Domain 4 - Communications and Network Security Flashcards

1
Q

OSI Model

A

PDNT SPA

Please Do Not Throw Away Sausage Pizzas

Physical
Data Link
Network
Transport
Session
Presentation
Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application Layer 7 Protocols

A
AFP
CDP
FTP
GOPHER
HTTP
LDAP
SNMP
SMTP
SMB
TELNET
TFTP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What protocols are used to encrypt HTTP documents?

A

Secure HTTP

S-HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SSL, Secure Socket Layer

A

Eencryption technology to provide secure transactions like credit card numbers exchange.

Two layered: SSL record protocol and handshake protocol.

Same as SSH it uses symmetric encryption for private connections and asymmetric or public key cryptography for peer authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Secure Electronic Transaction (SET)

A

authentication for credit card transactions. Overtaken by SSL

Also uses message authentication code for integrity checking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Telnet

A

terminal emulation enables user to access resources on another machine. Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FTP, File Transfer Protocol

A

for file transfers. Cannot execute remote files as programs. Authentication. Port 20 and 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TFTP, Trivial File Transfer Protocol

A

stripped down, can only send/receive but not browse directories.

No authentication thus insecure. Port 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SMTP, Simple Mail Transfer protocol

A

email queuing. Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SNMP, Simple Networking Management Protocol

A

collection of network information by polling the devices from a management station.

Sends out alerts –called traps- to an database called Management Information Bases (MIBs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Application Layer 7

A

C, AU, I, NR

The OSI model defines the application layer as the user interface responsible for displaying received information to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Presentation Layer 6

A

C, AU, Encryption

Translations like EBCDIC/ANSI; compression/decompression and encryption/decryption.

Uses a common format to represent data, Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Presentation Layer 6 Protocols

A

JPEG,
TIFF,
MID,
HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Session Layer 5

A

Inter-host communication, logical persistent connection between peer hosts, a conversation, simplex, half duplex, full duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Session Layer Protocols

A
NSF, 
SQL, 
RADIUS, 
RPC.  
PAP, 
PPTP, 
RPC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Transport Layer 4

A

End-to-end data transfer services and reliability. Technology: Gateways. Segmentation, sequencing, and error checking at this layer.

Datagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TCP Three-way Handshake

A

SYN, SYN-/ACK, ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Transport Layer Protocols

A
TCP, 
UDP, 
SSL, 
SSH-2, 
SPX, 
NetBIOS, 
AT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Secure Shell (SSH-2

A

Authentication,
Compression,
Confidentiality
Integrity

Uses RSA certificates for authentication and triple DES for encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TCP, Transmission control protocol

A

reliable, sequences and works with acknowledgements.

Provides a manageable data flow to avoid congestions overloading and data loss.

(Like having a telephone conversation with someone). Connection Oriented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

UDP, User Datagram Protocol

A

unreliable, scaled down version of TCP, no error correction, no sequencing. Less overhead. (Like sending a letter to someone).

Connectionless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Network Layer 3

A

C, AU, I

Path selection and logical/network addressing. Technology: Virtual circuits (ATM), routers.

Packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Addressing

A

IP uses the destination IP to transmit packets thru networks until delivered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Fragmentation

A

IP will subdivide a packet if its size is greater than the maximum allowed on a local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Network Layer 3 Protocols

A
IP,
IPSEC,
ICMP, 
BGP, 
OSPF, 
RIP,  
BOOTP, 
DHCP, 
ZIP, 
DDP, 
X.25, 
NAT 
IGMP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

OSPF Open Shortest Path First

A

routing protocol short path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

SKIP, Simple Key Management for Internet Protocols

A

provides high availability in encrypted sessions to protect against crashes. Exchanges keys on a session by session basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

ARP, Address resolution protocol

A

Used to match an IP address to a hardware MAC address.

ARP sends out broadcast to a network node to reply with its hardware address.

It stores the address in a dynamic table for the duration of the session, so ARP requests are only sent the first time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

ICMP, Internet control message protocol

A

sends messages between network nodes regarding the health of the network.

Also informs about rerouting in case of errors. Utility PING uses ICMP messages to check physical connectivity of the network machines IPX, Appletalk, and NetBEUI are non-IP protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

IP, Internet protocol

A

All hosts have an IP address.

Each data packet has an IP address of sender and recipient.

Routing in network is based upon these addresses.

Datagram service is considered unreliable because there’s no guarantee that the packet will be delivered, not even that its delivered only once and no guarantee that its delivered in the same sequence that its sent 32 bits long, IPv6 is 128 bits long

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

DHCP

A

Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

BootP, Bootstrap Protocol

A

when wireless workstation is on-lined it sends out a BootP request with its MAC address to get an IP address and the file from which it should boot.

Replaced by DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Data Link Layer 2

A

C

This layer deals with addressing physical hardware.

FRAMES Translates data into bits and formats them into data frames with destination header and source address. Error detection via checksums.

