Networking Systems and Telecommunications Flashcards

1
Q

3 Different types of Backup Methods

A
  1. Differential ? copy all cumulative changes since last full. (takes more space than incremental)
  2. Incremental ? copy data changes since the last full.
  3. full
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 Types of RAID

A
  1. Failure Resistant Disk System(FRDS)
  2. Failure Tolerant System.
  3. Disaster Tolerant System.

only FRDS is currently developed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ARP

A

Address Resolution Protocol ? ARP matches ip address to an ethernet address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Back?door

A

access through a preprogrammed, unknown access point using DUN or external network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Buffer Overflow

A

DoS attack ? receipt of an excessive amount of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bus Data Network Topology

A

All transmissions of the network nodes travel the full length of the cable and are received by all stations. (Ethernet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CHAP Remote Access Protocol

A

Challenge Handshake Protocol ? authentication using an encrypted key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DSS Wireless Access Protocol

A

Direct Sequence Spread Spectrum ? Splits contents of message into smaller bits and decoded at receiver end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dual?homed firewall

A

2 NICS, one on internal side and one on external side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EAP?PEAP Remote Access Protocol

A

Protected EAP ? like EAP?TLS but easier to administer but less secure due to lack of client?side certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EAP?TLS Remote Access Protocol

A

Extensible Authentication Protocol, Transport Layer Security ? both client and server authenticate over TLS. Digital certificates are used.Can be confident user is authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EAP?TTLS Remote Access Protocol

A

Tunneled TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Eavesdropping

A

Interception of network communication either passive or active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FHSS Wireless Access Protocol

A

Frequency Hopping Spread Spectrum ? Provides no error recovery. Splits available signal bandwidth and segments it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ICMP

A

Internet Control Message Protocol ? used for diagnostics and error correction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mesh Data Network Topology

A

Nodes are connected to every other node in the network. Backbone redundant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name and describe the OSI (Open System Interconnect)Model Layers?

A
  1. Physical ? electrical and mechanical level(x.21, HSSI,MAC address)
  2. Data Link ? prep for transfer of data(PPP, SLIP, ARP)
  3. Network ? handles data routing(IP,ICMP)
  4. Transport ? negotiates the data exchange(TCP,UDP,SPX)
  5. Session ? coordinates conversations between apps(NFS,SQL,RPC)
  6. Presentation ? o/s that associates types of files to programs(TIFF,JPEG,MPEG)
  7. Application ? not the app, but supports the end?user app process(HTTP,FTP,SMTP,TELNET)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Name the TCP/IP Model layers?

A
  1. Link(Network Access) ? x.25,ethernet,token ring, frame relay(layers 1 & 2 of OSI)
  2. Network(Internet) ? IP, ARP, ICMP, IPsec) (layer 3 of OSI)
  3. Transport(host?to?host) ? TCP, UDP (layer 4 of OSI)
  4. Application ? HTTP, FTP (layers 5?7 OSI)
    3.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

PAP Remote Access Protocol

A

Password Authentication Protocol ? not encrypted but typically easy to implement on any network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Piggybacking

A

Accessing the system with another user’s valid entery, via incorrect logoff or open session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

PPP Remote Access Protocol

A

Point?to?Point ? i.e. Dial?up Networking (DUN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Ring Data Network Topology

A

network nodes are connected by unidirectional transmission links to form a closed loop.(token and FDDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Screened Host firewall

A

Uses a router to filter data before the data reaches the firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Screened subnet firewall

A

Uses an external router to review data and bounce back as necessary before reaching the subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Session Hijacking

A

Taking control of another user’s network connection, via IP spoof.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

SLIP Remote Access Protocol

A

Serial Link Internet Protocol ? connecting one network to another over a single physical line or via modems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Smurf Attack

A

DoS attack ? causes severe congestion with ICMP ping response methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Spoofing

A

Convincing a network device to perform an authorized action by masquerading as a trusted user, resource, or file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Star Data Network Topology

A

Most used today. Nodes are connected to a central LAN device directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

SYN Flood Attack

A

DoS Attack ? A buffer of the TCP initialization flooded with connection requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Teardrop Attack

A

DoS Attack ? An altered offset field in IP packets confusing the system, causing it to crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Tree Data Network Topology

A

A version of bus that invorporates the use of branches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Trusted Network Interpretation(TNI) Evaluation Classes

A
D ? minimal protection
C ? discretionary protection
C1 ? discretionary security protection
C2 ? Controlled Access Protection (No off the shelf system goes higher than this)
B ? Mandatory protection
B1 ? Labeled Security Protection
B2 ? structured protection
B3 ? security domains
A1 ? verified protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Unauthorized Access

A

Users using their user name and password to access data they are not authorized for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

WAP Wireless Access Protocol

A

Wireless Application Protocol ? over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

WEP

A

Wired Equivalent Privacy ? uses shared secret between client and access point. Can be decrypted in a short time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

WPA

A

WiFi Protected Access ? uses TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

WPA2

A

WEP Protected Access 2 ? Supports IEEE 802.1ix authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Describe DES/DEA

A

64?bit block size and 56?bit key. It is a 16 round cryptosystem utlizsing S?boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Describe the Rijndael block cipher

A

iterated block cipher with variable block lenght and variabe key length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Describe XOR

A

Performs binary bit addition where T is 1 if A and B are not equal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

During Discovery scanning what does the classification process produce?

