Chapter 6 - Network Security Flashcards

0
Q

What is the tcp/ip model

A

Predecessor to the OSI model, had 4 layers instead of 7 application is one instead of 3 layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What ISO is the OSI model

A

ISO 7498

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the OSI layers?

A
Physical
Data link
Network
Transport
Session
Presentation
Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Open network architecture

A

A non proprietary architecture no one owns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encapsulation

A

Appending data to a packet one OSI layer at a time in a wrapper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Application Layer 7

A

Application protocol layer, software accesses API to common protocols like HTTP SMTP FTP each of which starts the OSI process and hands off to the presentation layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Presentation layer 6

A

Data is converted to a standard and may be encrypted and/or compressed.

Ex word 2010 document is made in application layer, at presentation layer this becomes ASCII and at another workstation this ASCII is opened in open office to view the file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Session Layer 5

A

This is where the data is sent from application to application.. This is where the server/client pieces have relevant association. The session is controlled by the software still at this point, authentication requirements live here

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Transport layer 4

A

TCP/UDP type network sessions are handled and maintained at this layer

SSL resides here due to network level encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network layer 3

A

IP and routing protocols live here

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data link layer 2

A

Logical link control - LLC

Media access control - MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logical link control

A

Interprets network data and converts it to a MAC addressing aware format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Media access control MAC

A

This is what specifies the appropriate voltage output. MAC addressing is also encapsulated in the packet. Different media requires different voltages, these decisions occur here

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physical layer 1

A

Transmits the voltage specified by the MAC into or from the wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the port ranges?

A

Well known 0-1024
Registered 1024-49151
Dynamic 49152-65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SYN proxy

A

Software that will hold onto the connection until the tcp handshake is complete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP session hijacking

A

This is done by predicting the sequence number and inserting packets into the stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Protocol data units

A
Data - application layer
Transport - segments
Network - packets
Data link - frames
Physical - bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CIDR

A

Classless inter domain routing / supernetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Type of service

A

QoS?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IPng

A

IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Jumbo grams

A

Massive oversize packets, aka jumbo packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Automatic tunneling

A

A technique used to autonegotiate and build tunnels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

6to4

A

Embeds ipv4 in ipv6 remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Teredo

A

Remote UDP tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

ISA-TAP

A

Ip4 to ip6 virtual map used for local association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Security issues with ipv6

A

Biggest is having tunneling on and accessible and not knowing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

802.1AE

A

MACSec - switch to switch encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

802.1AR

A

Provides unique iD that can be used for authentication 802.1AE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

802.1X

A

EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Bandwidth vs throughput

A

Bandwidth is the maximum amount of throughput possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Multistation access unit

A

Used in token ring as a central switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Carrier sense multiple access / collision detection

CSMA/CD

A

Used to sense if a line is free and if collisions are occurring on the wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Back off algorithm

A

When a collision is sensed all systems wait a random amount of time before sending a new frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

CSMA/CA

A

CSMA with collision avoidance.. It waits till it’s clear then tells everyone to shut up and it transmits

Used by 802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Collision Domain

A

A set of systems contending for the same piece of physical media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What protocol assigns the group in multicast?

A

IGMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

DORA

A

Discover
Offer
Request
Ack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

RARP

A

A MAC is sent out and a server sends an IP to the requester

Reverse arp

This evolved into bootp then dhcp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Arp poisoning

A

Modifying he arp table to send data to an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Ping of death

A

When oversized sized packets are sent to ddos a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Smurf attack

A

A spoofed icmp echo is sent to a broadcast address and all machines on a network will reply to the spoofed address, ie the ddos machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Fragile attack

A

Same as smurf, over udp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Managed information base MIB

A

A logical group of managed objects that contain management task data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Communities

A

Establish a trust between MIB agents/server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Community string

A

A community password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

DNSSEC

A

Secure DNS that requires a digital signature before responding and caching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Split DNS

A

External queries are handled by wan side servers only, internal queries are only handled by internal servers are are not accessible externally, these should forward recursion to the external servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

URL Hiding

A

Hiding a URL in an HTML link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

SASL

A

Framework for protocol independent authentication for SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Email spoofing

A

Using an email address that looks like it is legitimate but is not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

SMTP-AUTH

A

Used to verify the sender of a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Sender Policy Framework SPF

A

A DNS entry that is generated to associate a specific server to the email server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Whaling attack

A

Targeting largely important people in a company and very specifically engineer an email to trick then

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Autonomous System (AS)

A

An internal network isolated by BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Distance Vector Routing Protocol

A

Uses # hops and distance as a decision maker for the route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Link state routing protocols

A

Chooses routes based on link speed, packet size, delay, load and reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

VRRP

A

A virtual interface that is mapped to two different actual routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Exterior Gateway Protocols

A

eBGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Routing policy

A

An administrative weight override

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Bridge

A

Used to extend a LAN segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Source routing

A

Routing information is put into the packet at creation, this is dangerous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

How are layer 3 switches more efficient than routers?