Switches, bridges, hardware addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

LLC, the Logical Link Control

A

Sub layer - Flow control and error notification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

MAC: the Media Access Control layer

A

Physical addressing. Concerns frames, logical topologies and MAC-addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Data Link Layer 2 Protocols

A
L2F, 
PPTP,
L2TP, 
PPP, 
SLIP, 
ARP, 
RARP, 
SLARP,  
IARP, 
SNAP, 
BAP, 
CHAP, 
LCP,
LZS, 
MLP, 
Frame Relay,
Annex  A, 
Annex D, 
HDLC, 
BPDU, 
LAPD, ISL, 
MAC, 
Ethernet, 
Token Ring,
FDDI
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

RARP, Reverse address resolution protocol

A

When a hardware address is known but the IP address has to be found. (like an diskless machine)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Physical Layer 1

A

Physical signaling. Coverts bits into voltages or light impulses.

Electrical, Hardware and software drivers are on this level. It sends and receives bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Physical Layer 1 Devices?

A
Repeaters, 
hubs, 
cables, 
USB,
 DSL, 
SDN, 
ATM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What are the 4 layers of the TCP/IP Model?

A

NITA
Network access - Layer 1 (Data link, Physical). Routines for accessing physical networks and the electrical connection.

Internet – Layer 2 (corresponds to OSI network layer) Defines the IP datagram and handles routing

Host-to-Hotst Transport - – Layer 3 (Transport)

End-to-end data delivery Protocols: TCP and UDP

Application – layer 4 (Application/Presentation/Session) Applications and processes that uses the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

LPD, Line printer daemon

A

for printing and spooling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What are the Security Modes used in MAC?

A

Dedicated
Multi-Level
Controlled
Limited Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Security Modes used in MAC: Dedicated

A
  • All users can access all data.
  • Clearance for all information.
  • Need to know for ALL data system high security mode:
  • All users can access some data, based on need to know
  • Clearance for all information
  • Need to know for SOME data compartmented security mode:
  • All users can access some data, based on their need to know and approval.
  • Clearance for all information they access - Need to know for SOME data
  • Use of information labels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Security Modes used in MAC: Multi-level

A
  • All users can access some data, based on their need to know, approval and clearance.
  • Clearance for all information they access
  • Need to know for SOME data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Security Modes used in MAC: controlled

A

type of multilevel security where a limited amount of trust is placed in the system’s hardware/software along with classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Security Modes used in MAC: limited access

A

minimum user clearance is not cleared and the maximum data classification is unclassified but sensitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is a Firewall?

A

A method of guarding a private network by analyzing the data leaving and entering. Firewalls can also provide network address translation, so the IP addresses of computers inside the firewall stay hidden from view.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What are the different types of Firewalls?

A

Packet-filtering
Stateful packet filtering
Application Proxy
Circuit level proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Packet-filtering firewalls (layer 3/4)

A

use rules based on a packet’s source, destination, port or other basic information to determine whether or not to allow it into the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Stateful packet filtering firewalls (layer 7)

A

have access to information such as; conversation, look at state table and context of packets; from which to make their decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Application Proxy firewalls (layer 7) (3-7 actually

A

which look at content and can involve authentication and encryption, can be more flexible and secure but also tend to be far slower.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Circuit level proxy (layer 5)-

A

looks at header of packet only, protects wide range of protocols and services than app-level proxy, but as detailed a level of control. Basically once the circuit is allowed all info is tunneled between the parties. Although firewalls are difficult to configure correctly, they are a critical component of network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Wireless Protocols

A

IEEE 802.11 Wireless networking
IEEE 802.15 Bluetooth
IEEE 802.3 Ethernet
IEEE 802.20 LTE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

802.11

A

2 Mbps

2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

802.11a

A

54 Mbps

5 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

802.11b

A

11 Mbps

2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

802.11g

A

54 Mbps

2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

802.11n

A

200+ Mbps

2.4 or 5 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

802.11ac

A

1 Gbps

5 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Telnet

A

Remote terminal access and Secure Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

SSH

A

Secure Shell over Telnet for remote server administration via the command line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Class A network

A

number values begin at 1 and end at 127

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Class B network

A

number values begin at 128 and end at 191

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Class C network

A

number values begin at 192 and end at 223

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

ISDN BRI

A

B-channel 64Kbps, D-channel 16Kbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

ISDN PRI

A

B- and D-channels are 64Kbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Attenuation

A

a decrease in amplitude as a signal propagates along a transmission medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Data backups

A

addresses availability, integrity and recovery but not confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

IP headers

A

contain 32-bit addresses (in IPv4) and 128 in IPv6. In an Ethernet LAN, however, addresses for attached devices are 48 bits long.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

TCP 21

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

TCP 22

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

TCP 23

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

TCP 25

A

SMTP Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

TCP 53

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

TCP 80

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

TCP 143

A

IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

TCP 389

A

unsecured LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

TCP 636

A

LDAP-S over SSL or TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

UDP 69

A

TFTP (Trivial FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

TCP/UDP 137-139

A

NetBIOS services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Switched Networks

