Business data networks and security Flashcards

1
Q

Who funded the ARPANET?

A

Defense Advanced Research Projects Agency (DARPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What year for ARPA created?

A

1958

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What organization spawned the Network Working Group?

A

members of ARPANET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the Network Working Group do?

A

Create standards to be used for networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a Network WOrking Group “Request for Comments” (RFC) do

A

The RFC is the recommendation for a standard. All standard in networking are RFC, but not all RFC are standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the standards body IETF acronym stand for?

A

Internet Engineering Task Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When was the standards body IETF founded?

A

late 1960s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

was the IETF faster at producing standards than OSI?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a network standard?

A

rules of operation that specify how two pieces of hardware/software work together to exchange messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the important standards agencies?

A

Internet Engeneering Task Force (IETF)
International Organization of Standardization (ISO)
International Telecommunications Union- Telecommunications Standards Sector (ITU-T)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What standards agency creates internet standards

A

IETF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What other agencies work together to create network standards

A

ISO and ITU-T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a standards architecture?

A

Similar to software architecture, it is how the standards are designed to make sense and function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a standards architecture layer?

A

a sub-set of the standards architecture that describes a feature of how the standards architecture operates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the OSI Architecture layers in order from 1-7

A
Physical
data link
network
Transport
session
presentation
Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the TCP/IP (IETF) layers from 1-4

A

Subnet Access Protocol
Internet
Transport
Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the Hybrid TCP/IP-OSI layers 1-5

A
Physical
Data link
Internet
Transport
Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the TCP/IP architecture Subnet Access Protocol (SNAP)

A

Basically says “Use OSI standards here”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Does a standards agency dominate in the application layer?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

with regards to the TCP/IP-OSI architecture, what is the function of layer 5

A

Application layer governs how two applications work with eachother

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

with regards to the TCP/IP-OSI architecture, what is the function of layer 4

A

Transport Layer standards govern aspects of end-to-end communication between two end hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

with regards to the TCP/IP-OSI architecture, what is the function of layer 3

A

Internet link layer governs the transmission of packets across the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

with regards to the TCP/IP-OSI architecture, what is the function of layer 2

A

The data Link layer govern the transmission of frames across a single switched network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

