Networks Flashcards

1
Q

Operating Systems Role

A

Manage the computer’s resources
Memory management
Scheduling
Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Characteristics of Network Topologies

A
# of connections
# of “hops”
Addition of new nodes
Fairness
Collisions and points of failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protocol defined parameters

A

Type of error checking
Data compression method
Mechanisms to signal reception of a transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DNS Port

A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Static Routing

A

Static: entries entered once and not updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Routing Information Protocol (RIP):

A

entire tables shared on a periodic basis. Not very efficient or secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Open Shortest Path First (OSPF):

A

Table maintained to determine what the shortest path is to specific destinations. Tremendous overhead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Border Gateway Protocol (BGP):

A

Peer routers (neighbors) exchange routing information. Entire table initially loaded but subsequent changes limited to updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ICMP performs the following controls:

A
  • Flow Control
    • Detecting unreachable destinations
    • Redirecting routes
    • Checking remote hosts (e.g. ping)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of DOS attacks

A

Flooding – sending more data than the target can process
Crashing – sending data, often malformed, designed to disable the system or service
Distributed – using multiple hosts in a coordinated attack effort against a target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IPv4 vs. IPv6

A

scalability:IPv6 uses 128bit address space. Address length is 4 times longer than IPv4.
security:IPv6 basic specification includes security. It includes packet encryption (ESP:Encapsulated Security Payload) and source authentication (AH:Authentication Header). [confidentiality and authentication]
real-time:To support real-time traffic such as video conference, IPv6 has “Flow Label”. Using flow label, routers can know which end-to-end flow a packet belongs to, and then find out the packet which belongs to real-time traffic. [needed to allow for prioritization of traffic]
autoconfiguration:IPv6 basic specification includes address autoconfiguration. So, even a novice user can connect their machine to network.
specification optimization:IPv6 keeps good parts and discards old and useless parts of IPv4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Two major modes of IPSec

A

Tunnel: encrypts both the data and header portions of the packet.
Transport: encrypts the data portion of the packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

provides authenticity guarantee for packets, by attaching strong crypto checksum to packets. If you receive a packet with AH and the checksum operation was successful, you can be sure about two things :
The packet was originated by the expected peer. The packet was not generated by an impersonator.
The packet was not modified in transit.

A

IPSec Authentication Header (AH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

provides confidentiality guarantee for packets, by encrypting packets with encryption algorithms. If you receive a packet with ESP and successfully decrypted it, you can be sure that the packet was not wiretapped in the middle.

A

Encapsulating Security Payload (ESP):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ESP provides encryption service to the packets. However, encryption tends to negatively impact compression on the wire. IPcomp provides a way to compress packets before encryption by ESP (Of course, you can use IPcomp alone if you wish to).

A

IP payload compression (IPcomp):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AH and ESP need shared secret keys between peers. For communication between distant locations, we need to provide ways to negotiate keys in secrecy. IKE will make this possible.

A

Internet Key Exchange (IKE):