OSI Model and Diagrams Flashcards

0
Q

What are the protocol(s) of the Application Layer?

A

POP3, SMTP, SNMP, FTP, Telnet, HTTP, MIME, PGP (app), S/MIME (app), HTTPS (app), DNS, DHCP

POP3 - Post Office Protocol version 3
SMTP - Simple Mail Transfer Protocol
SNMP - Simple Network Management Protocol
FTP - File Transfer Protocol
MIME - Multipurpose Internet Mail Extensions
HTTP - HyperText Transfer Protocol
PGP - Pretty Good Privacy
DNS - Domain Name Service
DHCP - Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What are the OSI Model Layers?

A
Application (7)
Presentation (6)
Session (5)
Transport (4)
Network (3)
Data Link (2)
Physical (1)
Top-Bottom:  "All People Seem To Need Data Processing"
Bottom-Top:  "People Don't Need To See Pink Alligators"
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the protocol(s) of the Presentation Layer?

A

GIF, TIFF, JPG, character encoding (ASCII, UNICODE, EBCDIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the protocols(s) of the Session Layer?

A

NFS, SQL, NetBIOS, PPTP, RPC, RTCP

NFS - UNIX stateless Network File System
SQL - Structured Query Language
PPTP - Point-to-Point Tunneling Protocol
RPC - Remote Procedure Call
RTCP - RTP (Real-time Transport Protocol) Control Protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the protocols(s) of the Transport Layer?

A

TCP, UDP

TCP - Transmission Control Protocol
UDP - User Datagram Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the protocols(s) of the Network Layer?

A

IP, ICMP, IGMP, OSPF

IP - Internet Protocol
ICMP - Internet Control Message Protocol
IGMP - Internet Group Management Protocol
OSPF - Open Shortest Path First

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the protocols(s) of the Data Link Layer?

A

ARP, SLIP, PPP, L2TP, Ethernet, ISDN, Wi-Fi

ARP - Address Resolution Protocol
SLIP - Serial Line Internet Protocol
PPP - Point-to-Point Protocol
L2TP - Layer 2 Tunneling Protocol
ISDN - Internet Services for Digital Network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the protocols(s) of the Physical Layer?

A

Pinouts, voltages, cables, antennas, radio waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the encryption(s) of the Transport Layer?

A

SSL2, SSL3, TLS (therefore the encryption in support of HTTPS, POP3S, FTPS)

SSL - Secure Socket Layer
TLS - Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the encryption(s) of the Data Link Layer?

A

WEP, TKIP, CCMP

WEP - Wire Equivalent Privacy
TKIP - Temporal Key Integrity Protocol
CCMP - Counter-Mode/CBC-MAC Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the encryption(s) of the Network layer?

A

IPSec Transport ESP
IPSec Tunnel ESP

(RC5, DES, AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the SW/HW of the Application Layer?

A

SW: Gateways and Proxies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the encryption(s) of the Presentation Layer?

A

SSH (therefore, the encryption in support of S-FTP, S-HTTP, PGP, S/MIME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the encryption(s) of the Network layer?

A

IPSec Transport ESP
IPSec Tunnel ESP

(RC5, DES, AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the SW/HW of the Network Layer?

A

HW: Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the SW/HW of the Data Link Layer?

A

HW: Bridge, L2 Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the SW/HW of the Physical Layer?

A

HW: Hub, repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the firewall of the Application, Presentation, and Session Layer?

A

Proxy Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the firewall of the Session and Transport Layer?

A

Circuit (SOCKS) Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the firewall of the Network Layer?

A

Packet Filter Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the TCP/IP Model of the Application, Presentation, and Session Layer?

A

APPLICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the TCP/IP Model of the Session and Transport Layer?

A

HOST-TO-HOST (Transport)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the TCP/IP Model of the Network Layer?

A

INTERNET (Internetwork)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the TCP/IP Model of the Data Link and Physical Layer?

A

NETWORK ACCESS (Network Interface)

22
Q

What are the attacks on the Application Layer?

A
Repudiation
Modification
Buffer Overflow (at any layer & in the OS)
Replay
Viruses, Trojan Horse, Spyware
Keystroke Logger (software)
**the ones above typically occur in the OS, not the stack
DNS Spoofing
23
Q

What are the attacks on the Session Layer?

A

Fingerprinting (NetBIOS enumeration)

24
Q

What are the attacks on the Transport Layer?

A

Session Hijacking
TCP Sequences Numbering
Fingerprinting (Port Scan, TCP Scans)
SYN Flooding

25
Q

What are the attacks on the Network Layer?

A
IP Spoofing
Footprinting (Ping Scan)
Sniffing (Promiscous)
Eavesdropping
Ping of Death
ICMP Redirection
26
Q

What are the attacks on the Data Link Layer?

A

MAC Spoofing
ARP Poisoning
Deauthentication Attack

27
Q

What are the attacks on the Physical Layer?

A

Rogue Devices

Keylogger (HW)

28
Q

What are the bandwidth attacks?

A

DoS (Smurf, Fraggle, Physical Destruction)

DDoS (Botnets, Zombies)

29
Q

What are the social engineering attacks?

A

Dumpster diving
Shoulder surfing
Snooping
Eavesdropping

30
Q

What are the modem attacks?

A

War Dialing
Dial-Tone
Eavesdropping

31
Q

What are the entry attacks?

A

Piggybacking

Tailgating

32
Q

What are the discovery attacks?

