Domain 4 - Communications and Network Security Flashcards

1
Q

SSL (Application – layer 7 )

A

Two layered: SSL record protocol and handshake protocol. Same as SSH it uses
symmetric encryption for private connections and asymmetric or public key cryptography for peer
authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SMTP (Application – layer 7 )

A

Email queuing. Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Simple Networking Management Protocol (Application – layer 7 )

A

Collection of network information by polling the
devices from a management station. Sends out alerts – called traps - to an database called
Management Information Bases (MIBs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Presentation – layer 6

A

Compression/decompression and encryption/decryption. Uses acommon format to represent data, Standards like JPEG, TIFF, MID, ; Technology: Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Session - layer 5

A

Inter-host communication, logical persistent connection between peer hosts, a conversation, simplex,
half duplex, full duplex. Protocols as NSF, SQL, RADIUS, and RPC. Protocols: PAP, PPTP, RPC NFS SSL/TLS NETBIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Transport

A

End-to-end data transfer services and reliability. Technology: Gateways. Segmentation, sequencing,
and error checking at this layer.
Protocols: TCP, UDP, SSL, SSH-2,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fragmentation

A

– IP will subdivide a packet if its size is greater than the maximum allowed on a local
network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Simple Key Management for Internet Protocols

A

Provides high availability in encrypted

sessions to protect against crashes. Exchanges keys on a session by session basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ARP, Address resolution protocol

A

Used to match an IP address to a hardware MAC address. ARP
sends out broadcast to a network node to reply with its hardware address. It stores the address in a
dynamic table for the duration of the session, so ARP requests are only sent the first time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FRAMES

A

Translates data into bits and formats them into data frames with destination header and source
address. Error detection via checksums.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logical Link Control

A

Flow control and error notification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Packet-filtering firewalls (layer 3/4)

A

Use rules based on a packet’s source, destination, port or other basic information to determine whether or not to allow it into the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stateful packet filtering firewalls (layer 7)

A

Have access to information such as; conversation, look

at state table and context of packets; from which to make their decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application Proxy firewalls (layer 7)(3-7 actually)

A

Which look at content and can involve

authentication and encryption, can be more flexible and secure but also tend to be far slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Circuit level proxy (layer 5)

A

Looks at header of packet only, protects wide range of protocols and
services than app-level proxy, but as detailed a level of control. Basically once the circuit is allowed all
info is tunneled between the parties. Although firewalls are difficult to configure correctly, they are a
critical component of network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IEEE 802.15

A

is the standard for Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IEEE 802.3

A

Defines Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

802.11

A

Defines wireless

networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

802.20 d

A

Defines LTE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Class A network

A

1 and end at 127

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Class B

A

128 and end at 191

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Class C network

A

192 and end at 223

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SSL session key length

A

40bit to 256 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Ad hoc Mode

A

Directly connect two+ clients, no access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Infrastructure Mode

A

Connects endpoints to a central network, not directly to each other, need access
point and wireless clients for IM mode wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

WEP

A

Predecessor to WPA and WPA2, confidentiality, uses RC4 for encryption,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

WPA

A

Uses TKIP for data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

WPA2

A

Based on 802.11i, uses AES, key management, reply attack protection, and data integrity, most
secure, CCMP included, WPA2 ENTERPRISE Mode - uses RADIUS account lockout if a passwordcracker is used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

LEAP

A

Cisco proprietary protocol to handle

problems with TKIP, security issues don’t use. Provides reauthentication but was designed for WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Fiber Distributed Data Interface (FDDI)

A

Form of token ring that has second ring that activates on error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Frame Relay WAN

A

Over a public switched network. High Fault tolerance by relaying fault segments
to working.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

SASL

A

Provides secure LDAP authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

OpenLDAP

A

default, stores user PW in the clear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Client SSL Certificates

A

Used to identify clients to servers via SSL (client authentication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

S/MIME Certificates

A

Used for signed and encrypted emails, can form sign, and use as part of a SSO
solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

MOSS

A

MIME Object Security Services, provides authentication, confidentiality, integrity, and
nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

OAuth

A

Ability to access resources from another service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

OpenID

A

Paired with OAuth is a RESTful, JSON-based authentication protocol can provide identity
verification and basic profile information, phishing attack possible by sending fake data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Broadband Technologies

A

ISDN, cable modems, DSL, and T1/T3 lines that can support multiple
simultaneous signals. They are analog and not broadcast technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

CHAP

A

Challenge-Handshake Authentication Protocol, used by PPP servers to authenticate remote
clients. Encrypts username and PW and performs periodic re authentication while connected using
techniques to prevent replay attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

CIR – (committed Information Rate)

A

Minimum bandwidth guarantee provided by service provider to customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Data Streams