A

Coaxial
Ethernet twisted pair
Fiber Distributed Data Interface
Frame Relay WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Coaxial

A

many workstations, length. 1000Base-T

– 100 M Twisted pair to long. Cat 5 better than cat3 for interference Fiber optics immune to EMI, can be broken and high cost/expertise Topology failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Ethernet twisted pair

A

more resistant than coaxial Token Ring because a token is passed by every station, a NIC that’s is set to wrong speed or error can take all network down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Fiber Distributed Data Interface

A

form of token ring that has second ring that activates on error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Frame Relay WAN

A

over a public switched network. High Fault tolerance by relaying fault segments to working.

Speeds; T-1 – 1.544 Mbps, T-3 – 44,736 Mbps (45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

ATM

A

ATM uses a connection-oriented model in which a virtual circuit must be established between two endpoints before the actual data exchange begins.

These virtual circuits may be “permanent”, i.e. dedicated connections that are usually preconfigured by the service provider, or “switched”, i.e. set up on a per-call basis using signalling and disconnected when the call is terminated.

155 Mbps, ISDN – 64 or 128 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

CAT 3 UTP

A

10 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

CAT 5

A

100 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

CAT 5e/6

A

1,000 Mb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

LDAP

A

Lightweight Directory Access Protocol, client/server based directory query protocol loosely based upon X.500, commonly manages user information, for accessing directory services and manage certificates Ex. Active Directory,

cn=ben+ou=sales Zero or more, comma separated, no semi-colon, + to join

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

SASL

A

provides secure LDAP authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

OpenLDAP

A

default, stores user PW in the clear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Client SSL Certificates

A

used to identify clients to servers via SSL (client authentication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

S/MIME Certificates

A

used for signed and encrypted emails, can form sign, and use as part of a SSO solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

MOSS

A

MIME Object Security Services, provides authentication, confidentiality, integrity, and nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

PEM

A

provides authentication, confidentiality, integrity, and nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

DKIM

A

Domain Keys Identified Mail, domain validation tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

OAuth

A

Open Authorization

ability to access resources from another service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

OpenID

A

paired with OAuth is a RESTful, JSON-based authentication protocol can provide identity verification and basic profile information, phishing attack possible by sending fake dat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Security Perimeter

A

The first line of protection between trusted and untrusted networks. Generally includes a firewall and router that help filter traffic.

May also include proxies, IDSs, and IPSs. Zero Day – application white list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Multiplexors

A

device that enables more than one signal to be send out of one physical circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

WAN switches

A

multi-port networking devices that are used in carrier networks. Connect private data over public data by using digital signals.

Data link layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Access servers

A

server that provides dial-in and dial-out connections to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Modems

A

transmits data over telephone lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Channel Service Unit (CSU)/Data service unit (DSU)

A

digital interface device used to terminate the physical interface on a DTE device. They connect to the closest telephone company switch in a central office (CO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Repeaters

A

amplify data signals to extend range (physical)

107
Q

HUBS

A

connect multiple LAN devices into a concentrator. Is actually a multi-port repeater (physical

108
Q

Bridges

A

Forwards data to all other network segments if it’s not on the local segment. Operates at level 2 (thus no IP-addressing)

109
Q

Switches

A

Will only send data to the specific destination address. It’s actually a multi-port bridge. (Data link)

110
Q

Routers

A

opens up data packet, reads hardware or network address and then forwards it to the correct network

111
Q

Gateway

A

software that acts as access point to another network or device that translates between different protocols

112
Q

LAN extenders

A

remote access, multi layer switch that connects LANs over a WAN

113
Q

Broadband Technologies

A

ISDN, cable modems, DSL, and T1/T3 lines that can support multiple simultaneous signals. They are analog and not broadcast technologies.

114
Q

Broadcast Domain

A

set of systems that can receive a broadcast from each other

115
Q

CHAP

A

Challenge-Handshake Authentication Protocol, used by PPP servers to authenticate remote clients.

Encrypts username and PW and performs periodic re authentication while connected using techniques to prevent replay attacks.

116
Q

CIR

A

(committed Information Rate) minimum bandwidth guarantee provided by service provider to customers

117
Q

Collision Domain

A

set of systems that could cause a collision if they transmitted at the same time, more number of systems in domain increases likelihood of network congestion due to more collisions

118
Q

Data Streams

A

occur at Application, Presentation, and Session layers.

