Telecommunications & Network Security Flashcards

1
Q

What is a LAN ?

A

Local Area Network, small in scope (building, floor), connects servers, workstations, printers.

Typically High Speed and cheap (compared to a WAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a WAN ?

A

Wide Area Network - connects multiple LANs and other WANs by using telecommunications devices and facilities to form an internetwork. typically consists of Routers, CSU/DSU, FireWalls. VPN concentrators.

Typically Low Speed (compared to the LAN), Expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the OSI Model ?

A

The OSI model defines standard protocols for communication and interoperability by using a layered approach. This approach divides complex networking issues into simpler functional components that help the understanding, design, and development of networking solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many Layers does the OSI Model have ?

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 7 Layers ?

A

Application, Presentation, Session, Transport, Network, Data link, Physical.

Adult People Should Try New Dairy Products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Data Encapsulation ?

A

encapsulation. Data encapsulation wraps protocol information from the layer immediately above in the data section of the layer immediately below.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a PAN ?

A

Personal Area Network - Laptop, phone, PDA, (personal devices) that can be connected together via cables, bluetooth and wireless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a SAN ?

A

Storage Area Network - A Huge array of hard drives that appear as a logical entity to servers and the like. They uses technologies such as iSCSI, SCSI, Fibre Channel. They have redundency built into them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a VLAN ?

A

Virtual Local Area Network - it exists with a single or multiple switches and logically groups devices, users or groups together. Provide security and easy of management as well as layer 2 security. `

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a CAN ?

A

Campus Area Network - exists within a small area and connects buildings together with a ‘campus’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a MAN ?

A

Metropolitan Area Network - A network that spans over a City.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a VAN ?

A

A type of extranet that allows businesses within an industry to share information or integrate shared processes. For example, Electronic Data Interchange (EDI) allows organizations to exchange structured documents — such as order forms, purchase orders, bills of lading, and invoices — over a secure network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OSI Layer 1 ?

A

Physical Layer:
Sends and receives bits across the network. It specifies the electrical, mechanical, and functional requirements of the network, including network topology, cabling and connectors, and interface types, as well as the process for converting bits to electrical (or light) signals that can be transmitted across the physical medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Star Topology ?

A

All data communications must pass through the switch (or hub), which can become a bottleneck or single point of failure. A star topology is ideal for practically any size environment and is the most common basic topology in use today. A star topology is also easy to install and maintain, and network faults are easily isolated without affecting the rest of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Mesh Topology ?

A

In a mesh topology, all systems are interconnected to provide multiple paths to all other resources.In most networks, a partial mesh is implemented for only the most critical network components, such as routers, switches, and servers (by using multiple network interface cards [NICs] or server clustering) to eliminate single points of failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Ring Topology ?

A

A ring topology is a closed loop that connects end devices in a continuous ring, this is achieved by connecting individual devices to a Multistation Access Unit (MSAU or MAU). Physically, this setup gives the ring topology the appearance of a star topology.

Ring topologies are common in token-ring and FDDI networks. In a ring topology, all communication travels in a single direction around the ring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a Bus (Linear) Topology ?

A

In a bus (or linear bus) topology, all devices are connected to a single cable (the backbone) that’s terminated on both ends.

  • Small Networks
  • Backbone is a single point of failure
  • Problems tracing the fault.
  • Originally cheap (this is no longer the case)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is BaseBand signaling ?

A

Baseband signaling uses a single channel for transmission of digital signals and is common in LANs that use twisted-pair cabling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is BroadBand Signaling ?

A

Broadband signaling uses many channels over a range of frequencies for transmission of analog signals, including voice, video, and data. The four basic cable types used in networks are coaxial, twinaxial, twisted-pair, and fiber-optic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Co-Axial Cabling ?

A

Co-Ax, comes in two flavours - thinnet thicknet.

Coax cable consists of a single, solid-copper-wire core, surrounded by a plastic or Teflon insulator, braided-metal shielding, and (sometimes) a metal foil wrap, all covered with a plastic sheath. This construction makes the cable very durable and resistant to Electromagnetic Interference (EMI) and Radio Frequency Interference (RFI) signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ThinNet vs ThickNet:

A

Thick: Also known as RG8 or RG11 or thicknet. Thicknet cable uses a screw-type connector, known as an Attachment Unit Interface (AUI). Thin: Also known as RG58 or thinnet. Thinnet cable is typically connected to network devices by using a bayonet-type connector, known as a BNC (Bayonet Neill-Concelman) connector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is TwinAx Cabling ?

A

Twinaxial (also known as twinax) cable is very similar to coax cable, but it consists of two solid copper-wire cores, rather than a single core.

  • high Speed Data Transfer
  • High Speed, short distance, low cost.

