ISOC and SSL Flashcards

1
Q

Responsibilities of IETF

A

Applications Area, Internet Area, Network Management, OSI integration, Routing area, Security Area, Transport and service area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IETF

A

Internet Engineering Task Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IANA

A

Internet Assigned Number Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Responsibilities of IANA

A

Coordinate assigned values of protocol parameters, Type codes, Protocol numbers, Port numbers, Internet addresses and Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IRTF

A

Internet Research Task Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Responsibilities of IRTF

A

End to End research, Autonomous networks, Electronic libraries, Internet Architecture, Electronic Communities, Resource discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCPIP Architecture Design

A

Layered design, makes it easier for future developments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3 Levels of TCPIP Architecture

A

Connectionless Oriented Delivery (IP, Network Layer). Transport Layer Services (using IP). Highest Level is Application layer service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IETF RFC791 IPV4

A

Routing layer diagram of the TCP IP suite. IP frame header contains routing info and control info associated with datagram delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPv6 / IPnG

A

Increases address size from 32bits to 128 to support more levels of addressing. Adds scalability of multicast addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Anycast address

A

sends a packet to a group of nodes. added with ipv6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Advantages of IPv6

A

Efficient Formatting, Less Stringent Limits, Greater Flexibility. Support for extensions in headers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TCPIP Addressing Scheme (IPv4)

A

Nodes connected to IP network. 32 bit addresses. IP contains NetID and HostID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCPIP Address Classes

A

IP Address spaces are divided into fixed length structures called address classes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Class A

A

First bit of IP is 0. From 1.0.0.0 to 126.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Class B

A

First two bits of IP are 1 0. From 127.0.0.0 to 191.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Class C

A

First 3 bits are 1 1 0. 3 Bits for address class, 21 for network, 8 for host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Class D

A

first 4 bits are 1 1 1 0. Multicast address not a specific network. ex. Video Conferencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Class E

A

first 4 bits are 1 1 1 1. Special Reserved address. Doesn’t refer to specific networks. No numbers currently assigned in this range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Subnetting

A

Provides a way to extend network portion of IP beyond allocated bits. Uses a mask to host address to access subnetworks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Subnetting Overhead

A

Allocated bits for host identification

22
Q

Using Subnet Mask on IP

A

identifies network and node parts of address. Network bits represented by 1 and node by 0. Doing logical AND between these gives network address.

23
Q

Default Subnet Masks

A

Class A - 255.0.0.0
Class B - 255.255.0.0
Class C - 255.255.255.0

ex use C for smaller groups

24
Q

Limit of nodes part of address in subnet

A

196 nodes instead of 254 since subnetting has better traffic isolation and security

25
Q

CIDR

A

Classless interdomain Routing. Invented to keep from running out of IPs. Classful system was wasteful. Extends classful system, allocating only the amount of space needed

26
Q

Subnet Mask Notation in CIDR

A

Reduced. Listed as the number of 1s that start the mask.

27
Q

SSL

A

Secure Sockets Layer Protocol. Universally accepted over WWW for authenticated and encrypted communication between client and server.

28
Q

Transport Layer Security

A

TLS, based on SSL. IETF standard

29
Q

Where does the SSL protocol run

A

Above TCP/IP but below high level protocols such as HTTP, IMAP.

30
Q

SSL uses TCP on behalf of higher protocols to allow:

A

SSL enabled server to auth SLL enabled client
Client Auth to server
Encrypted connection between both parties

31
Q

SSL Protocol addresses concerns:

A

SSL Server authentication
SSL client authentication
Encrypted SSL connection

32
Q

SSL Server authentication

A

Can use standard techniques of public key cryptography to check server certificate and public IP is valid and certified.

33
Q

SSL client authentication

A

Allows server to confirm user’s identity, using the same techniques for server authentication

34
Q

Encrypted SSL connection

A

Requires all info sent between client and server to be encrypted by sending and decrypted by receiving software.

35
Q

SSL Sub protocols

A

SSL Record And SSL Handshake

36
Q

SSL Record

A

Defines format to transmit data

37
Q

SSL Handshake

A

Uses record to exchange series of messages between SSL server and client connection

38
Q

SSL exchange of messages is designed to facilitate the following:

A

Authenticate server to client
Allow client and server to select cyptographic algorithms
Authenticate client to server
Use public key encryption and generate shared secret
Establish an SSL connection

39
Q

Ciphers used with SSL

A

DES (Data Encryption Standard)
DSA (Data signature algorithm)
KEA (Key exchange method)
MD5 (Message Digest Algorithm)
SHA-1

40
Q

Most commonly used SSL Cipher

A

RSA key exchange

41
Q

Key exchange algorithms

A

govern how server and client determine symmetric keys they will both use during session.

42
Q

Cipher suites with RSA key exchange

A

Triple DES, RC4, RC2, DES, all support encryption and authentication

43
Q

What key encryption does SSL protocol use

A

a mix of public and symmetric key encryption

44
Q

SSL begins session with

A

Handshake. Allow server to authenticate and cooperate with client for encryption.

45
Q

SSL Handshake Process

A

Go check the notes for this

46
Q

Client encrypts premaster secret with

A

servers public key

47
Q

What can decrypt premaster secret?

A

private key that corresponds to it.

48
Q

Client Authentication cyptography

A

client encrypts random data with its private key. Public key in clients certificate can correctly validate the signature only if private key was used.

49
Q

VLAN

A

Group of isolated devices on a LAN. Subgroup of LAN and segregation of data. Can be addressed by MAC address of TCP.

50
Q

IP orientation

A

connectionless oriented

51
Q

TCP orientation

A

connection oriented