Domain 4 - Communications and Network Security Flashcards

1
Q

SSL (Application – layer 7 )

A

Two layered: SSL record protocol and handshake protocol. Same as SSH it uses
symmetric encryption for private connections and asymmetric or public key cryptography for peer
authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SMTP (Application – layer 7 )

A

Email queuing. Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Simple Networking Management Protocol (Application – layer 7 )

A

Collection of network information by polling the
devices from a management station. Sends out alerts – called traps - to an database called
Management Information Bases (MIBs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Presentation – layer 6

A

Compression/decompression and encryption/decryption. Uses acommon format to represent data, Standards like JPEG, TIFF, MID, ; Technology: Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Session - layer 5

A

Inter-host communication, logical persistent connection between peer hosts, a conversation, simplex,
half duplex, full duplex. Protocols as NSF, SQL, RADIUS, and RPC. Protocols: PAP, PPTP, RPC NFS SSL/TLS NETBIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Transport

A

End-to-end data transfer services and reliability. Technology: Gateways. Segmentation, sequencing,
and error checking at this layer.
Protocols: TCP, UDP, SSL, SSH-2,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fragmentation

A

– IP will subdivide a packet if its size is greater than the maximum allowed on a local
network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Simple Key Management for Internet Protocols

A

Provides high availability in encrypted

sessions to protect against crashes. Exchanges keys on a session by session basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ARP, Address resolution protocol

A

Used to match an IP address to a hardware MAC address. ARP
sends out broadcast to a network node to reply with its hardware address. It stores the address in a
dynamic table for the duration of the session, so ARP requests are only sent the first time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FRAMES

A

Translates data into bits and formats them into data frames with destination header and source
address. Error detection via checksums.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logical Link Control

A

Flow control and error notification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Packet-filtering firewalls (layer 3/4)

A

Use rules based on a packet’s source, destination, port or other basic information to determine whether or not to allow it into the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stateful packet filtering firewalls (layer 7)

A

Have access to information such as; conversation, look

at state table and context of packets; from which to make their decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application Proxy firewalls (layer 7)(3-7 actually)

A

Which look at content and can involve

authentication and encryption, can be more flexible and secure but also tend to be far slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Circuit level proxy (layer 5)

A

Looks at header of packet only, protects wide range of protocols and
services than app-level proxy, but as detailed a level of control. Basically once the circuit is allowed all
info is tunneled between the parties. Although firewalls are difficult to configure correctly, they are a
critical component of network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IEEE 802.15

A

is the standard for Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IEEE 802.3