Typical applications for twinax cabling include SANs and top-of-rack network switches that connect critical servers to a high-speed core.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is BER ?

A

Bit error ratio (BER) is the ratio of incorrectly received bits to total received bits over a specified period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Twisted Pair ?

A

Popular, Light Weight, Flexible, Cheap and easy to install.

Twisted-pair cable consists of four copper-wire pairs that are twisted together to improve the transmission quality of the cable by reducing crosstalk and attenuation. The tighter the twisted pairs, the better the transmission speed and quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is CrossTalk ?

A

Crosstalk occurs when a signal transmitted over one channel or circuit negatively affects the signal transmitted over another channel or circuit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is Attenuation ?

A

Attenuation is the gradual loss of intensity of a wave (for example, electrical or light) while it travels over (or through) a medium.

Currently, ten categories of twisted-pair cabling exist, although only four (Cat 3, Cat 5e, Cat 6, and Cat 6a) are currently defined as standards by the TIA/ EIA. Cat 5, Cat 5e, and Cat 6 cable are typically used for networking today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is Tempest ?

A

TEMPEST is a (previously classified) U.S. military term that refers to the study of electromagnetic emissions from computers and related equipment.

Cat 7 and Cat 7a cable is available as STP only. In addition to the entire Cat 7 or Cat 7a cable, the individual wire pairs are also shielded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is Fibre Optic Cable ?

A

Fiber-optic cable, the most expensive type of network cabling — but also the most reliable — is typically used in backbone networks and high-availability networks (such as FDDI). Fiber-optic cable carries data as lightsignals, rather than as electrical signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a Repeater ?

A

A repeater is a non-intelligent device that simply amplifies a signal to compensate for attenuation (signal loss) so that one can extend the length of the cable segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a Hub ?

A

A hub (or concentrator) is used to connect multiple LAN devices together, such as servers and workstations. The two basic types of hubs are:
Passive - All data is sent to all ports.
Active - All data is sent to all ports and is amplified (repeater)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a Switch ?

A

A switch is used to connect multiple LAN devices together. Unlike a hub, a switch doesn’t send outgoing packets to all devices on the network, but instead sends packets only to actual destination devices.

A switch typically operates at the Data Link Layer but the physical interfaces (the RJ-45 input connections) are defined at the Physical Layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the Data Link Layer (Layer 2)

A

The Data Link Layer ensures that messages are delivered to the proper device across a physical network link.

  • This layer also defines the networking protocol (for example, Ethernet and token-ring) used to send and receive data between individual devices.
  • The Data Link Layer formats messages from layers above into frames for transmission, handles point-to-point synchronization and error control, and can perform link encryption.
  • The Data Link Layer consists of two sub-layers: the Logical Link Control (LLC) and Media Access Control (MAC) sub-layers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the Role of the Logical Link Sub Layer

A

The LLC sub-layer operates between the Network Layer above and the MAC sub-layer below.

  • Provides an interface for the MAC sub-layer by using Source Service Access Points (SSAPs) and Destination Service Access Points (DSAPs).
  • Manages the control, sequencing, and acknowledgement of frames being passed up to the Network Layer or down to the Physical Layer.
  • Responsible for timing and flow control.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are the role of the MAC Sub Layer ?

A

The MAC sub-layer operates between the LLC sub-layer above and the Physical Layer below. It’s primarily responsible for framing

  • performs Error Control (CRC Checks)
  • Identifies Hardware / MAC Addresses
  • Controls Media Access Control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a MAC Address ?

A

The MAC address is a 48-bit address that’s encoded on each device by its manufacturer. The first 24 bits identify the manufacturer or vendor. The second 24 bits uniquely identify the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are LAN Controls & Transmission Methods ?

A

These are LAN Access Protocols:

  • ArcNet (Token Passing)
  • Ethernet (CSMA/CD)
  • Token Ring
  • FDDI (redundent Token Ring)
  • ARP
  • RARP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is ARP ?

A
  • ARP (Layer2) maps Network Layer IP addresses to MAC addresses.
  • ARP discovers physical addresses of attached devices by broadcasting ARP query messages on the network segment.
  • IP-address-to-MAC-address translations are then maintained in a dynamic table that’s cached on the system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is RARP ?

A

RARP (layer 2) maps MAC addresses to IP addresses.

This process is necessary when a system, such as a diskless machine, needs to discover its IP address.

The system broadcasts a RARP message that provides the system’s MAC address and requests to be informed of its IP address. A RARP server replies with the requested information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are the three types of LAN Data Transmission ?

A
  • Unicast - Single Source to a Single Destination
  • Multicast - Single Source to Multiple destinations that are masked with a multi-cast IP Address.
  • broadcast - Single Source to Every IP Address.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Wireless LAN Protocols, name them and their specs ?