A

Applications running on the target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

During discovery scanning what does the inventory scan produce

A

A list about the target systems OS and available ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

How does link encyrption operate?

A

each entity has keys in common with its two neighboring entities thus as a node recives the encyrpted message from its predecessor (neighboring node) it decrypts it and then reencrypts it with the shared key for the succesive node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

How is a one?time pad usually implemented

A

as a stream cipher by using XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

How is confusion performed in DES?

A

S?box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

How is diffusion performed in DES

A

P?Boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

In a triple DES encryption notation noted DES?EDE2 what do the letters after DES stand for?

A

Encrypt
Decrypt
Encrypt
2(keys)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Name common Trojans:

A

Trinoo, Back Orifice, NetBus, SubSeven

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Port 118

A

sqlserv

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Port 119

A

nntp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Port 161

A

snmp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Port 194

A

irc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Port 2049

A

NFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Port 389,636

A

LDAP/Secure LDAP

56
Q

Port 5631

A

PCAnywhere

57
Q

The number of rounds in the Rijndael Cipher is a function of the key size: Given a key size of 128 how many rounds will occur

A

10

58
Q

The number of rounds in the Rijndael Cipher is a function of the key size: Given a key size of 192 how many rounds will occur

A

12

59
Q

The number of rounds in the Rijndael Cipher is a function of the key size: Given a key size of 256 how many rounds will occur

A

14

60
Q

What are four differences in OS implementation of the TCP/IP stack?

A

Time to Live
Initial Window Size
Don’t Fragment bit
Type of Service

61
Q

What are some liabilities of PDAs

A

They do not support DAC
They lack audit capabilities
They don’t support a non?object reuse policy
They provide no data integrity protection

62
Q

What are the bit strenghts of AES variations?

A

128, 192 and 256

63
Q

What are the four modes of DES

A

Cipher block chaining
Electronic Code Book
Cipher Feedback
Output Feedback

64
Q

What are the three layers of the Rijndael cipher?

A

The non?linear layer
The liner mixing layer
The key addition layer

65
Q

What are the three main components of a polymorphic virus?

A

A scrambled virus body, a decryption routine, and a mutation engine

66
Q

What cipher is AES based on?

A

Rijndael

67
Q

What do header condition signatures look for?

A

dangerous or illogical combinations in packet headers.

68
Q

What do string signatures look for?

A

text strings that indicate a possible attack

69
Q

What is a liability of TCP FIN scans?

A

They work only on Non?Windows machines because Windows Machines send a RST regardless of if the port is open or closed.

70
Q

What is a SYN/ACK scan

A

A scanner sends a SYN/ACK packet if the port is closed it assumes the SYN/ACK is a mistake and sends a RST if the port is open the SYN/ACK will be dropped

71
Q

What is C2MYAZZ?

A

A utility that enables server spoofing to implement a session hijacking or MITM attack

72
Q

What is C2MYAZZ?

A

A utility that enables server spoofing to implement a s ession hijacking or MITM exploit

73
Q

What is clustering with reguards to cryptography?

A

a situation in which a plaintext message generates identical ciphertext messages by using the same transformation algorithms but with different cryptovariables or keys

74
Q

What is logon abuse?

A

Privilege escalation

75
Q

What is the best known symmetric key system?

A

DES

76
Q

What is the fixed block size for AES?

A

128 bits

77
Q

What is the intent of a discovery scan?

A

to collect enough information about each network device to identify what type of device it is.

78
Q

What is the intent of an inventory scan?

A

It provides information about the target system’s OS and its available ports

79
Q

What is the most basic and fastest type of TCP scan?

A

TCP connect()

80
Q

What is the native mode of DES

A

Electronic Code Book

81
Q

What is the standard TTL value for HP Jet direct printers?

A

60

82
Q

What is the standard TTL value for most network devices, UNIX and Mac systems?

A

255

83
Q

What is the standard TTL value for most Windows systems?

A

128

84
Q

What is the standard TTL value for Windows 95B/98 systems?

A

32

85
Q

What type of key does WEP use?

A

A 40?bit shared secret key, a RC4 psuedorandom number generator PRNG encryption and a 24 bit initialization vector

86
Q

Which modes of DES operates as a stream cipher?

A

Cipher Feedback and Output Feedback

87
Q

Which operational mode of DES is most likely to allow errors to propogate?

A

Cipher Feedback

88
Q

802.11a

A

54 Mbps in the 5GHZ range

89
Q

802.11b

A

11 Mbps

90
Q

802.11g

A

54 Mbps in 2.4 GHZ band

91
Q

802.15

A

PANs

92
Q

At what layer of the OSI model does Frame Relay operate?

