CNS Flashcards

1
Q

the connection between a wireless and wired network

A

Access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Provides dial-in and dial-out connections to the network

A

Access server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Directly connect two+ clients, no access point Infrastructure Mode – connects endpoints to a central network, not directly to each other, need access point and wireless clients for IM mode wireless

A

Ad hoc mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Used to match an IP address to a hardware MAC address. It sends out broadcast to a network node to reply with its hardware address. It stores the address in a dynamic table for the duration of the session, so it requests are only sent the first time

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IP uses the destination IP to transmit packets thru networks until delivered

A

Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Asymmetric. More downstream bandwidth up to 18,000 feet over single copper cable pair

A

ADSL, Asymmetric Digital Subscriber Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Infinite wave form, continuous signal, varied by amplification

Asynchronous communications, broadband connections, and half‐duplex links can be digital or analog.

A

Analog signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layer 4 network

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Provides an interface for which applications and end users can utilize networked resources.
Examples: FTP, Telnet

A

Application OSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Second generation: AKA proxy server While transferring data stream to another network, it masks the data origin. operating at Application layer of OSI

A

Application level firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layer 7: actually 3 through 7, which look at content and can involve authentication and encryption, can be more flexible and secure but also tend to be far slower.

A

Application Proxy firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Uses token passing in a star technology on coax

A

ARCnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

used in applications that are dedicated, such as embedded systems, when individual processors can be dedicated to specific tasks at design time

A

AMP: Asymmetric Multiprocessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sends bits of data sequentially. Same speed on both sides. Modems and dial-up remote access systems

A

Asynchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

very high bandwidth. It uses 53-byte fixed size cells instead of frames like Ethernet. It can allocate bandwidth up on demand making it a solution for Busty applications. Requires fiber optics

A

ATM: Asynchronous Transfer Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A decrease in amplitude as a signal propagates along a transmission medium

A

Attenuation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

logical or physical identifier that a computer uses to distinguish different terminal input/output data streams

A

Access port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

attack on the authentication protocol where the attacker transmits data to the claimant or verifier. Examples include a man-in-the-middle, impersonation, and session hijacking.

A

Active attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

illegal attaching of an unauthorized device for the purpose of obtaining access to data

A

Active wiretapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When attackers send unsolicited messages via Bluetooth

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Targets the data or information on Bluetooth-enabled devices

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When wireless workstation is on-lined it sends out a BootP request with its MAC address to get an IP address and the file from which it should boot. Replaced by DHCP

A

Bootstrap Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

a layer 2 device that used to connect two network segments and regulate traffic

A

Bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Forwards data to all other network segments if it’s not on the local segment. Operates at level 2 (thus no IP-addressing)

A

Bridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

ISDN, cable modems, DSL, and T1/T3 lines that can support multiple simultaneous signals. They are analog and not broadcast technologies.

A

Broadband Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Source packet is copied and sent to all nodes

A

Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Set of systems that can receive a broadcast from each other

A

Broadcast Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

a device that provides the functions of both a bridge and a router

A

Brouter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

All transmissions have to travel the full length of the cable

A

BUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

User initiates a connection, supplies identifying code, and then the system will call back a predetermined telephone number. Also less useful for travelling users

A

Callback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Checks incoming telephone number against an approval list and then uses Callback. Less useful for travelling users

A

Caller ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

multiple building connected to fast backbone on a campus

A

CAN Campus Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

for Ethernet. Workstations send out packet. If it doesn’t get an acknowledgement, it resends

A

CSMA Carrier Sense Multiple Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

non-replayable challenge/response dialog

A

Challenge Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

used by PPP servers to authenticate remote clients. Encrypts username and PW and performs periodic re authentication while connected using techniques to prevent replay attacks.

A

CHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

minimum bandwidth guarantee provided by service provider to customers

A

CIR Committed Information Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Layer 5: looks at header of packet only, protects wide range of protocols and services than app-level proxy, but as detailed a level of control. Basically once the circuit is allowed all info is tunneled between the parties. Although firewalls are difficult to configure correctly, they are a critical component of network security.

A

Circuit Level Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

There must be a dedicated physical circuit path exist during transmission. The right choice for networks that have to communicate constantly. Typically for a telephone company network Voice oriented. Sensitive to loss of connection

A

Circuit switched network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Used to identify clients to servers via SSL (client authentication)

A

Client SSL Certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Many workstations, length. 1000Base-T – 100 M
Twisted pair to long. Cat 5 better than cat3 for interference Fiber optics immune to EMI, can be broken and high cost/expertise Topology failures

A

Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

a cable consisting of a core, inner conductor that is surrounding by an insulator, an outer cylindrical conductor

A

OSI Layer 1->Physical->Wired
Coaxial cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

used to code/decode a digital data stream

A

Codec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Set of systems that could cause a collision if they transmitted at the same time, more number of systems in domain increases likelihood of network congestion due to more collisions

A

Collision Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

layer 1 network device that is used to connect network segments together, but provides no traffic control

A

Concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Carries multiple types of traffic like voice, video, and data

A

Converged Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

The merging of specialty or proprietary protocols with standard protocols, such as those from the TCP/ IP suite. The primary benefit of converged protocols is the ability to use existing TCP/ IP supporting network infrastructure to host special or proprietary services without the need for unique deployments of alternate networking hardware.