119
Q

EAP, Extensible Authentication Protocol

A

an authentication framework. Effectively, EAP allows for new authentication technologies to be compatible with existing wireless or point-topoint connection technologies, extensible was used for PPP connections

120
Q

FCoE

A

Fiber Channel Over Ethernet, allows existing high-speed networks to be used to carry storage traffic

121
Q

FDD

A

Fiber Distributed Data Interface, token-passing network uses a pair of rings with traffic flowing in opposite directions, uses tokens

122
Q

Gateway

A

translates between protocols

123
Q

ICMP

A

Internet Control Message Protocol, means to send error messages for non-transient error conditions and provides a way to probe the network in order to determine general characteristics about the network, ping

124
Q

iSCI

A

Internet Small Computer Interface, Converged protocol that allows location-independent file services over traditional network technologies. Cost less than Fiber. Standard for linking data storage sites

125
Q

ISDN

A

PRI (Primary Rate Interface) bandwidth of 1.544 Mbps, faster than BRI’s 144 Kbps

126
Q

Multilayer Protocols

A

allow encryption at various layers, support a range of protocols at higher levels. Bad – conceal covert channels, filters can be bypassed, sometimes logical boundaries can be bypassed

127
Q

MPLS

A

Multiprotocol Label Switching, high performance networking, uses path labels instead of network addresses, wide area networking protocol, label switching, finds final destination and then labels route for others to follow

128
Q

PAP

A

Password Authentication Protocol, sends PW unencrypted

129
Q

PEAP

A

provides encryption for EAP methods and can provide authentication, does not implement CCMP, encapsulates EAS in a TLS tunnel

130
Q

Port Based Authentication

A

802.1x, can be used with EAP

131
Q

PPP

A

Point-to-Point Protocol, most common, used for dial up connections, replaced SLIP

132
Q

Proxy

A

form of gateway that provide clients with a filtering, caching, or other service that protects their information from remote systems

133
Q

PVCs

A

Private Virtual Circuits

134
Q

RST flag

A

used to reset or disconnect a session, resumed by restarting the connection via a new three-way handshake

135
Q

Converged Network

A

carries multiple types of traffic like voice, video, and data

136
Q

SDN

A

Software designed networking, defined and configured as code or software, quickly change the network based on organizational requirements

137
Q

Hypervisor-based Network

A

may be software defined, but it could also use traditional network devices running as virtual machines

138
Q

Site Survey

A

identify areas where wireless network may be accessible

139
Q

SONET

A

protocol for sending multiple optical streams over fiber

140
Q

UDP

A

User Datagram Protocol, lightweight service for connectionless data transfer without error detection and correction

141
Q

Wired Extension Mode

A

uses WAP to link wireless clients to a wired network

142
Q

AMP

A

Asymmetric multiprocessing - used in applications that are dedicated, such as embedded systems, when individual processors can be dedicated to specific tasks at design time.

143
Q

SMP

A

Symmetric Multiprocessors, hardware and software architecture where two or more identical processors are connected to a single, shared main memory, have full access to all I/O devices, and are controlled by a single operating system instance that treats all processors equally, reserving none for special purposes.

144
Q

ARP Spoofing

A

a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker’s MAC address with the IP address of a legitimate computer or server on the network.

145
Q

Bluejacking

A

when attackers send unsolicited messages via Bluetooth

146
Q

Bluesnarfing

A

targets the data or information on Bluetoothenabled devices

147
Q

CAIN Attack

A

a password recovery tool for Microsoft Windows.

It can recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks.

148
Q

DNS Spoofing

A

when an attacker sends false replies to a requesting system, beating valid replies from the real DNS server

149
Q

DNS Poisoning

A

when an attacker changes the domain name to IP address mappings of a system to redirect traffic to alternative systems

150
Q

RDP

A

Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection.

The user employs RDP client software for this purpose, while the other computer must run RDP server software.

151
Q

Screenscrape

A

copy actual screen, subset of remote control

152
Q

SPIT attacks

A

Spam over Internet Telephony and targets VoIP systems

153
Q

What are some examples of Web Application Vulnerability scanners?

A

Nikto,
Burp Suite,
Wapiti

154
Q

Network Attacks – Denial of Service

A

Used to overwhelm a targets resources

  • Filling up hard drive by using huge email attachments or file transfers
  • Sends messages to reset targets host subnets masks
  • Using up all system resources
155
Q

DOS

A

performed by sending malformed packets to a system;

can interrupt service or completely deny legitimate users of system resources, an attack that attempts to prevent authorized use of a resource.

This can be done through flaw exploitation, connection overloading, or traffic flooding.

156
Q

DDOS

A

botnet, zombie, massive dos attack using multiple computers

157
Q

SMURF

A

ICMP requires three players (attacker, victim and amplifying network); attacker spoofs packet header to make it appear that it originated on the victim system with amplifying network broadcasting the message.

Countermeasures – disable broadcast at border routers; border routers should not accept packets that originate within network; restrict ICMP traffic (Hint IC = Its Smurf though spelled wrong)

158
Q

FRAGGLE

A

similar to Smurf but uses UDP

Countermeasures – disable broadcast at border routers; border routers should not accept packets that originate within network; restrict UDP traffic; employ IDS;

apply appropriate patches, block UDP port 7 & 9 from entering network

159
Q

Land Attack

A

The attack involves sending a spoofed TCP SYN packet (connection initiation) with the target host’s IP address and an open port as both source and destination.

