Networking Systems and Telecommunications Flashcards
3 Different types of Backup Methods
- Differential ? copy all cumulative changes since last full. (takes more space than incremental)
- Incremental ? copy data changes since the last full.
- full
3 Types of RAID
- Failure Resistant Disk System(FRDS)
- Failure Tolerant System.
- Disaster Tolerant System.
only FRDS is currently developed.
ARP
Address Resolution Protocol ? ARP matches ip address to an ethernet address.
Back?door
access through a preprogrammed, unknown access point using DUN or external network connection
Buffer Overflow
DoS attack ? receipt of an excessive amount of data.
Bus Data Network Topology
All transmissions of the network nodes travel the full length of the cable and are received by all stations. (Ethernet)
CHAP Remote Access Protocol
Challenge Handshake Protocol ? authentication using an encrypted key.
DSS Wireless Access Protocol
Direct Sequence Spread Spectrum ? Splits contents of message into smaller bits and decoded at receiver end.
Dual?homed firewall
2 NICS, one on internal side and one on external side
EAP?PEAP Remote Access Protocol
Protected EAP ? like EAP?TLS but easier to administer but less secure due to lack of client?side certificate.
EAP?TLS Remote Access Protocol
Extensible Authentication Protocol, Transport Layer Security ? both client and server authenticate over TLS. Digital certificates are used.Can be confident user is authorized.
EAP?TTLS Remote Access Protocol
Tunneled TLS
Eavesdropping
Interception of network communication either passive or active
FHSS Wireless Access Protocol
Frequency Hopping Spread Spectrum ? Provides no error recovery. Splits available signal bandwidth and segments it.
ICMP
Internet Control Message Protocol ? used for diagnostics and error correction.
Mesh Data Network Topology
Nodes are connected to every other node in the network. Backbone redundant.
Name and describe the OSI (Open System Interconnect)Model Layers?
- Physical ? electrical and mechanical level(x.21, HSSI,MAC address)
- Data Link ? prep for transfer of data(PPP, SLIP, ARP)
- Network ? handles data routing(IP,ICMP)
- Transport ? negotiates the data exchange(TCP,UDP,SPX)
- Session ? coordinates conversations between apps(NFS,SQL,RPC)
- Presentation ? o/s that associates types of files to programs(TIFF,JPEG,MPEG)
- Application ? not the app, but supports the end?user app process(HTTP,FTP,SMTP,TELNET)
Name the TCP/IP Model layers?
- Link(Network Access) ? x.25,ethernet,token ring, frame relay(layers 1 & 2 of OSI)
- Network(Internet) ? IP, ARP, ICMP, IPsec) (layer 3 of OSI)
- Transport(host?to?host) ? TCP, UDP (layer 4 of OSI)
- Application ? HTTP, FTP (layers 5?7 OSI)
3.
PAP Remote Access Protocol
Password Authentication Protocol ? not encrypted but typically easy to implement on any network
Piggybacking
Accessing the system with another user’s valid entery, via incorrect logoff or open session.
PPP Remote Access Protocol
Point?to?Point ? i.e. Dial?up Networking (DUN)
Ring Data Network Topology
network nodes are connected by unidirectional transmission links to form a closed loop.(token and FDDI)
Screened Host firewall
Uses a router to filter data before the data reaches the firewall.
Screened subnet firewall
Uses an external router to review data and bounce back as necessary before reaching the subnet.
Session Hijacking
Taking control of another user’s network connection, via IP spoof.
SLIP Remote Access Protocol
Serial Link Internet Protocol ? connecting one network to another over a single physical line or via modems.
Smurf Attack
DoS attack ? causes severe congestion with ICMP ping response methods.
Spoofing
Convincing a network device to perform an authorized action by masquerading as a trusted user, resource, or file.
Star Data Network Topology
Most used today. Nodes are connected to a central LAN device directly.
SYN Flood Attack
DoS Attack ? A buffer of the TCP initialization flooded with connection requests.
Teardrop Attack
DoS Attack ? An altered offset field in IP packets confusing the system, causing it to crash.
Tree Data Network Topology
A version of bus that invorporates the use of branches
Trusted Network Interpretation(TNI) Evaluation Classes
D ? minimal protection C ? discretionary protection C1 ? discretionary security protection C2 ? Controlled Access Protection (No off the shelf system goes higher than this) B ? Mandatory protection B1 ? Labeled Security Protection B2 ? structured protection B3 ? security domains A1 ? verified protection
Unauthorized Access
Users using their user name and password to access data they are not authorized for.
WAP Wireless Access Protocol
Wireless Application Protocol ? over the internet
WEP
Wired Equivalent Privacy ? uses shared secret between client and access point. Can be decrypted in a short time.
WPA
WiFi Protected Access ? uses TKIP
WPA2
WEP Protected Access 2 ? Supports IEEE 802.1ix authentication
Describe DES/DEA
64?bit block size and 56?bit key. It is a 16 round cryptosystem utlizsing S?boxes
Describe the Rijndael block cipher
iterated block cipher with variable block lenght and variabe key length
Describe XOR
Performs binary bit addition where T is 1 if A and B are not equal
During Discovery scanning what does the classification process produce?
Applications running on the target system
During discovery scanning what does the inventory scan produce
A list about the target systems OS and available ports
How does link encyrption operate?
each entity has keys in common with its two neighboring entities thus as a node recives the encyrpted message from its predecessor (neighboring node) it decrypts it and then reencrypts it with the shared key for the succesive node.
How is a one?time pad usually implemented
as a stream cipher by using XOR
How is confusion performed in DES?
S?box
How is diffusion performed in DES
P?Boxes
In a triple DES encryption notation noted DES?EDE2 what do the letters after DES stand for?
Encrypt
Decrypt
Encrypt
2(keys)
Name common Trojans:
Trinoo, Back Orifice, NetBus, SubSeven
Port 118
sqlserv
Port 119
nntp
Port 161
snmp
Port 194
irc
Port 2049
NFS