A

Converged Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

z- are attached by 2 coax cables. In one direction only. Wireless 802.11

A

OSI Layer 2->traffic control->Contention
IEEE 802.3
CSMA with Collision Avoidance Workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Only one host can send at the time, using jamming signals for the rest

A

OSI Layer 2->traffic control->Contention
IEEE 802.3
CSMA with Collision Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

z-C
This layer deals with addressing physical hardware. FRAMES
Translates data into bits and formats then into data frames with destination header and source address. Error detection via checksums.
Example: bridge

A

Data Link Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

z-also Channel Service Unit (CSU)
Digital interface device, used to terminate the physical interface on a DTE device. They connect to the closest telephone company switch in a central office (CO)

A

Data service unit (DSU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Occur at Application, Presentation, and Session layers.

A

Data streams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

a technique by which a computer is used to repeatedly dial a number (usually to a crowded modem pool) in an attempt to gain access immediately after another user had hung up

A

Demon dialer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

DHCP

A

z-Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Saw tooth form, pulses, on-off only, these are a means of transmission that involves the use of a discontinuous electrical signal and a state change or on‐off pulses. Asynchronous communications, broadband connections, and half‐duplex links can be digital or analog.

A

Digital signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

an asymmetric cryptography mechanism that provides authentication

A

Digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

employs all the available frequencies simultaneously in parallel. This provides a higher rate of data throughput than FHSS. It also uses a special encoding mechanism known as chipping code to allow a receiver to reconstruct data even if parts of the signal were distorted because of interference.

A

DSSS, Direct Sequence Spread Spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

domain validation tool

A

DKIM, Domain Keys Identified Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

When an attacker changes the domain name to IP address mappings of a system to redirect traffic to alternative systems

A

DNS Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

When an attacker sends false replies to a requesting system, beating valid replies from the real DNS server

A

DNS Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Consists of a host with 2 NIC’s. One connected to trusted, one to un-trusted. Can thus be used as translator between 2 network types like Ethernet/token ring. Internal routing capabilities must not be enabled to make it impossible to circumvent inspection of data.

A

Dual homed host firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Fourth generation: Enables modification of the firewall rule. It provides limited support for UDP by remembering UDP packages across the network.

A

Dynamic Packet Filtering firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

a passive network attack involving monitoring of traffic

A

Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

forgery of the sender’s email address in an email header

A

E-mail spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

potentially compromising leakage of electrical or acoustical signals

A

Emanations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

z-Encrypts IP packets and ensured integrity.
Header – contains information showing which security association to use and the packet sequence number. Like the AH, the ? sequences every packet to thwart replay attacks.

A

Encapsulating Security Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Using CSMA with an BUS-topology

A

Ethernet IEEE 802.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

More resistant than coaxial Token Ring because a token is passed by every station, a NIC that’s is set to wrong speed or error can take all network down

A

Ethernet twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

an authentication framework. Allows for new authentication technologies to be compatible with existing wireless or point-to-point connection technologies, it was used for PPP connections

A

EAP, Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A shield against leakage of electromagnetic signals.

A

Faraday Cage/Shield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

allows existing high-speed networks to be used to carry storage traffic

A

FCoE, Fiber Channel Over Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Form of token ring that has second ring that activates on error
Leased lines use multiple lines and/or multiple vendors

A

OSI Layer 2->Traffic Control->Token
IEEE 802.5
Fiber Distributed Data Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.

A

OSI Layer 1->Physical->Wired
Fiber optics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

z-a form of network data-storage solution (SAN or NAS) that allows for high-speed file transfers at upward of 16 GBps. It was designed to be operated over fiber-optic cables; support for copper cables was added later to offer less-expensive options. It can be used to support it over the existing network infrastructure. It is used to encapsulate Fibre Channel communications over Ethernet networks. Fibre Channel operates as a Network layer or OSI layer 3 protocol, replacing IP as the payload of a standard Ethernet network.

A

FCoE, Fibre Channel over Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

For file transfers. Cannot execute remote files as programs. Authentication. Port 20 and 21

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

a group of systems that enforces an access control policy between two networks

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

a denial of service attack initiated by sending spoofed UDP echo request to IP broadcast addresses

A

Fraggle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

IP will subdivide a packet if its size is greater than the maximum allowed on a local network
Message routing, error detection and control of node data are managed. IP, IPSEC, ICMP, BGP, OSPF, RIP, BOOTP, DHCP, ZIP, DDP, X.25, NAT and IGMP

A

Fragmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

High performance WAN protocol designed for use across ISDN interfaces. Is fast but has no error correction, supports multiple PVCs, unlike X.25, packet switched technology that provides CIR, requires DTE/DCE at each connection point

A

Frame Relay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Over a public switched network. High Fault tolerance by relaying fault segments to working.

