Telecommunications and Network Security Flashcards
What does the NOS (Network Operating System) provide?
powerful directory services internetworking routing WAN support support for remote users clustering functionality strong authentication and auditing functionality file and printing services backup/replication mgt. tools for remote clients software and hardware tools inventory functionality fault tolerance capabilities
NOS software works in the _____ model. All resources, files, and applications are ______ which users access from a ______ server rather tahn from individual workstations
client/server
centralized
central
DNS (Domain Name System) does what?
Resolves user-friendly hostnames to IP addresses/vice versa.
On DNS servers, networks are split into:
zones
A zone may contain one or many _____, with each ______ specific to a particular ________.
domains
domain
department
When a user’s computer needs to resolve a hostname, it uses ______ settings to locate its ______, which refers to the resource records for retrieving the corresponding ____ _____.
TCP/IP
DNS Server
IP Address
What do the primary DNS and secondary DNS contain? How is it synchronized? The DNS server should be properly configured to avoid unauthorized_____.
Primary: actual resource records
Secondary: copy of resource records.
Synchronized through a zone transfer.
Zone transfers.
To communicate with eachtoher, computers need to sue the same type of addressing scheme. The internet uses _____.
public IP address scheme
NAT =
Network Address Translation
What does NAT do?
enables a network taht isn’t using the public IP address scheme to communicate with different networks over the Internet. An organziation can purchase a small number of public IP addresses for use by employees. When an employee wants to access resources on the Internet the employees private address is translated to a public IP address for the duration of the session. When it ends the public address ius released back into the public pool for reuse.
How does NAT improve security? (2)
1 - private IP addresses within the org aren’t routable on the internet; aren’t available to attackers
2 - public IP addresses change constantly because a NAT device assigns an IP address to different clients over different sessions
PAT =
Port Address Translation
What’s the difference b/w PAT and NAT?
NAT uses a pool of IP addresses. PAT uses a single IP address.
With PAT, all employees use the ______ ____ _______ to access the Internet. However, the session of each employee is ______. PAT assigns a different _____ ____ to each user. A ____ ___ combined with the IP address forms a _____, which is unique for each session.
same IP address unique source port source port socket
Why can PAT conflict with multimedia applications?
they dynamically assign ports when connections are created; they may collide with the ports assigned by PAT for a session
Define Router
A device that uses network protocols to forward or route data from one network to another.
A router consists of ____ ____ that provide network connectivity, for example:
multiple interfaces
serial Ethernet
FDDI interfaces
What layer of the OSI model do routers operate?
network layer
The NOS forms an important part of a router that helps ___ ___ __ _ _.
route packets to their destinations
A router filters network traffic using _ _ _.
Access control lists (ACLs).
What are the 5 steps that occur when a packet arrives at a router.
1 - views routing data and retrieves the destinition IP network address
2 - views routing table to check which port matches the destintion iP address
3 - sends an error message to sender if no info about the destination address is found.
4 - changes header info of the packet so that it can reach the correct destination
5 - sends packet to the output queue for necessary interface
Routers connect the _ _ _, aka _, of different organziations, enabling access to the Internet
local area network
LAN
A router can also be a ____, which is like a system or device that connects _ _ _ _ _. A gateway is usually required to _ between different types of _ or _.
gateway
two unlike environments or systems
translate
applications or protocols
What do boundary router do? Why are they important part of organizations’ security perimeter?
Advertise externally learned routes which are then used by internal hosts. They filter out traffic which has no place on the internal network.