Domain 4. Networking Flashcards
What is the function of ARP (Address Resolution Protocol)?
MAC to IP translation
What is the function of IGMP (Internet Group Messaging Protocol)?
Used for multicasting
What is the function of ICMP (Internet Control Messaging Protocol)?
Used for troubleshooting and error messaging - ping, tracert
What is the function of IP (Internet Protocol)?
Used for addressing and routing
How many bits is IPv4?
32-bit, 4-octet identifier
How many bits in IPv6?
128-bit HEX identifier
What is the function of UDP (User Datagram Protocol)?
Connection-less delivery, no handshaking
What is the function of TCP?
Connection guaranteed delivery. Three-way handshake
What is the port?
A port is an identifier for an application within a computer. Port is associated with either UDP or TCP.
How many ports do we have?
65,535
“Well known ports” are…
1 - 1023
Dynamic ports (private ports) are …
49, 151 - 65,535
Registered ports are…
1024 - 49,151
DNSSEC
all responses from DNSSEC are digitally signed using public key encryption
What is MPLS?
Multiprotocol Label Switching - used to create cost effective, private Wide Area Networks (WANs) faster and more secure than regular routed “public” IP networks like the internet
More secure than the public internet, because a “virtual” private network (end-to-end circuit)can be built just for your organization
Layer 3 technology
Name 4 wireless network sizes
WPAN -> WLAN -> WMAN -> WWAN WPAN - personal area network WLAN - 802.11x network WMAN - connectst 802.11 network using 802.16 WWAN - point to point microwave links
What is Bluejacking?
Sending spam to nearby bluetooth devices
What is Bluesnarfing?
Copes information off remote device
Name 802.11 Access Modes?
WEP, WPA, WPA2
Name Wireless Attack Vectors
Passive:Sniffing, Eavesdropping, packet capture
MitM: Rogue Access Point, MAC impersonation, Replay Attack
DoS: Bogus requests, signal jamming, packet injection
WEP
broken ecryption, no integrity
WPA2
uses 801.11, EAP, AES and CBC-MAC
Encryption can be used to ensure … ?
Confidentiality
Hashing can be used to ensure … ?
Integrity
Digital signature can be used to ensure … ?
non-repudiation
Digital certificates can be used to ensure … ?
authentication
How S/MIME can be used?
digitally sign and encrypt emails
Eavesdropping
Violation of confidentiality
Tampering
Violation of integrity
Spoofing
violation of authenticity
Digital signature
Message Digest (MD) encrypted with the private key
DMZ
Semi-trusted network
Enclave network
Segment within a trusted network
NAT
used to translate internal IP
bridge
connects same protocol LANs
TEMPEST
Emanation certification network
What is the goal of CDN
Server content to end users with high availability and high performance
Name 4 VPN technologie
PPTP - point to point Tunneling Protocol
L2TP Layer 2 Tunneling Protocol
IPsec - internet protocol security
SSL - secure Socket Layer
IPsec two different modes
Transport mode - used for end-2-end protection between client and server. IP payload is encrypted. Headers are not encrypted
Tunnel mode - server to server, gateway-gateway. Everything is encrypted.
Name IPsec securitry services
Authentication - Kerberos or preshared key or digital cert
Integrity - HMAC - hash messaged auth code
Confidentiality - 3DES, AES
Non-repudiation - digital signature
IPsec Authentication Header (AH)
provide data integrity, data origin authentication, replay protection. Can be used as standalone IPsec protocol if confidentiality is not required
IPsec Encapsulating Security Payload (ESP)
All features of AH + symmetric encryption for payload
IPsec IKE
provides mechanism for device authentication and establishing security association
IPsec SPI
Security Parameter Index (SPI)
includes algo that will be used (hashing encryption), key length and key information
What is the difference between IPsec transport mode and tunnel mode?
In transport mode only payload is encrypted, but in tunnel mode - entire packet is encrypted
What PDU (Protocol Data Unit) and protocols is used in Layer 7 Application?
Application layer, Datastream
FTP, TFTP, SSH, IMAP, POP, HTTP, HTTPS
What PDU (Protocol Data Unit) and protocols is used at level 6 Presentation?
Presentation layer, Datastream
What PDU (Protocol Data Unit) and protocols is used at level 5 Session?
Session layer, Datastream
SQL, RPC
What PDU (Protocol Data Unit) and protocols is used at level 4?
Transport layer, Segment
TCP
UDP
SSL/TLS
What PDU (Protocol Data Unit) and protocols is used at level 3?
Network layer, Packets
IP, IPv6, IP NAT, ICMP, BGP