A

Frame Relay WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

The entire range of available frequencies is employed, but only one frequency at a time is used.

A

FHSS: Frequency Hopping Spread Spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

a secure connection to another network

A

Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

T1 speed over two copper cable pairs up to 12,000 feet

A

HDSL, High Rate Digital Subscriber Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

extension to SDLC also for mainframes. Uses data encapsulation on synchronous serial links using frame characters and checksums. Also data link layer High Speed Serial Interface (HSSI) - Defines electrical and physical interfaces to use for DTE/DCE communications. Physical layer of OSI

A

HDLC, High-level Data Link Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

interception and take over of a communication session by an attacker

A

Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Layer 3 (Transport)

A

Host to Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

layer 1 network device that is used to connect network segments together, but provides no traffic control

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Connect multiple LAN devices into a concentrator. Is actually a multi-port repeater (physical)

A

HUBS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

May be software defined, but it could also use traditional network devices running as virtual machines

A

Hypervisor-based Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

an attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input

A

Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

combination of digital telephony and data transports. Overtaken by xDSL, not all useable due to “D Channel” used for call management not data

A

ISDN, Integrated Services Digital Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

unauthorized access of information (e.g. tapping, sniffing, unsecured wireless communications, emanations)

A

Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Layer 2 (corresponds to OSI network layer) Defines the IP datagram and handles routing of data across networks
Protocols: IP, ARP, RARP, ICMP

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Sends messages between network nodes regarding the health of the network. Also informs about rerouting in case of errors. Utility PING uses these messages to check physical connectivity of the network machines

IPX, Appletalk, and NetBEUI are non-IP protocols

A

ICMP, Internet control message protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

? is global, ? is local for use within companies and ? can be used e.g. by your customers and clients but is not public.

A

Internet, Intranet, Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

z-All hosts have an IP address. Each data packet has an IP address of sender and recipient. Routing in network is based upon these addresses. Datagram service is considered unreliable because there’s no guarantee that the packet will be delivered, not even that its delivered only once and no guarantee that its delivered in the same sequence that its sent
32 bits long, IPv6 is 128 bits long

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Converged protocol that allows location-independent file services over traditional network technologies. Cost less than Fiber. Standard for linking data storage sites

A

iSCI, Internet Small Computer Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

a networking storage standard based on IP. This technology can be used to enable location-independent file storage, transmission, and retrieval over LAN, WAN, or public Internet connections.
It is often viewed as a low-cost alternative to Fibre Channel.

A

iSCSI, Internet Small Computer System Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

forging of an IP address

A

IP address spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

an attack that breaks up malicious code into fragments, in an attempt to elude detection

A

IP fragmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

z-Operates at Network Layer of OSI
Enables multiple and simultaneous tunnels
Encrypt and authenticate
Build into IPv6
Network-to-network use
Creates a private, encrypted network via a public network
Encryption for confidentiality and integrity

A

IPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Encryption via Tunnel mode (entire data package encrypted) or Transport mode (only datagram encrypted)
Only works with IP at Network layer of OSI NON IP-sec compatible

A

IPSEC Compatible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

PRI (Primary Rate Interface) bandwidth of 1.544 Mbps, faster than BRI’s 144 Kbps

A

ISDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Fifth generation: Application level Firewall Runs in windows NT, modular, kernel based, multiplayer session evaluation. Uses dynamic TCP/IP stacks to inspect network packages and enforce security policies.

A

Kernel Proxy Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

z-Cisco developed its own VPN protocol called which is a mutual authentication tunneling mechanism.
It does not offer encryption. It was not widely deployed and was soon replaced by L2TP. Both operate at layer 2. Both can encapsulate any LAN protocol.

A

L2F, Layer 2 Forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

z-Also in data-link layer of OSI
Single point-to-point connection per session
Dial-up network use
Port 115
Uses IPsec

A

L2TP, Layer 2 Tunneling Protocol

106
Q

Remote access, multi layer switch that connects LANs over a WAN

A

LAN extenders

107
Q

Involves sending a spoofed TCP SYN packet (connection initiation) with the target host’s IP address and an open port as both source and destination.
The reason this attack works is because it causes the machine to reply to itself continuously.

A

Land Attack

108
Q

Client/server based directory query protocol loosely based upon X.500, commonly manages user information, for accessing directory services and manage certificates Ex. Active Directory, cn=ben+ou=sales
Zero or more, comma separated, no semi-colon, + to join

A

LDAP, Lightweight Directory Access Protocol

109
Q

Cisco proprietary protocol to handle problems with TKIP, security issues don’t use. Provides reauthentication but was designed for WEP

A

LEAP, Lightweight Extensible Authentication Protocol

110
Q

created for use with X25, defines frame types and is capable of retransmitting, exchanging and acknowledging frames as detecting out of sequence or missing frames

A

LAPB, Link Access Procedure-Balanced

111
Q

Limited geographically to e.g. a building. Devices are sharing resources like printers, email and files. Connected through copper wire or fiber optics.

