Standards Flashcards

1
Q

X.500

A

Directory services (DAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.1x

A

Remote login (RADIUS)
Password is hashed with MD5 and sent to RADIUS server via UDP.
To encrypt, use TCP with TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.3

A

Ethernet. Specifically the Media Access Control sublayer of Layer 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.11n vs. 802.11ac

A

Both are Wi-Fi transmission standards. Both use OFDM spread spectrum.

  • 802.11n= fastest dual band ( both 2.4 and 5 Ghz).
  • 802.11ac= fastest 5 Ghz. Supports directional beamforming.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.15

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virtual Circuit: Frame Relay

A
Layer 2
Packet switching
Fast --  no error checking
Utilizes ISDN (phone lines)
Cheaper than T1
Supports multiple PVNs
Requires DCE/DTE at each end
Provides a Committed Information Rate
Speed: T1 (1.5 Mbs) to T3 (45 Mbs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Packet switching vs circuit switching

A
  • packet switching: packets are distributed across the bandwidth. Billed by data transmitted.
  • circuit switching: predefined narrow individual circuits in parallel. Billed by circuit, whether being used or not.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virtual circuit: X.25

A
Layer 3
Older, therefore includes error checking because in the old days transmission media were not reliable.
Packet switching
Slow: error check, store and forward
Requires DCE/DTE at each end
Does not support multiple VPNs
Speed: 2 Mbs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virtual circuit: ATM

A

Layer 2
Utilizes vendor-provided end-to-end virtual circuits – either permanent or per-call.
Both packet switching and circuit switching
Fast, because it does not lookup addressing information, does not do error checking.
Uses fixed length cells
Utilizes IDSN or SONET
Instead of DCE/DTE, uses ATM switch at each end
Supports multiple PVNs
Supports voice, data and video at same time
Speed: 25-620 Mbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Speed of T1

A

1.544 Mbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Speed of T3

A

45 Mbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ISDN BRI

A

Integrated Services Digital Network, Basic Rate Interface
Basic phone line service, primarily for single voice transmission
Good for single user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ISDN PRI

A

Integrated Services Digital Network, Primary Rate Interface
Premium phone line service, for multiple simultaneous voice and data transmissions
Good for offices (i.e. multiple users)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Digital Signature encryption standards

A
  • RSA
  • DSA (Digital Signature Algorithm)
  • Elliptic Curve DSA for cell phones
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

802.11e

A

“e” for excellent quality.

Wireless Quality of Service: gives priority to delay-sensitive protocols like VoIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.11i

A

“I” for information security

Wireless security standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ISO/IEC 14443

A

Smart card standard

Four fours, four sides to card

18
Q

MPLS

A
Multi Protocol Layer Switching.
Layer 3 and 2
New, replacing ATM and Frame Relay.  
Avoids the internet.
Rent virtual circuits (Label Switch Paths) from vendor. Need two LSPs, one for each way.  These use predefined shortcut addresses for routing, so not flexible like traditional IP routing. 
Use for office-to-office link, replacing VPN.
Supports QoS.
Speed: 2 Mbs-1 Gbs
19
Q

iSCSI

A

High speed access to drives over ethernet

20
Q

FCoE

A

Fiber Channel over Ethernet. Use fiber optics within data center for high speed access to servers and drives.

21
Q

Class A network

A

16 million hosts, 127 networks

1.0.0.1 to 126.255.255.254

22
Q

Class B network

A

65,000 hosts, 16,000 networks

128.1.0.1 to 191.255.255.254

23
Q

Class C network

A

254 hosts, 2 million networks

192.0.1.1 to 223.255.255.254

24
Q

Last octet of IP address

A
0 = network name
1 = gateway
2 = also can be gateway
3-254 = hosts
255 = broadcast to all the network
25
Q

Kerberos

A

Single sign on
Uses AES
Uses LDAP to access AD for authentication
Weaknesses: plaintext storage of keys and all password hashes stored with same encryption key on server – all eggs in one basket
Microsoft default

26
Q

SESAME

A

Similar to Kerberos but better: encrypted storage of user passwords
Uses PKI for authentication
Encrypted s
UNIX based

27
Q

ISC2 cannons

A

Papa:

  1. Protect society
  2. Act honorably
  3. Provide service to principals
  4. Advance the profession
28
Q

Graham-Denning Model

how many rules

A

Data security model
Primarily for integrity of financial transactions
8 rules: 4 for creating and deleting subjects & objects, 4 for rights (read, delete, etc.)

29
Q

TLS/SSL process

A

Goal: confidential communication with authenticated web server.

  1. Client sends request to server.
  2. Server sends digital certificate. Certificate contains the server’s public key for confidential return of the session key, as well as a CA’s digital signature to prove the server’s authenticity.
  3. Client authenticates the server.
  4. Client generates a symmetric session key, encrypts it with the server’s public key, and sends it back to the server.
  5. The server decrypts the session key with its private key.
  6. The client and server communicate using encryption from the session key.
30
Q

S/MIME

A

For public email.

Uses PKI for both signature and encryption

31
Q

CAT3

A

10base-T,10 Mbps

32
Q

CAT5

A

100Base-T, 100 Mbps, 100 M max distance

33
Q

CAT5e

A

1000Base-T, 1000 Mbps, 100 M max distance

34
Q

CAT6

A

1000Base-T, 1000 Mbps, 100 M max distance

35
Q

IPSEC

A
Uses IKE (Internet Key Exchange) with ISAKMP & OAKLEY
Used AES for confidentiality, SHA for integrity, HMAC for authentication
36
Q

SONET

A

Synchronous Optical NETwork.

Two fiber optic rings in opposite directions

37
Q

X.509 (International Telecommunications Union)

A

Digital signature standard

38
Q

VPN protocol: PPTP

A

Most widely used VPN protocol, used by Microsoft. Uses PPP to encrypt data.
Obsolete?
Multiprotocol

39
Q

VPN protocol: L2TP

A

Better than PPTP or L2F
Uses IPsec Transport mode to encapsulate
Multiprotocol & supports non-IP traffic

40
Q

VPN protocol: L2F

A

Uses PPP to encrypt. Replaced by L2TP.

41
Q

VPN protocol: MPLS

A

Multi-protocol Label Switching

Fast and efficient. Uses short labels to route packets through pre-defined routes.

42
Q

PGP

A

Proprietary email protocol. Web of trust. Commercial version uses RSA, IDEA and MD5.
Shareware uses Diffie-Hellman, CAST, SHA.