Domain 4. Networking Flashcards

1
Q

What is the function of ARP (Address Resolution Protocol)?

A

MAC to IP translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the function of IGMP (Internet Group Messaging Protocol)?

A

Used for multicasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the function of ICMP (Internet Control Messaging Protocol)?

A

Used for troubleshooting and error messaging - ping, tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the function of IP (Internet Protocol)?

A

Used for addressing and routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How many bits is IPv4?

A

32-bit, 4-octet identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How many bits in IPv6?

A

128-bit HEX identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the function of UDP (User Datagram Protocol)?

A

Connection-less delivery, no handshaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the function of TCP?

A

Connection guaranteed delivery. Three-way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the port?

A

A port is an identifier for an application within a computer. Port is associated with either UDP or TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How many ports do we have?

A

65,535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

“Well known ports” are…

A

1 - 1023

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dynamic ports (private ports) are …

A

49, 151 - 65,535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Registered ports are…

A

1024 - 49,151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DNSSEC

A

all responses from DNSSEC are digitally signed using public key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is MPLS?

A

Multiprotocol Label Switching - used to create cost effective, private Wide Area Networks (WANs) faster and more secure than regular routed “public” IP networks like the internet
More secure than the public internet, because a “virtual” private network (end-to-end circuit)can be built just for your organization
Layer 3 technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name 4 wireless network sizes

A
WPAN -> WLAN -> WMAN -> WWAN
WPAN - personal area network
WLAN - 802.11x network
WMAN - connectst 802.11 network using 802.16
WWAN - point to point microwave links
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Bluejacking?

A

Sending spam to nearby bluetooth devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Bluesnarfing?

A

Copes information off remote device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Name 802.11 Access Modes?

A

WEP, WPA, WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Name Wireless Attack Vectors

A

Passive:Sniffing, Eavesdropping, packet capture
MitM: Rogue Access Point, MAC impersonation, Replay Attack
DoS: Bogus requests, signal jamming, packet injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

WEP

A

broken ecryption, no integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

WPA2

A

uses 801.11, EAP, AES and CBC-MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Encryption can be used to ensure … ?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Hashing can be used to ensure … ?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Digital signature can be used to ensure … ?

A

non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Digital certificates can be used to ensure … ?

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How S/MIME can be used?

A

digitally sign and encrypt emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Eavesdropping

A

Violation of confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Tampering

A

Violation of integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Spoofing

A

violation of authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Digital signature

A

Message Digest (MD) encrypted with the private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

DMZ

A

Semi-trusted network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Enclave network

A

Segment within a trusted network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

NAT

A

used to translate internal IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

bridge

A

connects same protocol LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

TEMPEST

A

Emanation certification network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the goal of CDN

A

Server content to end users with high availability and high performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Name 4 VPN technologie

A

PPTP - point to point Tunneling Protocol
L2TP Layer 2 Tunneling Protocol
IPsec - internet protocol security
SSL - secure Socket Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

IPsec two different modes

A

Transport mode - used for end-2-end protection between client and server. IP payload is encrypted. Headers are not encrypted
Tunnel mode - server to server, gateway-gateway. Everything is encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Name IPsec securitry services

A

Authentication - Kerberos or preshared key or digital cert

Integrity - HMAC - hash messaged auth code

Confidentiality - 3DES, AES

Non-repudiation - digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

IPsec Authentication Header (AH)

A

provide data integrity, data origin authentication, replay protection. Can be used as standalone IPsec protocol if confidentiality is not required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

IPsec Encapsulating Security Payload (ESP)

A

All features of AH + symmetric encryption for payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

IPsec IKE

A

provides mechanism for device authentication and establishing security association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

IPsec SPI

A

Security Parameter Index (SPI)

includes algo that will be used (hashing encryption), key length and key information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the difference between IPsec transport mode and tunnel mode?

A

In transport mode only payload is encrypted, but in tunnel mode - entire packet is encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What PDU (Protocol Data Unit) and protocols is used in Layer 7 Application?

A

Application layer, Datastream

FTP, TFTP, SSH, IMAP, POP, HTTP, HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What PDU (Protocol Data Unit) and protocols is used at level 6 Presentation?