A

LAN, Local Area Network

112
Q

Flow control and error notification

A

Logical Link Control Sub layer

113
Q

hardware address of machine, can tell manufacturer,

A

MAC, Machine Access Control

114
Q

network extends over cities

A

MAN, Metropolitan Area Network

115
Q

z-Physical addressing. Concerns frames, logical topologies and MAC-addresses
Protocols: L2F, PPTP, L2TP, PPP, SLIP, ARP, RARP, SLARP,
IARP, SNAP, BAP, CHAP, LCP, LZS, MLP, Frame Relay, Annex
A, Annex D, HDLC, BPDU, LAPD, ISL, MAC,
Ethernet, Token Ring, FDDI

A

Media Access Control layer

116
Q

All nodes interconnected

A

MESH

117
Q

Involves the transmission of messages from node-to-node. Messages are stored on the network until a forwarding path is available.

A

Message switching networks

118
Q

high frequency, highly directional radio signals. Attackers target interception attempts at transmission and relay stations.

A

OSI Layer 1->Wireless
Microwave

119
Q

a device that converts between digital and analog representation of data

A

Modems

120
Q

a type of attack involving attempted insertion, deletion or altering of data

A

Modification

121
Q

provides authentication, confidentiality, integrity, and nonrepudiation

A

MOSS, MIME Object Security Services

122
Q

Source packet is copied and sent to multiple destinations

A

Multicast

123
Q

Allow encryption at various layers, support a range of protocols at higher levels. Bad – conceal covert channels, filters can be bypassed, sometimes logical boundaries can be bypassed

A

Multilayer Protocols

124
Q

a device that sequentially switches multiple analog inputs to the output

A

Multiplexers

125
Q

high performance networking, uses path labels instead of network addresses, wide area networking protocol, label switching, finds final destination and then labels route for others to follow

A

MPLS, Multiprotocol Label Switching

126
Q

Layer 1 (Data link, Physical)
Routines for accessing physical networks and the electrical connection

A

Network access

127
Q

Protocol that supports file sharing between two different file systems

A

Network File System

128
Q

z-C, AU, I
Path selection and logical/network addressing.
Technology: Virtual circuits (ATM), routers. Packets
Example: router

A

Network Layer 3

129
Q

z-Developed by Department of Defense in the 1970s to support the construction of the internet
HINT: AHIN

A

Network layers TCP/IP Model

130
Q

Ability to access resources from another service

A

OAuth

131
Q

a mail server that improperly allows inbound SMTP connections for domains it does not serve

A

Open mail relay servers

132
Q

z-Routing protocol short path

A

Open Shortest Path First

133
Q

Paired with OAuth is a RESTful, JSON-based authentication protocol can provide identity verification and basic profile information, phishing attack possible by sending fake data

A

OpenID

134
Q

Default, stores user PW in the clear

A

OpenLDAP

135
Q

employs a digital multicarrier modulation scheme that allows for a more tightly compacted transmission. The modulated signals are perpendicular and thus do not cause interference with each other.

A

OFDM, Orthogonal Frequency-Division Multiplexing

136
Q

a denial of service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet

A

Overlapping fragment attack

137
Q

a basic level of network access control that is based upon information contained in the IP packet header

A

Packet filtering

138
Q

First generation (static) AKA screening router Examines source/destination address, protocol and ports of the incoming package. Based on ACL’s access can be denied or accepted. Is considered a firewall and operates at Network or Transport layer of OSI

A

Packet filtering firewall

139
Q

Sits between trusted and un-trusted network, sometimes used as boundary router. Uses ACL’s. Protects against standard generic external attacks. Has no user authentication, has minimal auditing.

A

Packet filtering routers

140
Q

Nodes share bandwidth with each other by sending small data units called packets. Packets will be send to the other network and reassembled. Data oriented. Sensitive to loss of data. More cost effective than circuit switching because it creates virtual circuits only when they are needed.

A

PSN or PSDN, Packet switched networks

141
Q

 layer 3/4 : use rules based on a packet’s source, destination, port or other basic information to determine whether or not to allow it into the network.

A

Packet-filtering firewalls

142
Q

Provides identification and authentication of the user using static replayable passwords. No encryption of user-id or password during communication

A

PAP, Password Authenticate Protocol

143
Q

sends PW unencrypted

A

PAP, Password Authentication Protocol

144
Q

provides a physical cross connect point for devices

A

Patch panels

145
Q

is a telephone exchange for a specific office or business

A

PBX, Private Branch Exchange

146
Q

Provides encryption for EAP methods and can provide authentication, does not implement CCMP, encapsulates EAS in a TLS tunnel

A

PEAP

147
Q

Provides authentication, confidentiality, integrity, and nonrepudiation

A

PEM

148
Q

like a dedicated leased line; the logical circuit always exists and is waiting for the customer to send data. Like a walkie-talkie

A

PVC, Permanent virtual circuits

149
Q

a social engineering attack that uses spoofed email or websites to persuade people to divulge information

A

Phishing

150
Q

z- C
Physical signaling. Coverts bits into voltages or light impulses. Electrical, Hardware and software drivers are on this level. It sends and receives bits.
Repeaters, hubs, cables, USB, DSL, ISDN, ATM
Physical topologies: BUS, MESH, STAR, TREE, RING

A

Physical Layer 1

151
Q

unauthorized access of network devices

A

Physical tampering

152
Q

improvement on slip, adds login, password and error (by CHAP and PAP) and error correction. Data link.

