Domain 4: Communication and Network Security Flashcards

1
Q

Communications between computers over networks are made possible by ________

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protocols

A

Set of rules and restrictions that define how datat is transmitted iver a network medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OSI Layers

A

Physical, Data Link, Network, Transport, Session, Presentation, Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encapsulation

A

Addition of a header to the data received by each layer from the layer above before it’s handed off the the layer below

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the Physical Layer do?

A

Accepts frame from Data Link layer and converts into bits for transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the Data Link Layer do?

A

protocols convert the packet into the proper format for transmission (i.e. Ethernet), adds MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ARP and RARP

A

Address Resolution Protocol and Reverse ARP - resolve IP to MAC addresses and vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2 Data Link sublayers

A

Logical Link Control and MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the Network Layer do?

A

adds routing and addressing information to the datagram or segment to create a packet (ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the Transport Layer do?

A

managing the integrity of a connection, receives data stream/PDU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the Session layer do?

A

establishes, maintains, and terminates communication sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the Presentation layer do?

A

transforms data received from the Application layer into a format that any OSI model system can understand, interface btwn network and apps (encrypts and compresses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the Application layer do?

A

interfacing user applications with the protocol stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCP/IP Model to OSI Model

A

Application, Presentation, Session = Application
Transport = Transport
Network = Internet
Data Link, Physical = Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Difference btwn TCP and UDP

A

TCP is full duplex connection-oriented, UDP is simplex connectionless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which ports are registered software ports?

A

1024-49151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which ports are known as random, dynamic, or ephemeral ports?

A

49152-65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe the three-way handshake.

A

Clients sends SYN, server responds with a SYN/ACK, Client responds with an ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IGMP is used to support what?

A

Multicasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IP header protocol field value for ICMP

A

1 (0x01)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ICMP type field values (0, 3, 5, 8, 9, 10, 11)

A
0- echo reply
3- destination unreachable
5- redirect
8- echo request 
9- router advertisement
10- router solicitation
11- time exceeded
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Telnet Port

A

TCP Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

FTP Port

A

TCP Ports 20 and 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

TFTP Port

A

UDP Port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

SMTP Port

A

TCP Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

HTTP Port

A

TCP Port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

IMAP Port

A

TCP Port 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

DHCP Port

A

UDP Ports 67 and 68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

HTTP Port

A

TCP Port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

SSL/ HTTPS Port

A

TCP Port 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

LPD Port

A

TCP Port 515

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

X Window Port

A

TCP Ports 6000-6063

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

BootP/DHCP Port

A

UDP Ports 67 and 68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

NFS Port

A

TCP Port 2049

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

SNMP Port

A

UDP Port 161 and 162

36
Q

Data Emanation

A

transmission of data across electromagnetic signals

37
Q

802.11 Wireless Network Amendments, Speed and Frequency

A
  1. 11 - 2 Mbps, 1.4 GHz
  2. 11a -54 Mbps, 5 GHz
  3. 11b - 11 Mbps, 2.4 GHz
  4. 11g - 54 Mbps, 2.4 GHz
  5. 11n - 200 Mbps, 2.4 or 5 GHz
  6. 11ac - 1 Gbps, 5 GHz
38
Q

Infrastructure Mode

A

wireless access point is required

39
Q

Ad Hoc Mode

A

no centralized control authority

40
Q

Stand Alone Mode

A

wireless access point connects wireless clients but no wired resources

41
Q

Wired Extension Mode

A

wireless access point acts as a connection point to link wireless to wired

42
Q

Enterprise Extended Mode

A

multiple wireless access points are used to connect a large physical area

43
Q

Two Weaknesses of WEP

A

Static Common Key and Poor implementation of IV

44
Q

WPA Weakness

A

single static passphrase

45
Q

PEAP

A

Provides encryption for EAP

46
Q

Captive Portal

A

Log in at hotel, cafe, etc.

47
Q

Static Packet Filtering Firewalls

A

examines data from message header

48
Q

Application Level Gateway Firewalls

A

filters based on the internet service used

49
Q

Stateful Inspection Firewalls

A

evaluate the context of the network traffic

50
Q

SKIP

A

Simple Key Management for Internet Protocol, protects session less datagram protocols

51
Q

Software IP Encryption

A

Security protocol that provides authentication, integrity, and confidentiality using an encapsulation protocol

52
Q

Secure Remote Procedure Call

A

Authentication service to prevent unauthorized execution of code on remote systems

53
Q

Secure Sockets Layer and TLS

A

Protect comms between a web server and a web browser

54
Q

Secure Electronics Transaction

A

Security protocol for transactions over the internet

55
Q

CHAP

A

Challenge Handshake Authentication Protocol - encrypts credentials

56
Q

Password Authentication Protocol

A

Transmits credentials in the clear

57
Q

Extensible Authentication Protocol

A

Framework, not protocol, PEAP encapsulates EAP in a TLS tunnel

58
Q

Phreaker

A

Malicious attackers who abuse phone systems

59
Q

Black, Red, Blue and White Boxes (in terms of secure voice comms)

A

Trick phones. Black manipulates line voltage, Red mimics the sound of coins, Blue simulates tones to connect with trunk, and White controls the phone system

60
Q

S/MIME

A

Secure Multipurpose Internet Mail Extensions - email security standard that offers authentication and confidentiality

61
Q

MIME Object Security Services

A

Authentication, confidentiality, integrity, and nonrepudiation

62
Q

Privacy Enhanced Mail

A

Email encryption, C, I, Authentication and Nonrepudiation

63
Q

Pretty Good Privacy

A

Public-Private key system that encrypts files and email messages

64
Q

RADIUS

A

Centralized remote auth service for dial up connections, server sends logon creds to RADIUS server for authentication

65
Q

TACACS+

A

Centralized remote auth service, two factor authentication

66
Q

VPN

A

comms tunnel that provides point to point transmission of authentication and data traffic

67
Q

Tunneling

A

network communication process that protects the contents of protocol packets by encapsulating them in packets of another protocol

68
Q

4 Common VPN Protocols

A

PPTP, L2F, L2TP, and IPSec

69
Q

RADIUS and TACACS

A

Remote Auth Services

70
Q

S/MIME, MOSS, PEM, PGP

A

Email Security Solutions

71
Q

CHAP, PAP, EAP

A

Authentication Protocols

72
Q

SKIP, swIPe, S-RPC, SSL, TLS, SET

A

Secure Communication Protocols

73
Q

PPTP

A

Point to Point Tunneling Protocol- encapsulation protocol operating at Layer 2 for use on IP networks

74
Q

Most commonly used VPN Protocol

A

IPSec

75
Q

Two Primary Components of IPsec

A

AH and ESP

76
Q

VLAN

A

logically segment a network without altering its physical topology

77
Q

NAT

A

Network Address Translation - convert the internal IP addresses found in packet headers into public IP addresses for transmission over the Internet

78
Q

Class A IP Addresses

A

10.0.0.0-10.255.255.255

79
Q

Class B Ranges IP Addresses

A

172.16.0.0-172.31.255.255

80
Q

Class C Ranges IP Addresses

A

192.168.0.0-192.168.255.255

81
Q

Committed Information Rate

A

guaranteed minimum bandwidth a service provider grants to its customers

82
Q

Security Boundary

A

line of intersection between any two ares, subnets, or environment that have different security requirements or needs

83
Q

DNS Poisoning

A

attackers alters the domain-name to IP address mappings in a DNS system to direct traffic to a rogue system

84
Q

DNS Spoofing

A

attackers sends false replies to a requesting system

85
Q

Vernam Chiper

A

One time pad, only mathematically unbreakable form of cryptography