A

Presentation layer, Datastream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What PDU (Protocol Data Unit) and protocols is used at level 5 Session?

A

Session layer, Datastream

SQL, RPC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What PDU (Protocol Data Unit) and protocols is used at level 4?

A

Transport layer, Segment
TCP
UDP
SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What PDU (Protocol Data Unit) and protocols is used at level 3?

A

Network layer, Packets

IP, IPv6, IP NAT, ICMP, BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What PDU (Protocol Data Unit) and protocols is used at level 2?

A

Data link layer, Frames

Token ring, PPTP, L2TP, WLAN, Wi-Fi

52
Q

What PDU (Protocol Data Unit)and protocols is used at level 1?

A

Physical layer, Bits

53
Q

What is encapsulation?

A

Takes information from higher network layer and adds a header to it, treating the higher-layer information as data

54
Q

What layer 1 device provides basic physical connectivity?

A

Hub, modem, Wireless Access Point, cable, physical interface of NIC, repeater

55
Q

Name 3 different types of cables

A

Coaxial, Twisted Pair, FiberOpitc

56
Q

Name 4 Layer 1 network topolgies

A

Bus, Ring, Star, Mesh

57
Q

What is the most fault tolerant and redundant topology?

A

Mesh

58
Q

What threats exists in Physical Layer 1?

A

Sniffing, Interference, Data Emanation

59
Q

Name 2 sub-layers of Data Link layer

A

LLC - Logical link Control - error detection

MAC - Media Access Control

60
Q

ARP

A

Address Resolution Protocol. Takes known IP address and maps it to unknown MAC address. IP to MAC resolution. Broadcast base.

61
Q

RARP

A

Reverse Address Resolution Protocol.

Takes known MAC address and provides IP (basis for DHCP)

62
Q

ARP Poisoning, Cash Poisoning

A

Layer 2 attack. Uses unsolicited replies.

63
Q

MAC (Media Access Control) Mechanisms - collision control

A

CSMA/CD - Collision Detection
CSMA/CA - Collision Avoidance
Token passing

64
Q

How HUB works?

A

Sends all data out for all ports

65
Q

Name Layer 2 device

A

Switch, Switch doesn’t isolate broadcast, isolate collision domain

66
Q

What layer has IP address?

A

Layer 3

67
Q

What is Router?

A

Layer 3 device, router isolate broadcast domains

68
Q

Ping flood

A

Lots of ping traffic

69
Q

LOKI

A

sending data in ICMP messages - Covert Channel

70
Q

Which layer uses following protocols: icmp, ipsec, igmp, igrp

A

Layer 3. All protocols starting from i - are layer 3 protocol. Except imap!

71
Q

SMURF attack

A

uses spoofed source address (target) and direct broadcast to launch a DDoS

72
Q

Ingreess

A

Incomming traffic

73
Q

Egress

A

Outcomming address

74
Q

What is the goal of Layer 4 (Transport)

A

Provides End to End data transportation services

75
Q

Which protocols are used in Layer 4 (transport)?

A

SSL/TLS, TCP, UDP

76
Q

Across which layers SSL/TLS operates?

A

Layer 4-7

77
Q

What is the advantage of TCP?

A

Adds security
Easier to program with
Truly implements a sessio

78
Q

What is the disadvantage of TCP?

A

SYN Floods

Slower then UDP

79
Q

Describe TCP handshake

A

SYN
SYN/ACK
ACK
Has a guaranteed delivery based on handshake process

80
Q

Which protocol is used by TFTP

A

UDP

81
Q

Which protocol is used by FTP

A

TCP

82
Q

What is the function of Layer 5 (Session)?

A

Responsible for establishing a connection between two APPLICATIONS! (either on the same computer of two different coputers)

Create connection
Transfer data
Release connection

83
Q

What is the function of Layer 6 (Presentation)?

A

Present data in a format that all computers can understand..

84
Q

What OSI layer that doesn’t have any protocols?

A

Layer 6, Presentation layer

85
Q

What is the concern of Layer 6?

A

Concerned with encryption, compression and formatting

86
Q

What is the function of Layer 7?