A

PPP, Point to Point Protocol

153
Q

Most common, used for dial up connections, replaced SLIP

A

PPP, Point to Point Protocol

154
Q

Host can only transmit when he polls a secondary to see if its free

A

Polling

155
Q

802.1x, can be used with EAP

A

Port Based Authentication

156
Q

z-Works at data link layer of OSI
Only one single point-to-point connection per session
Point To Point protocol (PPP) for authentication and tunneling
Dial-up network use
Does not support EAP
Sends initial packets in plaintext

A

PPTP, Point to Point tunneling protocol

157
Q

z-C, AU, Encryption
Translations like EBCDIC/ANSI; compression/decompression and encryption/decryption. Uses a common format to represent data, Standards like JPEG, TIFF, MID, HTML; Technology: Gateway.

Messages

A

Presentation Layer 6

158
Q

mediates communication between un-trusted hosts on behalf of the hosts that it protects

A

Proxies

159
Q

Form of gateway that provide clients with a filtering, caching, or other service that protects their information from remote systems

A

Proxy

160
Q

PVCs

A

z-Private Virtual Circuits

161
Q

z-Provides terminal sessions w/out

A

RDP

162
Q

layer 1 network device that is used to connect network segments together, but provides no traffic control (a concentrator).

A

Repeaters

163
Q

Incoming calls are only allowed from specific addresses on an approval list. This authenticates the node, not the user!

A

Restricted Address

164
Q

When a hardware address is known but the IP address has to be found. (like an diskless machine)
Switches, bridges, hardware addressing

A

Reverse address resolution protocol

165
Q

Workstations are connected to form a closed loop

A

RING

166
Q

unauthorized wireless network access device

A

Rogue access points

167
Q

a layer 3 device that used to connect two or more network segments and regulate traffic

A

Routers

168
Q

Used to reset or disconnect a session, resumed by restarting the connection via a new three-way handshake

A

RST flag

169
Q

Used for signed and encrypted emails, can form sign, and use as part of a SSO solution

A

S/MIME Certificates

170
Q

a specialized wireless receiver/transmitter placed in orbit that facilitates long distance communication

A

OSI Layer 1->Wireless
Satellite

171
Q

Has both a packet-filter router and a bastion host. Provides both network layer (package filtering) as application layer (proxy) server.

A

Screened-Host firewall system

172
Q

Copy actual screen, subset of remote control

A

Screenscraper

173
Q

 z-Unique approach to network operation, design, and management. Aims at separating the infrastructure layer (i.e., hardware and hardware-based settings) from the control layer (i.e., network services of data transmission management). Furthermore, this also removes the traditional networking concepts of IP addressing, subnets, routing, and so on from needing to be programmed into or be deciphered by hosted applications. Offers a new network design that is directly programmable from a central location, is flexible, is vendor neutral, and is open-standards based.

A

SDN, Software Defined Network

174
Q

Symmetric up to 10,000 feet over single copper cable pair

A

SDSL, Symmetric Digital Subscriber Line

175
Q

Authentication for credit card transactions. Overtaken by SSL
Also uses message authentication code for integrity checking.

A

Secure Electronic Transaction

176
Q

Authentication, compression, confidentiality and integrity.
Uses RSA certificates for authentication and triple DES for encryption

A

Secure Shell

177
Q

Encryption technology to provide secure transactions like credit card numbers exchange. Two layered: record protocol and handshake protocol. Same as SSH it uses symmetric encryption for private connections and asymmetric or public key cryptography for peer authentication.

A

Secure Socket Layer

178
Q

 z-The first line of protection between trusted and untrusted networks. Generally includes a firewall and router that help filter traffic. May also include proxies, IDSs, and IPSs.
Zero Day – application white list

A

Security Perimeter

179
Q

An attack involving the hijacking of a TCP session by predicting a sequence number.

A

Sequence Attacks

180
Q

z- – None
Inter-host communication, logical persistent connection between peer hosts, a conversation, simplex, half duplex, full duplex. Protocols as NSF, SQL, RADIUS, and RPC. Protocols: PAP, PPTP, RPC Technology: Gateway
Examples: DNS, NFS

A

Session Layer 5

181
Q

Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.

A

Shielding

182
Q

Encrypting HTTP documents. Also overtaken by SSL

A

SHTTP

183
Q

Provides high availability in encrypted sessions to protect against crashes. Exchanges keys on a session by session basis.

