Networking Systems and Telecommunications Flashcards

1
Q

3 Different types of Backup Methods

A
  1. Differential ? copy all cumulative changes since last full. (takes more space than incremental)
  2. Incremental ? copy data changes since the last full.
  3. full
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 Types of RAID

A
  1. Failure Resistant Disk System(FRDS)
  2. Failure Tolerant System.
  3. Disaster Tolerant System.

only FRDS is currently developed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ARP

A

Address Resolution Protocol ? ARP matches ip address to an ethernet address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Back?door

A

access through a preprogrammed, unknown access point using DUN or external network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Buffer Overflow

A

DoS attack ? receipt of an excessive amount of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bus Data Network Topology

A

All transmissions of the network nodes travel the full length of the cable and are received by all stations. (Ethernet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CHAP Remote Access Protocol

A

Challenge Handshake Protocol ? authentication using an encrypted key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DSS Wireless Access Protocol

A

Direct Sequence Spread Spectrum ? Splits contents of message into smaller bits and decoded at receiver end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dual?homed firewall

A

2 NICS, one on internal side and one on external side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EAP?PEAP Remote Access Protocol

A

Protected EAP ? like EAP?TLS but easier to administer but less secure due to lack of client?side certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EAP?TLS Remote Access Protocol

A

Extensible Authentication Protocol, Transport Layer Security ? both client and server authenticate over TLS. Digital certificates are used.Can be confident user is authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EAP?TTLS Remote Access Protocol

A

Tunneled TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Eavesdropping

A

Interception of network communication either passive or active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FHSS Wireless Access Protocol

A

Frequency Hopping Spread Spectrum ? Provides no error recovery. Splits available signal bandwidth and segments it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ICMP

A

Internet Control Message Protocol ? used for diagnostics and error correction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mesh Data Network Topology

A

Nodes are connected to every other node in the network. Backbone redundant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name and describe the OSI (Open System Interconnect)Model Layers?

A
  1. Physical ? electrical and mechanical level(x.21, HSSI,MAC address)
  2. Data Link ? prep for transfer of data(PPP, SLIP, ARP)
  3. Network ? handles data routing(IP,ICMP)
  4. Transport ? negotiates the data exchange(TCP,UDP,SPX)
  5. Session ? coordinates conversations between apps(NFS,SQL,RPC)
  6. Presentation ? o/s that associates types of files to programs(TIFF,JPEG,MPEG)
  7. Application ? not the app, but supports the end?user app process(HTTP,FTP,SMTP,TELNET)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Name the TCP/IP Model layers?

A
  1. Link(Network Access) ? x.25,ethernet,token ring, frame relay(layers 1 & 2 of OSI)
  2. Network(Internet) ? IP, ARP, ICMP, IPsec) (layer 3 of OSI)
  3. Transport(host?to?host) ? TCP, UDP (layer 4 of OSI)
  4. Application ? HTTP, FTP (layers 5?7 OSI)
    3.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

PAP Remote Access Protocol

A

Password Authentication Protocol ? not encrypted but typically easy to implement on any network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Piggybacking

A

Accessing the system with another user’s valid entery, via incorrect logoff or open session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

PPP Remote Access Protocol

A

Point?to?Point ? i.e. Dial?up Networking (DUN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Ring Data Network Topology

A

network nodes are connected by unidirectional transmission links to form a closed loop.(token and FDDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Screened Host firewall

A

Uses a router to filter data before the data reaches the firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Screened subnet firewall

