Domain 4. Communication and Network Security Flashcards

(56 cards)

1
Q

At least two devices that are connected to each other.

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Common rules of network communication. A standard set of rules that are understood, confirmed to, and abided by so that two or more devices on a network can communicate.

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ability of native IP networks to carry non-IP traffic via what are known as converged protocols.

A

Convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Private Subnets of IPv4

A

10.0.0.0

172.16.x.x - 172.31.x.x

192.168.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Allows Fibre Channel communications to be transmitted over Ethernet networks. It is primarily used in data centers to consolidate storage and data networking.

A

Fibre Channel over Ethernet (FCoE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Used to transport SCSI commands over IP networks, enabling remote storage access and management.

A

Internet Small Computer Systems Interface (iSCSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Enables voice communications over IP networks, replacing traditional phone lines with internet-based calls.

A

Voice over Internet Protocol (VoIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is a private telephone network that supports internal communications, usually in the context of an organization or a place like a hotel.

A

Private Branch Exchange (PBX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is essentially the traditional, copper-wire-based telephone network that allows people and businesses to communicate with each other.

A

Public Switched Telephone Network (PSTN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Allows people and businesses to communicate via an internet connection, instead of a traditional copper-wire-based phone line.

A

VoIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A protocol for remote direct memory access (RDMA). This protocol is designed to provide access to memory as quickly as possible across the network. It is commonly used in applications like machine learning.

A

InfiniBand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A protocol for connecting CPUs to other components, such as devices and memory, as quickly as possible.

A

Compute Express Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is the secure version of RTP, which supports encryption, authentication, integrity, and replay attack protection. Note that RTP is mainly used for streaming voice and video over IP, with no existing security in it. Also provides good bandwidth optimization, low resource requirements, and is independent from underlying protocols. The full description of its operation is described in RFC 3711.

A

Secure Real-time Transport Protocol (SRTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is responsible for initiating, maintaining, and terminating voice and video sessions. It can also support a direct connection between PBX and public telephony networks.

A

Session Initiation Protocol (SIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sends fragmented packets that overlap, causing reassembly issues.

A

Overlapping fragments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Sends malformed fragmented packets with overlapping offsets.

A

Teardrop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Sends ICMP requests to broadcast address with spoofed source IP.

A

Smurf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Similar to Smurf, but uses UDP echo packets.

A

Fraggle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Is a TCP/IP-based utility that is used to determine if a network host is “alive” or available and to measure response time.

A

Ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Is a TCP/IP-based utility that takes ping a step further and actually maps a network connection from one host to another. Its usefulness comes in that it shows every hop traversed between the two locations. An attacker can take advantage of that to map a target network.

A

Traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Protocol which supports IP protocol by allowing network devices (e.g., routers) to send
error and control messages and enables Ping & Traceroute utilities

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Network protocol that enables a DHCP server to dynamically or statically assign IP
addresses to devices as they are added to the network

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Displays current TCP/IP network configuration on an endpoint – for example a computer - providing the IP & MAC addresses of any Network Interface Cards in the system plus the gateway, DHCP and DNS IP addresses.

24
Q

Used to query databases that store the registered users of an internet resource like a domain name. And also find out who is the owner of a domain name.

