocol (RARP)
- Maps MAC address to IP Address
29
Hub
- Used to connect multiple LAN devices | - Layer 1
30
Switch
- Similar to a Bridge but when it receives a frame, it forwards to the correct segment instead of all. - Layer 2 - 10 ports = 10 CDs and 1 BD
31
Router
- Routes packets based on IP Address | - Layer 3
32
3 Routing Protocol types | DV/LS/B
- Algorithms based on distance vector protocols - Algorithms based on link state protocols - Border Protocols
33
Distance Vector Protocols
- RIP/RIP v2 - Small Networks - List of destination networks with direction and distance in hops
34
Link State Protocols
- OSPF - Based on Cost - Each router keeps a topology map of network and identifies all routers
35
Gateway
- Software that links two different networks - IPX/SPX talking to TCP/IP - Layer 7
36
3 Types of Firewalls | SSP
- Static Packet Filtering - Stateful Packet Filtering - Application Proxy
37
Proxy Firewall
- Layer 7 - Middleman between communicating computers - Looks at payload of packet - Low performance
38
Static Packet Filter Firewall
- Uses ACL to make access decisions - Access based on source and destination IP/Port/Protocol - Layer 3 only - Screen routers with rules for rejecting or accepting data - Based on IP Header - Cant keep track of state
39
Stateful Firewall | layers/track/syn
- Packets captured by inspection engine and each OSI layer inspected - All Layer - Keeps track of state - Builds state table - Syn flood detector
40
Bastion Host
- Most secure state - AKA Hardened System or Locked Down System - Limited amount of ports/services/users/software allowed
41
``` Screened Host (Firewall) (RouterFW#/FWLoc/DMZLoc/fil) ```
- Separates trusted and non-trusted networks - Proxy directly behind a packet-filtering router - One router and one firewall - Router filters traffic before it is passed to firewall
42
Dual-homed Firewall
- Two interfaces, one for each network - Forwarding and routing turned off so each packet can be inspected - One firewall
43
Screened Subnet (Firewall)
- Two routers, one firewall - Firewall in-between router - DMZ setup between the two routers - External router filters traffic before it enters DMZ
44
Demilitarized Zone (DMZ)
- Network segment between protected internal network and non-trusted external network - Contains Bastion hosts
45
5 Things Firewalls Should Do | Deny/BlockB/BlockNon/BlockInt/Reass
- Deny all traffic unless expressly permitted (white list) - Block directed broadcasts (defense against smurf and fraggle attacks) - Block traffic leaving network from a non-internal address (possible zombie system) - Block traffic entering the network from an internal address (possible spoofing attack) - Packets should be reassembled before forwarding
46
3 Ways to Secure DNS | Cert/Zone/Queries
- Certificate Validation - Mutual Zone Transfer - Prevent Unauthorized Queries
47
Network Address Translation (NAT)
- Pool of public addresses that get mapped to internal computers - Limits understanding of internal network to external entities - Provides address conversion and hides the identity
48
Static NAT
- Each internal system has a corresponding external routeable IP Address
49
Hiding NAT - All Systems Share
- All systems share same external routeable IP address
50
Private IP Addresses (RFC 1918)
- 10.0.0.0/8 - 172.16-31.255.255/12 - 192.168.0.0/16
51
Socket
IP and port number
52
4 Wide Area Network (WAN) Technologies | FR/X/A/V
- Frame Relay - X.25 - ATM - VOIP
53
4 Bluetooth Attacks | BJ/BS/BB/BB
- *Bluejack: sends spam anonymously to victims - *Bluesnarfing: Stealing info up to a mile away - Bluebof exploit: Overflow of service - Bluebug: Uses AT commands on victims cell
54
X.25
- First packet switching technology that uses switched and permanent virtual circuits - *Protocol used: LAPB for error detection and corrective procedures - Used in older WAN technologies
55
Frame relay
- *Faster WAN packet-switching protocol with no error correction - Data link layer - Fee Based
56
Permanent Virtual Circuit (PVC)
Private line for a customer with an agreed upon bandwidth availability
57
Switched Virtual Circuit (SVC) - Frame Relay
Dynamically built when required
58
Committed Information Rate (CIR) - Frame Relay
Customer pays for a certain monthly payment to ensure a specific bandwidth availability
59
Asynchronous Transfer Mode (ATM)
- High bandwidth technology that uses switching and multiplexing - *53-byte fixed cells instead of various frame lengths over PVC and SVC
60
Voice Over IP (VOIP)
Technology that can combine different types of data (data, voice, video) into one packet
61
3 Challenges with VOIP | jitter/seq/latency
- When voice and data are combined, jittering can result - Connectionless, packets can arrive out of sequence - Each hop has potential in latency
62
4 Components Required for VOIP | D/CP/VM/VG
- IP telephony device - Call-processing manager - Voicemail system - Voice gateway
63
Session Initiation Protocol (SIP) - VOIP | loc/negot/mgmt/change/only
- Allows for establishment of user location (name to network address) - Negotiation occurs so that features are agreed on and supported - Call management mechanism (adding, dropping, transferring participants) - Change features during session - *Only a signaling protocol (ring, dial, busy)
64
5 Security Threats for VOIP | TF/DD/S/P/V
- Toll Fraud - DDos - SPIT (Spam over Internet Telephony) - Phishing - VOMIT (Replacing words in call before received)
65
Point-To-Point Protocol (PPP)
- Layer 2 service - Encapsulate data over a serial line for dial-up - Can encapsulate data that cant route through the internet
66
3 PPP Authentication Mechanisms
- PAP - CHAP - EAP
67
IPsec
- Works at network layer and provides security on top of IP
68
2 IPsec Encryption Modes
- Tunnel Mode: Payload and headers | - Transport Mode: Payload protected
69
Extensible Authentication Protocol (EAP)
- Protocol for authentication that supports multiple authentication methods - Credentials not protected
70
Protected Extensible Authentication Protocol (PEAP)
- Makes a secure channel before credentials | - Only server uses digital certificate
71
6 PEAP Steps to Protect Credentials
- Client makes connection to EAP Server - Public Key given from EAP Server to client - Client Authorizes cert - Session key encrypted with public key - Private key used to decrypt session key on EAP Server - AuthN data encrypted with session key
72
802.11b
- Speed: 11 mb/s - Freq: 2.4 GHz - Enc: WEP
73
802.11a
- Speed: 54 mb/s - Freq: 5 GHz - Enc: WEP
74
802.11g
- Speed: 54 mb/s - Freq: 2.4 GHz - Enc: WEP
75
802.11i
- Speed: N/A - Freq: N/A - Enc: WPA/WPA2
76
802.11n
- Speed: 450 mb/s - Freq: 2.4 & 5 GHz - Enc: WPA - Multiple in multiple out (MiMO) makes connections quick
77
Why is WPA more secure
- Uses Temporal Key Integrity Protocol (TKIP) | - Uses different session key for each packet
78
3 AES Encryption Lengths
128, 192, 256 bit