Domain 4 - Communication and Network Security Flashcards
OSI Layer 7
Application Layer
OSI Layer 6
Presentation Layer
OSI Layer 5
Session Layer
OSI Layer 4
Transport Layer
OSI Layer 3
Network Layer
OSI Layer 2
Data Link Layer
OSI Layer 1
Physical Layer
HTTP, FTP, LPD, SMTP, Telnet, TFTP, EDI, POP3, IMAP, SNMP, NNTP, S-RPC, and SET. Which OSI Layer are these protocols found?
Application - Layer 7
Encryption protocols and format types, such as ASCII, EBCDICM, TIFF, JPEG, MPEG, and MIDI. Which OSI Layer are these protocols found?
Presentation - Layer 6
NFS, SQL, and RPC. Which OSI Layer are these protocols found?
Session - Layer 5
SPX, SSL, TLS, TCP, and UDP. Which OSI Layer are these protocols found?
Transport - Layer 4
ICMP, RIP, OSPF, BGP, IGMP, IP, IPSec, IPX, NAT, and SKIP. Which OSI Layer are these protocols found?
Network - Layer 3
SLIP, PPP, ARP, RARP, L2F, L2TP, PPTP, FDDI, ISDN. Which OSI Layer are these protocols found?
Data Link - Layer 2
EIA/TIA-232, EIA/TIA-449, X.21, HSSI, SONET, V.24, and V.35. Which OSI Layer are these protocols found?
Physical - Layer 1
Which layer of the OSI Model is ARP and RARP found?
Data Link - Layer 2
Which layer of the OSI Model is ICMP and NAT found?
Network Layer - Layer 3
Which layer of the OSI Model is RPC found?
Session Layer - Layer 5
Which layer of the OSI Model is HTTP and TFTP found?
Application Layer - Layer 7
Which layer of the OSI Model is Encryption protocols and JPEG found?
Presentation Layer - Layer 6
Which layer of the OSI Model is SSL and TLS found?
Transport Layer - Layer 4
What are the four TCP/IP layers?
Application, Transport, Internet and Link
Application model in TCP/IP is equivalent to what layers in OSI?
Application, Presentation and Session (layers 7-5)
Transport layer in TCP/IP is equivalent to what layers in OSI?
Transport - Layer 4
Internet layer in TCP/IP is equivalent to what layers in OSI?
Network - Layer 3
Link layer in TCP/IP is equivalent to what layers in OSI?
Data Link and Physical - Layers 2 and 1
An open network architecture guide for network product vendors. This standard, or guide, provides a common foundation for the development of new protocols, networking services, and even hardware devices.
The OSI Model
Data name at Application, Presentation and Session layers
Data stream (or just data)
Data name at Transport layer
Segment
Data name at Network layer
Packet
Data name at Data Link layer
Frame
Data name at Physical layer
Bits
What are the OSI model data names in order (top to bottom)?
Data, Segment, Packet, Frame, Bits
Which TCP/IP layer would the protocols FTP and Telnet be found?
Application layer
Which TCP/IP layer would the protocols TCP and UDP be found?
Transport Layer
Which TCP/IP layer would the protocols ICMP and IP be found?
Internet Layer
Which TCP/IP layer would the protocol Ethernet be found?
Link layer
Transport layer protocol of TCP/IP that is a full duplex connection-oriented protocol?
TCP
Transport layer protocol of TCP/IP that is a simplex connectionless protocol?
UDP
This can be used to manage traffic, improve performance, and enforce security. Examples include intranet, extranet, and DMZ.
Network segmentation
A form of network data storage solution (i.e.,
SAN (storage area network) or NAS (network-attached storage)) that allows for high-speed file transfers.
Fibre Channel
This is used to encapsulate Fibre Channel communications over Ethernet networks.
FCoE (Fibre Channel over Ethernet)
A networking storage standard based on IP.
iSCSI (Internet Small Computer System Interface)
The IEEE standard for wireless network communications.
802.11
The process of investigating the presence, strength, and reach of wireless access points deployed in an environment. This task usually involves walking around with a portable wireless device, taking note of the wireless signal strength, and mapping this on a plot or schematic of the building.