A

Uses an external router to review data and bounce back as necessary before reaching the subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Session Hijacking
Taking control of another user's network connection, via IP spoof.
26
SLIP Remote Access Protocol
Serial Link Internet Protocol ? connecting one network to another over a single physical line or via modems.
27
Smurf Attack
DoS attack ? causes severe congestion with ICMP ping response methods.
28
Spoofing
Convincing a network device to perform an authorized action by masquerading as a trusted user, resource, or file.
29
Star Data Network Topology
Most used today. Nodes are connected to a central LAN device directly.
30
SYN Flood Attack
DoS Attack ? A buffer of the TCP initialization flooded with connection requests.
31
Teardrop Attack
DoS Attack ? An altered offset field in IP packets confusing the system, causing it to crash.
32
Tree Data Network Topology
A version of bus that invorporates the use of branches
33
Trusted Network Interpretation(TNI) Evaluation Classes
``` D ? minimal protection C ? discretionary protection C1 ? discretionary security protection C2 ? Controlled Access Protection (No off the shelf system goes higher than this) B ? Mandatory protection B1 ? Labeled Security Protection B2 ? structured protection B3 ? security domains A1 ? verified protection ```
34
Unauthorized Access
Users using their user name and password to access data they are not authorized for.
35
WAP Wireless Access Protocol
Wireless Application Protocol ? over the internet
36
WEP
Wired Equivalent Privacy ? uses shared secret between client and access point. Can be decrypted in a short time.
37
WPA
WiFi Protected Access ? uses TKIP
38
WPA2
WEP Protected Access 2 ? Supports IEEE 802.1ix authentication
39
Describe DES/DEA
64?bit block size and 56?bit key. It is a 16 round cryptosystem utlizsing S?boxes
40
Describe the Rijndael block cipher
iterated block cipher with variable block lenght and variabe key length
41
Describe XOR
Performs binary bit addition where T is 1 if A and B are not equal
42
During Discovery scanning what does the classification process produce?
Applications running on the target system
43
During discovery scanning what does the inventory scan produce
A list about the target systems OS and available ports
44
How does link encyrption operate?
each entity has keys in common with its two neighboring entities thus as a node recives the encyrpted message from its predecessor (neighboring node) it decrypts it and then reencrypts it with the shared key for the succesive node.
45
How is a one?time pad usually implemented
as a stream cipher by using XOR
46
How is confusion performed in DES?
S?box
47
How is diffusion performed in DES
P?Boxes
48
In a triple DES encryption notation noted DES?EDE2 what do the letters after DES stand for?
Encrypt Decrypt Encrypt 2(keys)
49
Name common Trojans:
Trinoo, Back Orifice, NetBus, SubSeven
50
Port 118
sqlserv
51
Port 119
nntp
52
Port 161
snmp
53
Port 194
irc
54
Port 2049
NFS
55
Port 389,636
LDAP/Secure LDAP
56
Port 5631
PCAnywhere
57
The number of rounds in the Rijndael Cipher is a function of the key size: Given a key size of 128 how many rounds will occur
10
58
The number of rounds in the Rijndael Cipher is a function of the key size: Given a key size of 192 how many rounds will occur
12
59
The number of rounds in the Rijndael Cipher is a function of the key size: Given a key size of 256 how many rounds will occur
14
60
What are four differences in OS implementation of the TCP/IP stack?
Time to Live Initial Window Size Don't Fragment bit Type of Service
61
What are some liabilities of PDAs
They do not support DAC They lack audit capabilities They don't support a non?object reuse policy They provide no data integrity protection
62
What are the bit strenghts of AES variations?
128, 192 and 256
63
What are the four modes of DES
Cipher block chaining Electronic Code Book Cipher Feedback Output Feedback
64
What are the three layers of the Rijndael cipher?
The non?linear layer The liner mixing layer The key addition layer
65
What are the three main components of a polymorphic virus?
A scrambled virus body, a decryption routine, and a mutation engine
66
What cipher is AES based on?
Rijndael
67
What do header condition signatures look for?
dangerous or illogical combinations in packet headers.
68
What do string signatures look for?
text strings that indicate a possible attack
69
What is a liability of TCP FIN scans?
They work only on Non?Windows machines because Windows Machines send a RST regardless of if the port is open or closed.
70
What is a SYN/ACK scan
A scanner sends a SYN/ACK packet if the port is closed it assumes the SYN/ACK is a mistake and sends a RST if the port is open the SYN/ACK will be dropped
71
What is C2MYAZZ?
A utility that enables server spoofing to implement a session hijacking or MITM attack
72
What is C2MYAZZ?
A utility that enables server spoofing to implement a s ession hijacking or MITM exploit
73
What is clustering with reguards to cryptography?
a situation in which a plaintext message generates identical ciphertext messages by using the same transformation algorithms but with different cryptovariables or keys
74
What is logon abuse?
Privilege escalation
75
What is the best known symmetric key system?
DES
76
What is the fixed block size for AES?
128 bits
77
What is the intent of a discovery scan?
to collect enough information about each network device to identify what type of device it is.
78
What is the intent of an inventory scan?
