Telecommunications & Network Security Flashcards

1
Q

What are the layers in the OSI Model?

A
(A)ll (P)eople (S)eem (T)o (N)eed (D)ata (P)rocessing
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical Link
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the OSI Layers Protocol Data Units

A
(D)on't forget your (S)(P)(F) at the (B)each
Data = Layers 7 - 5
Segments = Layer 4
Packets = Layer 3
Frame = Layer 2
Bits = Layer 1
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the components of Layer 1

A
Wiring,
Wireless
Modem
Hubs
Repeaters
Access Points
etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the wire types of layer 1

A

Twisted Pair
Coaxial Cable
Fiber Optics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the Attack vectors of Layer 1 (Using CIA as categories)

A

Integrity
- Injection/modification (noise)

Confidentiality

  • Tapping (Grabbing hold of wire)
  • Splicing (Breaking wire and pulling off a piece)
  • Emanations ( Picking up info on the outside of wire)

Availability
- Cutting wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the Controls to protect Layer 1?

A

Physical control of perimeter

  • Security Domains
  • DMZ
  • Dual-homed host

Conduit
- Pressurized

Radio Frequency Management
- Directional antenna

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the Topologies of Layer 1 (Physical Layout)

A
  • Bus
  • Tree
  • Ring
  • Mesh
  • Star
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the components of Layer 2

A

Switches

Bridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Switches

A
  • Separates collision domains based on physical wire
  • Hardware
  • Learns MAC addresses on segments and makes connections quickly and efficiently with no collisions
  • Has more than 2 points (multi port bridge)
  • full duplex
  • Can filter on MAC addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Bridges

A
  • Separates collision domains based on physical wire
  • Software
  • 2 Points
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does Layer 2 Provide?

A

1) Only Layer with 2 sub layers
- LLC (Logical Link Control - error detection)
- MAC (Media Access Control - Physical)
2) Responsible for error free, reliable transmission of data
3) Frames sized for compatibility with the MAC Protocol
4) Flow control, error detection and correction, retransmission
5) Uses MAC Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What Does MAC Provide in Layer 2

A

1) MAC is the real address of a computer

2) NIC Card is identified by MAC address (NIC is unique for every hardware card) by

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is Addressing/Resolution and Media access determined in Layer 2?

A

1) ARP (Address Resolution Protocol)
- Takes IP and maps to MAC
- Stores MAC in cache
(Vulnerable if false MAC address is inserted in cache; called ARP Poisoning and is caused by unsolicited replies)
2) RARP (Reverse Address Resolution Protocol)
- Takes MAC and says give me an IP (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is traffic controlled with MAC in Layer 2?

A

1) Contention
- fight for the wire
- (CSMA/CA) Carrier Sense Multiple Access with Collision Avoidance ; used in wireless.
- (CSMA/CD)”…” with Collision Detection; waits for clear then starts talking; used in Wired
- Collision Domain; where collisions occur and cause DoS or sniffing attacks
2) Token
- Who ever has the token is first
3) Polling
- A mediator decides who communicates first (mainframes)
* *** Contention is the most popular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Ethernet

A

1) Most common form of LAN networking
2) Uses CSMA/CD
3) Supports full duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the Communication Protocols of Layer 2

A

Communication

  • x.25; Robust
  • Frame Relay ; Purchase only the needed bandwidth
  • ATM (Asynchronous Transfer Mode) 100 MB or better (ie Voice/Video/Data or same channel)
  • MPLS (Multi Protocol Labeling Switching) sits above layer 2 but below layer 3; allows user to specify their needs and the telephone company uses whatever they need to satisfy.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the Resolution Protocols of Layer 2

A

ARP - Address Resolution Protocol (Used Most Often)
RARP - Reverse Address Resolution Protocol
IARP - Used for Frame Relay

18
Q

What are the transmission technologies of Layer 2

A

1) Synchronous - timing mech. with millisecs between 2 parties
* *2) Asynchronous - Uses stop and start bits. High overhead (25%)
3) Unicast - From me to you directly
4) Multicast - From me to a bunch of parties (Pay-Per-View)
5) Circuit Switched - Predictable amount of delay
* *6) Packet Switched - Takes various ways to get from me to you (Torrent)
* *7) Switched Virtual Circuits - Support packet switching
8) Permanent Virtual Circuits - To a private cloud