A

Simple Key Management for Internet Protocols

184
Q

Email queuing. Port 25

A

SMTP, Simple Mail Transfer protocol

185
Q

Collection of network information by polling the devices from a management station. Sends out alerts –called traps- to an database called Management Information Bases (MIBs)

A

SNMP, Simple Networking Management Protocol

186
Q

Identify areas where wireless network may be accessible

A

Site Survey

187
Q

A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses

A

Smurf

188
Q

Has also defined a De-Militarized Zone (DMZ) : a small network between trusted an untrusted

A

Screened-subnet firewalls

189
Q

an attack involving the hijacking of a TCP session by predicting a sequence number

A

Sequence attacks

190
Q

eavesdropping on network communications by a third party

A

Sniffing

191
Q

Every workstation gets some Socks software to reduce overhead

A

Socks firewall

192
Q

defined and configured as code or software, quickly change the network based on organizational requirements

A

SDN, Software designed networking

193
Q

Protocol for sending multiple optical streams over fiber

A

SONET

194
Q

a vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network

A

Source routing exploitation

195
Q

unsolicited commercial email

A

Spam

196
Q

T-1 – 1.544 Mbps,
T-3 – 44,736 Mbps (45)
ATM – 155 Mbps,
ISDN – 64 or 128 Mbps
CAT 3 UTP; 10 Mbps,
CAT 5;100 Mbps
CAT 5e/6 – 1,000 Mb

A

Speeds

197
Q

Spam over Internet Telephony and targets VoIP systems

A

SPIT attacks

198
Q

Normally disabled for secure networks

A

SSID

199
Q

Isolated system

A

Stand-alone Mode

200
Q

Nodes are connected to a central LAN device

A

STAR

201
Q

Third generation: (also known as Dynamic) All packages are inspected at the Networking layer so it’s faster. By examining the state and context of the data packages it helps to track connectionless protocols like UDP and RPC. Analyzed at all OSI Layers.

A

Stateful inspection firewall

202
Q

Layer 7 : have access to information such as; conversation, look at state table and context of packets; from which to make their decisions.

A

Stateful packet filtering firewalls

203
Q

z- Layer 3

A

Static Packet Firewall

204
Q

Logical division of a network

A

SUBNET

205
Q

Made up of two or more networks

A

Supernet

206
Q

high speed communication over public switches networks for exchanging
‘bursts of data’ between enterprises

A

SMDS, Switched Multimegabit DATA Service

207
Q

more like a shortwave or ham radio. You must tune the transmitter and receiver to a new frequency every time you want to communicate with someone.

A

SVC, Switched Virtual Circuit

208
Q

a layer 2 device that used to connect two or more network segments and regulate traffic

A

Switches

209
Q

hardware and software architecture where two or more identical processors are connected to a single, shared main memory, have full access to all I/O devices, and are controlled by a single operating system instance that treats all processors equally, reserving none for special purposes.

A

SMP, Symmetric Multiprocessors

210
Q

a denial of service attack that floods the target system with connection requests that are not finalized

A

SYN flooding

211
Q

Very high speed governed by electronic clock timing signals

A

Synchronous

212
Q

created by IBM for mainframes to connect to their remote offices. Uses a polling media access method. Works with dedicated leased lines permanent up.Data link layer of OSI model

A

SDLC, Synchronous Data Link Control

213
Q

eavesdropping on network communications by a third party

A

tapping

214
Q

mitigation of spamming and other attacks by delaying incoming connections as long as possible

A

Tar pits

215
Q

SYN, SYN-/ACK, ACK
Protocols: TCP, UDP, SSL, SSH-2, SPX, NetBIOS, ATP

A

TCP Three-way Handshake

216
Q

a denial of service attack that exploits systems that are not able to handle malicious, overlapping and oversized IP fragments

A

Teardrop

217
Q

Terminal emulation enables user to access resources on another machine. Port 23

A

Telnet

218
Q

a codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment

A

TEMPEST

219
Q

10Base5, coax up to 500 meters

A

Thicknet

220
Q

10base2 with coax cables up to 185 meters

A

Thinnet

221
Q

z-Design separates distinct protected zones and can be protected by a single firewall that has multiple interfaces

A

Tiers

222
Q

Temporal Key Integrity Protocol, uses RC4

A

TKIP

223
Q

Used in token rings, Hosts can only transit when they receive a clear to send token. DATA NETWORK TYPES

A

Data Link->Traffic Control
Token passing

224
Q

IBM created. All end stations are connected to a MAU Multi Access Unit. CAU: Controlled Access Units – for filtering allowed MAC (Extended Unique Identifier) addresses.

A

Token Ring IEEE 802.5

225
Q

z-Reliable, sequences and works with acknowledgements. Provides a manageable data flow to avoid congestions overloading and data loss. (Like having a telephone conversation with someone). Connection Oriented.

User UDP, Datagram protocol – unreliable, scaled down version of ?, no error correction, no sequencing. Less overhead. (Like sending a letter to someone). Connectionless.

