Chapter 4: Communications & Network Security Flashcards

(43 cards)

1
Q

What is TKIP ?

A

Temporal Key Integrity Protocol. Wifi security protocol, now considered insecure. PEAP or EAP-TLS are better options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is 802.11ac ?

A

AKA Wi-Fi 5: a wireless local area network (WLAN) standard introduced in 2013. It operates in 5 GHz & offers higher throughput than 802.11n.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the RST flag in TCP?

A

Reset or disconnect a session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List the standard TCP flags.

A

SYN, ACK, FIN, RST, URG, PSH.

Less common: WND, CHK, SEQ, CWR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List the common wifi standards from slowest to fastest.

A

802.11a and 802.11g are capable of 54Mbps.
802.11n can do 600Mbps.
802.11ac can reach 3.4Gbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is associated with layer 3 of the OSI model?

A

IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is CHAP ?

A

Challenge-Handshake Authentication Protocol. Encrypts username and password, and periodically re-authenticates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is LEAP ?

A

Authentication Protocol for WEP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is PAP and what’s wrong with it?

A

Authentication Protocol, but it doesn’t encrypt passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What protocol should be enabled and required to secure VoIP?

A

SIPS, the secure version of the session initialization protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What term describes a routing protocol that maintains a list of destination networks w/metrics including distance in hops?

A

A distance-vector protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which is a real thing: link-state protocol, destination metric protocol, link-distance protocol?

A

Link-state protocol (for routing).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is FCoE ?

A

Fiber channel over internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is SDWAN ?

A

Software-defined wide area network (SD-WAN) is a networking technology that uses software to manage and optimize wide area networks (WANs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Zigbee ?

A

standards-based wireless mesh network used widely in building automation, lighting, smart city, medical and asset tracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is MOSS ?

A

MOSS is a Protocol that uses the MIME multipart/signed and multipart/encrypted framework to apply digital signature and Encryption services to MIME objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is PEM ?

A

Privacy-Enhanced Mail (PEM) is a file format and internet security standard for storing and sending cryptographic keys, certificates, and other data to secure emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is DKIM ?

A

DomainKeys Identified Mail (DKIM) is a standard email authentication method that adds a digital signature to outgoing messages to verify their authenticity.

19
Q

What is “WPA2 in PSK mode?”

A

WPA2-PSK works by using a pre-shared key, or password, to authenticate devices and the network access point. It encrypts data and requires a unique password for access, which helps prevent unauthorized people from joining the network and stealing sensitive information.

20
Q

What is “WPA3 in SAE mode?”

A

WPA3 Simultaneous Authentication of Equals (SAE) is an authentication method that improves encryption and authentication for WPA3-Personal.

21
Q

What is “WPA2 in Enterprise mode?”

A

A security protocol developed by the Wi-Fi Alliance that uses 802.1x authentication to provide enterprise-grade security for corporate and government networks.

22
Q

What is MPLS ?

A

Multiprotocol Label Switching, a converged protocol for routing.

23
Q

What are 3 concerns with multilayer protocols ?

A

Can bypass filte, conceal covert channels, and extend past logical network boundaries.

24
Q

What features can IPsec provide?

A

Encryption, access control, Non-repudiation, and message authentication using public key. NOT authorization, protocol convergence, content distribution.

25
What are 3 security functions that can be provided by **4g** wireless?
Encryption, device-based authentication, and SIM-based authentication.
26
List 10 Layer 7 protocols.
Application Layer: SOAP, TCAP, Universal Plug and Play, DHCP, DNS, BOOTP, HTTP, HTTPS, NFS, POP3 SMTP, SNMP, FTP,NTP, IRC, Telnet, SSH, IMAP
27
List 3 **Layer 6** protocols.
Presentation Layer: TLS, SSL, AFP (Apple File Protocol), X.25 PAD
28
List 5 **Layer 5** protocols.
Session Layer: ADSP, ASP, H.245, NetBIOS, NetBEUI, NCP, PAP, RPC, RTCP, SDP, SMB, SMPP, SOCKS, ZIP (AppleTalk)
29
List 5 **Layer 4** protocols.
Transport Layer: AEP (AppleTalk), AH, DCCP, ESP, FCP, iSCSI, NBF, SPX, NBP {for AppleTalk}, TCP, UDP
30
List 5 **Layer 3** protocols.
Network Layer: IPX, NAT, AppleTalk DDP, HSRP, VRRP, IP, ICMP, ARP, RIP, OSPF, IPSEC
31
List 10 **Layer 2** protocols.
DataLink Layer: ARCNet, ATM, CHAP, Ethernet, FDDI, Frame Relay, WiFi, WiMax, LocalTalk, MAC, PPP, PPTP, PAP, SLIP, StarLAN, Spanning Tree, Token Ring, VLAN
32
What is the IEEE standard for port-based network access control (PNAC) authentication mechanism for devices that want to connect to a wired or wireless local area network?
802.1x
33
What is the IEEE standard for Ethernet?
802.3
34
What was the original IEEE standard for Bluetooth?
802.15.1
35
List 4 common VPN protocols.
PPTP, L2F, L2TP, IPsec
36
A - Transport Layer
37
What is the max speed for each of: Cat5e Fiber Cat6 Coax ?
Cat5e - 1 gigabit Fiber - 10 gigabit Cat6 - 10 gigabit Coax - 1 gigabit
38
What is an **MTU** mismatch?
A maximum transmission unit (MTU) mismatch occurs when a sender tries to transmit a packet that is too large for the receiver to handle.
39
C - AES
40
C - CAM table flooding. Port security is focused on hardware (MAC) addresses.
41
What does the Application Plane of an SDN do?
The application plane of an SDN is where applications run that use APIs to communicate about needed resources.
42
List advantages of 5g over 4g for security.
New mutual authentication capabilities, enhanced subscriber identity protection, and additional security mechanisms.
43
**MAC Address** belongs to which OSI layer?
6. Data Link