The reason a LAND attack works is because it causes the machine to reply to itself continuously.

160
Q

SYN FLOOD

A

TCP packets requesting a connection (SYN bit set) are sent to the target network with a spoofed source address.

The target responds with a SYN-ACK packet, but the spoofed source never replies.

This can quickly overwhelm a system’s resources while waiting for the half-open connections to time out.

This causes the system to crash or otherwise become unusable.

Counter: sync cookies/proxies, where connections are created later

161
Q

Teardrop

A

The length and fragmentation offset fields of sequential IP packets are modified, causing the target system to become confused and crash.

Uses fragmented packets to target a TCP flaw in how the TCP stack reassembles them. DOS

162
Q

Session hijacking (Spoofing)

A

IP spoofing involves altering a TCP packet so that it appears to be coming from a known, trusted source, thus giving the attacker access to the network. Intercept cookies from a request header

163
Q

TCP sequence number attack

A

intruder tricks target to believe it is connected to a trusted host and then hijacks the session by predicting the targets choice of an initial TCP sequence number

164
Q

Examples of Packet Switching Technologies

A
x25
Frame Relay 
Link Access Procedure-Balanced (LAPB) 
Frame Relay 
Switched Multimegabit DATA Service (SMDS) 
ATM
VOIP
165
Q

X25

A

defines point-to-point communication between Data terminal Equipment (DTE) and Data Circuit Terminating Equipment (DCE)

166
Q

LAPB

A

Link Access Procedure-Balanced

created for use with X25, LAPB defines frame types and is capable of retransmitting, exchanging and acknowledging frames as detecting out of sequence or missing frames

167
Q

Frame Relay

A

High performance WAN protocol designed for use across ISDN interfaces.

Is fast but has no error correction, supports multiple PVCs, unlike X.25, packet switched technology that provides CIR, requires DTE/DCE at each connection point

168
Q

SMDS

A

Switched Multimegabit DATA Service

high speed communication over public switches networks for exchanging ‘bursts of data’ between enterprises

169
Q

ATM

A

very high bandwidth. It uses 53-byte fixed size cells instead of frames like Ethernet.

It can allocate bandwidth up on demand making it a solution for Busty applications.

Requires fiber optics.

170
Q

VOIP

A

combines many types of data into a single IP packet. Cost, interoperability and performance wise it’s a major benefit.

171
Q

Synchronous Data Link Control (SDLC)

A

created by IBM for mainframes to connect to their remote offices.

Uses a polling media access method.

Works with dedicated leased lines permanent up.

Data link layer of OSI model

172
Q

High-level Data Link Control (HDLC)

A

extension to SDLC also for mainframes. Uses data encapsulation on synchronous serial links using frame characters and checksums.

Also data link layer

173
Q

High Speed Serial Interface (HSSI)

A

Defines electrical and physical interfaces to use for DTE/DCE communications.

Physical layer of OSI

174
Q

Twisted pair

A

Shielded (STP)

or unshielded (UTP) Cat 3=10BaseT,

Cat5=100BaseT

175
Q

Coaxial

A

More EMI resistant. Baseband: only one single channel

Broadband: multiple signal types like data, video, audio

176
Q

Fiber Optic

A

Most expensive, but hard to tap and resistant to EMI

177
Q

Firewall Types: First generation

A

(static) Packet filtering firewall AKA screening router Examines source/destination address, protocol and ports of the incoming package.

Based on ACL’s access can be denied or accepted. Is considered a firewall and operates at Network or Transport layer of OSI

178
Q

Firewall Types: Second generation

A

Application level firewall AKA proxy server While transferring data stream to another network, it masks the data origin. operating at Application layer of OSI

179
Q

Firewall Types: Third generation

A

Stateful inspection firewall (also known as Dynamic) All packages are inspected at the Networking layer so it’s faster. By examining the state and context of the data packages it helps to track connectionless protocols like UDP and RPC. Analyzed at all OSI Layers.

180
Q

Firewall Types: Fourth generation

A

Dynamic Packet Filtering firewall Enables modification of the firewall rule. It provides limited support for UDP by remembering UDP packages across the network. Fifth

181
Q

Firewall Types: Fifth generation

A

Kernel Proxy Firewall / Application level Firewall Runs in windows NT, modular, kernel based, multiplayer session evaluation. Uses dynamic TCP/IP stacks to inspect network packages and enforce security policies.

182
Q

Packet filtering routers

A

Sits between trusted and un-trusted network, sometimes used as boundary router. Uses ACL’s. Protects against standard generic external attacks. Has no user authentication, has minimal auditing.

183
Q

Screened-Host firewall system

A

Has both a packet-filter router and a bastion host. Provides both network layer (package filtering) as application layer (proxy) server.

