GCGA Ch. 3 Exploring Network Technologies and Tools Flashcards

1
Q

OSI Model

A

OSI Model ->

Please Do Not Throw Sausage Pizza Away

Physical Data Link Network Transport Session Presentation Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TLS & SSL

A

Transport Layer Security - updated, more secure version of Secure Sockets Layer (SSL); both of these technologies use certificates to establish an encrypted session between client/server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FTP & SFTP

A

File Transfer Protocol - used to send files over networks; SSH encrypts Secure Copy (SCP) and Secure FTP (SFTP). TLS encrypts FTPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SMTP & SMTPS

A

Simple Mail Transfer Protocol/Secure - uses TCP port 25 (original) and 587 (encrypted over TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

POP3

A

Post Office Protocol - uses TCP port 110 (original) and TCP port 995 (encrypted)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IMAP4

A

Internet Messaging Access Protocol - uses TCP port 143 (original) and TCP port 993 (encrypted)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HTTP & HTTPS

A

Hypertext Transfer Protocol/HTTP Secure - HTTP uses TCP port 80, HTTPS uses TCP port 443, encrypting browser-based traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LDAP & LDAPS

A

Lightweight Directory Access Protocol/LDAP Secure - LDAP runs over TCP port 389; LDAPS runs over TCP port 636

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RDP

A

Remote Desktop Protocol - connects graphically to remote systems over TCP 3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NTP

A

Network Time Protocol - provides time synchronization services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNS

A

Domain Name System - provides domain name resolution; includes A records for IPv4 addresses and AAAA records for IPv6. MX -> mail servers, MX w/ lowest preference is primary mail server; DNS uses TCP 53 -> zone transfers & UDP 53 -> client queries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DNSSEC

A

Domain Name Security Extensions - provides validation for DNS responses by adding a Resource Record Signature (RRSIG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RRSIG

A

Resource Record Signature - provides data integrity & authentication; helps prevent DNS poisoning attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Switch

A

connects computer on local network; map MAC addresses to physical ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Port security

A

limits access to switch ports; includes limiting # of MAC addresses per port and disabling unused ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Router

A

connect networks to each other; direct traffic based on destination IP address; routers (and firewalls) use rules w/in access control lists (ACLs) to allow or block traffic

17
Q

Route command

A

used to view/manipulate routing table

18
Q

Implicit deny

A

indicates that unless explicitly allowed, it is denied; last rule in an ACL

19
Q

Host-based firewalls

A

filter traffic in/out of individual hosts

20
Q

Network-based firewalls

A

filter traffic in/out of network, such as between Internet/internal network

21
Q

Stateless firewall

A

controls traffic between networks using rules within ACL; ACL can block traffic based on ports, IP addresses, subnets, and some protocols. Stateful firewalls, additionally, filter traffic based on state of a packet w/in session

22
Q

WAF

A

web application firewall - protects a web server against web application attacks; typically placed in screened subnet, will alert administrators of suspicious events; works @ application layer (7)

23
Q

NGFW

A

next generation firewall - perform deep packet inspection, analyzing traffic @ application layer (7)

24
Q

Stateful inspection firewall

A

In computing, a stateful firewall is a network-based firewall that individually tracks sessions of network connections traversing it; also known as layer 4 firewalls

25
Fail-open vs fail-closed
fail-open devices allow all traffic to pass when device fails; fail-closed devices allow no traffic to pass when device fails; fail-closed provide greater security
26
Screened subnet
provides layer of protection for servers accessible from Internet
27
Intranet vs extranet
intranet -> internal network. extranet -> part of a network that can be accessed by authorized entities outside network
28
NAT
network address translation - translates public IP addresses to private IP addresses; private back to public; hides IP addresses on internal network from users on internet; NAT gateway is device that implements NAT
29
Air gap
provides physical isolation for systems/networks; completely isolated with a gap of air
30
Forward proxy server
forwards requests for services from a client; can cache content and record users' internet activities
31
Reverse proxy server
accept traffic from internet and forward it to one or more internal web servers; placed in screened subnet and web servers can be in internal network
32
UTM security appliance
unified threat management - includes mult. layers of protection, such as URL filters, content inspection, malware, DDoS mitigator; UTMs raise alerts sends them to to admins to implement
33
Jump server
placed between diff. security zones, provide secure access from devices in one zone to devices in another zone; often used to manage devices in screened subnet from internal network
34
35