Domain 4: Network Security Flashcards
What happens at the session layer?
The session layer manages sessions, which provide maintenance on connections. Mounting a file share via a network requires a number of maintenance sessions, such as remote procedure calls (RPCs), which exist at the session layer.
What happens at the presentation layer?
The presentation layer presents data to the application and user in a comprehensible way. Presentation layer concepts include data conversion, characters sets such as ASCII, and image formats such as GIF (graphics interchange format), JPEG (joint photographic experts group), and TIFF (tagged image file format).
What is the difference between T1, T3, E1 and E3?
- A T1 is a dedicated 1.544-megabit circuit that carries 24.64kbit/s DS0 (Digital Signal 0) channels.
- A T3 is 28 bundled T1s, forming a 44.736-megabit circuit.
- An E1 is a dedicated 2.048-megabit circuit that carries 30 channels.
- An E3 is 16 bundled E1s, forming a 34.368-megabit circuit.
What is DNP3?
The distributed network protocol (DNP3) provides an open standard used primarily within the energy sector for interoperability between various vendors’ SCADA and
smart grid applications. Some protocols, such as SMTP, fit into one layer. DNP3 is a multilayer protocol and may be carried via TCP/IP (another multilayer protocol).
Recent improvements in DNP3 allow for “Secure Authentication,” which addresses challenges with the original specification that could have allowed, for example, spoofing or replay attacks. DNP3 became an IEEE standard in 2010, called IEEE 1815-2010 (now deprecated). It allowed preshared keys only. IEEE 1815-2012 is the
current standard; it supports public key infrastructure (PKI)
What do WPA and WPA2 use for confidentiality and integrity?
RSN is also known as WPA2 (Wi-Fi Protected Access 2), a full implementation of 802.11i. By default, WPA2 uses AES encryption to provide confidentiality, and CCMP (counter mode CBC MAC protocol) to create a message integrity check (MIC), which provides integrity. The less secure WPA (without the “2”) is appropriate for access points that lack the power to implement the full 802.11i standard, providing a better security alternative to WEP. WPA uses RC4 for confidentiality and TKIP (Temporal Key Integrity Protocol) for integrity
What is 802.1X?
802.1X is port-based network access control (PNAC) and includes extensible authentication protocol (EAP). EAP is an authentication framework that describes many specific authentication protocols. EAP provides authentication at layer 2 (it is port-based, like ports on a switch) before a node receives an IP address. It is available for both wired and wireless but is more commonly deployed on WLANs. An EAP client is called a supplicant, which requests authentication to an authentication server (AS)
What is LEAP?
LEAP (lightweight extensible authentication protocol) is a Cisco-proprietary protocol released before 802.1X was finalized. LEAP has significant security flaws and should not be used
What is EAP-TLS?
EAP-TLS (EAP-Transport Layer Security) uses PKI, requiring both server-side and clientside certificates. EAP-TLS establishes a secure TLS tunnel used for authentication. EAP-TLS is very secure due to the use of PKI but is complex and costly for the same reason. The other major versions of EAP attempt to create the same TLS tunnel without requiring a client-side certificate.
What is EAP-TTLS?
EAP-TTLS (EAP Tunneled Transport Layer Security), developed by Funk Software and Certicom, simplifies EAP-TLS by dropping the client-side certificate requirement, allowing other authentication methods (such as passwords) for client-side authentication. EAP-TTLS is thus easier to deploy than EAP-TLS, but less secure when omitting the client-side certificate.
What is PEAP?
PEAP (Protected EAP), developed by Cisco Systems, Microsoft, and RSA Security, is similar to and is a competitor of EAP-TTLS, as they both do not require client-side certificates.
What is the IANA?
IANA (Internet Assigned Numbers Authority) governs the IP’s address allocation. IANA is a department of ICANN (Internet Corporation for Assigned Names and Numbers).
What are the 5 RIRs?
- The world is divided into 5 RIR (Regional Internet Registry) regions and organizations:
The African Network Information Center (AFRINIC) serves Africa.[2]
The American Registry for Internet Numbers (ARIN) serves Antarctica, Canada, parts of the Caribbean, and the United States.[3]
The Asia-Pacific Network Information Centre (APNIC) serves East Asia, Oceania, South Asia, and Southeast Asia.[4]
The Latin America and Caribbean Network Information Centre (LACNIC) serves most of the Caribbean and all of Latin America.[5]
The Réseaux IP Européens Network Coordination Centre (RIPE NCC) serves Europe, Central Asia, Russia, and West Asia.[6]
What is SDLC?
SDLC (Synchronous Data Link Control):
- A synchronous L2 WAN protocol that uses polling to transmit data.
- Polling is similar to token passing, but with the primary node polls secondary nodes, allowing them to transmit data when polled.
- Combined nodes can act as primary or secondary, but using NRM transmission only.
What is HDLC?
HDLC (High-Level Data Link Control):
- The successor to SDLC.
- Adds error correction and flow control, and two additional modes (ARM/ABM).
What are the three modes of HDLC?
The three modes of HDLC are:
- NRM (Normal Response Mode): Secondary nodes transmit when given permission by the primary only. Also used in SDLC.
- ARM (Asynchronous Response Mode): Secondary nodes may initiate communication with the primary node.
- ABM (Asynchronous Balanced Mode): When nodes act as primary or secondary, initiating transmissions without receiving permission. This is most commonly used mode