A

Transmission control protocol

226
Q

z- C, AU, I
End-to-end data transfer services and reliability. Technology:
Gateways. Segmentation, sequencing, and error checking at this layer. Datagrams
Examples: TCP which uses IP in network layer, UDP, SSH

A

Transport Layer 4

227
Q

encrypt and protect transactions to prevent sniffing while data is in transit along with VPN and IPsec
most effective control against session hijacking
ephemeral session key is used to encrypt the actual content of communications between a web server and client

A

TLS - MOST CURRENT not SSL!!!
Transport Layer Security

228
Q

Bus type with multiple branches

A

TREE

229
Q

Stripped down, can only send/receive but not browse directories. No authentication thus insecure. Port 69

A

Trivial File Transfer Protocol

230
Q

a simple, inexpensive cabling technology consisting of two conductors that are wound together to decrease interference

A

OSI Layer 1->Physical->Wired
Twisted pair

231
Q

z-Uses the 802.11x specification to create a wireless LAN

A

Types of Wireless Networks

232
Q

Packet is sent from single source to single destination

A

Unicast

233
Q

lightweight service for connectionless data transfer without error detection and correction

A

UDP, User Datagram Protocol

234
Q

10BaseT=10MBps
100baseT=Fast Ethernet =100MBps
1000BaseT=Gigabit Ethernet=1GBps
Ethernet networks were originally designed to work with more sporadic traffic than token ring networks

A

UTP

235
Q

Valid Subnet Masks

A

255, 254, 252, 248, 240, 224, 192, 128

236
Q

13-52 MBps down,
1,5-2,3 Mbps upstream
over a single copper pair
over 1,00 to 4500 feet

A

VDSL, Very High speed Digital Subscriber Line

237
Q

Created by dynamically building a secure communications link between two nodes, using a secret encapsulation method via network address translation (NAT) where internal IP addresses are translated to external IP addresses. Cannot double NAT with the same IP range, same IP address cannot appear inside and outside of a NAT router.

A

VPN, Virtual Private Networks

238
Q

a protocol for the efficient transmission of voice over the Internet

A

Voice over Internet Protocol (IP) (VoIP)

239
Q

Hardware or software to create secure tunnels

A

VPN Devices

240
Q

WAF

A

Web Application Firewall

241
Q

Multi-port networking devices that are used in carrier networks. Connect private data over public data by using digital signals. Data link layer.

A

WAN switches

242
Q

reconnaissance technique, involving automated, brute force identification of potentially vulnerable modems

A

War dialing

243
Q

searching for wireless networks in a moving car

A

War driving

244
Q

wireless local area network technology specified in the 802.11 sub group A, B, G, or N

A

OSI Layer 1->Wireless
Wi-Fi

245
Q

“Worldwide Interoperability of Microwave Access” (IEEE 802.16) is a specification for wireless Metropolitan Area Networks that provides an alternative to the use of cable and DSL for last mile delivery

A

WI-MAX

246
Q

Connects LANS over a large geographical area

A

WAN, Wide Area network

247
Q

Uses WAP to link wireless clients to a wired network

A

Wired Extension Mode

248
Q

Wireless speeds

A

Wi-Fi 6E (802.11ax), Max Linkrate = 600 to 9608 Mbit/s, Adopted = 2020, Frequency = 6 GHz
Wi-Fi 6 (802.11ax), Max Linkrate = 600 to 9608 Mbit/s, Adopted = 2019, Frequency = 2.4/5 GHz
Wi-Fi 5 (802.11ac), Max Linkrate = 433 to 6933 Mbit/s, Adopted = 2014, Frequency = 5 GHz
Wi-Fi 4 (802.11n), Max Linkrate = 72 to 600 Mbit/s, Adopted = 2008, Frequency = 2.4/5 GHz
(Wi-Fi 3)* 802.11g, Max Linkrate = 6 to 54 Mbit/s, Adopted = 2003, Frequency = 2.4 GHz
(Wi-Fi 2)* 802.11a, Max Linkrate = 6 to 54 Mbit/s, Adopted = 1999, Frequency = 5 GHz
(Wi-Fi 1)* 802.11b, Max Linkrate = 1 to 11 Mbit/s, Adopted = 1999, Frequency = 2.4 GHz
(Wi-Fi 0)* 802.11, Max Linkrate = 1 to 2 Mbit/s, Adopted = 1997, Frequency = 2.4 GHz

249
Q

Uses TKIP for data encryption

A

WPA

250
Q

Based on 802.11i, uses AES, key management, reply attack protection, and data integrity, most secure, CCMP included, WPA2 ENTERPRISE Mode - uses RADIUS account lockout if a password-cracker is used

A

WPA2

251
Q

Defines point-to-point communication between Data terminal Equipment (DTE) and Data Circuit Terminating Equipment (DCE)

A

X25

252
Q

Digital subscriber Line uses telephone to transport high bandwidth data to remote subscribers

A

xDSL

253
Q

organizations should not automatically trust anything inside or outside its perimeters and instead must authenticate and verify all subjects, objects, and actions before granting access

A

zero trust

254
Q

OSI Layer 1

A

Physical - Responsible for transmission of bits. Implemented primarily through hardware. Encompasses signaling method, electrical and mechanical interfaces

Devices = access point, concentrator/patch panel, hub, multiplexers, modem, repeater

Protocol = EIA-TIA 534

Security Protocol =

Attacks = Physical

255
Q

OSI Layer 2

A

Data Link = responsible for error-free, reliable, transmission of data. Flow control, error detection and correction, retransmission. Uses MAC addresses.

