Domain 4: Communication and Network Security Flashcards

(85 cards)

1
Q

Communications between computers over networks are made possible by ________

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protocols

A

Set of rules and restrictions that define how datat is transmitted iver a network medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OSI Layers

A

Physical, Data Link, Network, Transport, Session, Presentation, Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encapsulation

A

Addition of a header to the data received by each layer from the layer above before it’s handed off the the layer below

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the Physical Layer do?

A

Accepts frame from Data Link layer and converts into bits for transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the Data Link Layer do?

A

protocols convert the packet into the proper format for transmission (i.e. Ethernet), adds MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ARP and RARP

A

Address Resolution Protocol and Reverse ARP - resolve IP to MAC addresses and vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2 Data Link sublayers

A

Logical Link Control and MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the Network Layer do?

A

adds routing and addressing information to the datagram or segment to create a packet (ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the Transport Layer do?

A

managing the integrity of a connection, receives data stream/PDU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the Session layer do?

A

establishes, maintains, and terminates communication sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the Presentation layer do?

A

transforms data received from the Application layer into a format that any OSI model system can understand, interface btwn network and apps (encrypts and compresses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the Application layer do?

A

interfacing user applications with the protocol stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCP/IP Model to OSI Model

A

Application, Presentation, Session = Application
Transport = Transport
Network = Internet
Data Link, Physical = Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Difference btwn TCP and UDP

A

TCP is full duplex connection-oriented, UDP is simplex connectionless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which ports are registered software ports?

A

1024-49151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which ports are known as random, dynamic, or ephemeral ports?

A

49152-65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe the three-way handshake.

A

Clients sends SYN, server responds with a SYN/ACK, Client responds with an ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IGMP is used to support what?

A

Multicasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IP header protocol field value for ICMP

A

1 (0x01)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ICMP type field values (0, 3, 5, 8, 9, 10, 11)

A
0- echo reply
3- destination unreachable
5- redirect
8- echo request 
9- router advertisement
10- router solicitation
11- time exceeded
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Telnet Port

A

TCP Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

FTP Port

A

TCP Ports 20 and 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

TFTP Port

A

UDP Port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
SMTP Port
TCP Port 25
26
HTTP Port
TCP Port 80
27
IMAP Port
TCP Port 143
28
DHCP Port
UDP Ports 67 and 68
29
HTTP Port
TCP Port 80
30
SSL/ HTTPS Port
TCP Port 443
31
LPD Port
TCP Port 515
32
X Window Port
TCP Ports 6000-6063
33
BootP/DHCP Port
UDP Ports 67 and 68
34
NFS Port
TCP Port 2049
35
SNMP Port
UDP Port 161 and 162
36
Data Emanation
transmission of data across electromagnetic signals
37
802.11 Wireless Network Amendments, Speed and Frequency
802. 11 - 2 Mbps, 1.4 GHz 802. 11a -54 Mbps, 5 GHz 802. 11b - 11 Mbps, 2.4 GHz 802. 11g - 54 Mbps, 2.4 GHz 802. 11n - 200 Mbps, 2.4 or 5 GHz 802. 11ac - 1 Gbps, 5 GHz
38
Infrastructure Mode
wireless access point is required
39
Ad Hoc Mode
no centralized control authority
40
Stand Alone Mode
wireless access point connects wireless clients but no wired resources
41
Wired Extension Mode
wireless access point acts as a connection point to link wireless to wired
42
Enterprise Extended Mode
multiple wireless access points are used to connect a large physical area
43
Two Weaknesses of WEP
Static Common Key and Poor implementation of IV
44
WPA Weakness
single static passphrase
45
PEAP
Provides encryption for EAP
46
Captive Portal
Log in at hotel, cafe, etc.
47
Static Packet Filtering Firewalls
examines data from message header
48
Application Level Gateway Firewalls
filters based on the internet service used
49
Stateful Inspection Firewalls
evaluate the context of the network traffic
50
SKIP
Simple Key Management for Internet Protocol, protects session less datagram protocols
51
Software IP Encryption
Security protocol that provides authentication, integrity, and confidentiality using an encapsulation protocol
52
Secure Remote Procedure Call
Authentication service to prevent unauthorized execution of code on remote systems
53
Secure Sockets Layer and TLS
Protect comms between a web server and a web browser
54
Secure Electronics Transaction
Security protocol for transactions over the internet
55
CHAP
Challenge Handshake Authentication Protocol - encrypts credentials
56
Password Authentication Protocol
Transmits credentials in the clear
57
Extensible Authentication Protocol
Framework, not protocol, PEAP encapsulates EAP in a TLS tunnel
58
Phreaker
Malicious attackers who abuse phone systems
59
Black, Red, Blue and White Boxes (in terms of secure voice comms)
Trick phones. Black manipulates line voltage, Red mimics the sound of coins, Blue simulates tones to connect with trunk, and White controls the phone system
60
S/MIME
Secure Multipurpose Internet Mail Extensions - email security standard that offers authentication and confidentiality
61
MIME Object Security Services
Authentication, confidentiality, integrity, and nonrepudiation
62
Privacy Enhanced Mail
Email encryption, C, I, Authentication and Nonrepudiation
63
Pretty Good Privacy
Public-Private key system that encrypts files and email messages
64
RADIUS
Centralized remote auth service for dial up connections, server sends logon creds to RADIUS server for authentication
65
TACACS+
Centralized remote auth service, two factor authentication
66
VPN
comms tunnel that provides point to point transmission of authentication and data traffic
67
Tunneling
network communication process that protects the contents of protocol packets by encapsulating them in packets of another protocol
68
4 Common VPN Protocols
PPTP, L2F, L2TP, and IPSec
69
RADIUS and TACACS
Remote Auth Services
70
S/MIME, MOSS, PEM, PGP
Email Security Solutions
71
CHAP, PAP, EAP
Authentication Protocols
72
SKIP, swIPe, S-RPC, SSL, TLS, SET
Secure Communication Protocols
73
PPTP
Point to Point Tunneling Protocol- encapsulation protocol operating at Layer 2 for use on IP networks
74
Most commonly used VPN Protocol
IPSec
75
Two Primary Components of IPsec
AH and ESP
76
VLAN
logically segment a network without altering its physical topology
77
NAT
Network Address Translation - convert the internal IP addresses found in packet headers into public IP addresses for transmission over the Internet
78
Class A IP Addresses
10.0.0.0-10.255.255.255
79
Class B Ranges IP Addresses
172.16.0.0-172.31.255.255
80
Class C Ranges IP Addresses
192.168.0.0-192.168.255.255
81
Committed Information Rate
guaranteed minimum bandwidth a service provider grants to its customers
82
Security Boundary
line of intersection between any two ares, subnets, or environment that have different security requirements or needs
83
DNS Poisoning
attackers alters the domain-name to IP address mappings in a DNS system to direct traffic to a rogue system
84
DNS Spoofing
attackers sends false replies to a requesting system
85
Vernam Chiper
One time pad, only mathematically unbreakable form of cryptography