184
Q

Dual homed host firewall

A

Consists of a host with 2 NIC’s. One connected to trusted, one to un-trusted.

Can thus be used as translator between 2 network types like Ethernet/token ring.

Internal routing capabilities must not be enabled to make it impossible to circumvent inspection of data.

185
Q

Screened-subnet firewalls

A

Has also defined a De-Militarized Zone (DMZ) : a small network between trusted an untrusted.

186
Q

Socks firewall

A

Every workstation gets some Socks software to reduce overhead

Tiers – design separates distinct protected zones and can be protected by a single firewall that has multiple interfaces

187
Q

Centralized access control

A

CALLBACK; system calls back to specific location (danger in user forwarding number) somewhere you are

CHAP (part of PPP) supports encryption

XTACACS separates authentication, authorization and accounting processes

TACACS+: stronger through use of tokens

188
Q

Terminal Access Controller Access Control System TACACS

A

User passwords are administrated in a central database instead of individual routers.

A network device prompts user for a username and static password then the device queries a TACACS server to verify the password.

TACACSs does not support prompting for password change or use of dynamic password tokens.

Port 49 TACACS: user-id and static password for network access via TCP

189
Q

TACACS+

A

Enhanced version with use of two factor authentication, ability to change user password, ability of security tokens to be resynchronized and better audit trails and session accounting

190
Q

Remote Authentication Dial-In User Service RADIUS

A

Client/server protocol, often leads to TACACS+.

Clients sends their authentication request to a central radius server that contains all of the user authentication and network ACL’s RADIUS does not provide two way authentication, therefore it’s not used for routerto-router authentication.

Port 1812. Contains dynamic password and network service access information (Network ACLs) NOT a SSO solution, TLS over TCP – to encrypt, Default UDP, PW encrypted, supports TCP and TLD if set, Remote connectivity via dial in (user dials in to access server, access server prompt for credentials, user enters credentials and forwards to radius server, radius server accepts or rejects).

USES UDP. Incorporates an AS and dynamic/static password user can connect to any network access server, which then passes on the user’s credentials to the RADIUS server to verify authentication and authorization and to track accounting.

In this context, the network access server is the RADIUS client and a RADIUS server acts as an authentication server.

The RADIUS server also provides AAA services for multiple remote access servers.

191
Q

DIAMETER

A

remote connectivity using phone wireless etc, more secure than radius, cordless phone signal is rarely encrypted and easily monitored

192
Q

Asynchronous Dial-Up Access

A

This is how everyone connects to the internet. Using a public switched telephone network to access an ISP

193
Q

ISDN

A

protocol that permits telephone line to carry data, voice and other source traffic.

Two types: BRI Basic rate interface and Primary Rate Interface (PRI) xDSL uses regular telephone lines for high speed digital access Cable Modems Via single shared coaxial cable, insecure because of not being filtered or firewalled

194
Q

Remote Access Security Technologies

A

Restricted Address
Callback
Caller ID

195
Q

Callback

A

User initiates a connection, supplies identifying code, and then the system will call back a predetermined telephone number. Also less useful for travelling users

196
Q

Caller ID

A

checks incoming telephone number against an approval list and then uses Callback. Less useful for travelling users.

197
Q

Remote Node Security Protocols

A

PAP

CHAP

198
Q

Password Authenticate Protocol PAP

A

Provides identification and authentication of the user using static replayable passwords. No encryption of user-id or password during communication

199
Q

Challenge Handshake Authenticate Protocol (CHAP)

A

nonreplayable challenge/response dialog

200
Q

LAN Topologies

A
Bus
Ring
Star
Tree
Mesh
201
Q

BUS

A

all transmissions have to travel the full length of the cable

202
Q

RING

A

Workstations are connected to form a closed loop

203
Q

STAR

A

nodes are connected to a central LAN device

204
Q

TREE

A

bus type with multiple branches

205
Q

MESH

A

all nodes interconnected

206
Q

DATA NETWORK SIGNALS

A

Analog
Digital
Asynchronous
Synchronous

207
Q

Analog signal

A

Infinite wave form, continuous signal, varied by amplification

208
Q

Digital signal

A

Saw-tooth form, pulses, on-off only, digital signals are a means of transmission that involves the use of a discontinuous electrical signal and a state change or on‐off pulses.

209
Q

Asynchronous

A

sends bits of data sequentially. Same speed on both sides. Modems and dial-up remote access systems

Note: Asynchronous communications, broadband connections, and halfduplex links can be digital or analog.

