Domain 4. Networking Flashcards
What is the function of ARP (Address Resolution Protocol)?
MAC to IP translation
What is the function of IGMP (Internet Group Messaging Protocol)?
Used for multicasting
What is the function of ICMP (Internet Control Messaging Protocol)?
Used for troubleshooting and error messaging - ping, tracert
What is the function of IP (Internet Protocol)?
Used for addressing and routing
How many bits is IPv4?
32-bit, 4-octet identifier
How many bits in IPv6?
128-bit HEX identifier
What is the function of UDP (User Datagram Protocol)?
Connection-less delivery, no handshaking
What is the function of TCP?
Connection guaranteed delivery. Three-way handshake
What is the port?
A port is an identifier for an application within a computer. Port is associated with either UDP or TCP.
How many ports do we have?
65,535
“Well known ports” are…
1 - 1023
Dynamic ports (private ports) are …
49, 151 - 65,535
Registered ports are…
1024 - 49,151
DNSSEC
all responses from DNSSEC are digitally signed using public key encryption
What is MPLS?
Multiprotocol Label Switching - used to create cost effective, private Wide Area Networks (WANs) faster and more secure than regular routed “public” IP networks like the internet
More secure than the public internet, because a “virtual” private network (end-to-end circuit)can be built just for your organization
Layer 3 technology
Name 4 wireless network sizes
WPAN -> WLAN -> WMAN -> WWAN WPAN - personal area network WLAN - 802.11x network WMAN - connectst 802.11 network using 802.16 WWAN - point to point microwave links
What is Bluejacking?
Sending spam to nearby bluetooth devices
What is Bluesnarfing?
Copes information off remote device
Name 802.11 Access Modes?
WEP, WPA, WPA2
Name Wireless Attack Vectors
Passive:Sniffing, Eavesdropping, packet capture
MitM: Rogue Access Point, MAC impersonation, Replay Attack
DoS: Bogus requests, signal jamming, packet injection
WEP
broken ecryption, no integrity
WPA2
uses 801.11, EAP, AES and CBC-MAC
Encryption can be used to ensure … ?
Confidentiality
Hashing can be used to ensure … ?
Integrity