A

Data link

93
Q

Describe an ATM network

A

High?bandwidth, low delay technology that uses both switching and multiplexing. It uses 53?byte fixed size cells instead of frames

94
Q

How does CHAP prevent against remote client impersonation?

A

By sending challenge strings at random intervals.

95
Q

How does CHAP protect against replay attacks?

A

It does not send the password in clear text an it uses an arbitrary challenge string for each authentication attempt

96
Q

How many channels (up/down) comprise a Basic Rate Interface?

A

Two B & one D

97
Q

How many channels (up/down) comprise a Primary Rate Interface?

A

1 Single D channel + 23/30 channels for voice and data

98
Q

How many non?overlapping channels are used in DSSS?

A

Typically 3

99
Q

IPSEC can support multiple ______ but not multiple _________

A

simultaneous tunnels; multiple protocols

100
Q

Is RADIUS TCP or UDP?

A

UDP

101
Q

It can be said that TACAS and RADIUS are standards based”…what does that mean?”

A

That they can interoperate with other systems of the same time.

102
Q

RAID 0

A

Striping

103
Q

RAID 1

A

Mirroring

104
Q

RAID 2

A

Hamming Code Parity (bit?interleaved parity)

105
Q

RAID 3

A

Byte Level Parity

106
Q

RAID 4

A

Block Level Parity

107
Q

RAID 5

A

Interleave Parity

108
Q

To create an IPSEC tunnel that provides authentication, integrity and encryption what protocol would I use?

A

ESP

109
Q

To create an IPSEC tunnel that provides source authentication and integrity without encryption which protocol would I enable?

A

AH

110
Q

What are the FCC regulations for FHSS networks?

A

75 or more frequencies can be used with a maximum dwell time of 400ms

111
Q

What are the five layers of WAP?

A

application, session, transaction, security and transport

112
Q

What are the private IP address ranges?

A
  1. 0.0.0 ? 10.255.255.255
  2. 16.0.0 ? 172.31.255.255
  3. 168.0.0 ? 192.168.255.255
113
Q

What are the three classes of WTLS security?

A

Class 1: anonymous authentication
Class 2: Server Authentication
Class 3: Two?way client and server authentication

114
Q

What are the two different spread spectrum technologies in use in 2.4GHZ LANs

A

Direct?dequence spread spectrum(DSSS) and frequency hopping spread spectrum (FHSS)

115
Q

What are the two primary types of ISDN interfaces?

A

Basic Rate Interface and Primary Rate Interface

116
Q

What does TACAS+ provide that TACAS does not provide?

A

two factor password authentication
the ability for a user to change thier password
the capability for resynchronizing security tokens
better audit trails

117
Q

What does the application layer of WAP consist of?

A

The wireless application environment (WAE), a microbrowser specification for internet access, wireless markup language, WMLScript

118
Q

What does the Transport layer of the WAP consist of?

A

Wireless Datagram Protocol

119
Q

What extention to EAP allows for authentication using digital certificates?

A

EAP?TLS

120
Q

What is 802.1X

A

Port based authentication for security in wireless networks

121
Q

What is a multiplexer?

A

It enables several signals to be sent over one physical

122
Q

What is a Switched Multimegabit Data Service network use for?

A

to extend LAN like performance to a MAN or WAN

123
Q

What is Frame Relay?

A

A high?performance WAN protocol that was originally developed for ISDN and is considered the successor to X.25/LAPB

124
Q

What is LEAP

A

it dynamically creates WEP keys making WEP more secure.

125
Q

What is Link Access Procedure Balanced?

A

For use in X.25 networks defines frame types and is capable of retransmitting, exchanging, and acknowledging frames as well as detecting out of sequence or missing frames

126
Q

What is one advantage of MS?CHAP V2 over regular MS?CHAP/CHAP?

A

Mutual authentication support

127
Q

What is te most common implementation of RAID

A

RAID 5

128
Q

What is the difference between remote journaling and electronic journaling?

A

Electronic vaulting happens at pretimed intervals whereas remote journaling is real time

129
Q

What is the early de facto standard for dial up communications

A

SLIP

130
Q

What is the main difference between Layer 2 and Layer 3 tunneling protocols

A

Layer 2 protocols use frames and Layer 3 protocols use headers

131
Q

What is the maximum effective radius of a Switched Multimegabit Data Service network?

A

30 Miles

132
Q

What is X.25?

A

The first commercially successful connection oriented packet switching network where packets travel over virtual circuits.

133
Q

What layer does the Point to Point Protocol operate at?

A

Data Link

134
Q

What RFC defines CHAP/PAP

A

RFC1334

135
Q

What succeeded SLIP?

A

PPP

136
Q

What type of authentication does PPP use?

A

PAP, CHAP and MS?CHAP

137
Q

Why is RADIUS not used for router?to?router authentication?

A

It does not provide support for two?way authentication