Chapter 3 Flashcards

1
Q

Four Layers of TCP/IP

A

Application
Host-to-Host
Internet Layer
Network Access Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network Access Layer

A

Responsible for placing and removing packets on the physical network through communications with the network adapters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encapsulation

A

allows a transport protocol to be sent across the network and utilized by the equivalent service or protocol at the receiving host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IANA

A

Internet Assigned Numbers Authority

Defines the list of well known ports
port 25 is SMTP etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does TCP establish a session?

A

The threeway handshake.

A client originates this connection with an ISN (Initial Sequence Number)
The server responds with a TCP segment that includes the ISN and a value buffer
The client then sends back an acknowledgment of the server’s sequence number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

iSCSI and it’s ports!

A

Internet Small Computer Systems Interface

Allows data storage and transfers across an existing network

Ports 860 and 3260

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fibre Channel

A

Like an iSCSI but meant for fiber optic. Not routable at the network level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Factors of a security topology

A
DMZ
Subnetting
VLANs
Remote Access
NAT
Telephony
NACs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VLAN

A

Virtual Local Area Network

Allows you to create groups of users and systems and segment them on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PPTP

A

Point-to-Point Tunneling Protocol

Supports encapsulation in a single point-to-point environment. Encrypts PPP packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Weakness of packet-capture devices

A

Capturing the negotiation process can potentially uses that information to determine the connection type and information about how the tunnel works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

L2F

A

Layer 2 Forwarding

Created by Cisco as a method of creating tunnels primarily for dial-up connections. Similar in capability to PPP and it shouldn’t carry over to WANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

L2TP

A

Layer 2 Tunneling Protocol

MS and Cisco agreed to combine their respective tunneling protocols into one protocol. Can be used with many different network protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Problem with L2TP

A

It doesn’t provide data security: the information isn’t encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SSH

A

Secure Shell

A tunneling protocol originally designed for Unix systems. It uses encryption to establish a secure connection between two systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IPSec

A

Internet Protocol Security

Not a tunneling Protocol, but used in conjunction with tunneling protocols. Usually for LAN-to-LAN connections

17
Q

RRAS

A

Routing and Remote Access

previously known as Remote Access Services

Connection accomplished via dial-up POTS

18
Q

Telephony

A

telephone technology + Info Technology

VoIP is taking over!!!!

19
Q

NAC

A

Network Access Control

Used for daily operations of the network, connections to other networks, and backup plans

20
Q

Proxy Firewall

A

Intermediary between you network and any other network. Decides whether a packet should be accepted or refused

21
Q

Dual-homed firewall

A

Proxy Firewall with 2 NICs. One for outside the network. One for inside the network

22
Q

Application Level Proxies

A

Reads individual commands of protocols being served. Must know the difference between GET and PUT commands

23
Q

Circuit-level proxy

A

creates a circuit between the client and the server and doesn’t deal with contents of the packets that are being processed

24
Q

Stateful vs Stateless inspection in firewalls

A

Stateful inspections (aka SPI filtering) Keeps track of how information is routed or used

Stateless firewalls make decisions based on the data that comes in. More simple

25
Load Balancing
Shifting a load from one device to another
26
IDS
Intrusion Detection Service software that runs either on individual workstations or on network devices to monitor and track network activity.
27
Types of IDS
Behavior Based: looks for variations in behavior such as unusually high traffic, policy violations, etc Signature Based Detection: AKA misuse detection IDS. Evaluates attacks based on attack signatures and audit trails Anomaly Detection IDS: Looks for anything outside the ordinary Heuristic IDS: uses an algorithm to analyze the traffic passing through the network