A
  1. 11a 54 Mbps Operates at 5 GHz (less interference than at 2.4 GHz)
  2. 11b 11 Mbps Operates at 2.4 GHz (first widely used protocol)
  3. 11g 54 Mbps Operates at 2.4 GHz (backward-compatible with 802.11b)
  4. 11n 600 Mbps Operates at 5 GHz or 2.4 GHz
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

WAN Protocol - P to P ?

A

This is a point to point link. These links provide a single, pre-established WAN communications path from the customer’s network, across a carrier network (such as a Public Switched Telephone Network [PSTN]), to a remote network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the Point to Point Protocol ?

A

The successor to SLIP. PPP provides router-to-router and host-to-network connections over synchronous and asynchronous circuits. It’s a more robust protocol than SLIP and provides additional built-in security mechanisms. PPP is far more common than SLIP in modern networking environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What PPTP ?

A

Point-to-Point Tunneling Protocol (PPTP): A tunneling protocol developed by Microsoft and commonly used to implement VPNs, specifically PPP traffic. PPTP doesn’t provide encryption or confidentiality, instead relying on other protocols, such as PAP, CHAP, and EAP, for security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is SLIP ?

A

Serial Line IP (SLIP): The predecessor of Point-to-Point Protocol (PPP), SLIP was originally developed to support TCP/ IP networking over low-speed asynchronous serial lines (such as dial-up modems) for Berkeley UNIX computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is xDSL ?

A

Digital Subscriber Line (xDSL): xDSL uses existing analog phone lines to deliver high-bandwidth connectivity to remote customers. Table 5-4 describes several types of xDSL lines that are currently available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is ISDN ?

A

Integrated Services Digital Network (ISDN): ISDN is a communications protocol that operates over analog phone lines that have been converted to use digital signaling. ISDN lines are capable of transmitting both voice and data traffic. ISDN defines a B-channel for data, voice, and other services, and a D-channel for control and signaling information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What are the two ISDN Service Levels ?

A
  • Basic Rate Interface (BRI) One 16-Kbps D-channel and two 64-Kbps B-channels (maximum data rate of 128 Kbps)
  • Primary Rate Interface (PRI) One 64-Kbps D-channel and either 23 64-Kbps B-channels (U.S.) or 30 64-Kbps B-channels (EU), with a maximum data rate of 1.544 Mbps (U.S.) or 2.048 Mbps (EU)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is Frame Relay ?

A
  • A packet Switched Network.

* High speed, No Error Correction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is MPLS ?

A

Multi-Protocol Label Switching (MPLS): A packet-switched, high-speed, highly scalable and highly versatile technology used to create fully meshed Virtual Private Networks (VPNs). It can carry IP packets, as well as ATM, SONET (Synchronous Optical Networking), or Ethernet frames. MPLS is specified at both Layer 2 and Layer 3.

Disadvantaages: * Loss of visability into the cloud, so does an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is a LER Router ?

A

Lable Edge Router - used in MPLS, they label and remove labels, capsulate and unencapsulate data packets as they leave the clouds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is SONET ?

A

Synchronous Optical Network - used in the USA by telco and energy companies. high speed multiplexed,low latency based on Fibre Optics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is SDH ?

A

Synchronous Digital Hierarichy - Successor to SONET, used throughout the world, save the USA. high speed multiplexed,low latency based on Fibre Optics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is a Datagram ?

A

A Datagram is a self contained unit that is capable of being routed between a source and a destination, commonly used in UDP and AppleTalk. Similar to an IP Packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is X.25 ?

A

X.25 was the first packet switching network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is a Packet Switched Network ?

A

Packet Switched Networks are:

  • ideal for on demand connections that occasionally ‘burst’ due to high traffic volumes.
  • They are connectionless orientated
  • Variable Delays
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Characteristics of Asynchronous Communication

A
  • data is transmitted serially
  • it has start and stop bits
  • communicate at the same speed
  • parity bits reduce error
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is a Bridge ?

A
  • Semi Inteligent Repeater
  • connects two or more network segments
  • maintains an ARP Cache
  • Responsible for broadcast storms - can flood a network with ARP requests.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is a Switch ?

A
  • intelligent Hub that uses MAC addresses to route traffic.
  • Can be used to implement VLANS
  • traditionally layer 2, new switches function at layers 3 and 7.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is DTE ?

A

Data Terminal Equipment, a general term used to classify end devices like workstation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is the DCE ?

A

Data Communications Equipement - It is the physical connection to the network from the DTE devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is Layer 3 ?

A

The Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Network Layer (3) Functions ?

A
  • Routing between systems on the same or interconnected networks.
  • RIP, OSPF, BGP, IP, IPX are all defined at this layer.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What are Static Routing Protocols ?

