Networking Flashcards

1
Q

ISO 7498

A

OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

OSImodel

A
Application
Presentation
Session
Transport
Network
Data Link
Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Converged Protocols

A

Standard protocols (like TCP/IP) mixed with proprietary protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fibre Channel over Ethernet (FCoE)

A

Converged Protocol. High-speed network data storage (storage area network SAN) or network-attached storage (NAS) for file transfers.

Replaces IP at Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Multiprotocol Label Switching (MPLS)

A

Converged Protocol. Uses short labels to route traffic instead of long network addresses. Encapsulates with other transport mechanisms besides TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet Small Computer System Interface (iSCSI)

A

Converged Protocol. Network storage standard based on IP. Seen as cheaper alternative to FCoE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Voice over IP (VoIP)

A

Converged Protocol. Tunneling mechanism to support voice/data transfer over TCP/IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Software-Defined Networking (SDN)

A

Converged Protocol. Way to control network w/ software, freeing up how hardware is bought & configured. Don’t have to worry about IP addressing, subnets, etc. being programmed into or deciphered by hosting applications

Effectively network virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CDN

A

Content Delivery/Distribution Network
Geographical/logical load balancing. Low latency, high-availability. high perf, stability to hosted content.

CloudFlare, Akamai, Amazon CloudFront, CacheFly,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Emanation

A

(Wireless Networks)

transmission of data across electromagnetic signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wireless Cells

A

Areas where a wireless device can connect to a wireless access point. Can adjust the strength of the WAP to minimize un-authed user access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Wife networking amendments

A
.11 - 2 Mbps - 2.4GHz
.11a - 54 -        5
.11b - 11 -         2.4
.11g - 54         2.4
.11n -   200+   - 2.4/5
.11ac  - 1GB      - 5Ghz
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Infrastructure Mode vs Ad-Hoc Mode

A

(WIFI)
WAPs configured to Infra, not ad-hoc.

In ad-hoc, two devices w/ wireless network cards can connect directly without centralized control authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Stand-Alone (Infra mode)

A

WAP connecting wireless clients to each other but not to to any wired devices.
Infra does. WAP serves as wireless hub exclusively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wired Extension (Infra Mode)

A

WAP acts as a connection point to link wireless clients to wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Enterprise Extended (Infra Mode)

A

multiple WAPs used to connected a large physical area to same network.

Each WAP uses the same extended service set identifier (ESSID) so clients can roam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Bridge Mode (Infra Mode)

A

WAP is used to connect to wired networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SSID

A

Service Set Identifier. Used to differentiate wireless networks.

BSSID: Basic Service Set Identifier. in Inframode, MAC address of base station hosting the ESSID
ESSID: extended service set ID. name of wireless network when WAP or wireless base station used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Beacon frame

A

Special transmission that WAPs use to broadcast SSID to available network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How to secure WAP/ SSID Beaconing

A

Use WPA2 for auth/encryption instead of hiding the SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Site survey

A

Physical survey to find weaknesses/spread of WiFi networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

OSA

A

Open System Authentication. A method to authenticate to WAPs because normal network comms can occur. basically means anyone can connect. As long as a radio signal can be transmitted, comms are allowed. Everything transmitted in clear text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SKA

A

Shared Key Authentication. A method to auth to WAPS.

Some form of auth must be performed. WEP is one example. Later amendments are WPA, WPA2, other

