Domain 4: Communication and Network Security Flashcards Preview

CISSP > Domain 4: Communication and Network Security > Flashcards

Flashcards in Domain 4: Communication and Network Security Deck (85):
1

Communications between computers over networks are made possible by ________

Protocols

2

Protocols

Set of rules and restrictions that define how datat is transmitted iver a network medium

3

OSI Layers

Physical, Data Link, Network, Transport, Session, Presentation, Application

4

Encapsulation

Addition of a header to the data received by each layer from the layer above before it's handed off the the layer below

5

What does the Physical Layer do?

Accepts frame from Data Link layer and converts into bits for transmission

6

What does the Data Link Layer do?

protocols convert the packet into the proper format for transmission (i.e. Ethernet), adds MAC address

7

ARP and RARP

Address Resolution Protocol and Reverse ARP - resolve IP to MAC addresses and vice versa

8

2 Data Link sublayers

Logical Link Control and MAC

9

What does the Network Layer do?

adds routing and addressing information to the datagram or segment to create a packet (ICMP)

10

What does the Transport Layer do?

managing the integrity of a connection, receives data stream/PDU

11

What does the Session layer do?

establishes, maintains, and terminates communication sessions

12

What does the Presentation layer do?

transforms data received from the Application layer into a format that any OSI model system can understand, interface btwn network and apps (encrypts and compresses)

13

What does the Application layer do?

interfacing user applications with the protocol stack

14

TCP/IP Model to OSI Model

Application, Presentation, Session = Application
Transport = Transport
Network = Internet
Data Link, Physical = Link

15

Difference btwn TCP and UDP

TCP is full duplex connection-oriented, UDP is simplex connectionless

16

Which ports are registered software ports?

1024-49151

17

Which ports are known as random, dynamic, or ephemeral ports?

49152-65535

18

Describe the three-way handshake.

Clients sends SYN, server responds with a SYN/ACK, Client responds with an ACK

19

IGMP is used to support what?

Multicasting

20

IP header protocol field value for ICMP

1 (0x01)

21

ICMP type field values (0, 3, 5, 8, 9, 10, 11)

0- echo reply
3- destination unreachable
5- redirect
8- echo request
9- router advertisement
10- router solicitation
11- time exceeded

22

Telnet Port

TCP Port 23

23

FTP Port

TCP Ports 20 and 21

24

TFTP Port

UDP Port 69

25

SMTP Port

TCP Port 25

26

HTTP Port

TCP Port 80

27

IMAP Port

TCP Port 143

28

DHCP Port

UDP Ports 67 and 68

29

HTTP Port

TCP Port 80

30

SSL/ HTTPS Port

TCP Port 443

31

LPD Port

TCP Port 515

32

X Window Port

TCP Ports 6000-6063

33

BootP/DHCP Port

UDP Ports 67 and 68

34

NFS Port

TCP Port 2049

35

SNMP Port

UDP Port 161 and 162

36

Data Emanation

transmission of data across electromagnetic signals

37

802.11 Wireless Network Amendments, Speed and Frequency

802.11 - 2 Mbps, 1.4 GHz
802.11a -54 Mbps, 5 GHz
802.11b - 11 Mbps, 2.4 GHz
802.11g - 54 Mbps, 2.4 GHz
802.11n - 200 Mbps, 2.4 or 5 GHz
802.11ac - 1 Gbps, 5 GHz

38

Infrastructure Mode

wireless access point is required

39

Ad Hoc Mode

no centralized control authority

40

Stand Alone Mode

wireless access point connects wireless clients but no wired resources

41

Wired Extension Mode

wireless access point acts as a connection point to link wireless to wired

42

Enterprise Extended Mode

multiple wireless access points are used to connect a large physical area

43

Two Weaknesses of WEP

Static Common Key and Poor implementation of IV

44

WPA Weakness

single static passphrase

45

PEAP

Provides encryption for EAP

46

Captive Portal

Log in at hotel, cafe, etc.

47

Static Packet Filtering Firewalls

examines data from message header

48

Application Level Gateway Firewalls

filters based on the internet service used

49

Stateful Inspection Firewalls

evaluate the context of the network traffic

50

SKIP

Simple Key Management for Internet Protocol, protects session less datagram protocols

51

Software IP Encryption

Security protocol that provides authentication, integrity, and confidentiality using an encapsulation protocol

52

Secure Remote Procedure Call

Authentication service to prevent unauthorized execution of code on remote systems

53

Secure Sockets Layer and TLS

Protect comms between a web server and a web browser

54

Secure Electronics Transaction

Security protocol for transactions over the internet

55

CHAP

Challenge Handshake Authentication Protocol - encrypts credentials

56

Password Authentication Protocol

Transmits credentials in the clear

57

Extensible Authentication Protocol

Framework, not protocol, PEAP encapsulates EAP in a TLS tunnel

58

Phreaker

Malicious attackers who abuse phone systems

59

Black, Red, Blue and White Boxes (in terms of secure voice comms)

Trick phones. Black manipulates line voltage, Red mimics the sound of coins, Blue simulates tones to connect with trunk, and White controls the phone system

60

S/MIME

Secure Multipurpose Internet Mail Extensions - email security standard that offers authentication and confidentiality

61

MIME Object Security Services

Authentication, confidentiality, integrity, and nonrepudiation

62

Privacy Enhanced Mail

Email encryption, C, I, Authentication and Nonrepudiation

63

Pretty Good Privacy

Public-Private key system that encrypts files and email messages

64

RADIUS

Centralized remote auth service for dial up connections, server sends logon creds to RADIUS server for authentication

65

TACACS+

Centralized remote auth service, two factor authentication

66

VPN

comms tunnel that provides point to point transmission of authentication and data traffic

67

Tunneling

network communication process that protects the contents of protocol packets by encapsulating them in packets of another protocol

68

4 Common VPN Protocols

PPTP, L2F, L2TP, and IPSec

69

RADIUS and TACACS

Remote Auth Services

70

S/MIME, MOSS, PEM, PGP

Email Security Solutions

71

CHAP, PAP, EAP

Authentication Protocols

72

SKIP, swIPe, S-RPC, SSL, TLS, SET

Secure Communication Protocols

73

PPTP

Point to Point Tunneling Protocol- encapsulation protocol operating at Layer 2 for use on IP networks

74

Most commonly used VPN Protocol

IPSec

75

Two Primary Components of IPsec

AH and ESP

76

VLAN

logically segment a network without altering its physical topology

77

NAT

Network Address Translation - convert the internal IP addresses found in packet headers into public IP addresses for transmission over the Internet

78

Class A IP Addresses

10.0.0.0-10.255.255.255

79

Class B Ranges IP Addresses

172.16.0.0-172.31.255.255

80

Class C Ranges IP Addresses

192.168.0.0-192.168.255.255

81

Committed Information Rate

guaranteed minimum bandwidth a service provider grants to its customers

82

Security Boundary

line of intersection between any two ares, subnets, or environment that have different security requirements or needs

83

DNS Poisoning

attackers alters the domain-name to IP address mappings in a DNS system to direct traffic to a rogue system

84

DNS Spoofing

attackers sends false replies to a requesting system

85

Vernam Chiper

One time pad, only mathematically unbreakable form of cryptography