A

Occur at Application, Presentation, and Session layers

43
Q

EAP, Extensible Authentication Protocol

A

An authentication framework. Effectively, EAP allows for
new authentication technologies to be compatible with existing wireless or point-to-point connection
technologies, extensible was used for PPP connections

44
Q

FCoE

A

Fiber Channel Over Ethernet, allows existing high-speed networks to be used to carry storage
traffic

45
Q

iSCI

A

Internet Small Computer Interface, Converged protocol that allows location-independent file
services over traditional network technologies. Cost less than Fiber. Standard for linking data storage
sites

46
Q

ISDN

A

PRI (Primary Rate Interface) bandwidth of 1.544 Mbps, faster than BRI’s 144 Kbps

47
Q

MPLS

A

Multiprotocol Label Switching, high performance networking, uses path labels instead of
network addresses, wide area networking protocol, label switching, finds final destination and then
labels route for others to follow

48
Q

PAP

A

Password Authentication Protocol, sends PW unencrypted

49
Q

PEAP

A

Provides encryption for EAP methods and can provide authentication, does not implement
CCMP, encapsulates EAS in a TLS tunnel

50
Q

PPP

A

Point-to-Point Protocol, most common, used for dial up connections, replaced SLIP

51
Q

RST flag

A

Used to reset or disconnect a session, resumed by restarting the connection via a new threeway handshake

52
Q

SONET

A

Protocol for sending multiple optical streams over fiber

53
Q

SYN FLOOD

A

TCP packets requesting a connection (SYN bit set) are sent to the target network with
a spoofed source address. The target responds with a SYN-ACK packet, but the spoofed source never
replies. This can quickly overwhelm a system’s resources while waiting for the half-open connections
to time out. This causes the system to crash or otherwise become unusable. Counter: sync
cookies/proxies, where connections are created later

54
Q

Teardrop

A

The length and fragmentation offset fields of sequential IP packets are modified, causing
the target system to become confused and crash. Uses fragmented packets to target a TCP flaw in how
the TCP stack reassembles them.

55
Q

TCP sequence number attack

A

Intruder tricks target to believe it is connected to a trusted host and then hijacks the session by predicting the targets choice of an initial TCP sequence number.

56
Q

X25

A
Defines point-to-point communication between Data terminal Equipment (DTE) and Data Circuit
Terminating Equipment (DCE)
57
Q

Frame Relay

A

High performance WAN protocol designed for use across ISDN interfaces. Is fast but has
no error correction, supports multiple PVCs, unlike

58
Q

Synchronous Data Link Control

A

Works with dedicated leased lines permanent up. Data

link layer of OSI model

59
Q

High-level Data Link Control

A

extension to SDLC also for mainframes. Uses data

encapsulation on synchronous serial links using frame characters and checksums. Also data link layer

60
Q

High Speed Serial Interface

A

Defines electrical and physical interfaces to use for DTE/DCE communications. Physical layer of OSI

61
Q

Baseband

A

only one single channel

62
Q

Broadband

A

Multiple signal types like data, video, audio

63
Q

Packet filtering routers

A

Sits between trusted and un-trusted network, sometimes used as boundary
router. Uses ACL’s. Protects against standard generic external attacks. Has no user authentication, has
minimal auditing

64
Q

Screened-Host firewall system

A
Has both a packet-filter router and a bastion host. Provides both
network layer (package filtering) as application layer (proxy) server.
65
Q

Dual homed host firewall

A

Consists of a host with 2 NIC’s. One connected to trusted, one to untrusted. Can thus be used as translator between 2 network types like Ethernet/token ring. Internal
routing capabilities must not be enabled to make it impossible to circumvent inspection of data.

66
Q

Screened-subnet firewalls

A

Has also defined a De-Militarized Zone (DMZ) : a small networkbetween trusted an untrusted.

67
Q

Socks firewall

A

Every workstation gets some Socks software to reduce overhead

68
Q

TACACS+

A

Enhanced version with use of two factor authentication, ability to change user password,
ability of security tokens to be resynchronized and better audit trails and session accounting

69
Q

Remote

Authentication Dial-In User Service RADIUS

A

Client/server protocol, often leads to TACACS+.
Clients sends their authentication request to a central radius server that contains all of the user
authentication and network ACL’s RADIUS does not provide two way authentication, therefore it’s not
used for router-to-router authentication. Port 1812. Contains dynamic password and network service
access information (Network ACLs) NOT a SSO solution

70
Q

DIAMETER

A

Remote connectivity using phone wireless etc, more secure than radius, cordless phone
signal is rarely encrypted and easily monitored

71
Q

Thinnet

A

10base2 with coax cables up to 185 meters

72
Q

Thicknet

A

10Base5, coax up to 500 meters

73
Q

Carrier Sense Multiple Access CSMA

A

for Ethernet. Workstations send out packet. If it doesn’t get
an acknowledgement, it resends

74
Q

CSMA with Collision Detection

A

Only one host can send at the time, using jamming signals for the rest.