A

Static manual routes placed on routers to direct traffic from A to B. If the router is down the network is down.

  • If two paths are listed for a route there is no congestion control.
  • only practical in small networks
  • It does have low bandwidth requirements and built in security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What are Dynamic Routing Protocols ?

A

Dynamic Routing Protocols discover routes to get to another location.

  • Congestion Aware.
  • link state aware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is a distance-vector protocol ?

A

It makes routing decisions based on 2 factors distance (hops) and vector (egress router interface).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is Convergence ?

A

The time it takes for all routers in a network to update their routing tables.
* During Convergence routing information is exchanged and networks slow down considerably.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What is RIP ?

A
  • Routing Information Protocol.

* It uses Distance - Vector routing protocol that uses hop counting as a routing metric with a hop limit of 15.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What is a Link State Protocol ?

A
  • Demands that all routers maintain a complete map / routing table of the entire network.
  • processor intensive to produce.
  • calculates the most efficient way to data across a networkm calculating factors like: Speed, Delay, Load, relability and cost.
    Convergence with link state protocols occurs much more quickly than with vector - distance Protocols.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is a Path Vector Protocol ?

A

Is similar in concept to a distance vector protocol but without the scalability issues associated with limited hop counts. BGP is an example of this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

RIP Routing Loops

A

Routing loops are when packets get stuck bouncing between various hops. to prevent this RIP implements the following:

  • Hop limit of 15.
  • Split Horizon - prevents a router from advertising a route back out through the same interface.
  • Route Poisoning - Sets the hop count on a bad route to 16.
  • Holddown Timers - starts a timer when a router receives a router to a destination that is unreachable, untill the timer ends any router updates to that destination are dropped. this prevents flapping.
  • RIP uses UDP port 520
  • Slow Convergance
  • Poor Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is OSPF ?

A

Open Shortest Path First:

  • A link state routing protocol
  • It is considered an Interior Gateway Protocol (IGP)
  • Encapsulated as IP Datagrams, as oppose to TCP,UDP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What is an Autonomous System (AS) ?

A

A group of contiguous IP address ranges under the control of a single internet entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What is an ASN ?

A

Autonomous System Number - individual autonomous systems are assigned a 16 ro 32 AS Number that uniquely identifies them on the Internet, these are assigned by IANA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What is IANA ?

A

Internet Assigned Numbers Authourity.

* Assigns 16 or 32 bit unique numbers to autonomous systems on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What is IS-IS ?

A

Intermediate Systems to Intermediate Systems - A link state routing protocol used to route datagrams through a packet switched network.

  • It is an Interior Gateway Protocol (IGP)
  • used in large service provider backbone networks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is BGP ?

A

Border Gateway Protocol - a Path vector routing protocol used between seperate authonomous systems (AS).

  • Exterior Gateway Protocol (EGP).
  • Core Protocol used by ISPs and on large enterprise networks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

eBGP ?

A

External Border Gateway Protocol - when BGP is used between autonomous systems (AS).

78
Q

iBGP ?

A

Internal Border Gateway Protocol - When BGP runs within an Autonomous System (AS).

79
Q

What are Routed Protocols ?

A

Network Layer Protocols that address packets with routing information.
* IP, IPX.

80
Q

Internet Protocol (IP) ?

A
  • Contains Addressing information that enables it to be routed.
  • Connectionless, best effort, delivery of datagrams.
  • Fragmentation and reassembly of datagrams.
  • IPv4 used 32bit logical IP addresses divided into 4 x 8 bit octets.
81
Q

The 5 IP Classes:

A
A - 1 top 126 (large, 16,777,214)
B - 128 to 191 (medium, 65,534)
C - 192 to 223 (small, 254)
MultiCast - 224 to 239
Experimental - 240 - 254
82
Q

IP LoopBack

A

127.0.0.1 - 127.255.255.255 - loopback network used for testing and troubleshooting.

83
Q

Class ‘A’ Private IP Range ?

A

10.0.0.0 - 10.255.255.255

84
Q

Class ‘B’ Private IP Range ?

A

172.16.0.0 - 172.31.0.0

85
Q

Class ‘C’ Private IP Range ?

A

192.168.0.0 - 192.168.255.255

86
Q

IPv6

A
  • 128bit logical IP Address Scheme

* backward compatable with IPv4

87
Q

What is IPX ?

A

Internetwork Packet Exchange.

  • COnnectionless Protocol associated with Netware
  • part of the IPX / SPX package Suite.
88
Q

What is ICMP ?

A

Internet Control Message Protocol. Layer 3.

  • reports errors and other information back to the source.
  • Common Terms: Destination Unreachable, Echo Request, Echo Reply, Redirect, Time Exceeded. PING
89
Q

What is SKIP ?