with regards to the TCP/IP-OSI architecture, what is the function of layer 1

A

Physical layer govern transmission between adjacent devices connected by a medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what is carried inside of a frame
packets
26
How is the three-step opening performed?
1: Host A sends a TCP SYN to Host B 2: Host B sends a TCP SYN/ACK to Host A 3: Host A sends aback a pure TCP ACK segment to Host B
27
What are the three TCP control Segments?
SYN ACK FIN
28
in TCP protocol what are the three general parts of a message
Header data fields frame trailer
29
What is a threat environment?
The types of attacks that are commonly used
30
What is malware?
malicious software that is typically infiltrated into a network
31
Describe what the spear phishing attack is?
The attacker personalizes an e-mail message for a particular recipient so that information is exfiltrated or malware is infiltrated
32
What are the three types of malware
Viruses Worms Trojan Horses
33
What is a virus malware?
A piece of malware (typically a script) that leverages vulnerabilities in software which already exists within the network.
34
What is a worm malware?
Worms are full programs that can be propagated between computers.
35
What is a Trojan Horse?
A malware which disguises itself as a legitimate, and must be placed in a network by another piece of malware, or attacker
36
What is a malware payload?
A piece of code that performs the malicious activity
37
With regards to a cyber attack, what is an APT?
Advanced Persistant Threat
38
With regard to the OSI model, at what layers do wireless LANs operate?
physical and data link layers
39
What is the distinction between WI-FI and 802.11?
Wi-Fi steams from the Wi-Fi Alliance, which is an industry consortium of 802.11 compliant product vendors.
40
with regards to Wi-Fi, what is a service band?
A range of frequencies used for a specific purpose. This is comprised of multiple channels
41
With regards to Wi-Fi, what is a channel?
A subset of Service band frequencies.
42
With regards to Wi-Fi, what is the range of frequencies used in the 2.4GHz service band?
2.4GHz -> 2.4835GHz
43
With regards to Wi-Fi, what is the frequency range of the 5GHz service band?
5GHz -> 5.725GHz
44
With regards to the 802.11 standard, what is roaming?
The hand-off between multiple access points, while a user is moving between them
45
What OSI layer are switched and wireless networks governed?
Layer 1 and Layer 2
46
With regards to a router, what is an interface?
The physical connector for a wired connector
47
With regards to a switch, what is a port?
The physical connector for a wired connection
48
Explain the network adage "Switch where you can; route where you must"
This is used to describe the idea that for the same amount of network traffic, a router is much more expensive than a switch
49
With regards to the Internet, what is a network?
collection of routers and data links owned by a recognized organization
50
With regards to Ethernet, what is a network
A collection of hosts and clients connected to a single datalink and router
51
With regards to TCP/IP networking, what are the parts of the hierarchical Addressing?
network, subnet, host
52
With regards to TCP/IP networking, what is the network part of the hierarchical IPv4 address?
The network part is the first 8 to 24 bits of a network address. This identifies the host's recognized network on the internet
53
With regards to TCP/IP networking, what is the subnet part of the hierarchical IPv4 address?
The 8 bits after the network address. This is used to subdivide an organization's networks into smaller units
54
With regards to TCP/IP networking, what is the host part of the hierarchical IPv4 address?
The remaining bits that are not a part of the network or the subnet in the address. This is used to identify the specific host in the subnet
55
Just looking at a IPv4 address, can you determine the network, subnet, host?
No
56
What does a border router do?
Routes between different networks
57
What does an internal router do?
connect different subnets
58
with regards to TCP/IP, how do masks work?
A mask is applied as a binary and with the address to determine the network or subnet.
59
with regards to TCP/IP, what is routing?
The process of getting a packet closer to its destination host.
60
With regards to TCP/IP, what is a Routing Table
A table of routes, that a router uses to determine the best route to send a packet.
61
With regards to IPv4, how many bits are in the version field?
4
62
With regards to IPv4, how many bits are in the internet header length?
4
63
With regards to IPv4, how many bits are in the differentiated Service Control Point?
6
64
With regards to IPv4, how many bits are in the ECN?
2
65
With regards to IPv4, how many bits are in the Total Length?
16
66
With regards to IPv4, how many bits are in the Identification?
16
67
With regards to IPv4, how many bits are in the flags?
3
68
With regards to IPv4, how many bits are in the Fragment Offset?
13
69
With regards to IPv4, how many bits are in the time to live?
8
70
With regards to IPv4, how many bits are in the Protocol
8
71
With regards to IPv4, how many bits are in the Header Checksum
16
72
With regards to IPv4, how many bits are in the Source IP Address
32
73
With regards to IPv4, how many bits are in the destination IPv4 Address?
32
74
With regards to IPv4, what is the ECN?
Explicit Congestion Notification, used to notify the receiver of congestion
75
With regards to IPv4, what fields govern transmission quality?
Differentiated Services Control Point Explicit Congestion Notification (ECN)
76
With regards to the IPv4 header Protocol Field, what is the value for TCP?
6
77