A

Defines Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

802.11

A

Defines wireless

networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

802.20 d

A

Defines LTE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Class A network

A

1 and end at 127

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Class B

A

128 and end at 191

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Class C network

A

192 and end at 223

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SSL session key length

A

40bit to 256 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Ad hoc Mode

A

Directly connect two+ clients, no access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Infrastructure Mode
Connects endpoints to a central network, not directly to each other, need access point and wireless clients for IM mode wireless
26
WEP
Predecessor to WPA and WPA2, confidentiality, uses RC4 for encryption,
27
WPA
Uses TKIP for data encryption
28
WPA2
Based on 802.11i, uses AES, key management, reply attack protection, and data integrity, most secure, CCMP included, WPA2 ENTERPRISE Mode - uses RADIUS account lockout if a passwordcracker is used
29
LEAP
Cisco proprietary protocol to handle | problems with TKIP, security issues don’t use. Provides reauthentication but was designed for WEP
30
Fiber Distributed Data Interface (FDDI)
Form of token ring that has second ring that activates on error
31
Frame Relay WAN
Over a public switched network. High Fault tolerance by relaying fault segments to working.
32
SASL
Provides secure LDAP authentication
33
OpenLDAP
default, stores user PW in the clear
34
Client SSL Certificates
Used to identify clients to servers via SSL (client authentication)
35
S/MIME Certificates
Used for signed and encrypted emails, can form sign, and use as part of a SSO solution
36
MOSS
MIME Object Security Services, provides authentication, confidentiality, integrity, and nonrepudiation
37
OAuth
Ability to access resources from another service
38
OpenID
Paired with OAuth is a RESTful, JSON-based authentication protocol can provide identity verification and basic profile information, phishing attack possible by sending fake data
39
Broadband Technologies
ISDN, cable modems, DSL, and T1/T3 lines that can support multiple simultaneous signals. They are analog and not broadcast technologies.
40
CHAP
Challenge-Handshake Authentication Protocol, used by PPP servers to authenticate remote clients. Encrypts username and PW and performs periodic re authentication while connected using techniques to prevent replay attacks
41
CIR – (committed Information Rate)
Minimum bandwidth guarantee provided by service provider to customers
42
Data Streams
Occur at Application, Presentation, and Session layers
43
EAP, Extensible Authentication Protocol
An authentication framework. Effectively, EAP allows for new authentication technologies to be compatible with existing wireless or point-to-point connection technologies, extensible was used for PPP connections
44
FCoE
Fiber Channel Over Ethernet, allows existing high-speed networks to be used to carry storage traffic
45
iSCI
Internet Small Computer Interface, Converged protocol that allows location-independent file services over traditional network technologies. Cost less than Fiber. Standard for linking data storage sites
46
ISDN
PRI (Primary Rate Interface) bandwidth of 1.544 Mbps, faster than BRI’s 144 Kbps
47
MPLS
Multiprotocol Label Switching, high performance networking, uses path labels instead of network addresses, wide area networking protocol, label switching, finds final destination and then labels route for others to follow
48
PAP
Password Authentication Protocol, sends PW unencrypted
49
PEAP
Provides encryption for EAP methods and can provide authentication, does not implement CCMP, encapsulates EAS in a TLS tunnel
50
PPP
Point-to-Point Protocol, most common, used for dial up connections, replaced SLIP
51
RST flag
Used to reset or disconnect a session, resumed by restarting the connection via a new threeway handshake
52
SONET
Protocol for sending multiple optical streams over fiber
53
SYN FLOOD
TCP packets requesting a connection (SYN bit set) are sent to the target network with a spoofed source address. The target responds with a SYN-ACK packet, but the spoofed source never replies. This can quickly overwhelm a system’s resources while waiting for the half-open connections to time out. This causes the system to crash or otherwise become unusable. Counter: sync cookies/proxies, where connections are created later
54
Teardrop
The length and fragmentation offset fields of sequential IP packets are modified, causing the target system to become confused and crash. Uses fragmented packets to target a TCP flaw in how the TCP stack reassembles them.
55
TCP sequence number attack
Intruder tricks target to believe it is connected to a trusted host and then hijacks the session by predicting the targets choice of an initial TCP sequence number.
56
X25
``` Defines point-to-point communication between Data terminal Equipment (DTE) and Data Circuit Terminating Equipment (DCE) ```
57
Frame Relay
High performance WAN protocol designed for use across ISDN interfaces. Is fast but has no error correction, supports multiple PVCs, unlike
58
Synchronous Data Link Control
Works with dedicated leased lines permanent up. Data | link layer of OSI model
59
High-level Data Link Control
extension to SDLC also for mainframes. Uses data | encapsulation on synchronous serial links using frame characters and checksums. Also data link layer
60
High Speed Serial Interface
Defines electrical and physical interfaces to use for DTE/DCE communications. Physical layer of OSI
61
Baseband
only one single channel
62
Broadband
Multiple signal types like data, video, audio
63
Packet filtering routers
Sits between trusted and un-trusted network, sometimes used as boundary router. Uses ACL’s. Protects against standard generic external attacks. Has no user authentication, has minimal auditing
64
Screened-Host firewall system
``` Has both a packet-filter router and a bastion host. Provides both network layer (package filtering) as application layer (proxy) server. ```