A

Simple Key Management for Internet Protocols - A Network layer key management protocol used to share encryption keys.

  • Bandwidth intensive (size of packet header information due to encrypted packets).
  • No pre-required session is required.
90
Q

Layer 3 Network Equipement ?

A

Router - hardware and software equipment (BGP,OSPF,RIP)

Gateway - Hardware and software appliance that links disparate networks, this can include protocols (IPX <> IP)

91
Q

What is Layer 4 ?

A

The Transport Layer - It provides end to end reliable data transport and and transmission control.

92
Q

What is Flow Control ?

A

A transport layer function that manages data transmission between devices. Makes sure 1 device does not overload another.

93
Q

What is Multiplexing ?

A

A transport layer function that enables data from multiple applications to be transmitted over a single physical link.

94
Q

What is Virtual Circuit Management ?

A

A transport layer function that establishes, maintains and terminates virtual circuits.

95
Q

What is Error Checking & Recovery ?

A

A transport layer function that detects for transmission eorrs and takes actions to resolve the errors.

96
Q

What is TCP ?

A

Transmission Control Protocol (Layer 4):

  • A full duplex connection orientated protcol.
  • Connection established through a 3-way handshake
  • Reliable - guarantees delivery by acknowledging packets and re-transmitting / requesting if there is an error.
  • Slow - due to the overhead (3-way,error checking)
97
Q

What is TCP-SYN

A

A PC attempting to communicate with another initiates the communication with a SYN (syncronise) Packet. Part 1 of the 3 way TCP Hand Shake.

98
Q

What is TCP-SYN-ACK

A

The PC that has received a SYN packet responds to the original Request with a SYN-ACK (syncronise - acknowledgement) Part 2 of the 3 Way TCP HandShake.

99
Q

What is TCP SYN-ACK-ACK

A

A response to a SYN-ACK packet, this is third part of the TCP 3 Way Hand shake.

100
Q

What is UDP ?

A

User Datagram Protocol:

  • Connectionless protocol, uses Best effort for delivery.
  • no delivery guarantee
  • no packet re-sequencing or error checking.
101
Q

UDP Uses Cases

A
  • suited for data that requires fast delivery that is not sensitive to packet loss or fragmentation.
  • DNS
  • SNMP
  • video and audio streaming.
102
Q

What is SPX ?

A

Sequenced Packet Exchange.

  • Used to guarantee data delivery on Netware Networks.
  • Similar to TCP
  • reliable.
  • provides for packet re-assembly.
103
Q

What is SSL / TLS

A

Secure Socket Layer / Transport Layer Security.

* provides session based encryption & authentication.

104
Q

What is the Layer 5 ?

A

The Session Layer . This establishes co-ordinates and terminates communication sessions between networked systems.

105
Q

Layer 5 Communication Sessions are divided into 3 phases:

A

1) Connection Establishment: Initial Contact between communicating systems is made and the end devices agree on communication parameters.
2) Data Transfer - data is exchanged between end devices.
3) Connection Release - After the data has been communicated end devices end the session.

106
Q

What are the three operation modes of the communication session (OSI, Layer 5)?

A
  • Simplex Mode - 1 way communication path, 1 transmits the other receives. Like a Radio.
  • Half Duplex Mode - Both devices can transmit and receive but not at the same time. Like a 2 way radio.
  • Full Duplex - Both devices can communicate at the same time (transmit and receive) simultaneously. Life a telephone.
107
Q

What is NetBios ?

A

Network Basic Input / Output System.

  • Layer 5
  • microsoft protocol, designed for communication across a LAN.
  • None routable.
108
Q

What is a NFS ?

A

Network File System.

  • Layer 5.
  • designed to faciliate remote access to resources for users on a UNIX based system.
109
Q

What is a RPC ?

A

Remote Procedure Call

  • Layer 5 protocol
  • This is a client | Server network redirection tool.
110
Q

What is SSH ?

A

SecureShell. - An alternative to tellnet.

  • Layer 5 Protocol.
  • provides remote access on unix systems.
111
Q

What is SIP ?

A

Session Initiation Protocol:

  • Layer 5 Protocol
  • used for managing and terminative real time communications (Video, Audio and Text)
112
Q

What is Layer 6 ?

A

Presentation Layer: Provides coding and conversion functions for data being presented the Application Layer.

113
Q

Common Layer 6 (Presentation) Tasks ?

A
  • Data Representation
  • Character Conversion
  • Data Compression
  • Data Encryption
114
Q

What is ASCII ?

A

American Standard Code for Information Interchange.

  • Layer 6
  • Character encoding system
115
Q

What is Layer 7 ?

A

Application Layer - responsible for identifying and establishing availability of communication partners, determining resource availability and syncronising communications.