A

War driving

Eavesdropping

33
Q

What is Symmetric Encryption used for?

A

Bulk Encryption

34
Q

What is Asymmetric Encryption used for?

A
Authentication
Digital Signatures (non-repudiation)
Digital Certificates
Key Exchange (KEA/RSA)
KSA - Key Exchange Algorithm
RSA - Rivest, Shamir, & Adelman)
35
Q

What is a Hash used for?

A

Integrity
Digital Signatures (Integrity)
Message Authentication Code (MAC)
Digital Fingerprint

36
Q

What is an example of a stream cipher (symmetric encryption)?

A

RC4 (64 bit key size)

One-time pad

37
Q

What are some examples of a block cipher (symmetric encryption)?

A

DES (Digital Encryption Standard, 56 bit key size)
3DES (Triple DES, 168 bit key size)
AES128, AES192, AES256 (Advances Encryption Standard, 128, 192, and 256 bit key size)
RC5 and RC6 (up to 2048 bits)
Blowfish (64 bit block, 32-448 bit key)
Twofish (128 bit block, 128-256 bit key)
SAFER+ (bluetooth keys and bluetooth authentication but not encryption)
SAFER++ (digital signatures, integrity, and encryption; 64 and 128 bit)
IDEA (International Data Encryption Algorithm, 128 bit key, original cipher for PGP)

38
Q

What are some examples of asymmetric encryption (public key)?

A
RSA (Rivest, Shamir, & Adelman)
El Gamal (based on discrete logarithms)
ECC (Elliptical Curve Cryptosystem)

To provide confidentiality with asymmetric cryptography, encrypt with the receiver’s PUBLIC key and decrypt with the receiver’s PRIVATE key.

39
Q

How do you provide confidentiality with asymmetric cryptography?

A

To provide confidentiality with asymmetric cryptography, encrypt with the receiver’s PUBLIC key and decrypt with the receiver’s PRIVATE key. (Authentication, Digital Envelope, and confidential transmission of files)

40
Q

How do you provide non-repudiation with asymmetric cryptography?

A

To provide non-repudiation with asymmetric cryptography, encrypt with the sender’s PRIVATE key and decrypt with the sender’s PUBLIC key. (Digital signatures).

41
Q

How do private keys and public keys work?

A

Private key - held by owner, never shared, confided, or exchanged
Public key - made publicly available to everyone

Each set of two keys are mathematically related (“key pair”); either can encrypt but ONLY the mated key can decrypt.

The public key can be derived from the private key but the public key CANNOT be used to derive the private key.

42
Q

What are some examples of hash functions?

A
LANMAN (should not be used)
NTLM v1, v2
MD5 (Message Digest v5, 128 bit)
SHA1 (Secure Hashing Algorithm, 160 bit)
SHA2 (family of functions, SHA256, SHA512, etc.)
MAC (Message Authentication Code)
HMAC (Hashed Message Authentication Code)
RIPEMD (160 bit message digest)
43
Q

What is the encryption of 802.11?

A

WEP (RC4)

Wired Equivalent Privacy
Rivest Cipher (?)
44
Q

What is the encryption of WPA?

A

TKIP (RC4)

Temporal Key Integrity Protocol
Rivest Cipher (?)
Wi-Fi Protected Access

45
Q

What is the encryption of WPA2?

A

CCMP (AES)

Counter-Mode/CBC-MAC Protocol
Advanced Encryption Standard
Wi-Fi Protected Access

46
Q

What is the authentication of 802.11?

A

Shared Key (CHAP)

Challenge Handshake Authentication Protocol

47
Q

What is the authentication of WPA?

A

Pre-Shared Key (personal)
802.1X/EAP (enterprise)

Extensible Authentication Protocol
Wi-Fi Protected Access

48
Q

What is the authentication of WPA2?

A

Pre-Shared Key (personal)
802.1X/EAP (enterprise)

Extensible Authentication Protocol
Wi-Fi Protected Access

49
Q

What is the encryption of IPSec ESP (OSI L3)?

A

RC5, DES, AES

Rivest Cipher
Digital Encryption Standard
Advanced Encryption Standard

50
Q

What is the encryption of SSL/TLS (OSI L4)?

A

3DES, AES

Triple DES (Digital Encryption Standard)
Advanced Encryption Standard
51
Q

What is the encryption of SSH (OSI L6/L7)?

A

3DES, AES

Triple DES (Digital Encryption Standard)
Advanced Encryption Standard
52
Q

What are the hashing functions (MACs) of IPSec ESP (OSI L3), SSL/TLS (OSI L4), and SSH (OSI L6/L7)?

A

MD5, MAC

Message Digest
Message Authentication Code

53
Q

What are the authentications of IPSec ESP (OSI L3), SSL/TLS (OSI L4), and SSH (OSI L6/L7)?

A

Digital Certificates

54
Q

What is the key exchange used by IPSec ESP (OSI L3)?

A

IKE

Internet Key Exchange

55
Q

What are the key exchanges used by SSL/TLS (OSI L4), and SSH (OSI L6/L7)?

A

Diffie Hellman

RSA (Rivest, Shamir, & Adelman)

56
Q

What are some of the security measures that you can take on a Wireless Access Point?

A
Change the default SSID
Disable SSID broadcast
Enable MAC filtering
Enable WEP, WPA, or WPA2 (preferred)
Limit power output (reduce range)