A

Defines a protocol that two different programs or applications understand

87
Q

Name Layer 7 protocols

A

HTTP, HTTPS, FTP, TFTP, SMTP, SNMP,

88
Q

What is the disadvantage of the deep packet inspection?

A

Performance and expensive

89
Q

What is the key responsibility of Application layer?

A

User application service

90
Q

What is the key responsibility of Presentation layer?

A

Data translation, Compression and encryption

91
Q

What is the key responsibility of Session layer?

A

Session establishment, management and termination

92
Q

What is the key responsibility of Transport layer?

A

End to end connection, segmentation and reassembly

93
Q

What is the key responsibility of Network layer?

A

Logical Addressing, Routing, Datagram encapsulation, error handling

94
Q

What is the key responsibility of Data Link layer?

A

Logical Link Control (LLC), MAC Media Access Control, Data framing, Addressing, Error Detection

95
Q

What is the key responsibility of Physical layer?

A

Encoding & signaling, Physical data transfer, Topology and design

96
Q

Salami attack

A

Many small attacks add up to equal a large attack

97
Q

Data Diddling

A

Altering/Manipulation data, usually before entry

98
Q

Session Hijacking

A

Attacker steps in between

99
Q

Tear Drop

A

Sending Malformed packets which the Operating System does not know how to reassemble. Layer 3 attack

100
Q

Buffer Overflow

A

Attacks that overwhelm a specific type of memory on a system—the buffers. Is best avoided with input validation

101
Q

Bonk attack

A

Similar to the Teardrop attack. Manipulates how a PC reassembles a packet and allows it to accept a packet much too large.

102
Q

Land Attack

A

Creates a “circular reference” on a machine. Sends a packet where source and destination are the same.

103
Q

Syn Flood Attack

A

Type of attack that exploits the three way handshake of TCP. Layer 4 attack. Stateful firewall is needed to prevent

104
Q

Smurf attack

A

Uses an ICMP directed broadcast. Layer 3 attack. Block distributed broadcasts on routers

105
Q

Fraggle attck

A

Similar to Smurf, but uses UDP instead of ICMP. Layer 4 attack. Block distributed broadcasts on routers

106
Q

At which layer of OSI proxy operates

A

Layer 7 Application

107
Q

State full firewall

A

Keeps tracks of connections

108
Q

What is DMZ?

A

A buffer zone between an unprotected network and a protected network that allows for the monitoring and regulation of traffic between the two.

109
Q

What is multi-homed firewall

A

Multi-homed firewalls may be used to setup a DMZ with a single firewall.

110
Q

Internal Private Addresses (RFC1918)

A
  1. x.x.x
  2. 16.xx-172.31.x.x
  3. 168.x.x
111
Q

Name circuit switching technologies

A

DSL, ISDN, PSTN, t-carriers

112
Q

Name packet switching technologies

A

X.25, Frame relay, ATM, VOIP, MPLS, Cable modem

113
Q

What is the greatest security threat to VOIP

A

Eavesdropping

114
Q

Latency

A

Fixed Dely

115
Q

Jittering

A

Variable delay

116
Q

PPP description? What OSI layer?

A

Point to Point. Layer 2

117
Q

PPTP

A

Point to Point Tunneling Protocol
Uses EAP for authentication
Work only with IP networks

118
Q

L2TP

A

Layer 2 Tunneling Protocol

There is no security in L2TP

119
Q

Describe WEP Problems

A
Weak IV (24 bits)
IV transmitted in clear text
RC4 stream cipher
Easy crackable
No backward compatible
120
Q

Describe WPA Problems

A

Stronger IV
Introduced TKIP (temporary key integrity protocol)
Still used RC4

121
Q

Describe WPA2

A

AES
CCMP - key protection
Not backwards compatible

122
Q

Blue bugging

A

Allows use of the phone
Allows one to make calls
Can eavesdrop on calls

123
Q

WAP GAP

A

As the gateway decrypts from WTLS and encrypts as SSL/TLS, the data is plaintext. If someone could access the gateway, they could capture the communications

124
Q

TCP/IP model

A

Application
Transport
Internet
Link

125
Q

Common-mode noise (EMI)

A

Common-Mode noise occurs between hot and ground wires

126
Q

Traverse-mode noise (EMI)

A

Traverse-mode noise occurs between hot and neutral wires.