Standards Flashcards

1
Q

X.500

A

Directory services (DAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.1x

A

Remote login (RADIUS)
Password is hashed with MD5 and sent to RADIUS server via UDP.
To encrypt, use TCP with TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.3

A

Ethernet. Specifically the Media Access Control sublayer of Layer 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.11n vs. 802.11ac

A

Both are Wi-Fi transmission standards. Both use OFDM spread spectrum.

  • 802.11n= fastest dual band ( both 2.4 and 5 Ghz).
  • 802.11ac= fastest 5 Ghz. Supports directional beamforming.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.15

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virtual Circuit: Frame Relay

A
Layer 2
Packet switching
Fast --  no error checking
Utilizes ISDN (phone lines)
Cheaper than T1
Supports multiple PVNs
Requires DCE/DTE at each end
Provides a Committed Information Rate
Speed: T1 (1.5 Mbs) to T3 (45 Mbs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Packet switching vs circuit switching

A
  • packet switching: packets are distributed across the bandwidth. Billed by data transmitted.
  • circuit switching: predefined narrow individual circuits in parallel. Billed by circuit, whether being used or not.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virtual circuit: X.25

A
Layer 3
Older, therefore includes error checking because in the old days transmission media were not reliable.
Packet switching
Slow: error check, store and forward
Requires DCE/DTE at each end
Does not support multiple VPNs
Speed: 2 Mbs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virtual circuit: ATM

A

Layer 2
Utilizes vendor-provided end-to-end virtual circuits – either permanent or per-call.
Both packet switching and circuit switching
Fast, because it does not lookup addressing information, does not do error checking.
Uses fixed length cells
Utilizes IDSN or SONET
Instead of DCE/DTE, uses ATM switch at each end
Supports multiple PVNs
Supports voice, data and video at same time
Speed: 25-620 Mbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Speed of T1

A

1.544 Mbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Speed of T3

A

45 Mbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ISDN BRI

A

Integrated Services Digital Network, Basic Rate Interface
Basic phone line service, primarily for single voice transmission
Good for single user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ISDN PRI

A

Integrated Services Digital Network, Primary Rate Interface
Premium phone line service, for multiple simultaneous voice and data transmissions
Good for offices (i.e. multiple users)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Digital Signature encryption standards

A
  • RSA
  • DSA (Digital Signature Algorithm)
  • Elliptic Curve DSA for cell phones
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

802.11e

A

“e” for excellent quality.

Wireless Quality of Service: gives priority to delay-sensitive protocols like VoIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.11i

A

“I” for information security

Wireless security standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ISO/IEC 14443

A

Smart card standard

Four fours, four sides to card

18
Q

MPLS

A
Multi Protocol Layer Switching.
Layer 3 and 2
New, replacing ATM and Frame Relay.  
Avoids the internet.
Rent virtual circuits (Label Switch Paths) from vendor. Need two LSPs, one for each way.  These use predefined shortcut addresses for routing, so not flexible like traditional IP routing. 
Use for office-to-office link, replacing VPN.
Supports QoS.
Speed: 2 Mbs-1 Gbs
19
Q

iSCSI

A

High speed access to drives over ethernet

20
Q

FCoE

A

Fiber Channel over Ethernet. Use fiber optics within data center for high speed access to servers and drives.

21
Q

Class A network

A

16 million hosts, 127 networks

1.0.0.1 to 126.255.255.254

22
Q

Class B network

A

65,000 hosts, 16,000 networks

128.1.0.1 to 191.255.255.254

23
Q

Class C network

A

254 hosts, 2 million networks

192.0.1.1 to 223.255.255.254

24
Q

Last octet of IP address

A
0 = network name
1 = gateway
2 = also can be gateway
3-254 = hosts
255 = broadcast to all the network
25
Kerberos
Single sign on Uses AES Uses LDAP to access AD for authentication Weaknesses: plaintext storage of keys and all password hashes stored with same encryption key on server -- all eggs in one basket Microsoft default
26
SESAME
Similar to Kerberos but better: encrypted storage of user passwords Uses PKI for authentication Encrypted s UNIX based
27
ISC2 cannons
Papa: 1. Protect society 2. Act honorably 3. Provide service to principals 4. Advance the profession
28
Graham-Denning Model | how many rules
Data security model Primarily for integrity of financial transactions 8 rules: 4 for creating and deleting subjects & objects, 4 for rights (read, delete, etc.)
29
TLS/SSL process
Goal: confidential communication with authenticated web server. 1. Client sends request to server. 2. Server sends digital certificate. Certificate contains the server's public key for confidential return of the session key, as well as a CA's digital signature to prove the server's authenticity. 3. Client authenticates the server. 4. Client generates a symmetric session key, encrypts it with the server's public key, and sends it back to the server. 5. The server decrypts the session key with its private key. 6. The client and server communicate using encryption from the session key.
30
S/MIME
For public email. | Uses PKI for both signature and encryption
31
CAT3
10base-T,10 Mbps
32
CAT5
100Base-T, 100 Mbps, 100 M max distance
33
CAT5e
1000Base-T, 1000 Mbps, 100 M max distance
34
CAT6
1000Base-T, 1000 Mbps, 100 M max distance
35
IPSEC
``` Uses IKE (Internet Key Exchange) with ISAKMP & OAKLEY Used AES for confidentiality, SHA for integrity, HMAC for authentication ```
36
SONET
Synchronous Optical NETwork. | Two fiber optic rings in opposite directions
37
X.509 (International Telecommunications Union)
Digital signature standard
38
VPN protocol: PPTP
Most widely used VPN protocol, used by Microsoft. Uses PPP to encrypt data. Obsolete? Multiprotocol
39
VPN protocol: L2TP
Better than PPTP or L2F Uses IPsec Transport mode to encapsulate Multiprotocol & supports non-IP traffic
40
VPN protocol: L2F
Uses PPP to encrypt. Replaced by L2TP.
41
VPN protocol: MPLS
Multi-protocol Label Switching | Fast and efficient. Uses short labels to route packets through pre-defined routes.
42
PGP
Proprietary email protocol. Web of trust. Commercial version uses RSA, IDEA and MD5. Shareware uses Diffie-Hellman, CAST, SHA.