Domain 4. Communication and Network Security Flashcards
(56 cards)
At least two devices that are connected to each other.
Network
Common rules of network communication. A standard set of rules that are understood, confirmed to, and abided by so that two or more devices on a network can communicate.
Protocols
Ability of native IP networks to carry non-IP traffic via what are known as converged protocols.
Convergence
Private Subnets of IPv4
10.0.0.0
172.16.x.x - 172.31.x.x
192.168.0.0
Allows Fibre Channel communications to be transmitted over Ethernet networks. It is primarily used in data centers to consolidate storage and data networking.
Fibre Channel over Ethernet (FCoE)
Used to transport SCSI commands over IP networks, enabling remote storage access and management.
Internet Small Computer Systems Interface (iSCSI)
Enables voice communications over IP networks, replacing traditional phone lines with internet-based calls.
Voice over Internet Protocol (VoIP)
Is a private telephone network that supports internal communications, usually in the context of an organization or a place like a hotel.
Private Branch Exchange (PBX)
Is essentially the traditional, copper-wire-based telephone network that allows people and businesses to communicate with each other.
Public Switched Telephone Network (PSTN).
Allows people and businesses to communicate via an internet connection, instead of a traditional copper-wire-based phone line.
VoIP
A protocol for remote direct memory access (RDMA). This protocol is designed to provide access to memory as quickly as possible across the network. It is commonly used in applications like machine learning.
InfiniBand
A protocol for connecting CPUs to other components, such as devices and memory, as quickly as possible.
Compute Express Link
This is the secure version of RTP, which supports encryption, authentication, integrity, and replay attack protection. Note that RTP is mainly used for streaming voice and video over IP, with no existing security in it. Also provides good bandwidth optimization, low resource requirements, and is independent from underlying protocols. The full description of its operation is described in RFC 3711.
Secure Real-time Transport Protocol (SRTP)
Is responsible for initiating, maintaining, and terminating voice and video sessions. It can also support a direct connection between PBX and public telephony networks.
Session Initiation Protocol (SIP)
Sends fragmented packets that overlap, causing reassembly issues.
Overlapping fragments
Sends malformed fragmented packets with overlapping offsets.
Teardrop
Sends ICMP requests to broadcast address with spoofed source IP.
Smurf
Similar to Smurf, but uses UDP echo packets.
Fraggle
Is a TCP/IP-based utility that is used to determine if a network host is “alive” or available and to measure response time.
Ping
Is a TCP/IP-based utility that takes ping a step further and actually maps a network connection from one host to another. Its usefulness comes in that it shows every hop traversed between the two locations. An attacker can take advantage of that to map a target network.
Traceroute
Protocol which supports IP protocol by allowing network devices (e.g., routers) to send
error and control messages and enables Ping & Traceroute utilities
ICMP
Network protocol that enables a DHCP server to dynamically or statically assign IP
addresses to devices as they are added to the network
DHCP
Displays current TCP/IP network configuration on an endpoint – for example a computer - providing the IP & MAC addresses of any Network Interface Cards in the system plus the gateway, DHCP and DNS IP addresses.
ipconfig
Used to query databases that store the registered users of an internet resource like a domain name. And also find out who is the owner of a domain name.
WHOIS