Chapter 3 Flashcards

1
Q

Four Layers of TCP/IP

A

Application
Host-to-Host
Internet Layer
Network Access Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network Access Layer

A

Responsible for placing and removing packets on the physical network through communications with the network adapters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encapsulation

A

allows a transport protocol to be sent across the network and utilized by the equivalent service or protocol at the receiving host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IANA

A

Internet Assigned Numbers Authority

Defines the list of well known ports
port 25 is SMTP etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does TCP establish a session?

A

The threeway handshake.

A client originates this connection with an ISN (Initial Sequence Number)
The server responds with a TCP segment that includes the ISN and a value buffer
The client then sends back an acknowledgment of the server’s sequence number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

iSCSI and it’s ports!

A

Internet Small Computer Systems Interface

Allows data storage and transfers across an existing network

Ports 860 and 3260

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fibre Channel

A

Like an iSCSI but meant for fiber optic. Not routable at the network level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Factors of a security topology

A
DMZ
Subnetting
VLANs
Remote Access
NAT
Telephony
NACs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VLAN

A

Virtual Local Area Network

Allows you to create groups of users and systems and segment them on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PPTP

A

Point-to-Point Tunneling Protocol

Supports encapsulation in a single point-to-point environment. Encrypts PPP packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Weakness of packet-capture devices

A

Capturing the negotiation process can potentially uses that information to determine the connection type and information about how the tunnel works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

L2F

A

Layer 2 Forwarding

Created by Cisco as a method of creating tunnels primarily for dial-up connections. Similar in capability to PPP and it shouldn’t carry over to WANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

L2TP

A

Layer 2 Tunneling Protocol

MS and Cisco agreed to combine their respective tunneling protocols into one protocol. Can be used with many different network protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Problem with L2TP

A

It doesn’t provide data security: the information isn’t encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SSH

A

Secure Shell

A tunneling protocol originally designed for Unix systems. It uses encryption to establish a secure connection between two systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IPSec

A

Internet Protocol Security

Not a tunneling Protocol, but used in conjunction with tunneling protocols. Usually for LAN-to-LAN connections

17
Q

RRAS

A

Routing and Remote Access

previously known as Remote Access Services

Connection accomplished via dial-up POTS

18
Q

Telephony

A

telephone technology + Info Technology

VoIP is taking over!!!!

19
Q

NAC

A

Network Access Control

Used for daily operations of the network, connections to other networks, and backup plans

20
Q

Proxy Firewall

A

Intermediary between you network and any other network. Decides whether a packet should be accepted or refused

21
Q

Dual-homed firewall

A

Proxy Firewall with 2 NICs. One for outside the network. One for inside the network

22
Q

Application Level Proxies

A

Reads individual commands of protocols being served. Must know the difference between GET and PUT commands

23
Q

Circuit-level proxy

A

creates a circuit between the client and the server and doesn’t deal with contents of the packets that are being processed

24
Q

Stateful vs Stateless inspection in firewalls

A

Stateful inspections (aka SPI filtering) Keeps track of how information is routed or used

Stateless firewalls make decisions based on the data that comes in. More simple

25
Q

Load Balancing

A

Shifting a load from one device to another

26
Q

IDS

A

Intrusion Detection Service

software that runs either on individual workstations or on network devices to monitor and track network activity.

27
Q

Types of IDS

A

Behavior Based: looks for variations in behavior such as unusually high traffic, policy violations, etc

Signature Based Detection: AKA misuse detection IDS. Evaluates attacks based on attack signatures and audit trails

Anomaly Detection IDS: Looks for anything outside the ordinary

Heuristic IDS: uses an algorithm to analyze the traffic passing through the network