Networking Flashcards

1
Q

ISO 7498

A

OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

OSImodel

A
Application
Presentation
Session
Transport
Network
Data Link
Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Converged Protocols

A

Standard protocols (like TCP/IP) mixed with proprietary protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fibre Channel over Ethernet (FCoE)

A

Converged Protocol. High-speed network data storage (storage area network SAN) or network-attached storage (NAS) for file transfers.

Replaces IP at Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Multiprotocol Label Switching (MPLS)

A

Converged Protocol. Uses short labels to route traffic instead of long network addresses. Encapsulates with other transport mechanisms besides TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet Small Computer System Interface (iSCSI)

A

Converged Protocol. Network storage standard based on IP. Seen as cheaper alternative to FCoE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Voice over IP (VoIP)

A

Converged Protocol. Tunneling mechanism to support voice/data transfer over TCP/IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Software-Defined Networking (SDN)

A

Converged Protocol. Way to control network w/ software, freeing up how hardware is bought & configured. Don’t have to worry about IP addressing, subnets, etc. being programmed into or deciphered by hosting applications

Effectively network virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CDN

A

Content Delivery/Distribution Network
Geographical/logical load balancing. Low latency, high-availability. high perf, stability to hosted content.

CloudFlare, Akamai, Amazon CloudFront, CacheFly,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Emanation

A

(Wireless Networks)

transmission of data across electromagnetic signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wireless Cells

A

Areas where a wireless device can connect to a wireless access point. Can adjust the strength of the WAP to minimize un-authed user access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Wife networking amendments

A
.11 - 2 Mbps - 2.4GHz
.11a - 54 -        5
.11b - 11 -         2.4
.11g - 54         2.4
.11n -   200+   - 2.4/5
.11ac  - 1GB      - 5Ghz
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Infrastructure Mode vs Ad-Hoc Mode

A

(WIFI)
WAPs configured to Infra, not ad-hoc.

In ad-hoc, two devices w/ wireless network cards can connect directly without centralized control authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Stand-Alone (Infra mode)

A

WAP connecting wireless clients to each other but not to to any wired devices.
Infra does. WAP serves as wireless hub exclusively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wired Extension (Infra Mode)

A

WAP acts as a connection point to link wireless clients to wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Enterprise Extended (Infra Mode)

A

multiple WAPs used to connected a large physical area to same network.

Each WAP uses the same extended service set identifier (ESSID) so clients can roam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Bridge Mode (Infra Mode)

A

WAP is used to connect to wired networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SSID

A

Service Set Identifier. Used to differentiate wireless networks.

BSSID: Basic Service Set Identifier. in Inframode, MAC address of base station hosting the ESSID
ESSID: extended service set ID. name of wireless network when WAP or wireless base station used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Beacon frame

A

Special transmission that WAPs use to broadcast SSID to available network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How to secure WAP/ SSID Beaconing

A

Use WPA2 for auth/encryption instead of hiding the SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Site survey

A

Physical survey to find weaknesses/spread of WiFi networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

OSA

A

Open System Authentication. A method to authenticate to WAPs because normal network comms can occur. basically means anyone can connect. As long as a radio signal can be transmitted, comms are allowed. Everything transmitted in clear text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SKA

A

Shared Key Authentication. A method to auth to WAPS.

Some form of auth must be performed. WEP is one example. Later amendments are WPA, WPA2, other

24
Q

Wireless Network Security

A
  • Secure WAPs (site survey, Secure SSID)
  • Secure Encryption Protocols (WEP, WPA, WPA2, 802.1X/EAP)
  • Antenna placement
25
Q

WEP

A

Wired Equivalent Privacy. Same level of security to wireless networks as on wired.

Static shared secret key to encrypt all messages, provides hash (confidentiality + integrity). Uses RC4 cipher.

Easy to crack, so not recommended.

26
Q

WPA

A

WiFi protected Access

Replaced WEP. Uses LEAP/TKIP cryptosystems to secure communications, but one secret key per host. Still vulnerable to brute force.

27
Q

WPA2

A

Improvement on WFA per 802.11i. New method of securing:

Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP), based on AES.

28
Q

802.1X/EAP

A

Extensible Auth Protocol: framework for new auth mechanisms to be incorporated into wireless comms

PEAP, LEAP, MAC Filter, TKIP, CCMP

29
Q

General Wifi Security Procedure

A
  1. Change default admin password
  2. Disable SSID broadcast
  3. Change the SSID to something unique
  4. Enable MAC filtering
  5. Consider using static IP addresses, or configure DHCP with reservations
  6. Turn on highest form of auth and encrytpion supported (WPA2)
  7. Treat wireless as remote access, and manage access w/ 802.1X
  8. Treat wireless as external access, and separate WAP fro Wired using a firewall
  9. Treat wireless as entry point and monitor WAP-to-wired with IDS
  10. Require VPN.
30
Q

Intranet vs extranet

A

Intranet: totally internal internet.
Extranet: combo of intra + public internet, common as DMZ

31
Q

NAC

A

Network access control. Control access to an environment through strict adherence to set of policies.