210
Q

Synchronous

A

very high speed governed by electronic clock timing signals

211
Q

Types of LAN Media Access

A

Ethernet IEEE 802.3
ARCnet
Token Ring IEEE 802.5
FDDI

212
Q

Thinnet

A

10base2 with coax cables up to 185 meters Thicknet

213
Q

Thicknet

A

10Base5, coax up to 500 meters

214
Q

UTP

A

10BaseT=10MBps

100baseT=Fast Ethernet =100MBps

1000BaseT=Gigabit Ethernet=1GBps

Ethernet networks were originally designed to work with more sporadic traffic than token ring networks

215
Q

ARCnet

A

uses token passing in a star technology on coax

216
Q

Token Ring IEEE 802.5

A

IBM created. All end stations are connected to a MAU Multi Access Unit. CAU: Controlled Access Units – for filtering allowed MAC (Extended Unique Identifier) addresses.

217
Q

FDDI, Fiber Distributed Data Interface

A

token-passing dual token ring with fiber optic. Long distances, minimal EMI interference permits several tokens at the time active

218
Q

LAN Transmission Protocols

A

CSMA

CSMA with Collision Avoidance workstations

CSMA with Collision Detection

219
Q

Carrier Sense Multiple Access CSMA

A

for Ethernet. Workstations send out packet. If it doesn’t get an acknowledgement, it resends

220
Q

CSMA with Collision Avoidance workstations

A

are attached by 2 coax cables. In one direction only. Wireless 802.11

221
Q

CSMA with Collision Detection

A

Only one host can send at the time, using jamming signals for the rest.

222
Q

Polling

A

Host can only transmit when he polls a secondary to see if its free

223
Q

Token-passing

A

Used in token rings, Hosts can only transit when they receive a clear to send token.

224
Q

LAN

A

Limited geographically to e.g. a building. Devices are sharing resources like printers, email and files. Connected through copper wire or fiber optics.

225
Q

CAN

A

campus area network, multiple building connected to fast backbone on a campus

226
Q

MAN

A

metropolitan network extends over cities

227
Q

WAN

A

Connects LANS over a large geographical area Internet

228
Q

Internet
intranet
extranet

A

Internet is global,

intranet local for use within companies and

extranet can be used e.g. by your customers and clients but is not public.

229
Q

VPN

A

A VPN is created by dynamically building a secure communications link between two nodes, using a secret encapsulation method via network address translation (NAT) where internal IP addresses are translated to external IP addresses.

Cannot double NAT with the same IP range, same IP address cannot appear inside and outside of a NAT router.

230
Q

VPN Protocols

A

PPTP
L2F
L2TP
IPSEC

231
Q

PPTP, Point to Point tunneling protocol

A
  • Works at data link layer of OSI
  • Only one single point-to-point connection per session
  • Point To Point protocol (PPP) for authentication and tunneling
  • Dial-up network use
  • Does not support EAP
  • Sends initial packets in plaintext
232
Q

L2F, Layer 2 Forwarding

A
  • Also in data-link layer of OSI
  • Single point-to-point connection per session
  • Dial-up network use
  • Port 115
  • Uses IPsec
233
Q

IPSEC

A
  • Operates at Network Layer of OSI
  • Enables multiple and simultaneous tunnels
  • Encrypt and authenticate
  • Build into IPv6
  • Network-to-network use
  • Creates a private, encrypted network via a public network
  • Encryption for confidentiality and integrity
234
Q

IPSEC protocols

A

AH Authentication header and ESP Encapsulated Security Payload works with Security Associations (SA’s) works with IKE protocols

IKE IS FOR MANAGING SECURITY ASSOCIATIONS

2 modes: transport, data is encrypted header is not tunneled: new uses rc6; IP header is added, old IP header and data is encrypted cipher types: block (padding to blocks of fixed size) like DES 3DES AES or stream (bit/byte one by one o padding) like RC4, Sober

235
Q

TLS – Transport Layer Security

A
  • encrypt and protect transactions to prevent sniffing while data is in transit along with VPN and IPsec
  • most effective control against session hijacking
  • ephemeral session key is used to encrypt the actual content of communications between a web server and client
  • TLS - MOST CURRENT not SSL!!!
236
Q

PVC

A

Permanent virtual circuits, is like a dedicated leased line; the logical circuit always exists and is waiting for the customer to send data. Like a walkie-tealie

237
Q

SVC

A

switched virtual circuit, is more like a shortwave or ham radio. You must tune the transmitter and receiver to a new frequency every time you want to communicate with someone.

238
Q

VPN Devices

A

Is hardware or software to create secure tunnels

239
Q

IPSEC: Encryption via Tunnel mode

A

entire data package encrypted

240
Q

IPSEC: Transport mode

A

only datagram encrypted

241
Q

What layer of OSI model is IPSEC?

A

Network layer

242
Q

Encapsulating Security Payload

A

Encrypts IP packets and ensured integrity

 ESP Header – contains information showing which security association to use and the packet sequence number. Like the AH, the ESP sequences every packet to thwart replay attacks.

 ESP Payload

243
Q

FHSS

A

– Frequency Hopping Spread Spectrum, The entire range of available frequencies is employed, but only one frequency at a time is used.

