Chapter 4: Communications & Network Security Flashcards
(43 cards)
What is TKIP ?
Temporal Key Integrity Protocol. Wifi security protocol, now considered insecure. PEAP or EAP-TLS are better options.
What is 802.11ac ?
AKA Wi-Fi 5: a wireless local area network (WLAN) standard introduced in 2013. It operates in 5 GHz & offers higher throughput than 802.11n.
What is the RST flag in TCP?
Reset or disconnect a session.
List the standard TCP flags.
SYN, ACK, FIN, RST, URG, PSH.
Less common: WND, CHK, SEQ, CWR
List the common wifi standards from slowest to fastest.
802.11a and 802.11g are capable of 54Mbps.
802.11n can do 600Mbps.
802.11ac can reach 3.4Gbps.
What is associated with layer 3 of the OSI model?
IP addresses.
What is CHAP ?
Challenge-Handshake Authentication Protocol. Encrypts username and password, and periodically re-authenticates.
What is LEAP ?
Authentication Protocol for WEP.
What is PAP and what’s wrong with it?
Authentication Protocol, but it doesn’t encrypt passwords.
What protocol should be enabled and required to secure VoIP?
SIPS, the secure version of the session initialization protocol.
What term describes a routing protocol that maintains a list of destination networks w/metrics including distance in hops?
A distance-vector protocol.
Which is a real thing: link-state protocol, destination metric protocol, link-distance protocol?
Link-state protocol (for routing).
What is FCoE ?
Fiber channel over internet.
What is SDWAN ?
Software-defined wide area network (SD-WAN) is a networking technology that uses software to manage and optimize wide area networks (WANs).
What is Zigbee ?
standards-based wireless mesh network used widely in building automation, lighting, smart city, medical and asset tracking.
What is MOSS ?
MOSS is a Protocol that uses the MIME multipart/signed and multipart/encrypted framework to apply digital signature and Encryption services to MIME objects.
What is PEM ?
Privacy-Enhanced Mail (PEM) is a file format and internet security standard for storing and sending cryptographic keys, certificates, and other data to secure emails.
What is DKIM ?
DomainKeys Identified Mail (DKIM) is a standard email authentication method that adds a digital signature to outgoing messages to verify their authenticity.
What is “WPA2 in PSK mode?”
WPA2-PSK works by using a pre-shared key, or password, to authenticate devices and the network access point. It encrypts data and requires a unique password for access, which helps prevent unauthorized people from joining the network and stealing sensitive information.
What is “WPA3 in SAE mode?”
WPA3 Simultaneous Authentication of Equals (SAE) is an authentication method that improves encryption and authentication for WPA3-Personal.
What is “WPA2 in Enterprise mode?”
A security protocol developed by the Wi-Fi Alliance that uses 802.1x authentication to provide enterprise-grade security for corporate and government networks.
What is MPLS ?
Multiprotocol Label Switching, a converged protocol for routing.
What are 3 concerns with multilayer protocols ?
Can bypass filte, conceal covert channels, and extend past logical network boundaries.
What features can IPsec provide?
Encryption, access control, Non-repudiation, and message authentication using public key. NOT authorization, protocol convergence, content distribution.