With regards to the IPv4 header Protocol Field, what is the value for UDP?
17
78
With regards to the IPv4 header Protocol Field, what is the value for ICMP?
1
79
With regards to TCP/IP, what role does the ICMP protocol provide?
This is used for the internet layer supervisory messages
80
While IPv4 is very common today, what is the largest issue presented to its use?
The Internet Assigned Numbers Authority ran out of unique address.
81
With regards to TCP/IP wahat is the Canonical Text Notation?
RFC 5952, it is used to create a human readable notation for an IP address
82
With regards to TCP/IP, what is the notation used for IPv6?
Hexadecimal notation
83
With regards to IPv$, what is the notation used
dotted decimal notation
84
with regards to IPv4 what are the two addresses that hosts cannot have?
all 1's | all 0's
85
with regards to IPv6, what are the three parts of an address?
routing prefix subnet ID interface ID
86
with regards to IPv6, what is the IPv4 equivalent to the routing prefix?
network part of the address
87
with regards to IPv6, what is the IPv4 equivalent to the subnet ID?
the subnet part of the address
88
with regards to IPv6, what is the IPv4 equivalent to the interface ID?
The host part of the address
89
With regards to 802.11, what is war driving?
When an attacker uses the wireless signal of the access points to collect information from a victim. In unsecured networks, this could even lead to man in the middle attacks
90
with regards to 802.11, do public hot-spots protect your transmission
No
91
What does the 802.11i standard provide?
This standard provides encrypted wireless communication between an access point and a host
92
With regards to cybersecurity, what does the CIA acronym stand for?
Confidentiality Integrity Authentication
93
With regards to 802.11, why does turning off the periodic broadcast of the access point SSID not provide protection
If there is communication to that access point and a host, each packet header contains an unencrypted SSID for the network.
94
With regards to 802.11, why does whitelisting the EUI-48 addresses not provide additional security?
During communication between the access point and the host, the EUI-48 is unencrypted in each packet header
95
With regards to 802.11i, what layer is protected?
The 802.11 standard is focused on protecting the data-link layer
96
What are some data-link security standards that existed prior to 802.11i?
Advanced Encryption Standard (AES) Wired Equivalent Privacy (WEP) Wireless Protected Access (WPA)
97
With regards to 802.11, Why is WEP no longer used?
It is easily compromised, due to design level issues.
98
With regards to 802.11 data-link security, which is superior 802.11i or WPA?
802.11i
99
With regards to cyber-security, what is end-to-end encryption?
Encryption that spans from client to target server
100
With regards to 802.11i, what is the initial authentication?
The wireless client is the supplicant, which must prove its identity before the access point will allow the client to connect.
101
With regards to 802.11i, what are the two methods for initial authentication?
Pre-Shared Key (for use in home networks) | 802.1X (for use in enterprises)
102
With regards to 802.11i, how does the pre-shard key (PSK) for initial authentication work?
The wireless host sends a request to the access point The access point sends an unencrypted challenge message to the host The host uses the PSK to encrypt the challenge message and sends it to the access point The access point can decrypt the challenge message and allow access or not
103
With regards to 802.11i, what is the pairwise session key?
This is the key used for subsequent communication to the access point.
104
With regards to 802.11i, what are some threats?
The PSK is too publicly known. | An ex-employee can still have the PSK when they leave
105
With regards to 802.11i, what is the minimum password length for a strong Pre-Shared Key(PSK)?
20 characters
106
with regards to 802.11i, how is the 802.1X initial authentication performed?
The wireless host contacts the Access point The access point notifies the 802.1X server The 802.1X server sends requirements for authentication to the access point The access point sends the requirements to the wireless host The wireless hosts sends credentials to access point The access point sends the credentials to the 802.11X server to perform credentials check The 802.11X server sends an authorization message to the wireless access point The wireless access point authorizes the connection to the wireless client, and passes the authorization message
107
With regards to 802.11i, what are two types of attacks that can occur?
Rogue access point | evil twin attack
108
With regards to 802.11i, what is the evil twin attack
a man-in-the-middle attack in which the evil twin intercepts traffic passing between a wireless hosts and a legit access point
109
with regards to 802.11, what defeats an evil twin attack?
A VPN will defeat an evil twin attack
110
With regards to networking, what is the Simple Network Management Protocol (SNMP) used for?
Management of access points
111
with regards to networks, what are 4 categories of Quality of Service (QoS)?
Speed Errors Availability Latency
112
with regards to 802.3, what are the OSI standard layers impacted?
Datalink | Physical
113
With regards to 802.3, what is a workgroup switch?
A switch to connect individual hosts to the network
114
With regards to 802.3, what is a core switch?
A switch to connect to other switches
115
With regards to 802.3, what is an access link?
A physical connection between host and switch
116
With regards to 802.3, what is a Trunk link?
A physical connection between switches