116
Q

What is FTP ?

A

File Transfer Protocol.

  • Layer 7
  • copy files from A to B
117
Q

What is HTTP ?

A

HyperText Transfer Protocol.

  • Language of the WWW
  • Layer 7
118
Q

What is HTTPs ?

A

HyperText Transfer Protocol Secure.

  • Language of commerical applications on the WWW
  • Layer 7
  • HTTP + SSL / TLS
119
Q

What is IMAP ?

A

Internet Message Access Protocol - Stores and forwards electronic emails.

  • Layer 7
  • User port 143
120
Q

What is POP ?

A

Post Office Protocol version 3 (POP3)

  • Layer 7
  • An Email retrieval protocol
  • uses port 110
  • Insecure auth over plain text.
121
Q

What is S/MIME ?

A

Secure Multi Purpose Internet Mail Extension

  • layer 7
  • allowed users to send email with a web browser.
122
Q

What is SMTP ?

A

Simple Mail Transfer Protocol

  • Layer 7
  • used to send and receive email across the internet.
  • Runs on Port 25.
123
Q

What is the TCP / IP Model ?

A

A communication model based on TCP/IP that predates the OSI Model. 4 layers:
Application (App, Presentation,Session: OSI)
Transport (Transport : OSI)
Internet (Network: OSI)
Network (Link) Layer: (Data Link, Physical: OSI)

124
Q

What is a FireWall ?

A

A hardware and Software appliance that controls traffic flow.

125
Q

What is a Packet Filtering FireWall ?

A
  • denies / permits traffic based on TCP, UDP, ICMP and IP headers of individual packets.
  • Cheap
  • Uses pre-defined access rules (ACLs)
  • Fast, Efficient.
  • Transparent.
  • No protection from IP or DNS spoofing
  • Doesn’t strong user encryption
  • limited logging
126
Q

What is a Circuit Level Gateway ?

A

A FireWall that controls access by maintaining state information about established connections. When the session is created (layer 5) between 2 hosts packets flow freely between them.

  • Speed (after a connection is made individual packets aren’t analysed)
  • support for many protocols
  • easy maintenance
  • dependence on trustworthy connections
  • limited logging.
127
Q

What is a Stateful inspection FireWall ?

A
  • A circuit level gateway that captures network layer packets and then queues and analyses them.
128
Q

What is an Application level Gateway ?

A
  • operates at the Application (Layer 7) of the OSI model.
  • Proxy Server
  • Processes and inspects data packets for specific IP Applications.
  • No data is directly sent between the two hosts, the proxy server accepts the packets, inspects the packets and sends on a copy.
  • masks network internals and designs
  • Can implement strong user authentication
  • reduced network performance
  • Must be tailored to specific applications.
129
Q

What is a screening Router ?

A
  • A Basic type of firewall architecture
  • A router that is placed between a trusted and untrusted network that uses an ACL secruity policy.
  • Device is transparent
  • Simple and inexpensive
  • has issues with certain types of traffic
  • limited / no logging
  • no user authentication
  • Single point of failure
  • Is not really a firewall (no choke point strategy)
130
Q

What is a Dual homed Gateway ?

A
  • A common FireWall Architecture
  • Called a Bastion Host. (sacrifical lamb)
  • Systems with 2x NICS that sits between 2 networks
  • A hardened system that employs robust security mechanisms.
  • Proxys connections between NICS
  • Can have a fail safe option.
  • internal network structure is masked.
  • Inconvenient to Users
  • can cause slower network performance (bottleneck)
131
Q

What is a Screened-host Gateway ?

A
  • A type of firewall architecture that employs both a bastion host as well as a screening router.
  • The screening router makes the bastion the single point of ingress / egress between the two networks.
  • provides distributed secruity between 2 devices
  • transparent outbound
  • restricted inbound
  • bastion host could be bypassed by the screened router
    Masking the internal network structure is difficult
  • multiple single points of failure.
132
Q

What is a Screened-Subnet ?

A
  • A secure Firewall Architecture
  • uses an exterrnal screening router
  • dual homed host with a second screening router (DMZ)
  • Transparent to end users
  • Flexible
  • provides defense in depth
  • internal network structure can be masked.
  • expensive, difficult to maintain and configure
  • tough to troubleshoot.
133
Q

IDS / IPS

A

Provides realtime monitoring and analysis of network traffic.

134
Q

Active IDS

A
  • This is an IPS, it can block suspected attacks.
  • Must be placed inline
  • single point of failure
  • could be used to DoS a company
135
Q

Passive IDS

A
  • Or just a plain old IDS
  • monitors and alerts.
  • Not neccesarily inline.
136
Q

Network IDS

A

Is an a network device / appliance with an NIC card configured in promiscious mode, can sniff all traffic.