244
Q

DSSS

A

Direct Sequence Spread Spectrum, employs all the available frequencies simultaneously in parallel. This provides a higher rate of data throughput than FHSS. DSSS also uses a special encoding mechanism known as chipping code to allow a receiver to reconstruct data even if parts of the signal were distorted because of interference.

245
Q

OFDM

A

Orthogonal Frequency-Division Multiplexing, employs a digital multicarrier modulation scheme that allows for a more tightly compacted transmission. The modulated signals are perpendicular and thus do not cause interference with each other.

All use spread spectrum techniques to transmit on more than one frequency at the same time. Neither FHSS nor DHSS uses orthogonal modulation, while multiplexing describes combining multiple signals over a shared medium of any sort. Wi-Fi may receive interference from FHSS systems but doesn’t use it.
WAN

246
Q

Private Circuit technologies

A

Dedicated line reserved communication, always available Leased line can be reserved for communications.

Type of dedicated line.

  • T1 1,5 Mbps through telephone line
  • T3 44,7 Mbps through telephone line
  • E1 European 2048 Mbps digital transmission
  • Serial Line IP (SLIP) TCP/IP over slow interfaces to communicate with external hosts (Berkley UNIX, windows NT RAS), no authentication, supports only half-duplex communications, no error detection, manual link establishment and teardown
247
Q

Point to Point protocol (PPP)

A

improvement on slip, adds login, password and error (by CHAP and PAP) and error correction. Data link.

248
Q

Integrated Services Digital Network (ISDN)

A

combination of digital telephony and data transports. Overtaken by xDSL, not all useable due to “D Channel” used for call management not data

249
Q

xDSL Digital subscriber Line

A

uses telephone to transport high bandwidth data to remote subscribers

250
Q

ADSL

A

Asymmetric. More downstream bandwidth up to 18,000 feet over single copper cable pair

251
Q

SDSL

A

Symmetric up to 10,000 feet over single copper cable pair

252
Q

HDSL

A

High Rate T1 speed over two copper cable pairs up to 12,000 feet

253
Q

VDSL

A

Very High speed 13-52MBps down, 1,5-2,3 Mbps upstream over a single copper pair over 1,00 to 4500 feet

254
Q

Circuit-switched networks

A

There must be a dedicated physical circuit path exist during transmission. The right choice for networks that have to communicate constantly. Typically for a telephone company network Voice oriented. Sensitive to loss of connection

255
Q

Message switching networks

A

Involves the transmission of messages from node-to-node. Messages are stored on the network until a forwarding path is available.

256
Q

Packet-switched networks (PSN or PSDN)

A

Nodes share bandwidth with each other by sending small data units called packets.

Packets will be send to the other network and reassembled.

Data oriented. Sensitive to loss of data. More cost effective than circuit switching because it creates virtual circuits only when they are needed.

257
Q

Converged Protocols

A

Fibre Channel over Ethernet (FCoE)

MPLS

iSCSI

Vo

IP

SDN

258
Q

Converged Protocols

A

are the merging of specialty or proprietary protocols with standard protocols, such as those from the TCP/ IP suite.
The primary benefit of converged protocols is the ability to use existing TCP/ IP supporting network infrastructure to host special or proprietary services without the need for unique deployments of alternate networking hardware.

259
Q

Fibre Channel over Ethernet (FCoE)

A

a form of network datastorage solution (SAN or NAS) that allows for high-speed file transfers at upward of 16 GBps.

It was designed to be operated over fiber-optic cables; support for copper cables was added later to offer less-expensive options.

Fibre Channel over Ethernet (FCoE) can be used to support it over the existing network infrastructure. FCoE is used to encapsulate Fibre Channel communications over Ethernet networks.

Fibre Channel operates as a Network layer or OSI layer 3 protocol, replacing IP as the payload of a standard Ethernet network.

260
Q

MPLS

A
  • (Multiprotocol Label Switching) is a high-throughput highperformance network technology that directs data across a network based on short path labels rather than longer network addresses.

MPLS is designed to handle a wide range of protocols through encapsulation.

261
Q

iSCSI

A

Internet Small Computer System Interface (iSCSI) is a networking storage standard based on IP.

This technology can be used to enable location-independent file storage, transmission, and retrieval over LAN, WAN, or public Internet connections.

It is often viewed as a low-cost alternative to Fibre Channel.

262
Q

VoIP

A

Voice over IP - a tunneling mechanism used to transport voice and/ or data over a TCP/ IP network.

VoIP has the potential to replace or supplant PSTN because it’s often less expensive and offers a wider variety of options and features.

263
Q

SDN

A

a unique approach to network operation, design, and management.

SDN aims at separating the infrastructure layer (i.e., hardware and hardware-based settings) from the control layer (i.e., network services of data transmission management).

Furthermore, this also removes the traditional networking concepts of IP addressing, subnets, routing, and so on from needing to be programmed into or be deciphered by hosted applications.

SDN offers a new network design that is directly programmable from a central location, is flexible, is vendor neutral, and is open-standards based.