Technologies And Tools Flashcards
Layers of the OSI Model
Physical Data Network Transport Session Presentation Application
Define IP
Internet Protocol, delivers packets across layer 3
Define TCP
Transmission Control Protocol
TCP Flags
Syn opens connect
Fin terminates connect
Ack acknowledges request
Define UDP
User Data Protocol
Primary difference between UDP and TCP
UDP does not send acknowledge responses (one way comms)
TCP is connection oriented
DNS Look Up Port Number
53 via UDP
FTP Port Number
21
SSH Port Number
22
RDP Port Number
3389
SMTP Port Number
25 Unencrypted
465 Encrypted
POP Port Number
110 Unencryted
995 Encrypted
IMAP Port Number
143 Unencrypted
993 Encrypted
HTTP Port Number
80
HTTPS Port Number
443 with SSL
Purpose of a Switch
Create Networks on layers 2 and limited layer 3
Purpose of Routers
Connect networks via ACL
Purpose of Bridges
Connect only two nets over layer 2 between MAC addresses
Purpose of a Media Gateway
Translate between network types (i.e. 3G, 4G, LTE, etc)
Define a Stateful Firewall
Tracks outgoing communications to determine open connections
Purpose of Explicit Deny Rule
To generate logs, implicit deny is not logged.
Firewall Positioning
typically between router and internet
Difference between a Forward Proxy and Reverse Proxy
Forward Proxy is on client’s side (i.e. a web browser)
Reverse Proxy is on a server’s side
Purpose of a Transparent Proxy
Also called “In-line, intercepting, or forced” proxy
Intercepts connection between client and server without modifying requests and responses.
Load Balancer Modes
Round-Robin Scheduling
Session Persistance
VPN Types
Site-to-site
Remote Access
VPN Endpoints
Firewalls
Routers
Servers
VPN Concentrators (for high volume)
VPN Modes
Full Tunnel
Split Tunnel
IPsec Functions
Adds security to TCP/IP via: Internet Key Exchange (IKE) Encapsulating Sec Payload (ESP) for Confidentiality Authentication Header (AH) *Not compatible for dynamic NAT
Define NIDS
Network Intrusion Detection System
Define NIPS
Network Intrusion Prevention System
Define HIPS
Host Intrusion Prevention System
Define HIDS
Host Intrusion Detection System
Detection Methods
Signature Based
Anomaly/Behavior/Heuristic Based
Define OAuth
Federated SSO for web authorization
Define Open ID Connect
Authentication protocol for OAuth
Firewall Rule Configuration Errors
Shadowed Rules
Promiscuous Rules
Orphaned Rules
Define a Shadow Rule
Rule never reached due to placement order
Define a Promiscuous Rule
Overly broad permissions
Define an Orphaned Rule
Rule built for decommissioned networks or systems
Types of Flooding Attacks
SYN flood
MAC flood
Define STP and Purpose
Spanning Tree Protocol, prever loops in IP/MAC addressing
Network Monitoring Modes
Full Packet Capture
Net Flow Data
Information in Net Flow Data
Source and Destination IP/Ports
Time
Amount of Data
SNMP PDU Types
GetRequest SetRequest GetNextRequest GetBulkRequest Response Trap InformRequest
Storage Network Types
Network Attached Storage (NAS), file servers
Storage Area Network (SAN), raw disks
802.11 Network speed and frequency
2 Mbps on 2.4 GHz
802.11b Network speed and frequency
11 Mbps on 2.4 GHz
802.11g Network speed and frequency
22 Mbps on 2.4 GHz
802.11n Network speed and frequency
600 Mbps on 2.4/5 GHz
802.11ac Network Speeds
1 Gbps
Wireless Authentication Methods
Pre-shared Keys
Enterprise Authentication
Pre-Shared Key Types
Hexadecimal String
Passwords
Enterprise Authentication Types
LEAP
EAP
PEAP
LEAP Algorithm Types
MS-CHAP (insecure)
EAP Algorithm Types
TLS
TTLS
MD5 (Insecure)
FAST
Define PEAP
EAP tunneled in encrypted TLS
Wireless Antennae Types
Omni-Directional
Directional
Beam forming (Virtual Directional)
WAP HW Types
Fat; contain hardware and software
Thin; contain hardware only, configured via wireless controller
Define WORM
Write Once Read Many, permanent logs sent to SIEMs
Define NTP
Network Time Protocol, sync devices to centralized time server
DLP Environments
Host
Network
Cloud