25
Used to query DNS – domain name systems – to get all the details on a domain name such as the name servers the domain name uses, the mail server, etc.
Dig
26
A free and open source terminal emulator, serial console, and network file transfer application. It supports several network protocols, including SCP, SSH, Telnet, rlogin, and raw socket connection.
Putty
27
A free and open source network scanner used to discover hosts and services on a computer network by sending packets and analyzing the responses.
NMAP
28
Is an open source password cracking tool and is available for many operating systems.
John the Ripper
29
A command-line network utility that displays network connections for TCP and UDP (both incoming and outgoing), routing tables, and a number of network interface (network interface controller or software-defined network interface) and network protocol statistics.
Netstat
30
Used for querying the Domain Name System (DNS) to obtain domain name or IP address mapping or other DNS records.
Nslookup
31
Simply prompts for a user ID and password when establishing a connection. Sadly, passwords are transmitted in plaintext, and the user will never be prompted to change their password, as it will be static in nature.
Password Authentication Protocol (PAP)
32
Is an improved version of PAP. Passwords are encrypted during transmission, while challenges are sent in regular intervals behind the scenes to ensure that an intruder has not hijacked or otherwise compromised a session.
Challenge Handshake Authentication Protocol (CHAP)
33
Allows vendors to adapt the latest authentication technologies, like smart keys and digital certificates, to their products. In fact, due to its inherent strengths, It can also be embedded into other things, like wireless security, where it’s used with WPA2 for purposes of connecting to wireless networks and authenticating users at the same time.
Extensible Authentication Protocol (EAP)
34
isn’t actually a standalone authentication protocol, it’s just a wrapper for EAP. Encapsulates EAP within an encrypted TLS - Transport Layer Security Tunnel - thus encrypting any EAP traffic that is being sent across a network.
Protected Extensible Authentication Protocol (PEAP)
35
Maps IP Addresses to MAc Addresses
ARP
36
Maps MAC addresses to IP addresses
RARP
37
In its simplest form, It changes IP addresses to other IP addresses. For example, a private, internal, and non-routable IP addresses to a routable IP address.
Network Address Translation (NAT)
38
Is an inherent part of NAT, and it helps keep track of individual internet requests using unique port assignments for each request.
Port Address Translation (PAT)
39
Is an application-layer protocol that allows a user to connect to and access network resources. RADIUS was developed to support dial-in networking and provides authentication, authorization, and accounting (AAA).
Remote Authentication Dial-In User Service (RADIUS)
40
Was developed by CISCO as an extension of TACACS and an improvement over RADIUS. Unlike RADIUS (which uses UDP). Uses TCP and encrypts all the transmitted packets, while RADIUS only poorly obfuscates user passwords.
Terminal Access Controller Access Control System Plus (TACACS+)
41
is the successor to and an enhanced version of RADIUS. Adds improved security features, such as EAP, which provides a much more secure and robust authentication of users.
Diameter
42
Managing network devices through the same network that they are used to transmit user or application data (less secure - no physical segmentation)
In-band Management
43
Managing network devices using a dedicated network that is separate from the main network (more secure)
Out-of-band Management
44
Extreme form of segmentation where one segment of the network is completely isolated from all others physically and logically
Air-gapped
45
Allows a single physical network to be partitioned into multiple smaller logical networks
Virtual Local Area Networks (VLANs)
46
Create a private network across public network infrastructure. Used to connect remote users or separate branches of a business to the main office’s network
Virtual Private Networks (VPNs)
47
Allows multiple instances of a routing table to coexist within the same router at the same time
Virtual Routing & Forwarding (VRF)
48
Ability to create multiple separate security domains within a single physical device (e.g. Firewall). Allows multiple virtual firewall instances within a single device
Virtual Domain
49
Maximum amount of data that can be transmitted over a network or internet connection in a given amount of time
Bandwidth
50
Actual rate of successful data transfer achieved, measured over a period of time
Throughput
51
Measure of the level of the desired signal to the level of background noise. A higher _ can allow for higher data rates
Signal-to-noise ratio
52
Time it takes for signal to travel from its source to its destination and back (round-trip time)
Latency
53
Variation in time delay in milliseconds between data packets over a network. Inconsistency of latency over time.
Jitter
54
Forward packets based on direction of the control plane (packet forwarding & switching). It has two types: Cut-through and Store-and-forward.
Data Plane. Cut-through: Switch starts forwarding the packet as soon as it reads the destination address, without waiting for the entire packet to be received. Reduces latency but does not allow for error checking of the entire packet. Store-and-forward: Switch receives the entire packet, checks it for errors, and then forwards it to the destination. Introduces more latency but ensures that the packet is error-free before forwarding.
55
Functions and processes which determine paths (route calculation / determination, OSPF, BGP)
Control Plane
56
Manages and monitors the network’s operations
Management Plane