Site survey
An early alternative to WEP. This technique was an improvement but was itself not fully secure. It is based on the LEAP and TKIP cryptosystem and employs a secret passphrase.
Wi-Fi Protected Access (WPA)
a new encryption scheme known as the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP), which is based on the AES encryption scheme.
WPA2
is defined by the IEEE 802.11 standard. It was designed to provide the same level of security and encryption on wireless networks as is found on wired or cabled networks. It provides protection from packet sniffing and eavesdropping against wireless transmissions. A secondary benefit is that it can be configured to prevent unauthorized access to the wireless network. It uses a predefined shared secret key.
Wired Equivalent Privacy (WEP)
An authentication framework that allows for new
authentication technologies to be compatible with existing wireless or point-to-point connection technologies.
EAP (Extensible Authentication Protocol)
encapsulates EAP methods within a TLS tunnel that provides authentication and potentially encryption.
PEAP (Protected Extensible Authentication Protocol)
a Cisco proprietary alternative to TKIP for WPA. This was developed to address defi ciencies in TKIP before the 802.11i/WPA2 system was ratified as a standard.
LEAP (Lightweight Extensible Authentication Protocol)
A list of authorized wireless client interface
MAC addresses that is used by a wireless access point to block access to all non-authorized devices.
MAC filtering
This was designed as the replacement for WEP without requiring replacement of legacy wireless hardware. It was implemented into 802.11 wireless networking under the name WPA (Wi-Fi Protected Access).
TKIP (Temporal Key Integrity Protocol)
This was created to replace WEP and TKIP/WPA. It uses AES (Advanced Encryption Standard) with a 128-bit key.
CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)
An authentication technique that redirects
a newly connected wireless web client to a portal access control page.
captive portal
What the are the standard network topologies
Ring, bus, star and mesh
Name the four basic types of firewalls
static packet filtering, application-level gateway, circuit-level gateway, and stateful inspection
Examples of protocol services used to connect LAN and WAN communication technologies
Frame Relay, SMDS, X.25, ATM, HSSI, SDLC, HDLC, and ISDN.
The addition of a header, and possibly a footer, to the data received by each layer from the layer above before it’s handed off to the layer below.
Encapsulation
What is the range of well-known or the service ports?
0-1023 (first 1,024)
Name the steps of the TCP handshake process.
Client sends a SYN (synchronize) flagged packet to the server. The server responds with a SYN/ACK (synchronize and acknowledge) flagged packet
back to the client. The client responds with an ACK (acknowledge) flagged packet back to the server.
Name the two methods to disconnect a TCP session
FIN (finish) flagged packets and RST (reset) flagged packets
Is used to to resolve IP addresses (32-bit binary number for logical addressing) into Media Access Control (MAC) addresses.
Address Resolution Protocol (ARP)
Is used to resolve MAC addresses into IP addresses.
Reverse Address Resolution Protocol (RARP)
TCP port 23
Telnet
TCP Ports 20 and 21
File Transfer Protocol (FTP)
UDP Port 69
Trivial File Transfer Protocol (TFTP)
TCP Port 25
Simple Mail Transfer Protocol (SMTP)
TCP Port 110
Post Office Protocol (POP3)
TCP Port 143
Internet Message Access Protocol (IMAP)
This is a terminal emulation network application that supports remote connectivity for executing commands and running applications but does not support transfer of files.
Telnet
This is a network application that supports an exchange of files that requires anonymous or specific authentication.
File Transfer Protocol (FTP)
This is a network application that supports an exchange of files that does not require authentication.
Trivial File Transfer Protocol (TFTP)
This is a protocol used to transmit email messages from a client to an email server and from one email server to another.
Simple Mail Transfer Protocol (SMTP)
This is a protocol used to pull email messages from an inbox on an email server down to an email client.
Post Office Protocol (POP3)
This is a protocol used to pull email messages from an inbox on an email server down to an email client. It is more secure than POP3 and offers the ability to pull headers down from the email server as well as to delete messages directly off the email server without having to download to the local client first.
Internet Message Access Protocol (IMAP)