137
Q

Host IDS

A

Is a system with host applications or agents that are installed on hosts and alert the IDS when triggers occur.

138
Q

Knowledge / Signature Based IDS

A

This type of IDS references a database of previous attack profiles.

  • Low false positive rate
  • alerts are more standardised.
  • signature based must be continually maintained
  • new attacks may have not been classified and thus not be detected.
139
Q

Behaviour / anomaly / Based IDS

A
  • this references a baseline or learned pattern
  • deviations from the baseline or pattern trigger an alarm.
  • less dependent on identifying specific OS vulns.
  • dynamically adapt to new, unique, original attacks.
  • High false positive rate
  • cannot adapt to legitimate usage patterns.
140
Q

Remote Access Sec. Method - Restricted Address

A

Access is granted or restricted based on the user’s IP Address.

141
Q

Remote Access Sec. Method - Caller ID

A

Access is granted or restricted based on the user’s phone number.

142
Q

Remote Access Sec. Method - CallBack

A

This requires a remote access user to authenticate to a RAS Server, the RAS then disconnects and calls the user back at a preconfigured phone number.
* Easily defeated with call forwarding.

143
Q

What is RAS ?

A

Remote Access Service - they utilise PPP to encapsulate IP packets and establish a dial-in connection.

144
Q

What is a VPN ?

A

VIrtual Private Network. - A secure tunnel over a public network such as the Internet.

145
Q

VPN Connection Methods

A

Client to VPN Concentrator
Client to Client
Firewall to firewall
router to router

146
Q

VPN PPTP Protocol ?

A

Point-to-Point Tunneling Protocol:

  • Developed by Microsoft.
  • tunnels the Point to Point Protocol through a public network.
  • uses native PPP authentication & encryption services.
147
Q

What is L2F ?

A
Layer 2 forwarding protocol:
* designed by Cisco 
* similar to PPTP 
* Data link layer (Layer 2)
permits tunneling of WAN Protcols (HDLC,SLIP)
148
Q

What is L2TP ?

A

Layer 2 Tunneling Protocol

  • combination of L2F and PPTP
  • Transparent (requires no additional software)
  • Robust Authentication (PPP,RADIUS,TACACS)
  • Local addressing (assigned by VPN not ISP)
  • Authorisation - managed server side
  • Accounting - Both the ISP and USER perform AAA accounting
149
Q

What is IPSEC ?

A

Internet Protocol Security.

  • Layer 3 IETF open standard.
  • Ensures confidentiality, integrity and authenticity
150
Q

What is IPS SEC Transport Mode ?

A

Only data is encrypted.

151
Q

What is IP SEC Tunnel Mode ?

A

The entire packet is encrypted.

152
Q

What is AH ?

A

IP-SEC protocol - Authentication Header, provides integrity, authentication, and non-repudiation.

153
Q

What is ESP ?

A
IP-SEC Protocol - Encapsulated Security Payload. 
Provides confidentiality (encryption) and limited authentication.
154
Q

What is a Security Association (SA) ?

A

A component of IPSEC.

  • A 1 way connection between 2 communicating parties.
  • Thus you need two SAs between 2 parties
  • Each SA only supports ESP or AH.
155
Q

What are the 3 (SA) parameters that identify them as IPSec sessions ?

A
  • Security Parameter Index (SPI) - 32bit string used by receiving stations to differentiate between SAs.
  • Destination IP Address - (Unicast address)
  • Security Protocol ID - The Security Protocol ID must be either an AH or ESP association.
156
Q

What is IKE ?

A

Internet key Exchange .

  • Key Management in IP Sec.
  • a combination of 3 other protocols: ISAKMP, SKEME and OKE protocol.
157
Q

What is SSL ?

A

Secure Socket Layer - Layer 4 Transport Protocol.

  • Low Cost , Easy to use.
  • Transparent - no special software is required to use it.
  • Provides granular access control.
  • Not all applications are SSL aware.
158
Q

4 types of wireless antenna:

A
  • Omni-Directional: send and receive signals equally in all directions.
  • Parabolic: Also known as dish antenna, extend wireless ranges.
  • Sectorized: direct signals in a 60 to 120 degree pattern provides additional range and decreases interference.
  • Yagi: Used for long distances in P2P or P2MP wireless apps.
159
Q

What is Root Mode (AP, WLAN) ?

A
  • default access point setup.

* The AP is directly connected to the wired Network and bridges the two networks.

160
Q

What is Repeater Mode (AP,WLAN) ?

A
  • The access point provides an upstream link to another AP effectively extending the range.
161
Q

What is Bridge Mode (AP,WLAN)?

A
  • The Wireless Access Point functions as a bridge between two seperate wireless networks.
162
Q

What is ad-hoc (WLAN) ?