24
Q

Wireless Network Security

A
  • Secure WAPs (site survey, Secure SSID)
  • Secure Encryption Protocols (WEP, WPA, WPA2, 802.1X/EAP)
  • Antenna placement
25
WEP
Wired Equivalent Privacy. Same level of security to wireless networks as on wired. Static shared secret key to encrypt all messages, provides hash (confidentiality + integrity). Uses RC4 cipher. Easy to crack, so not recommended.
26
WPA
WiFi protected Access Replaced WEP. Uses LEAP/TKIP cryptosystems to secure communications, but one secret key per host. Still vulnerable to brute force.
27
WPA2
Improvement on WFA per 802.11i. New method of securing: | Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP), based on AES.
28
802.1X/EAP
Extensible Auth Protocol: framework for new auth mechanisms to be incorporated into wireless comms PEAP, LEAP, MAC Filter, TKIP, CCMP
29
General Wifi Security Procedure
1. Change default admin password 2. Disable SSID broadcast 3. Change the SSID to something unique 4. Enable MAC filtering 5. Consider using static IP addresses, or configure DHCP with reservations 6. Turn on highest form of auth and encrytpion supported (WPA2) 7. Treat wireless as remote access, and manage access w/ 802.1X 8. Treat wireless as external access, and separate WAP fro Wired using a firewall 9. Treat wireless as entry point and monitor WAP-to-wired with IDS 10. Require VPN.
30
Intranet vs extranet
Intranet: totally internal internet. Extranet: combo of intra + public internet, common as DMZ
31
NAC
Network access control. Control access to an environment through strict adherence to set of policies. - Reduce 0days - Enforce sec policy throughout network - Use identities to perform access control
32
Firewalls
Filter/block network traffic coming in/out of network. Often between internal vs public internet, but can be anywhere. Can't block viruses or malware. Single, two-, and three-tiered deployment. 2.1 = split, 3.2 = split
33
Repeaters, Concentrators, Amplifiers
Layer 1 tools that used to strengthen comms signal over cable segment, connect segments over same protocol.
34
Hubs
Connect multiple systems and connect network segments using same protocol. Broadcasts incoming data across all outbound ports. Multiport repeater. Not great for sec
35
Modems
Modulates between analog carrier signal and ditial information. Mostly replaced by ISDN, cable modems, DSL modems, wifi, etc.
36
Bridges
Connect two networks together (of different types) of same protocol.
37
Switches
Not hub - forwards to one port to the specific destination
38
Router
Layer 3, control traffic flow on networks. Static defined routing table or dynamic routing system
39
Ring topology
Ring topology, only one device can send data at a time, with the use of a token that's passed around in one direction.
40
Bus Topology
One central trunk, devices off it. Collisions can occur. to prevent, everyone listens for any other occurring traffic, waits until coast is clear. also more resilient against single segment failures. Linear vs tree. Not used much because must be terminated at both eneds, and any disconnection can take down the entire network
41
Star topology.
Uses central connection device. Logical bus or logical ring can be applied on top of physical star implementation
42
Mesh topology
Many paths between systems.
43
Frequency Hopping Spread Sprectrum
Spread spectrum comms. | Bits of message are sent sequentially at different frequency bands
44
Direct Sequence Spread Spectrum
Spread spectrum comms. | Sends parts of message in parallel across all available frequencies at same time
45
Orthogonal Frequency-Division Multiplexing
Spread spectrum comms. | Modulated signals are perpendicular to minimize interferece
46
Bluetooth Risks
Personal Area Network. pairing over 2.4 GhZ 4 digit code (easy to BF) Bluesnarfing: connect w/o knowledge and collect data Blue bugging: remote control over bluetooth device Bluejacking: transmit SMS-like messages
47
LAN technologies
Ethernet Token Ring Fiber Distributed Data Interface (FDDI)
48
Ethernet
LAN Allows numerous devices to communicate, but have to do collision detection and avoidance. Broadcast and collision domains Full-duplex Twisted-pair cabling Uses frames for units Most often star/bus technologies
49
Token ring
LAN | Token passing mechanism. Can be deployed on ring or star topologies
50
Fiber Distributed Data Interface
FDDI. LAN | 2 token rings in opposite directions.
51
LAN Media Access
Used to prevent or avoid transmission collisions. ``` CSMA CSMA/CA CSMA/CD Token Passing Polling ```
52
Carrier-Sense Multiple Access
CSMA 1. Host listens to LAN media to determine whether in use 2. If LAN not being used, transmits 3. Host waits for acknolwedgement 4. If no ack after a timeout, host starts over at stpe 1
53
CSMA with Collision Avoidance
1. Host has inbound + output lines 2. Host listens to LAN media to see if not being used. If not, requests permission to send 3. If receives permission sends. If not, step 1 4. If permission granted, transmits comms over outbound 5. Waits for ack 6. If no ack received after timeout, starts over at step 1
54
CSMA Collection Detection
CSMA/CD 1. Host listens to LAN media to determine if in use 2. If not in use, transmits comms 3. While transmitting, listens for collision 4. If collision detection, transmit a jam signal 5. If jam signal received, all hosts stop tramsitting. Each host waits a random period of time then starts over at step 1 Ethernet.
55
Token Passing
LAN media system to prevent collision
56
Polling
LAN media access technology that uses master + slave config.
57
UTP Categories
``` Cat 1: Voice only (modems) Cat 2: 4 Mpbs - mainframes Cat 3: 10M: 10BaseT ethernet networks, phone cables Cat4: 16 - Token ring Cat5: 100 - 100Base-TX, FDDI, ATM Cat6: 1K - high-speed Cat 7: 10Gpbs 10 gig-speed networks ```