  • Reduce 0days
  • Enforce sec policy throughout network
  • Use identities to perform access control
32
Q

Firewalls

A

Filter/block network traffic coming in/out of network. Often between internal vs public internet, but can be anywhere. Can’t block viruses or malware.

Single, two-, and three-tiered deployment.
2.1 = split, 3.2 = split

33
Q

Repeaters, Concentrators, Amplifiers

A

Layer 1 tools that used to strengthen comms signal over cable segment, connect segments over same protocol.

34
Q

Hubs

A

Connect multiple systems and connect network segments using same protocol. Broadcasts incoming data across all outbound ports. Multiport repeater. Not great for sec

35
Q

Modems

A

Modulates between analog carrier signal and ditial information. Mostly replaced by ISDN, cable modems, DSL modems, wifi, etc.

36
Q

Bridges

A

Connect two networks together (of different types) of same protocol.

37
Q

Switches

A

Not hub - forwards to one port to the specific destination

38
Q

Router

A

Layer 3, control traffic flow on networks. Static defined routing table or dynamic routing system

39
Q

Ring topology

A

Ring topology, only one device can send data at a time, with the use of a token that’s passed around in one direction.

40
Q

Bus Topology

A

One central trunk, devices off it. Collisions can occur. to prevent, everyone listens for any other occurring traffic, waits until coast is clear. also more resilient against single segment failures.

Linear vs tree.
Not used much because must be terminated at both eneds, and any disconnection can take down the entire network

41
Q

Star topology.

A

Uses central connection device. Logical bus or logical ring can be applied on top of physical star implementation

42
Q

Mesh topology

A

Many paths between systems.

43
Q

Frequency Hopping Spread Sprectrum

A

Spread spectrum comms.

Bits of message are sent sequentially at different frequency bands

44
Q

Direct Sequence Spread Spectrum

A

Spread spectrum comms.

Sends parts of message in parallel across all available frequencies at same time

45
Q

Orthogonal Frequency-Division Multiplexing

A

Spread spectrum comms.

Modulated signals are perpendicular to minimize interferece

46
Q

Bluetooth Risks

A

Personal Area Network.
pairing over 2.4 GhZ
4 digit code (easy to BF)

Bluesnarfing: connect w/o knowledge and collect data
Blue bugging: remote control over bluetooth device
Bluejacking: transmit SMS-like messages

47
Q

LAN technologies

A

Ethernet
Token Ring
Fiber Distributed Data Interface (FDDI)

48
Q

Ethernet

A

LAN
Allows numerous devices to communicate, but have to do collision detection and avoidance.

Broadcast and collision domains

Full-duplex
Twisted-pair cabling
Uses frames for units
Most often star/bus technologies

49
Q

Token ring

A

LAN

Token passing mechanism. Can be deployed on ring or star topologies

50
Q

Fiber Distributed Data Interface

A

FDDI. LAN

2 token rings in opposite directions.

51
Q

LAN Media Access

A

Used to prevent or avoid transmission collisions.

CSMA
CSMA/CA
CSMA/CD
Token Passing
Polling
52
Q

Carrier-Sense Multiple Access

A

CSMA

  1. Host listens to LAN media to determine whether in use
  2. If LAN not being used, transmits
  3. Host waits for acknolwedgement
  4. If no ack after a timeout, host starts over at stpe 1
53
Q

CSMA with Collision Avoidance

A
  1. Host has inbound + output lines
  2. Host listens to LAN media to see if not being used. If not, requests permission to send
  3. If receives permission sends. If not, step 1
  4. If permission granted, transmits comms over outbound
  5. Waits for ack
  6. If no ack received after timeout, starts over at step 1
54
Q

CSMA Collection Detection

A

CSMA/CD

  1. Host listens to LAN media to determine if in use
  2. If not in use, transmits comms
  3. While transmitting, listens for collision
  4. If collision detection, transmit a jam signal
  5. If jam signal received, all hosts stop tramsitting. Each host waits a random period of time then starts over at step 1

Ethernet.

55
Q

Token Passing

A

LAN media system to prevent collision

56
Q

Polling

A

LAN media access technology that uses master + slave config.

57
Q

UTP Categories

A
Cat 1: Voice only (modems)
Cat 2: 4 Mpbs - mainframes
Cat 3: 10M: 10BaseT ethernet networks, phone cables
Cat4: 16 - Token ring
Cat5: 100 - 100Base-TX, FDDI, ATM
Cat6: 1K - high-speed
Cat 7: 10Gpbs 10 gig-speed networks