Final Flashcards

(65 cards)

1
Q

A device that can filter traffic based on source or destination addresses is called a:

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Briefly describe the OSI model.

A

A model used in networking which breaks up communications into 7 abstract layers. The layers communicate with each other using encapsulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Briefly describe the purpose of a VPN.

A

Virtual Private Network is used to securely access resources over a non-secure public network connection, using an encrypted tunnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Briefly describe what NAT does.

A

Network Address Translation modifies IP headers to change the source/destination IP/ports for the purposes of mapping one address to another. It can be used, for example, to let many devices on a private network all share one public IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the TCP 3-way handshake.

A

It is the start of a TCP connection. Host A send a packet with the SYN flag set. Host B responds with a SYN/ACK. Host A then confirms the connection by sending an ACK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give an example of a Layer 1 medium.

A

Copper or fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give an example of a link-state routing protocol.

A

OSPF or IS-IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How many bits is an IPv4 address?

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How many bits is this subnet: 255.255.255.0?

A

24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How many individual copper wires are in a Cat5e cable?

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How many layers are in the OSI model?

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If your network address is 192.168.12.0/24, how many IP addresses are available on this network?

A

256 total, 254 usable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In TCP, what happens if a packet is lost?

A

TCP will notice a packet that is not acknowledged and retransmit it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In TCP, what’s the purpose of the FIN packet?

A

To end a TCP connection nicely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In a TCP connection, when the sender advertises a window size, what does this tell the receiver?

A

This tells the receiver how much data the sender is willing to accept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In which layer does an ethernet switch run?

A

layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Is the IP protocol ““best effort”” or does it guarantee delivery?

A

Best effort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

List an advantage and a disadvantage of using layered protocols.

A

One advantage is abstraction. One layer can be changed without affecting other laters. One disadvantage is the overhead of going through so many layers may slow communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

List the layers of the OSI model.

A
Physical
Data link
Network
Transport
Session
Presentation
Applcation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Name an advantage of fiber optic cabling over copper cabling.

A

Has more bandwidth. Can go further distance. Is not susceptible to EMI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is CSMA/CD?

A

It is one of the protocols used in Ethernet.
Carrier Sense – the device can tell when someone is talking on the channel or when the channel is idle. Multiple Access – let’s multiple devices use the same channel.
Collision Detection – detection when two devices talk and the same time and their frames collide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Dynamic Host Control Protocol (DHCP) used for?

A

Used to distribute network information (IP, Netmask, DNS, router, etc) to clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a DNS root server?

A

One of 13 servers around the globe responsible for handling top level domain name requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is encapsulation?

A

Encapsulation is adding more data to a packet as it travels down the layers of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the ping of death?
A malicious attack used by sending an oversize ping request. The victim would not expect a ping of this size and would typically crash.
26
What is the purpose of a Regional Internet Registry, such as ARIN?
To distribute IP address blocks in a region of the world.
27
What is the purpose of networking?
To communicate
28
What port does the SMTP protocol run on?
25
29
What type of address is hardcoded into an ethernet adapter?
MAC address
30
What type of address is this: 00:25:4b:a0:c2:d0?
MAC Address
31
What's a common frequency that wireless networks use?
2.4ghz or 5ghz
32
What's a common protocol that runs at Layer 2?
Ethernet, ADSL, DOCSIS
33
What's a common protocol that runs at Layer 3?
IP
34
What's an advantage of a ethernet switch over an ethernet hub?
A switch is “smart” and learns which devices are plugged into which ports, and will not unnecessarily broadcast unneeded data across the network.
35
What's the purpose of a CNAME record in DNS?
Canonical name is a DNS alias.
36
When a DNS server looks up an address, it may store the response in case another client later asks for the same address. What is this called?
Caching
37
When would you want to use a protocol where it doesn't matter if you lose packets?
When transmitting real-time data such as voice and video.
38
Which is more susceptible to electro-magnetic interference, copper or fiber?
Copper
39
Which routing protocol let's autonomous systems share routing information and build the global Internet routing tables?
BGP
40
Which type of network topology has more redundancy, star or ring?
Ring
41
What is the key to IP scalability?
Hierarchical address allocation
42
Which protocol will retransmit a lost packet?
TCP
43
The order of rules in a firewall is important. True or false?
True
44
What is cryptography?
1. "secret writing" | 2. Encryption/Decryption of messages to protect against unauthorized viewers
45
What is an advantage of Symmetric Encryption over Public Key Encryption?
Symmetric is a lot faster.
46
What is Symmetric Encryption?
Symmetric is traditional encryption. give it a password, and you can encrypt and decrypt with that password.
47
What is public key encryption?
A cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message. When John wants to send a secure message to Jane, he uses Jane's public key to encrypt the message. Jane then uses her private key to decryptit.
48
What is digital signature?
When you digitally sign, take a hash of the clear text, and encrypt that with your own private key, and send it. Other user can decrypt it with your public key.
49
What is CIA? Explain each one.
Confidentiality: Concealment of information or resources. Integrity: Trustworthiness of resources or resources in terms of preventing improper or unauthorized changes. Availability: data is on-line and you can retrieve it
50
Routing tables, ospf | What is your default route that matches everything?
0.0.0.0
51
SSL Certificates | What is CA?
CA (certificate authority) guys that issue certificates
52
SSL Certificates | What is CSR?
CSR(Certificate Signing Request) is a document you send to a CA to get their stamp of approval and added to their list of people
53
What is IPSEC?
Encryption at layer 3. If you encrypt at layer 3, everything above it will....
54
What is IPSEC used for?
IPSEC is used for authenticating and encrypting IP packets of a communication session.
55
DNS Cache Poisoning
A nameserver authoritative for one domain returns DNS information for itself as well as other domains that really don't go to where they should (i.e www.evil.com returns section(www.evil.com, 1.2.3.4,A) and the section(www.cnn.com,5.6.7.8,A) but its not the real cnn..get it? it's poisoning the cache lol)
56
AAA (Authentication, Authorization, Accountability)
Authentication: confirming identity of subject(Who dey is,man?) Authorization: determining what the subject can do (What dey doing, man?) Accountability: association subjects to their actions(This nigga right here! he the one who do that)
57
Black Hat Gray Hat White Hat
- a guy that does bad shit, they suck.(Joffery Baratheon) - a guy that just does his shit and gets by, ya never really know about these guys (Tyrion Lannister) - a guy that does the good shit, they good (Jaime Lannister, after he stopped fucking Cersei)
58
Stateful Firewall
Firewall that keeps track of network connections, once a connections is established, it remembers it and doesn't check the packets. One of the rare times in security where you get both efficiency and security.
59
Discretionary Access Control (DAC)
- user decided | - user can make and implement policy decisions
60
Mandatory Access Control (MAC)
- System decided - system implements central security policy - user cannot override policy
61
P2P bitTorrent
- Distribute the same file to many peers. - Single publisher, many downloaders. - Emphasis on efficient fetching, not searching. - To prevent freeloading, there are incentives for peers to contribute.
62
P2P Gnutella
- fully decentralized - search cost distributed to all connected clients - large scope for searching, requires long time - high overhead
63
What is a Man in The Middle Attack?
As an attacker, inserting yourself in the center. Forcing all of the traffic to go through you, making you see it all and having the ability to modify the data.
64
What is nmap?
(Network Mapper) is a security scanner used to discover hosts and services on a computer network, thus creating a "map" of the network.
65
What is nmap used for?
Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.