Chapter 15: Secure Communications Channels Flashcards

(65 cards)

1
Q

PSTN

A

public switched telephone network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

public switched telephone network

A

uses circuit switching instead of packet routing to connect calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SS7

A

Signaling System 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Signaling System 7 protocol

A

used for establishing and terminating calls in the PSTN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

main components of a PSTN network

A

signal switching points (SSPs) terminate subscriber loops, signal transfer points (STPs) which interconnect SSPs and other STPs to route calls through the network, and service control points (SCPs) to control advanced features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SSP

A

signal switching points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

STPs

A

signal transfer points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SCPs

A

service control points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DSL

A

digital subscriber line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

digital subscriber line

A

high-speed communications technology which simultaneously transmits analog voice and digital data between a home or business and a PSTN service provider’s central office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ADSL

A

Asymmetric DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Asymmetric DSL

A

can only support distances of a mile from the central office without signal boosters; data rates of up to 24 Mbps downstream and 1.4 Mbps upstream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VDSL

A

Very high-data-rate DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Very high-data-rate DSL

A

higher-speed version of ADSL (up to 300 Mbps upstream and 100 Mbps upstream)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

G.fast

A

DSL running over fiber-optic cable from the central office to a distribution point near the home and uses legacy copper wires for the last few hundred feet to the home or office; can deliver data rates of up to 1 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ISDN

A

Integrated Services Digital Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Integrated Services Digital Network

A

obsolescent pure digital technology using legacy phone lines for both voice and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BRI

A

Basic Rate Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BRI ISDN

A

supports a single user with two channels each with data throughput of 64 Kbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

PRI

A

Primary Rate Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

PRI ISDN

A

23 usable channels, 64 Kbps each, equivalent to a T1 leased line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cable modems

A

high-speed access to the Internet through existing cable coaxial and fiber lines; the shared nature of these media result in inconsistent throughputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IP

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IP telephony

A

describes carrying telephone traffic over IP networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Voice over IP aka
IP telephony
26
Jitter
irregularity in arrival times of consecutive packets; problematic for interactive voice and video communications
27
H.323 recommendation
standard for audio and video calls over packet-based networks
28
SIP
Session Initiation Protocol
29
Session Initiation Protocol
application layer protocol used for call setup and teardown in IP telephony, video and multimedia conferencing, instant messaging, and online gaming
30
RTP
Real-time Transport Protocol
31
Real-time Transport Protocol
session layer protocol which carries data in media stream format (audio and video); used in VoIP, telephony, video conferencing, and other multimedia streaming technologies
32
RTCP
RTP Control Protocol
33
RTP Control Protocol
used with RTP and also a session layer protocol; provides out-of-band statistics and control information for feedback on QoS levels of individual streaming multimedia sessions
34
multimedia collaboration
remotely and simultaneously sharing any combination of voice, video, messages, telemetry, and files in an interactive session
35
Telepresence
application of technologies to allow people to be virtually present somewhere other than where they physically are
36
UC
Unified communications
37
unified communications
integration of real-time and non-real-time communications technologies in one platform
38
always-on VPN
system configuration which automatically connects the device to the VPN with no user interaction
39
VPN kill switch
system configuration which automatically cuts off Internet access unless a VPN session is established
40
VPN split tunnel
configuration which routes certain traffic through VPN while allowing other traffic to access the Internet directly
41
PAP
Password Authentication Protocol
42
Password Authentication Protocol
obsolete and insecure authentication protocol which sends user credentials in plaintext and should not be allowed
43
CHAP
Challenge Handshake Authentication Protocol
44
Challenge Handshake Authentication Protocol
challenge/response mechanism using password as an encryption key to authenticate the user instead of having the user send a password over the wire
45
EAP
Extensible Authentication Protocol
46
Extensible Authentication Protocol
framework which enables many types of authentication techniques to be used when establishing network connections
47
Desktop virtualization technologies
remote desktops and virtual desktops; allow users to remotely interact with computers as if they were physically using them
48
Two common remote desktops
Microsoft's Remote Desktop Protocol (RDP; open-source Virtual Network Computing (VNC) system
49
VDI
Virtual desktop infrastructure
50
virtual desktop infrastructure
tech which hosts multiple virtual desktops centrally and makes them available to authorized users
51
SSH
Secure Shell
52
Secure Shell
secure tunneling mechanism which provides terminal-like access to remote computers
53
network socket
endpoint for a data communications channel, defined by five parameters: source address, source port, destination address, destination port, and protocol (TCP or UDP)
54
Remote procedure calls
a program in your network can execute a function or procedure on some other host
55
Type of networks where SS7 protocol is used
PSTN; Public switched telephone network to set up, control, and disconnect calls
56
SIP
Session Initiated Protocol
57
Session Initiated Protocol
application layer protocol used in online gaming communications, instant messaging, multimedia conferencing
58
consumer-grade products
lack security controls and management features to properly secure multimedia collaboration platforms
59
unified communication rely on ...
a central hub which integrates, coordinates, and synchronizes various technologies; ensure the hub is adequately protected against physical and logical threats
60
best authentication protocol for VPN connections
EAP (Extensible Authentication Protocol) is more secure than both PAP (insecure) and CHAP. SIP does not provide authentication mechanisms
61
VPN configurations to enable
Split tunneling for staff using printers on their home networks; some traffic will go to the local network or to the Internet directly
62
Best protection for confidentiality of sensitive research data
VDI (Virtual desktop infrastructure); sensitive data remains in protected network while users work with it over a virtual desktop; prevents data from being stored on the remote user's computer
63
Secure remote procedure calls (RPC) with ...
Tunnel RPC through Transport Layer Security (TLS); RPC lacks security controls and TLS will authenticate hosts and encrypt RPC traffic
64
Advantages of virtual desktops
helpful in regulated environments for data retention, configuration management, and incident response through persistent and nonpersistent sessions
65
Disadvantage of virtual desktop
VDI relies on VMs in a data center; there is not a computer which a user could physically log in