65
Dual homed host firewall
Consists of a host with 2 NIC’s. One connected to trusted, one to untrusted. Can thus be used as translator between 2 network types like Ethernet/token ring. Internal routing capabilities must not be enabled to make it impossible to circumvent inspection of data.
66
Screened-subnet firewalls
Has also defined a De-Militarized Zone (DMZ) : a small networkbetween trusted an untrusted.
67
Socks firewall
Every workstation gets some Socks software to reduce overhead
68
TACACS+
Enhanced version with use of two factor authentication, ability to change user password, ability of security tokens to be resynchronized and better audit trails and session accounting
69
Remote | Authentication Dial-In User Service RADIUS
Client/server protocol, often leads to TACACS+. Clients sends their authentication request to a central radius server that contains all of the user authentication and network ACL’s RADIUS does not provide two way authentication, therefore it’s not used for router-to-router authentication. Port 1812. Contains dynamic password and network service access information (Network ACLs) NOT a SSO solution
70
DIAMETER
Remote connectivity using phone wireless etc, more secure than radius, cordless phone signal is rarely encrypted and easily monitored
71
Thinnet
10base2 with coax cables up to 185 meters
72
Thicknet
10Base5, coax up to 500 meters
73
Carrier Sense Multiple Access CSMA
for Ethernet. Workstations send out packet. If it doesn’t get an acknowledgement, it resends
74
CSMA with Collision Detection
Only one host can send at the time, using jamming signals for the rest.
75
PPTP, Point to Point tunneling protocol
* Works at data link layer of OSI * Only one single point-to-point connection per session * Point To Point protocol (PPP) for authentication and tunneling * Dial-up network use * Does not support EAP * Sends initial packets in plaintext
76
L2F, Layer 2 Forwarding
• Cisco developed its own VPN protocol called which is a mutual authentication tunneling mechanism. • L2F does not offer encryption. L2F was not widely deployed and was soon replaced by L2TP. • both operate at layer 2. Both can encapsulate any protoco
77
L2TP, Layer 2 tunneling protocol
* Also in data-link layer of OSI * Single point-to-point connection per session * Dial-up network use * Port 115 * Uses IPsec
78
IPSEC
Operates at Network Layer of OSI • Enables multiple and simultaneous tunnels • Encrypt and authenticate • Built into IPv6 • Network-to-network use • Creates a private, encrypted network via a public network • Encryption for confidentiality and integrity
79
IPSEC tunneled vs transport
* transport: data is encrypted header is not | * tunneled: new uses rc6; IP header is added, old IP header and data is encrypted
80
TLS – Transport Layer Security
• Encrypt and protect transactions to prevent sniffing while data is in transit along with VPN and IPsec • most effective control against session hijacking • ephemeral session key is used to encrypt the actual content of communications between a web server and client • TLS - MOST CURRENT not SSL!!
81
PVC
Permanent virtual circuits, is like a dedicated leased line; the logical circuit always exists and is waiting for the customer to send data. Like a walkie-talkie
82
SVC
Switched virtual circuit, is more like a shortwave or ham radio. You must tune the transmitter and receiver to a new frequency every time you want to communicate with someone
83
IP-sec compatible | • Encryption via Tunnel mode
Entire data package encrypted)
84
IP-sec compatible - Transport mode
Only datagram encrypted
85
Socks-based proxy servers
Used to reach the internal network from the outside. Also contains strong encryption and authentication methods
86
.ESP Header
contains information showing which security association to use and the packet sequence number. Like the AH, the ESP sequences every packet to thwart replay attacks
87
ESP Payload
Payload
88
FHSS
Frequency Hopping Spread Spectrum, The entire range of available frequencies is employed, but only one frequency at a time is used.
89
DSSS
Direct Sequence Spread Spectrum, employs all the available frequencies simultaneously in parallel. This provides a higher rate of data throughput than FHSS. DSSS also uses a special encoding mechanism known as chipping code to allow a receiver to reconstruct data even if parts of the signal were distorted because of interference.
90
OFDM
Orthogonal Frequency-Division Multiplexing, employs a digital multicarrier modulation scheme that allows for a more tightly compacted transmission. The modulated signals are perpendicular and thus do not cause interference with each other.
91
T1
1,5 Mbps through telephone line
92
T3
44,7 Mbps through telephone line
93
E1
European 2048 Mbps digital transmission
94
• Serial Line IP (SLIP)
TCP/IP over slow interfaces to communicate with external hosts (Berkley UNIX, windows NT RAS), no authentication, supports only half-duplex communications, no error detection, manual link establishment and teardown
95
Point to Point protocol (PPP)
Improvement on slip, adds login, password and error (by CHAP and PAP) and error correction. Data link.
96
Integrated Services Digital Network
Combination of digital telephony and data transports. | Overtaken by xDSL, not all useable due to “D Channel” used for call management not data
97
xDSL Digital subscriber Line
- uses telephone to transport high bandwidth data to remote subscribers
98
ADSL
Asymmetric. More downstream bandwidth up to 18,000 feet over single copper cable pair
99
SDSL
Symmetric up to 10,000 feet over single copper cable pair
100
HDSL
High Rate T1 speed over two copper cable pairs up to 12,000 feet
101
VDSL
Very High speed 13-52MBps down, 1,5-2,3 Mbps upstream over a single copper pair over 1,000 to 4,500 feet
102
Circuit-switched networks
There must be a dedicated physical circuit path exist during transmission. The right choice for networks that have to communicate constantly. Typically for a telephone company network Voice oriented. Sensitive to loss of connection
103
Packet-switched networks
More cost effective than | circuit switching because it creates virtual circuits only when they are needed.