It provides information about the target system's OS and its available ports
79
What is the most basic and fastest type of TCP scan?
TCP connect()
80
What is the native mode of DES
Electronic Code Book
81
What is the standard TTL value for HP Jet direct printers?
60
82
What is the standard TTL value for most network devices, UNIX and Mac systems?
255
83
What is the standard TTL value for most Windows systems?
128
84
What is the standard TTL value for Windows 95B/98 systems?
32
85
What type of key does WEP use?
A 40?bit shared secret key, a RC4 psuedorandom number generator PRNG encryption and a 24 bit initialization vector
86
Which modes of DES operates as a stream cipher?
Cipher Feedback and Output Feedback
87
Which operational mode of DES is most likely to allow errors to propogate?
Cipher Feedback
88
802.11a
54 Mbps in the 5GHZ range
89
802.11b
11 Mbps
90
802.11g
54 Mbps in 2.4 GHZ band
91
802.15
PANs
92
At what layer of the OSI model does Frame Relay operate?
Data link
93
Describe an ATM network
High?bandwidth, low delay technology that uses both switching and multiplexing. It uses 53?byte fixed size cells instead of frames
94
How does CHAP prevent against remote client impersonation?
By sending challenge strings at random intervals.
95
How does CHAP protect against replay attacks?
It does not send the password in clear text an it uses an arbitrary challenge string for each authentication attempt
96
How many channels (up/down) comprise a Basic Rate Interface?
Two B & one D
97
How many channels (up/down) comprise a Primary Rate Interface?
1 Single D channel + 23/30 channels for voice and data
98
How many non?overlapping channels are used in DSSS?
Typically 3
99
IPSEC can support multiple ______ but not multiple _________
simultaneous tunnels; multiple protocols
100
Is RADIUS TCP or UDP?
UDP
101
It can be said that TACAS and RADIUS are standards based"...what does that mean?"
That they can interoperate with other systems of the same time.
102
RAID 0
Striping
103
RAID 1
Mirroring
104
RAID 2
Hamming Code Parity (bit?interleaved parity)
105
RAID 3
Byte Level Parity
106
RAID 4
Block Level Parity
107
RAID 5
Interleave Parity
108
To create an IPSEC tunnel that provides authentication, integrity and encryption what protocol would I use?
ESP
109
To create an IPSEC tunnel that provides source authentication and integrity without encryption which protocol would I enable?
AH
110
What are the FCC regulations for FHSS networks?
75 or more frequencies can be used with a maximum dwell time of 400ms
111
What are the five layers of WAP?
application, session, transaction, security and transport
112
What are the private IP address ranges?
10. 0.0.0 ? 10.255.255.255 172. 16.0.0 ? 172.31.255.255 192. 168.0.0 ? 192.168.255.255
113
What are the three classes of WTLS security?
Class 1: anonymous authentication Class 2: Server Authentication Class 3: Two?way client and server authentication
114
What are the two different spread spectrum technologies in use in 2.4GHZ LANs
Direct?dequence spread spectrum(DSSS) and frequency hopping spread spectrum (FHSS)
115
What are the two primary types of ISDN interfaces?
Basic Rate Interface and Primary Rate Interface
116
What does TACAS+ provide that TACAS does not provide?
two factor password authentication the ability for a user to change thier password the capability for resynchronizing security tokens better audit trails
117
What does the application layer of WAP consist of?
The wireless application environment (WAE), a microbrowser specification for internet access, wireless markup language, WMLScript
118
What does the Transport layer of the WAP consist of?
Wireless Datagram Protocol
119
What extention to EAP allows for authentication using digital certificates?
EAP?TLS
120
What is 802.1X
Port based authentication for security in wireless networks
121
What is a multiplexer?
It enables several signals to be sent over one physical
122
What is a Switched Multimegabit Data Service network use for?
to extend LAN like performance to a MAN or WAN
123
What is Frame Relay?
A high?performance WAN protocol that was originally developed for ISDN and is considered the successor to X.25/LAPB
124
What is LEAP
it dynamically creates WEP keys making WEP more secure.
125
What is Link Access Procedure Balanced?
For use in X.25 networks defines frame types and is capable of retransmitting, exchanging, and acknowledging frames as well as detecting out of sequence or missing frames
126
What is one advantage of MS?CHAP V2 over regular MS?CHAP/CHAP?
Mutual authentication support
127
What is te most common implementation of RAID
RAID 5
128
What is the difference between remote journaling and electronic journaling?
Electronic vaulting happens at pretimed intervals whereas remote journaling is real time
129
What is the early de facto standard for dial up communications
SLIP
130
What is the main difference between Layer 2 and Layer 3 tunneling protocols
Layer 2 protocols use frames and Layer 3 protocols use headers
131
What is the maximum effective radius of a Switched Multimegabit Data Service network?
30 Miles
132
What is X.25?
The first commercially successful connection oriented packet switching network where packets travel over virtual circuits.
133
What layer does the Point to Point Protocol operate at?
Data Link
134
What RFC defines CHAP/PAP
RFC1334
135
What succeeded SLIP?
PPP
136
What type of authentication does PPP use?
PAP, CHAP and MS?CHAP
137
Why is RADIUS not used for router?to?router authentication?
It does not provide support for two?way authentication