Devices = bridge, switch

Protocol = X.25, Frame Relay, Asynchronous Transfer Mode (ATM), DOCSIS, Multi Protocol Label Switching (MPLS), Generic MPLS

Security Protocol =

Attacks = Physical

256
Q

OSI Layer 3

A

Network = Transport of information. Abstraction of routing information. Not needed on direct links.

Devices = router

Protocol =
Routing->Authenticated(BGP, OSPF)
Routing->Unauthenticated(Routing Information Protocol, RIP, routing table compromise)

Network->Internet Protocol (IP)->IPv4
Network->Internet Protocol (IP)->IPv6
Network->Not answers->IPX (Novell), DRP (DECnet), DDP, (AppleTalk), CLNP (ISO)

Testing->Internet Control Message Protocol (ICMP)

Multicast->Internet Group Message Protocol (IGMP)

Tunneling -> Point to Point Tunneling Protocol (PPTP)
Tunneling-> Layer 2 Tunneling Protocol (L2TP)

Security Protocol = IPSec

Attacks =

Integrity =
port scanning (scanning tool, FIN NULL XMAS scanning, source routing exploitation, syn scanning)
session hijacking (tcp sequence number attacks, sequence attacks)
IP address spoofing,
ping scanning,
traceroute exploitation

Confidentiality =
source routing exploitation,
eavesdropping

Availability =
ICMP redirect attacks,
denial of service/distributed denial of service (syn flooding, smurf, fraggle),
ping of death,
IP fragmentation attacks (overlapping fragment attack, teardrop)

257
Q

OSI Layer 4

A

Transport = Connection, Connectionless, 3-way handshake, Exchange of data between end systems, error free, in sequence, no losses, no duplicates, quality of service

Devices =

Protocol =
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
SPX -> old, not answer for exam

Security Protocol =

Attacks =

Integrity =
port scanning (scanning tool, FIN NULL XMAS scanning, source routing exploitation, syn scanning)
session hijacking (tcp sequence number attacks, sequence attacks)
IP address spoofing,
ping scanning,
traceroute exploitation

Confidentiality =
source routing exploitation,
eavesdropping

Availability =
ICMP redirect attacks,
denial of service/distributed denial of service (syn flooding, smurf, fraggle),
ping of death,
IP fragmentation attacks (overlapping fragment attack, teardrop)

258
Q

OSI Layer 5

A

Session = control of dialogues between applications, dialogue discipline, recovery, sockets/winsock

Devices =

Protocol =

Remote Procedure Call (RPC),
Real-time Transport Control Protocol (RTCP),
SOCKS (Internet socket)

Security Protocol =

Attacks = application buffer overflows

259
Q

OSI Layer 6

A

Presentation = Data conversion. Character Code Translation. Compression. Encryption and Decryption.

Devices =

Protocol =
CODEC (Compression/Decompression)
Compression formats (Video [jpeg, h.261], Audio [mpeg, g.711]),
Abstract Syntax Notation One (ASN.1)

Security Protocol =

Attacks = application buffer overflows

260
Q

OSI Layer 7

A

Application =

Asynchronous messaging (e-mail and news, Simple mail transfer protocol, Post office protocol, Internet message access protocol, Network news transfer protocol)

Instant messaging (Open protocols, applications and services, proprietary application and services)

Data exchange (world wide web, file transfer protocol, trivial file transfer protocol, hypertext transfer protocol, passive and active content [activex, java, javascript])

Administrative services (Simple network management protocol v3, RMON by Cisco)

Remote access services (RADIUS Remote Authentication Dial In User Service, Telnet Terminal emulation protocol, Remote login [rlogin], remote shell [rsh], remote copy [rcp])

Devices =
Protocol =
Security Protocol =

Attacks = application buffer overflows

261
Q

when an adversary drains a client node’s battery by sending a constant series of management messages to the subscriber station/mobile subscriber (SS/MS)

A

Water torture attack

262
Q

ports

A

FTP: 20/21
SSH: 22
Telnet: 23
SMTP: 25
DNS: 53
HTTP: 80
POP3: 110
NTP: 123
Windows File Sharing: 135, 137-139, 445
HTTPS: 443
LPR/LPD: 515
Microsoft SQL Server: 1433/1434
Oracle: 1521
H.323: 1720
PPTP: 1723
RDP: 3389
HP JetDirect printing: 9100