ISOC and SSL Flashcards

1
Q

Responsibilities of IETF

A

Applications Area, Internet Area, Network Management, OSI integration, Routing area, Security Area, Transport and service area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IETF

A

Internet Engineering Task Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IANA

A

Internet Assigned Number Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Responsibilities of IANA

A

Coordinate assigned values of protocol parameters, Type codes, Protocol numbers, Port numbers, Internet addresses and Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IRTF

A

Internet Research Task Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Responsibilities of IRTF

A

End to End research, Autonomous networks, Electronic libraries, Internet Architecture, Electronic Communities, Resource discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCPIP Architecture Design

A

Layered design, makes it easier for future developments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3 Levels of TCPIP Architecture

A

Connectionless Oriented Delivery (IP, Network Layer). Transport Layer Services (using IP). Highest Level is Application layer service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IETF RFC791 IPV4

A

Routing layer diagram of the TCP IP suite. IP frame header contains routing info and control info associated with datagram delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPv6 / IPnG

A

Increases address size from 32bits to 128 to support more levels of addressing. Adds scalability of multicast addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Anycast address

A

sends a packet to a group of nodes. added with ipv6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Advantages of IPv6

A

Efficient Formatting, Less Stringent Limits, Greater Flexibility. Support for extensions in headers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TCPIP Addressing Scheme (IPv4)

A

Nodes connected to IP network. 32 bit addresses. IP contains NetID and HostID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCPIP Address Classes

A

IP Address spaces are divided into fixed length structures called address classes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Class A

A

First bit of IP is 0. From 1.0.0.0 to 126.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Class B

A

First two bits of IP are 1 0. From 127.0.0.0 to 191.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Class C

A

First 3 bits are 1 1 0. 3 Bits for address class, 21 for network, 8 for host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Class D

A

first 4 bits are 1 1 1 0. Multicast address not a specific network. ex. Video Conferencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Class E

A

first 4 bits are 1 1 1 1. Special Reserved address. Doesn’t refer to specific networks. No numbers currently assigned in this range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Subnetting

A

Provides a way to extend network portion of IP beyond allocated bits. Uses a mask to host address to access subnetworks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Subnetting Overhead

A

Allocated bits for host identification

22
Q

Using Subnet Mask on IP

A

identifies network and node parts of address. Network bits represented by 1 and node by 0. Doing logical AND between these gives network address.

23
Q

Default Subnet Masks

A

Class A - 255.0.0.0
Class B - 255.255.0.0
Class C - 255.255.255.0

ex use C for smaller groups

24
Q

Limit of nodes part of address in subnet

A

196 nodes instead of 254 since subnetting has better traffic isolation and security

25
CIDR
Classless interdomain Routing. Invented to keep from running out of IPs. Classful system was wasteful. Extends classful system, allocating only the amount of space needed
26
Subnet Mask Notation in CIDR
Reduced. Listed as the number of 1s that start the mask.
27
SSL
Secure Sockets Layer Protocol. Universally accepted over WWW for authenticated and encrypted communication between client and server.
28
Transport Layer Security
TLS, based on SSL. IETF standard
29
Where does the SSL protocol run
Above TCP/IP but below high level protocols such as HTTP, IMAP.
30
SSL uses TCP on behalf of higher protocols to allow:
SSL enabled server to auth SLL enabled client Client Auth to server Encrypted connection between both parties
31
SSL Protocol addresses concerns:
SSL Server authentication SSL client authentication Encrypted SSL connection
32
SSL Server authentication
Can use standard techniques of public key cryptography to check server certificate and public IP is valid and certified.
33
SSL client authentication
Allows server to confirm user's identity, using the same techniques for server authentication
34
Encrypted SSL connection
Requires all info sent between client and server to be encrypted by sending and decrypted by receiving software.
35
SSL Sub protocols
SSL Record And SSL Handshake
36
SSL Record
Defines format to transmit data
37
SSL Handshake
Uses record to exchange series of messages between SSL server and client connection
38
SSL exchange of messages is designed to facilitate the following:
Authenticate server to client Allow client and server to select cyptographic algorithms Authenticate client to server Use public key encryption and generate shared secret Establish an SSL connection
39
Ciphers used with SSL
DES (Data Encryption Standard) DSA (Data signature algorithm) KEA (Key exchange method) MD5 (Message Digest Algorithm) SHA-1
40
Most commonly used SSL Cipher
RSA key exchange
41
Key exchange algorithms
govern how server and client determine symmetric keys they will both use during session.
42
Cipher suites with RSA key exchange
Triple DES, RC4, RC2, DES, all support encryption and authentication
43
What key encryption does SSL protocol use
a mix of public and symmetric key encryption
44
SSL begins session with
Handshake. Allow server to authenticate and cooperate with client for encryption.
45
SSL Handshake Process
Go check the notes for this
46
Client encrypts premaster secret with
servers public key
47
What can decrypt premaster secret?
private key that corresponds to it.
48
Client Authentication cyptography
client encrypts random data with its private key. Public key in clients certificate can correctly validate the signature only if private key was used.
49
VLAN
Group of isolated devices on a LAN. Subgroup of LAN and segregation of data. Can be addressed by MAC address of TCP.
50
IP orientation
connectionless oriented
51
TCP orientation
connection oriented