Domain 4 - Communication and Network Security Flashcards

(142 cards)

1
Q

Defense in depth

A

Have defenses throughout the network. Not just in perimeter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Simplex

A

one way (radio, broadcast tv).

Way to define network comms like full/half duplex.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Baseband

A

Network has one channel and can only send one signal at a time.

ethernet is baseband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Broadband

A

Networks have multiple channels and can send multiple signals at a time, like cable TV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Analog comms

A

comms are a continuous wave of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Digital comms

A

Transfer data in bits, ones and zeros.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PAN

A

Personal Area Network (bluetooth is best example)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LAN

A

Local Area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MAN

A

Metropolitan area network. Confined to a Zip code or city usually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WAN

A

Wide Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

GAN

A

Global Area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Circuit-switched networks

A

Dedicated circuit or channel is dedicated between two nodes. Circuit is dedicated to data flow.

Not resilient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Packet-switched network

A

Data is broken up and sent individually. Unused bandwidth is available for other stuff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Layered Design

A

OSI, TCP/IP models are an example. Functions in one layer do not directly affect another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network Model

A

description of how a network protocol suite works/operates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network Stack

A

Suite of protocols programmed in software or hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Protocol

A

set of rules that end points in telecommunications use dto communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

OSI Model

A

Open System Interconnetion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

OSI origin org

A

ISO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

OSI LAyers

A
Physical - Bits
Data Link
Network
Transport
Session
Presentation
Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Physical Data unit