75
Q

PPTP, Point to Point tunneling protocol

A
  • Works at data link layer of OSI
  • Only one single point-to-point connection per session
  • Point To Point protocol (PPP) for authentication and tunneling
  • Dial-up network use
  • Does not support EAP
  • Sends initial packets in plaintext
76
Q

L2F, Layer 2 Forwarding

A

• Cisco developed its own VPN protocol called which is a mutual authentication tunneling
mechanism.
• L2F does not offer encryption. L2F was not widely deployed and was soon replaced by L2TP.
• both operate at layer 2. Both can encapsulate any protoco

77
Q

L2TP, Layer 2 tunneling protocol

A
  • Also in data-link layer of OSI
  • Single point-to-point connection per session
  • Dial-up network use
  • Port 115
  • Uses IPsec
78
Q

IPSEC

A

Operates at Network Layer of OSI
• Enables multiple and simultaneous tunnels
• Encrypt and authenticate
• Built into IPv6
• Network-to-network use
• Creates a private, encrypted network via a public network
• Encryption for confidentiality and integrity

79
Q

IPSEC tunneled vs transport

A
  • transport: data is encrypted header is not

* tunneled: new uses rc6; IP header is added, old IP header and data is encrypted

80
Q

TLS – Transport Layer Security

A

• Encrypt and protect transactions to prevent sniffing while data is in transit along with VPN and
IPsec
• most effective control against session hijacking
• ephemeral session key is used to encrypt the actual content of communications between a web
server and client
• TLS - MOST CURRENT not SSL!!

81
Q

PVC

A

Permanent virtual circuits, is like a dedicated leased line; the logical circuit always exists and is
waiting for the customer to send data. Like a walkie-talkie

82
Q

SVC

A

Switched virtual circuit, is more like a shortwave or ham radio. You must tune the transmitter
and receiver to a new frequency every time you want to communicate with someone

83
Q

IP-sec compatible

• Encryption via Tunnel mode

A

Entire data package encrypted)

84
Q

IP-sec compatible - Transport mode

A

Only datagram encrypted

85
Q

Socks-based proxy servers

A

Used to reach the internal network from the outside. Also contains strong
encryption and authentication methods

86
Q

.ESP Header

A

contains information showing which security association to use and the packet
sequence number. Like the AH, the ESP sequences every packet to thwart replay attacks

87
Q

ESP Payload

A

Payload

88
Q

FHSS

A

Frequency Hopping Spread Spectrum, The entire range of available frequencies is employed,
but only one frequency at a time is used.

89
Q

DSSS

A

Direct Sequence Spread Spectrum, employs all the available frequencies simultaneously in
parallel. This provides a higher rate of data throughput than FHSS. DSSS also uses a special encoding
mechanism known as chipping code to allow a receiver to reconstruct data even if parts of the signal
were distorted because of interference.

90
Q

OFDM

A

Orthogonal Frequency-Division Multiplexing, employs a digital multicarrier modulation
scheme that allows for a more tightly compacted transmission. The modulated signals are
perpendicular and thus do not cause interference with each other.

91
Q

T1

A

1,5 Mbps through telephone line

92
Q

T3

A

44,7 Mbps through telephone line

93
Q

E1

A

European 2048 Mbps digital transmission

94
Q

• Serial Line IP (SLIP)

A

TCP/IP over slow interfaces to communicate with external hosts
(Berkley UNIX, windows NT RAS), no authentication, supports only half-duplex
communications, no error detection, manual link establishment and teardown

95
Q

Point to Point protocol (PPP)

A

Improvement on slip, adds login, password and error (by CHAP and PAP) and error correction. Data link.

96
Q

Integrated Services Digital Network

A

Combination of digital telephony and data transports.

Overtaken by xDSL, not all useable due to “D Channel” used for call management not data

97
Q

xDSL Digital subscriber Line

A
  • uses telephone to transport high bandwidth data to remote subscribers
98
Q

ADSL

A

Asymmetric. More downstream bandwidth up to 18,000 feet over single copper cable
pair

99
Q

SDSL

A

Symmetric up to 10,000 feet over single copper cable pair

100
Q

HDSL

A

High Rate T1 speed over two copper cable pairs up to 12,000 feet

101
Q

VDSL

A

Very High speed 13-52MBps down, 1,5-2,3 Mbps upstream over a single copper pair
over 1,000 to 4,500 feet

102
Q

Circuit-switched networks

A

There must be a dedicated physical circuit path exist during transmission. The right choice for networks
that have to communicate constantly. Typically for a telephone company network Voice oriented.
Sensitive to loss of connection

103
Q

Packet-switched networks

A

More cost effective than

circuit switching because it creates virtual circuits only when they are needed.