A

They use hardware based port tagging

63
Q

802.1Q

A

VLAN

64
Q

VLAN Hopping Attacks

A

VLAN tags are inserted into the headers to fake VLAN access

65
Q

Private branch exchange

A

PBX system used to translate phone data streams

66
Q

Phreakers

A

Phone hackers

67
Q

How does MPLS work?

A

It uses packet tagging just like a layer 3 switch, which is why it is more reliable

68
Q

Egress vs ingress

A

Ingress is inbound

Egress is outbound

69
Q

How do stateful firewalls work?

A

They keep track of a connection state in a state table. This scans headers and verify protocol rules are not being broken

70
Q

What is the difference between circuit level and application level proxy?

A

Circuit level is layer 1-4 inspection
Application level is layer 1-7 inspection

Both recreate the traffic

71
Q

SOCKS firewall?

A

Look it up, no idea

72
Q

What is a dynamic packet filtering firewall?

A

A firewall that dynamically add outbound source based rules for requests from inside to specific systems outside, this assists with avoid any out rules

73
Q

Appliances

A

OS layer software used for a specific and isolated purpose. Everything is locked down other than that one purpose

74
Q

Kernel firewalls

A

This is a firewall specific kernel design to interface directly with hardware

75
Q

Bastion Host

A

A highly exposed system that is most likely to get targeted and most hardened

76
Q

Screened host

A

A firewall behind a router that has packet analysis

77
Q

Screened subnet

A

Fancy name for DMZ

78
Q

Silent rule

A

Drop noisy traffic to reduce logs

79
Q

Stealth rule

A

Disallows traffic from unauthorized systems to firewall software

80
Q

Cleanup Rule

A

Log traffic allowed

81
Q

Negate rule

A

Specific deny rules

82
Q

Forwarding proxy

A

Handles the traffic on behalf of another computer

83
Q

Open proxy

A

Anonymous proxy

84
Q

Reverse proxy

A

A proxy that does not hide the identity of the source and handles inbound traffic

85
Q

Honeypot

A

A sweet server to hack into that detracts attention away from priority systems long enough to discover the offender

86
Q

Tarpit

A

A system with ultra slow response that will cause timeouts and inconsistency for the automated hacking tools

87
Q

Extranet

A

An internal network that extends to other companies, like EDI

88
Q

Value added network

A

A company between companies handling EDI traffic

89
Q

Sonet

A

Synchronous optical network

Used in MANs by ISPs to handle city and nationally wide infrastructure

90
Q

Synchronous digital hierarchy

A

This is the world wide standard used version of sonet ring (US only) and varies in speed and density

91
Q

Multiplexing

A

Running multiple channels at once sending data per channel per frame,

One frame has 8 bits of each channel being multiplexed in a T1 (24 channels)

92
Q

What is an E carrier?

A

This is the world standard instead of T lines in the US

E1 - 2.048 Mbps

93
Q

OC - x

A

This is the optical carrier used for the Internet backbone

Scale has 4 OC - 192s

94
Q

Statistical time division multiplexing

A

STDM - transmit several types of data over a cable (T1)

95
Q

Frequency division multiplexing

A

FDM - an available wireless channel is split up into smaller multiple channels then used for multiplexing

96
Q

Wave division multiplexing

A

Laser wavelength multiplexing

97
Q

CSU/DSU

A

Used by T telecom to multiplex data into separate channels per frame

98
Q

Circuit switching

A

Switching changes made within an ISP to simulate a dedicated line

99
Q

Packet switching

A

This is how the interwebs works

100
Q

Committed information rate

A

Higher cost to guarantee services

101
Q

Frame relay

A

Switching based dedicated links

102
Q

Permanent virtual circuit

A

This is a dedicated line connected to a frame relay cloud

103
Q

Switched virtual circuits

A

Dynamically makes a dedicated switch circuit as needed

104
Q

ATM

A

Asynchronous transfer mode

Like frame relay but better

Uses 53B fried frames to optimize switching

105
Q

What are the bit rates for QOS?

A

Constant - prioritize connection oriented
Variable - de-prioritize connection oriented
Unspecified - no specification
Available - the bit rate changes by availability

106
Q

What are the levels of QoS?

