Telecommunications and Network Security Flashcards

1
Q

IPv6

A

39-digit number in decimal larger and simpler than IPv4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Does IPv6 hosts needs a DHCP

A

no, because IPv6 hosts can statelessly autoconfigure a unique IPv6 address, omitting the need for static addressing or DHCP. It takes the host’s MAC address and uses it to configure the IPv6 address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is RFC 1918 addresses?

A

* 10.0.0.0–10.255.255.255 (10.0.0.0/8)

  • 172.16.0.0–172.31.255.255 (172.16.0.0/12)
  • 192.168.0.0–192.168.255.255 (192.168.0.0/16)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three new TCP flags were added

A

CWR (Congestion Window Reduced)

ECE (Explicit Congestion Notification Echo),

NS (Nonce Sum)

These flags are used to manage congestion (slowness) along a network path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SNMP agents use what port?

A

UDP port 161

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

coaxial network cable

A

has an inner copper core separated by an insulator from a metallic braid or shield. The outer layer is a plastic sheath.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fiber Optics

A

made from a very narrow glass or plastic fiber that is surrounded by and the cladding in turn is covered by a protective sheath. Fiber optics emit extremely small amounts of energy from the cable, data cannot be as easily intercepted. Fiber optics are more difficult to wiretap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FDDI (Fiber Distributed Data Interface)

A

legacy LAN technology, running a logical network ring (token-passing ) via a primary and secondary counter-rotating fiber optic ring.

The secondary ring was typically used for fault tolerance. Runs at 100 MBPS speed using light Not effected by EMI

FDDI-2 allows for fixed bandwidth to be assigned unlike FDDI and not affected by EMI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T1

A

a 1.544-megabit circuit that carries 24 64-bit DS0 (DigitalSignal0) channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T3

A

28 bundled T1s, forming a 44.736-megabit circuit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

E1

A

is a dedicated 2.048-megabit circuit that carries 30 channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

E3

A

16 bundled E1s, forming a 34.368-megabit circuit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SONET

A

carries multiple T-carrier circuits via fiber optic cable. SONET uses a physical fiber ring for redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

X.25

A

is an older packet-switched WAN protocol.

Transmit data over long distances in the 1970s though early 1990s via analog modem.

Separate from the global IP-based Internet.

Performs error correction that can add latency on long links and can carry TCP/IP.

It uses virtual circuits instead of dedicated ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Frame Relay

A

a Layer 2 WAN protocol, no error recovery and focuses on speed.

Frame Relay multiplexes multiple logical connections over a single physical connection to create Virtual Circuits; this shared bandwidth model is an alternative to dedicated circuits such as T1s.

Frame Relay can carry TCP/IP.

Like X.25, it uses virtual circuits instead of dedicated ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Asynchronous Transfer Mode (ATM)

A

Not a packet-switch based network. Reliable network comparing to Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Multiprotocol Label Switching (MPLS)

A

forward WAN data via labels through a shared MPLS cloud network, such as ATM, Frame Relay and IP.

A technical solution for the QoS, speed, and security problems facing the Internet.

Improved routing performance. gives service providers the ability to create VPNs without the need of end user applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Synchronous Data Link Control (SDLC) is

A

synchronous Layer 2 WAN protocol that uses polling to transmit data. Polling is similar to token passing; the difference is that a primary node polls secondary nodes, which can transmit data when polled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

High-Level Data Link Control (HDLC)

A

the successor to SDLC. HDLC adds error correction and flow control, as well as two additional modes (ARM and ABM). Three modes: NRM, ARM, and ABM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Normal Response Mode (NRM)

A

Secondary nodes can transmit when given permission by the primary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Asynchronous Response Mode (ARM

A

Secondary nodes may initiate communication with the primary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Asynchronous Balanced Mode (ABM)

A

Combined mode where nodes may act as primary or secondary, initiating transmissions without receiving permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Routing protocols come in two basic varieties:

A

o Interior Gateway Protocols (IGPs) such as RIP and OSPF used by Private network. o Exterior Gateway Protocols (EGPs), such as BGP are used on public networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Distance vector routing protocols

A

uses metrics, which is hop count prone to routing loops, where packets loop between two routers. Ex. RIP and OSPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

RIP

A

a distance vector routing protocol that uses hop count as it’s metric.

It does not have a full view of a network: It can only “see“directly connected routers.

Convergence is slow.

RIP sends routing updates every 30 seconds regardless of routing changes.

RIP’s maximum hop count is 15; 16 is considered “infinite.”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Disadvantage of RIP

A

increases network congestion

Only works with classful network, and there is no way for a router to verify the trustworthiness of a route update from its neighbors.

Hold-down timers, split horizon, and poison reverse are small fixes that do not compensate for RIP’s weaknesses.

RIP uses split horizon to help avoid routing loops.

RIP uses a hold-down timer to avoid flapping (repeatedly changing a route’s status from up to down).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

RIPv2

A

used in a network with different subnet masks and authenticate with other routers using MD5. RIPv2 added support for CIDR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What RIP can do to avoid routing loop?

