Week 8 - Net Flashcards

1
Q

What does DHCP stand for?

A

Dynamic host configuration protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does DHCP allow?

A

automated address assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Do clients have public or private addresses?

A

private, used with NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Do clients need DNS entry?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Do servers need a DNS entry?

A

Yes, as clients lookup the server address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is dynamic configuration?

A

automatically assigned address “leasing” from a pool of addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Does DHCP use LAN or WAN?

A

LAN broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is DHCP useful for?

A
  • nomadic devices

- large number of hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Process of DHCP?

A
  • client broadcasts message
  • both servers broadcast reply
  • broadcast confirmation; server B chosen
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is routing? In terms of an IP router?

A

– the process of discovering paths through the network,
gathering routing information, using a routing protocol
-– A metric value (a “cost”) is assigned to each route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is forwarding? In terms of an IP router?

A

– the process of transmitting packets using the discovered

routing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is forwarding? In terms of an IP host?

A

– discover locally available route(s) for destinations

– make local forwarding decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a destination

A

another network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is used to choose the route for forwarding?

A

longest prefix match

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does longest prefix match work?

A
  • apply network mask of routing entry to destination address in packet
  • the longest mask that produces a match between the local forwarding entry and destination address is used
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What to use if no prefix matches?

A

default route

17
Q

what does NAT stand for?

A

network address translation

18
Q

What is NAT?

A

process where a network device, assigns a public address to a computer inside a private network

19
Q

What is the main use of NAT?

A

to limit the number of public IP addresses an organization or company must use, for both economy and security purposes.

20
Q

Describe some problems with NAT?

A
  • lose end-to-end model
  • makes end-to-end security harder
  • single point of failure
21
Q

What does a firewall prevent?

A
  • packets leaving site network

- packets entering site network

22
Q

where is a firewall situated?

A

border router

23
Q

What are some on the wire threats?

A

eavesdropping
traffic modification
- modification of genuine packets
man in the middle

24
Q

Explain symmetric cryptography?

A

single key
used for both encyprtion and decryption
must be known and kept secure by both parties

25
Q

explain public key cyrptography?

A

paired keys

different keys but complimentary

26
Q

What does a hash algorithm do?

A

creates a fixed size bit pattern from any input of bits

27
Q

properties of a hash algorithm?

A
  • fixed size hash value as output
  • cannot reporudce original message from hash
  • Very low probability of
    producing two messages with
    the same hash.
28
Q

explain message authentication codes

A

sender sends message and MAC

reciever recieves message and MAC, and encrypts using their key and check if both MAC’s match to ensure no tampering

29
Q

how does digital checksum work?

A

Signature - public key:
– create hash
– encrypt with kS
– check at receiver using kP

30
Q

What does TLS stand for?

A

transport layer security

31
Q

What does TLS allow?

A
  • client to authenticate server, and vise versa
  • client and server to select crypto protocols for use over a communication session
  • client and server to exchange keys securely
  • confidential sessions between client and server