Domain 4: Communication and Network Security Flashcards

1
Q

Name the Layers of the TCP/IP Model

A
  • Application
  • Transport
  • Internet
  • Network Access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Open standard primarily used within the energy sector for interoperability between various SCADA vendors’ and smart grid applications

A

Distributed Network Protocol (DNP3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Storage networking that leverages Fibre Channel but is transmitted across standard ethernet networks

A

Fibre Channel over Ethernet (FCoE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Storage network that leverages existing networking infrastructure and protocols to interface with storage

A

iSCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • iSCSI technology

- Provides a way of addressing storage across the network

A

Logical Unit Numbers (LUNs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Sends traffic over a radio band

- Uses a number of small frequency channels throughout the band and “hops” through them in pseudorandom order

A

Frequency-Hopping Spread Spectrum (FHSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Sends traffic over a radio band

- Uses the entire band at once, “spreading” the signal throughout the band

A

Direct-Sequence Spread Spectrum (DSSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Sends traffic over a radio band
  • Allows simultaneous transmissions to use multiple independent wireless frequencies that do not interfere with each other
A

Orthogonal Frequency-Division Multiplexing (OFDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Wireless Standard
  • Top Speed: 2 Mbps
  • Frequency: 2.4 GHz
A

802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • Wireless Standard
  • Top Speed: 11 Mbps
  • Frequency: 2.4 GHz
A

802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • Wireless Standard
  • Top Speed: 54 Mbps
  • Frequency: 2.4 GHz
A

802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Wireless Standard
  • Top Speed: 54 Mbps
  • Frequency: 5 GHz
A

802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Wireless Standard
  • Top Speed: 72-600 Mbps
  • Frequency: 2.4 GHz / 5 GHz
A

802.11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • Wireless Standard
  • Top Speed: 422 Mbps - 1.3 Gbps
  • Frequency: 5 GHz
A

802.11ac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • Wireless security standard
  • Early attempt to provide 802.11 wireless security
  • Weak new attacks can break key in minutes
A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Wireless security standard

- Utilizes RSN which allows changes to cryptographic ciphers as new vulnerabilities are discovered

A

802.11i

17
Q
  • Wireless security standard
  • Uses AES encryption for confidentiality
  • CCMP for integrity
  • aka RSN
A

WPA2

18
Q
  • Wireless security standard
  • RC4 encryption for confidentiality
  • TKIP for integrity
  • Appropriate when AP lacks power to implement full standard
A

WPA

19
Q
  • 802.15 PAN wireless technology
  • Operates in 2.4 GHz frequency
  • Uses Frequency-Hopping Spread Spectrum (FHSS)
  • Sensitive devices should disable automatic discovery by other devices
A

Bluetooth

20
Q

How can a Bluetooth device be discovered?

A
  • By guessing the MAC address
  • First 24 bits are OUI easily guessed
  • Last 24 bits can be determined via brute-force attack
21
Q

Technology used to create wirelessly readable tags for animals or objects

A

RFID

22
Q

What are the 3 types of RFID tags?

A

Active
Semi Passive
Passive

23
Q
  • RFID tag
  • Have a battery
  • Broadcast a signal
A

Active RFID tags

24
Q
  • RFID tag
  • Have a battery
  • Rely on RFID reader’s signal for power
A

Semi Passive RFID tags

25
Q
  • RFID tag
  • Have no battery
  • Rely on RFID reader’s signal for power
A

Passive RFID tags

26
Q

Port-based network access control and includes extensible authentication protocol (EAP)

A

802.1X

27
Q
  • Provides authentication at layer 2 before a node receives an IP address
  • Used both on wired and wireless networks
  • Client called supplicant
A

EAP

28
Q
  • Type of EAP
  • Cisco-proprietary alternative to TKIP for WAP
  • Was developed to address deficiencies in TKIP before 802.11i/WPA2 was ratified as a standard
  • Significant security flaws should not be used
A

LEAP

29
Q
  • Type of EAP
  • Uses PKI requiring both server-side and client-side certificates
  • Establishes a secure TLS tunnel used for authentication
A

EAP-TLS

30
Q
  • Type of EAP
  • Drops the client-side certificate requirement allowing other authentication methods (i.e. passwords) for client-side authentication
A

EAP-TTLS

31
Q
  • Type of EAP
  • Developed by Cisco, Microsoft and RSA
  • Encapsulates EAP methods within a TLS tunnel that provides authentication and potentially encryption
  • Does not require client-side certificates
A

PEAP

32
Q
  • Prevents collisions on a 802.11 wireless network

- Devices cannot send and receive data simultaneously

A

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

33
Q
  • Prevents collisions on a ethernet network

- Devices can send and receive data simultaneously

A

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

34
Q
  • Enables two 802.11 wireless clients to communicate with one another directly without an AP
  • i.e. wireless printers, sharing files
A

Ad hoc mode

35
Q

Wireless clients can only communicate with an AP, not with other clients

A

Client mode aka Managed mode

36
Q
  • Wireless clients use the AP to communicate with other clients
  • Most commonly used 802.11 wireless mode
A

Infrastructure mode aka Master mode

37
Q
  • Encrypts only HTTP data, not the header allowing it to be sent over TCP port 80
  • Uses DES or RC2 for encryption
  • Supports asymmetric keys, but can be used with only symmetric keys
A

S-HTTP