A

A WLAN architecture that has no Access Points. Device communicate directly with each other in a peer to peer network.

163
Q

What is an SSID ?

A

32 Character name that identifies a wireless network.

164
Q

What is WEP ?

A

Wired Equivalent Privacy (WEP). Gen 1 wireless security protocol.

  • RC4 stream cipher
  • CRC-32 checksum for integrity
  • uses a 40 or 104 bit key with a 24-bit initialisation vector (IV) to form a 64 or 128 bit key.
165
Q

WEP Authentication Methods ?

A

Open System Authentication - no wireless client required.

Shared Key Authentication - uses a 4 way handshake to auth and associate the wireless client with the access point.

166
Q

Increasing WEP Security

A

You can tunnel IPSec and SSH over WEP to increase Security.

167
Q

WPA

A

WiFi Protected Access (WPA/WPA2)

  • WPA uses the Temporal Key Integrity Protocol (TKIP) to address some encryption issues. TKEP = secret root key + initialisation vector.
  • Support for EAP Extensions (EAP-TLS, EAP-TTLS, Protected EAP).
168
Q

WPA 2

A

Wifi Protected |Access (WPA2)
WPA 1 + security enhancements
* WPA2 uses AES-based algorithm counter mode /w Cipher block chaining message authenitication Code.

169
Q

Email Security - SMTP

A
  • Open Relay be default (bad)
170
Q

Email Security - RBL

A
  • A realtime blackhole list

* A frequently updated list of IP addresses with open relay.

171
Q

Email Security -Phishing

A

Victims are lured to an online site and asked to validate personal data. (Mostly banking type sites)

172
Q

What is SPIM ?

A

Spam Over Instant Messaging

173
Q

What is SPIT ?

A

Spam Over Internet Telephony

174
Q

Web Security - 2 Primary Protocols

A
  • HTTP - Hypertext Transport Protocol

* HTML - Hypertext Markup Language

175
Q

Web Security - Script Injection

A

An attempt to inject scripting language commands into a web form.
* This is an attempt to fool the web server into sending the contents of the back-end databases to the hacker.

176
Q

Web Security -Buffer Overflow

A
  • An attempt to send machine language instructions as part of a query to a web server in an attempt to get the server to run the commands.
177
Q

Web Security -Denial of Service (DoS)

A

Sending huge numbers of queries to a web server in an attempt to clog inputs and make it unavailable.

178
Q

Facsimile Security

A
  • Use Cover pages
  • Place fax machines in secure areas.
  • Using secure phone lines.
  • Encrypting fax data.
179
Q

PBX, POTS VoIP abuse

A
  • Audit call logs

* publish and enforce corporate telephone use policies.

180
Q

Caller ID Fraud

A
  • Use a calling card
  • Use a caller id service
  • blocking caller id
  • reconfigure your telephoen switch
  • VoIP
181
Q

What is Blue Jacking ?

A

sending anonymous unsolicted messages to bluetooth enabled devices.

182
Q

What is Blue Snarfing?

A

stealing personal data from a bluetooth enabled device.

183
Q

What is a Fraggle Attack ?

A

a UDP echo (port 7) flood attack

184
Q

What is an ICMP Flood ?

A

A large number of ICMP (echo requests) are sent to the target network in an attempt to consume resources (bandwidth)

185
Q

What is Session Hijacking / Spoofing ?

A

IP Spoofing involves altering a TCP packet so that it appears to be coming from a known good / trusted source.

186
Q

What is a smurf Attack ?

A

A large number of ICMP (echo requests) are sent to the target network in an attempt to consume resources (bandwidth).
However in this attack the packets are sent to the broadcast address of the target network from a spoofed ip address on the target network.
* To counter you could drop ICMP at the router.

187
Q

What is a syn flood ?

A
  • TCP packets with a spoofed source address request a connection (syn bit set) to the target network.
  • target network responds with a syn-ack packet, but the spoofed source never responds.
  • broken three way packets over whealm the system and it crashes.
188
Q

CounterMeasures for a Syn Flood ?

A
  • Enable tcp intercept on the router
  • Enable committed access rate (CAR) which would rate limit the bandwidth.
  • Checkpoint has a syn defender function
  • reduce the time out period on networked systems
  • change the default max. number of half open TCP connections.
189
Q

What is a TearDrop Attack ?

A

A tear drop attack occurs when a change has been made to the length and fragmentation offset fields of sequential IP packets, which causes the target system to to become confused and crashed.

190
Q

What is a UDP Flood ?

A
  • In a UDP Flood large numbers of UDP packets are sent to the target network to consume available bandwdith and shut the network down due to congestion.
  • A counter for this would be to drop unneccessary UDP packets at the router.