** Main ones

19
Q

What are layer 3 devices

A

Router
Firewall
End Stations

20
Q

What are the firewall types of Layer 3

A

1) Screening Router - ACLS
2) Secure Gateway (smarter than router)
- Static packet filtering
- Stateful inspection
- Dynamic Packet Filtering
3) Proxies
- Circuit Level (Physical)
- App Level (Virtual)
4) Adaptive Proxy
5) Personal Firewall

21
Q

What protocols are on Layer 3

A

ICMP - ie Ping
IGMP - Internet Group Message Protocol; Conservation of bandwidth; requires all routers in path to pass traffic
IP
Routers
All protocols that start with “I” except IMAP

22
Q

What are the firewall types of Layer 3

A

1) Screening Router - ACLS
2) Secure Gateway (smarter than router)
- Static packet filtering
- Stateful inspection
- Dynamic Packet Filtering
3) Proxies
- Circuit Level (Physical)
- App Level (Virtual)
4) Adaptive Proxy
5) Personal Firewall

23
Q

What is Layer 3 Quality of Service Traffic Shaping

A

1) Help prioritize traffic so no latency
2) Does not speed traffic up but prioritizes so that you get the max speed possible
3) Stops congestion
(i. e. Video Call)

24
Q

What are the network types of layer 3

A
LAN (Local Area Network)
VLAN (Virtual Local Area Network)
WAN (Wide Area Network)
MAN ( Metropolitan Area Network / Campus)
SAN (Storage area network)
25
What are Layer 3 Operating Systems
Servers Work Stations PDA Smart Phones
26
What is Layer 3 responsible for
Transport of information Abstraction of routing information Not needed on direct links
27
What is NAT
Network Address Translation | 1 to 1 internal to external mapping
28
What is PAT
Port Address Translation | Allows for 1 to many mapping using ports
29
What are the Private network IP ranges
172. 16-31.255 192. 168.x.x 10. x.x.x
30
What are the encryption protocols for Layer 3
VPN - IPSEC - SSL - SSH - SOCKS
31
What are the firewall filters on Layer 3
``` Protocol ID Address - Both are done on perimeter Port Content - Both are done closer to content ```
32
What are the controls for Layer 3 (CIA)
Integrity = Authentication Header (AH) Confidentiality = Encapsulating Security Payload (ESP) No Availability
33
IPsec Authn & Confidentiality Layer 3 Protocol
- Encapsulating Security Payload (ESP); Protocol ID 50 - AuthN Header (AH); Protocol ID 51 - Security Association (SA); Unidirectional : Security Choice; Key Exchange - Security Parameter Index (SPI); Random number to identify the traffic so they don't have to decrypt traffic
34
What is Tunneling Protocol in Layer 3
1) Point to Point Tunneling Protocol (replaced by IPsec) 2) Layer 2 Tunneling Protocol (L2TP) - Supports VPN - Neither Encryption or Confidentiality
35
IPsec Encryption Options?
``` Its choice driven: IPsec: ESP (Encryption) or AH (AuthN) or Both Encryption: DES or 3DES, or AES AuthN: MD5 or SHA Key Exchange: DH1 or DH2 or DH5 ```
36
What is SSH Encryption Layer 3
``` Secure Shell (SSH) If no encryption then will wrap in a shell. Examples are: Telnet, ftp, rcp, rsh, rsh, rexec, rlogin SSHv1 = Bad SSHv2 = Good ```
37
What is SSL Layer 3
SSL - Wrapped up in HTTPS | Uses asynchronous Encryption
38
What are the IPsec Configurations
1) Internet Key Exchange (IKE) - UDP 500 - ISA KMP 2) Tunnel Mode - Network to Network 3) Transport Mode - Host to VPN Concentrator - Host to Host * * to remember Tunnel, think that network to network has 2 "N"s in it like Tunnel and Transport has an S in it for Host to Host
39
What is the Bogon List
It is a List of known bogus IP addresses that should never be accepted.
40
What is BSD Firewall in Layer 3
IP firewall with NATD (NAT Deny) - Does not support NAT - Limited Logging - Rules are indexed - Packet is handled based upon rule results * Permit * Deny * Divert = natd
41
What are the IP Versions Layer 3
IPv4 - 32 bits = 4 decimal sets - Subnetting; break up broadcast domains - Subnet mask if for readability - Valid subnet mask 255.x.y.0 IPv6 - 128 bits - No need to subnet - has next header flag
42
Linux with netfilters/iptables firewall in Layer 3
``` Based on BSD but better Rules are grouped in chains Chains are grouped into tables - Filter , NAT, Mangle Define rules matching packet content Define a target action * Accept, Drop, Queue, Return, Reject, Log, DNAT, SNAT, Masquerade ```