A

Best effort - no guarantees
Differentiated - shorter delays
Guaranteed - first in line

107
Q

Traffic shaping

A

uses QoS to maintain bandwidth levels

108
Q

Switched multimegabit data service

A

Antiquated packet switching service

109
Q

Synchronous data link protocol

A

Mainframe datalink layer switching protocol used between mainframes

110
Q

High level data link control

A

Mainly used for device to device communication like router to router

111
Q

LCP/NCP

A

LCP is link control protocol and handles the connection of a PPP
NCP is network control protocol and controls the authentication

112
Q

SLIP

A

Serial line internet protocol - old technology used to connect serial lines. PPP replaced it

113
Q

High speed serial interface HSSI

A

Used for an interface to connect multiplexers and routers to high speed ATM and frame relay

114
Q

Multiservice access technology

A

Running several services at the same time like voice and data

115
Q

PSTN - public switched telephone network

A

Old technology that used circuit switching instead of packet switching .. Think of POTS

116
Q

H.323

A

Conversion gateways between the circuit based PSTN to the packet based VOIP

117
Q

Vishing

A

A telephone phishing attack where people call you trying to get information

118
Q

SIP

A

Three way handshake used to establish IP telephony connections for conferences and VOIP

119
Q

SIP process

A
Caller Invite
Server sends Trying
Receiver Ringing
Receiver sends Ok
Caller Ack
120
Q

What is RTP?

A

Standardized packet format for delivering audio / video

121
Q

What is a VoIP registrar used for?

A

Keeps a centralized record of the updated locations

122
Q

What is RTCP?

A

Provided feedback on RTP

RTP control protocol

123
Q

Is SIP encrypted?

A

Nope!

124
Q

SPIT

A

Spam over ip telephony

This is VoIP spam and causes voicemail overload and wasted time

125
Q

What is an ISDN bri/pri?

A

BRI - 2 channel home quality ISDN 144kbps

PRI - 23 channel commercial quality ISDN often used as an on demand redundant connection

126
Q

What are the types of DSL?

A
Sdsl - slow symetrical service
Adsl - faster asymetrical service
Hdsl - faster yet asymetrical
Vdsl - fastest asymetrical service
Radsl - rate adaptive based in media
127
Q

What is DOCSIS?

A

A standard for adding high speed data transfer over existing cable infrastructure

128
Q

Layer 2 tunneling protocol

A

Used to traverse layer 2 point to point (PPP) networks like MPLS

129
Q

How does IPSec work?

A

IP Tunnel Encryption Protocol

130
Q

Authentication header (AH)

A

Used for data integrity, data origin, protection from replay

131
Q

Encapsulating security payload (ESP)

A

Provides confidentiality, and integrity

132
Q

ISAKMP

A

Provides a framework for security

133
Q

IKE

A

Authentication Ceritcifcate keys

134
Q

HAIPE

A

A layer 3 VPN tunneling protocol used mostly by the NSA as a replacement for PPP/L2TP devices and methods

135
Q

Transport adjacency

A

More then one security policy used in a VPN.

136
Q

Iterated tunneling

A

Tunnels within tunnels

137
Q

What is PAP?

A

Clear text authentication used over PPP

138
Q

How does CHAP work?

A

It is a challenge response authentication..

A random number (challenge) is encrypted with a predefined password and sent for verification

139
Q

EAP

A

Is a framework to enable authentication and has many variants like

EAPGSS - generic security service using Kerberos
EAPTLS - digital certificate based authentication

140
Q

Spread Spectrum

A

Parrellel wireless over multiple frequencies

141
Q

Frequency hopping spread spectrum - FHSS

A

Frequency hopping is when sub-spectrums are used in a particular order to reduce the possibility of collision

1-2 Mbps

142
Q

Direct sequence spread spectrum -DSSS

A

A chipping number is placed in each transmission and randomized only the proper chipping sequence can interpret the data, offers resend capability

11 Mbps

143
Q

Orthogonal frequency division multiplexing OFDM

A

Used to tightly and precisely pack signals near each other using different perpendicular modulation

52 Mbps +

144
Q

What is open system authentication?

A

Non-encrypted wireless ssid

145
Q

Shared key authentication

A

Wireless that used challenge / response to encrypt the communication

146
Q

802.11i

A

Standard for wireless security

147
Q

802.1x

A

Allows for authentication as a separate process since it is at the networking level

148
Q

Bluejacking

A

Sending a user something like a contact or message via Bluetooth connection

149
Q

Bluesnarfing

A

Getting access to personal information through a Bluetooth connection

150
Q

What allows wireless mobile devices to use the limited frequency of radio?

A

Each tower uses a different frequency and no adjacent tower can use the same

151
Q

FDMA

A

1G - first gen. Used sub band frequencies per call, this ran out quickly.

152
Q

TDMA

A

Time slice of a frequency allows no one user to hog a frequency - GSM

153
Q

CDMA

A

3G - spread spectrum using the entire bandwidth for each user call

154
Q

OFDMA

A

Frequencies are extremely closely packet using narrow sub channels to get the most bandwidth.. This is where 4G comes in.

155
Q

Cell phone cloning

A

The use of someone’s cell phone credentials to utilize calls on their account