A

bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Data Link data unit

A

frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Network data unit

A

packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Transport data unit

A

segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Session, presentation, and application data unit
data
26
Physical layer
Dumb. Encapsulates cable standards, repeaters, electrical signals.
27
Data Link
Switch, or bridge. ethernet card and MAC address.
28
Data Linc sub layer 1
MAC Media Access Control, interface.
29
Data Link sub layer 2
LLC Logical Link Control. Handles LAN comms, touches layer 3.
30
Network layer
IP addresses and layers. IPV4, IPV6, others. Routers.
31
Transport Layer
TCP, UDP, GRE. handles packet sequencing, flow control, error detection.
32
Session
Duplexes live here. Manages sessions, provides maintenance to connections.
33
Presentation
Presents data to apps and user in comprehensible ways
34
Application
What user interfaces with. apps live here. Complex protocols live here.
35
Please Do not Tell Sales People Anything
Physical, Data Link, Network, Transport, Session, presentation, Application
36
TCP/IP Model creator
Created by DARPA
37
TCP/IP model
suite of protocls using UDP, icmp, among others.
38
TCP/IP Layers
``` Network Access layer (OSI physical and data link) Internet Layer(osi network) Transport Layer (osi transport) Application layer (OSI session, presentation, app) ```
39
Encapsulation
takes info from a higher leayer and adds a header to it. One layer's header is a lower layers' data.
40
EUI-64 MAC Addresses
Extends serial portion of MAC from 24 to 40 bits.
41
IP Header length
20 bytes
42
Key IP HEader fields
``` IP Version Type of service time to live protocol tcp/udp, etc source and dest ips ```
43
IPV6 routing
Simpler routing
44
IPV6 header size
40 bytes
45
IPV6 header contents
``` IP Version source/dest address traffic class flow label payload length ```
46
Stateless Autoconfig ipv6
takes host MAC Address and uses it to config IPV6
47
Statefull autoconfig ipv6
uses DHCP
48
IPV6 sec challenges
Deveices can give themselves IP addresses Many network pros have limited experience.
49
RFC 1918
defines private addresses and NAT
50
Static NAT
one to one
51
Pool Nate (AKA Dynamic NAT)
reserves a number of public IPs in a pool. Addresses can be assigned from pool then returned.
52
PAT
port address translation, NAT overloading. Many to one translation.
53
TCP header fields
``` 20 bytes minimum source/dest port sequence and ack numbers. TCP flags window size ```
54
DNSSEC
Provides security extensions to DNS to authenticate DNS servers.
55
PVC
Permanent virutal circuit | dedicated bandwidth
56
SVC
switched virtual circuit - on demand
57
DLCI
data link connection identifier
58
x.25
strong error connection. packet switched WAN protocol
59
SDLC
layer 2 wan | uses polling to transmit data
60
HDLC
High-level data link control | 3 modes of operation
61
Converged protocol
multilayer protocol | DNP3 distributed netwrk protocol is most used
62
Converged protocol
multilayer protocol | DNP3 distributed netwrk protocol is most used
63
FHSS
Frequency Hopping Spread spectrum method of sending traffic on radio band -designed to maximize throughput while minimizing effects of interference - Hops through frequency channels in random order.
64
DSSS
Direct Sequence Spread Spectrum. Uses entire breatdh of radio spectrum available.
65
OFDM
orthogonal frequency division multiplexing. Newer multiplexing method. Allows concurrent transmissions on multiple independent wireless frequencies.
66
Managed Mode wireless network
clients cannot connect to anyone other than the access point
67
Master Mode wireless network
can only conect with clients who are in managed mode.
68
Ad-hoc mode wireless network
peer to peer comms without central access point
69
monitor mode
read-only for sniffing WLAN traffic.
70
WEP
wired equivalent privacy protocol. WEAK.
71
WEP key lengths
40 and 104
72
802.11i - AKA WPA2
first wireless security standard | provides reasonable security.
73
Bluetooth speeds
3 Mbps. Version 3 is faster
74
bluetooth classes
Class 3- under 10 meters Class 2- 10 meters Class 1- 100 meters
75
bluetooth encryption
weak. real world equivalent of about 38 bit skey length.
76
RFID
radio frequency identification | tech used to create wirelessly readable tags for animals or objects
77
RFID
radio frequency identification | tech used to create wirelessly readable tags for animals or objects
78
RFID type Active
has a battery active tag broadcasts can operate over larger distances toll transponders
79
RFID - type Semi passive
has a batttery | have to get close to reader, relies on readers' power
80
RFID - passive type
no battery | relies on RFID reader's power
81
Routing, Split Horizon
Avoids routing loops. Means a router won't send traffic back out a link it initially arrived on.
82
Hold down timer
avoids flapping
83
BGP RFC#
RFC4271
84
Packet filter firewall
simple and fast. Each filtering decision made on a per packet basis. No way to refer to past packets to make current decision. stateless
85
Statefull firewall
keeps a state table of connections to better analyze traffic. Slower than packet filter
86
Proxy firewall
firewalls that act as intermediary servers.
87
DTE/DCE
Data terminal equipment. Data circuit-terminating equipment Syncronous, DCE provides clock signal
88
PAP
clear text auth protocol
89
CHAP
More secure than PAP. Password is securely created. Server stores plaintext passwords.
90
802.1x
Port based network access control. Includes EAP - extensible auth protocol.
91
LEAP
type of EAP - cisco proprietary. Should not be used
92
EAP TLS
Uses PKI. Dual side authentication. Encrypted
93
EAP- TTLS
tunneled transport security layer. | Drops client side certificate
94
PEAP
Protected EAP
95
SLIP
Serial line internet protocol. layer 2
96
PPP
replaced SLIP
97
PPTP
point to point tunneling protocol. tunnels PPP via IP
98
L2TP
layer 2 tunneling protocol. Combines PPTP and L2F (layer 2 forwarding) No confidentiality
99
VPN
Necessary because IPV4 isn't encrypted by default.
100
ESP
Encapsulating security payload IP Protocol 50
101
AH
Auth Header IP Protocol 51
102
Extranet
Connection between private intranets, such as between business partner intranets.
103
BOOTP
bootstrap protocol.
104
UTP
Unshielded twisted pair
105
STP
shielded twisted pair
106
Cat 1
analog voice
107
Cat 2
ARCNET, up to 4 Mbps
108
Cat 3
10baseT
109
Cat 4
Token Ring - 16 Mbps
110
Cat 5
100 Mbps
111
Cat 5e
1000 Mbps
112
Cat 6
1000 Mbps
113
multimode fiber
uses multiple paths, used for shorter distances
114
singlemode fiber
uses one path, used for long haul high speed network.
115
CSMA
Carrier sense multi access. Addresses collisions in ethernet network. CSMA/CA - collision avoidance CSMA/CD - Collision detection
116
ARCNET
Attached resource computer network
117
ARCNET topology and speed
star. 2.5 Mbps.
118
Token Ring topo and speed
physical star, 16 mbps, Physical star - but stations pass the token in a logical ring.
119
FDDI
Fiber distributed data interface. another ring technology. Up to 100 Mbps in speed. Uses a backup ring.
120
ATM
Asyncronous Transfer Mode WAN tech that uses fixed length cells. Cells are 53 bytes
121
MPLS
Multiprotocol label switching. Forwards WAN traffic via labels
122
Converged protocol
provide services over Ethernet /TCP IP that normally wouldn't use that.
123
DNP3
Distributed network protocol Open standard used primarily in the energy sector for interoperability between various SCADA devices.
124
FCoE
Fiber channel (over ethernet) - means you can use Ethernet switches instead of requiring fiber channel switches.
125
WLAN DoS and Availability
WLANs are susceptible to DOS attacks.
126
Bastion Host
Hardened device, sits directly on internet. Usually provides a single service and has everything else turned off.
127
Dual-homed host
Two network interfaces. One connectes to a trusted network, another to an untrusted network.
128
EAP Acronym
Extensible authentication protocol
129
Wireless Application Protocol (WAP)
provides secure web services to handheld wireless devices. Uses HDML - Handheld Device Markup Language.
130
Content distribution Network
CDN. Geographically diverse caching servers to improve performance for all users. I.e. netflix, amazon, cloudflare, etc.
131
TCP port range
0-65,535
132
TCP Reserved ports
1023 or lower`
133
ephemeral ports TCP
1024 tp 65,535
134
ICMP
Layer 3 protocol. Uses types and codes instead of port numbers.
135
FTP Ports (Control and Data)
Active: Control = client port 1025 to server 21 Data flow = Server 20 to 1026 Passive: Control = client port 1025 to server 21 Data flow = Server 1026 to 1025
136
Frame Relay
packet-switched, layer 2 WAN tech. No error correction
137
DNP3
Distributed Network Protocol. Primarily used in energy sector for SCADA Smart grid applications.
138
802.11 a
First, 2 Mb/s
139
802.11 b
Second, 11 Mb/s
140
802.11 g
Third, backwards compatible with 802.11b. 54 Mb/s
141
802.11 n
First to use both 2.4 and 5 Ghz frequencies. Uses MIMO (multiple input, multiple output) to use more than one antenna.
142
802.11ac
5Ghz only. Speeds up to 1.3 Ghz