A

RIP can use split horizon to help avoid routing loops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Poison reverse

A

Distance vector routing protocol safeguard that sets a bad route to infinity. Can be used in addition to split horizon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Link-state routing protocols

A

additional metrics for determining the best route, including bandwidth, latency and QoS. Ex. OSPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

o Open Shortest Path First (OSPF)

A

an open link-state routing protocol. It learns the entire network topology for their area the lowest cost paths to a destination. OSPF routers send event-driven updates. If a network is converged for a week, the OSPF routers will send no updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Stateful matching IDS`

A

scans for attack signatures in the context of a stream of traffic or overall system behavior rather than the individual packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Statistical anomaly-based IDS

A

Analyzes event data by comparing it to typical, known, or predicted traffic profiles by analyzing event data and identifying patterns of entries that deviate from a predicted norm. Very effective and, at a very high level. It can detect unknown attacks. Tuning the IDS can be challenging and, if not performed regularly, the system will be prone to false positives. Not suitable in large enterprises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Protocol anomaly-based IDS

A

identifies any unacceptable deviation from expected behavior based well-known or well-defined protocols within an environment. Ex: HTTP session Specific protocol analysis modules may have to be added or customized to deal with unique or new protocols or unusual use of standard protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Traffic anomaly-based IDS

A

dentifies any unacceptable deviation from expected behavior based on actual traffic structure. When a session is established between systems, there is typically an expected pattern and behavior to the traffic transmitted in that session. That traffic can be compared to expected traffic conduct based on the understandings of traditional system interaction for that type of connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Land attack

A

It uses a spoofed SYN packet that includes the victim’s IP address as both source and destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Smurf attack

A

which involves ICMP flooding.

The attacker sends ICMP Echo Request messages with spoofed source addresses of the victim to the directed broadcast address of a network known to be a Smurf amplifier.

38
Q

Key points about CHAP

A

not susceptible to replay attacks.

relies on a shared secret: the password

Chap uses Link Control Protocol (LCP) to create an initial connection.

CHAP uses three-way authentication process.

CHAP is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients.

39
Q

A drawback of CHAP

A

the server stores plaintext passwords of each client.

40
Q

What layer does EAP provides?

A

layer 2

41
Q

802.1X

A

802.1X is Port-Based Network Access Control (PBNAC) and includes the Extensible Authentication Protocol (EAP).

42
Q

Serial Line Internet Protocol (SLIP)

A

is a Layer 2 protocol and older dial-up connection protocol, which requires IP assigned to both ends and it uses asynchronous connections such as serial lines and modems. No built-in confidentiality, integrity, or authentication. SLIP replaced with PPP.

43
Q

PPP (Point-to-Point Protocol)

A

a Layer 2 protocol adds confidentiality, integrity, and authentication via point-to-point links. Replace SLIP supports authentication: PAP, CHAP and EAP.

44
Q

PPTP

A

tunnels PPP via IP uses Generic Routing Encapsulation (GRE) to pass PPP via IP. Uses TCP for a control channel (using TCP port 1723). A key weakness of PPTP is: it derives its encryption key from the user’s password. This violates the cryptographic principle of randomness.

45
Q

Layer 2 Tunneling Protocol (L2TP) combines

A

PPTP and Layer 2 Forwarding (L2F), designed to tunnel PPP.

It focuses on authentication and does not provide confidentiality

Unlike PPTP, L2TP can also be used on non-IP networks, such as ATM.

46
Q

Internet Key Exchange (IKE) protocol

A

a key management protocol standard negotiates the algorithm selection process.

Two sides of an IPsec tunnel will typically use IKE to negotiate to the highest and fastest level of security.

IPSec can however, be configured without IKE by manually.

47
Q

IPsec security association (SA)

A

is a simplex (one-way) connection that may be used to negotiate ESP or AH parameters.

 In phase 1, IKE creates an authenticated, secure channel between the two IKE peers, called the IKE security association. The Diffie-Hellman key agreement is always performed in this phase.
 In phase 2 IKE negotiates the IPSec security associations and generates the required key material for IPSec.

48
Q

Security Parameter Index (SPI)

A

a unique 32-bit number, which identifies each simplex SA connection.

ISAKMP manages the SA creation process.

49
Q

Which attack is effective against IPsec?

A

man-in-the-middle

50
Q

What is the default encryption potocol for IPsec?

A

Cipher Block Chaining (CBC) mode

51
Q

SRTP uses for security

A

AES for confidentiality and SHA-1 for integrity.

52
Q

What are the methods for sending traffic via a radio band?

A

Frequency Hopping Spread Spectrum (FHSS) Direct Sequence Spread Spectrum (DSSS) Both DSSS and FHSS are designed to maximize throughput while minimizing the effects of interference

53
Q

Direct Sequence Spread Spectrum (DSSS)

A

uses the entire band at once, “spreading” the signal throughout the band. By spreading the signal over a wider band, the signal is less susceptible to interference.

54
Q

Frequency-Hopping Spread Spectrum (FHSS)

A

uses a number of small-frequency channels throughout the band and “hops” through them in pseudorandom order.

55
Q

Orthogonal Frequency-Division Multiplexing (OFDM)

A

is a newer multiplexing method, allowing simultaneous transmission using multiple independent wireless frequencies that do not interfere with each other.

56
Q

Frequency Division Multiple Access (FDMA)

A

used in analog cellular only. It subdivides a frequency band into sub-bands and assigns an analog conversation to each sub-band.

57
Q

WPA2 uses

A

uses AES encryption to provide confidentiality CCMP (Counter Mode CBC MAC Protocol) to create a Message Integrity Check (MIC), which provides integrity.

58
Q

What is Bluetooth cipher type and what frequency?

A

uses the 128-bit E0 symmetric stream cipher.

802.15, PAN and 2.4GHZ.

59
Q

WPA uses

A

RC4 for confidentiality and TKIP for integrity

60
Q

ISDN

A

D channel for control signals - 16K B channel for sending voice/data - 64K

61
Q

NIS weakness

A

It does not authenticate individual RPC requests can be used to spoof responses to NIS requests from a client.

62
Q

What is the maximum upstream and downstream rate of HDSL transmitted over two copper twisted pairs?

A

1.544 megabits per second (Mbps)

63
Q

What are the transmission rates of Very high bit-rate Digital Subscriber Line (VDSL)?

A

52 Mbps downstream and 12 Mbps upstream

64
Q

Which type of frame includes a two-byte Type field?

A

an Ethernet II frame

65
Q

Which layer is OSPF located?

A

Layer 3 of the OSI model

66
Q

Which wireless mode allows wireless computers to connect to a LAN, a WAN, or the Internet?

A

Infrastructure mode

67
Q

What are the three physical elements of fiber-optic cable?

A

the core, the cladding, and the jacket

68
Q

What is the purpose of an inverse multiplexer?

A

to group several leased lines together for fault tolerance purposes

69
Q

Which type of cable uses LC, SC, and ST connectors?

A

fiber-optic cable

70
Q

Which protocol is a combination of PPTP and L2F?

A

Layer 2 Tunneling Protocol (L2TP)

71
Q

Which switching method copies an entire frame to its buffer, computes the cyclic redundancy check (CRC), and discards frames containing errors?

A

store-and-forward switching

72
Q

Which layer PPTP is located?

A

Layer 5 of OSI

73
Q

What is Global Information Grid ?

A

DoD global network, one of the largest private networks.

74
Q

What bootstrap ports use?

A

UDP port 67 for servers and UDP port 68 for clients.

75
Q

Fraggle attack -

A

a variation of the Smurf attack. While Smurf uses ICMP, Fraggle uses UDP port 7 and often stimulates an ICMP Port Unreachable message.

76
Q

Session hijacking

A

involves a combination of sniffing and spoofing in order for the attacker to masquerade as one or both ends of an established connection.

77
Q

What post used by VNC?

A

TCP 5900

78
Q

HDSL (High-data-rate DSL)

A

matches SDSL speeds using two pairs of copper; HDSL is used to provide inexpensive T1 service.

79
Q

Network File System (NFS), Common Internet File System (CIFS), and Server Message Block (SMB) are all protocols used by

A

network-attached storage (NAS)

80
Q

What is rthe pirpose of Network File System (NFS)?

A

used to enable two different types of file systems to interoperate. NFS attacks: drawbacks are due to their rather basic authentication mechanisms.

81
Q

Modbus and Fieldbus are standard

A

standard industrial communication protocols designed by separate groups - SCADA.

The focus of the design is not security; rather it is uptime and control of devices.

Many of these protocols send information in clear text across transmission media, and the devices they support require little or no authentication to execute commands on a device

82
Q

What is the name of the standrd that uses 802.5

A

Toket Ring

83
Q

What si the name of the data in data-link layer?

A

Frame

84
Q

What is the name of the data in network layer?

A

packet or datagram

85
Q

What si the name of the data in transport layer?

A

segment

86
Q

What is the size of UPD header?

What is the size of TCP header?

A

8

20

87
Q

What is challeneging fotr active FTP through fiorewall?

A

A challenging protocol because the server initiates the data channel connection to client.

88
Q

What is SSL protocol primary use?

A

is to authenticate the client to the server using public key cryptography and digital certificates.

he authentication of the client side only comes with version 3.0.

89
Q

Application whitelisting

A

determines in advance which binaries are considered safe to execute. A weakness is when a “known good” binary is exploited by an attacker and used maliciously. Application whitelisting is superior to application blacklisting. This technique can prevent a previously unknown attack from being successful.

90
Q

What is the purpose of TCP Sequence number?

A

Guarantee message delivery.
 TCP uses a sequence number to identify each byte of data.