Secure Communications and Network Attacks Flashcards

1
Q

Understand PPP

A

Point-to-Point Protocol (PPP) is an encapsulation protocol designed to support the transmission of IP traffic over dial-up or point-to-point links. The original PPP options for authentication were PAP, CHAP, and EAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define PAP, CHAP, and EAP

A

PAP transmits usernames and passwords in cleartext. CHAP performs authentication using a challenge-response dialogue that cannot be replayed. EAP allows customized authentication security solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Be able to provide examples of EAP

A

Over 40 EAP methods are defined, including LEAP, PEAP, EAP-SIM, EAP-FAST, EAP-MD5, EAP-POTP, EAP-TLS, and EAP-TTLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Understand IEEE 802.1X

A

IEEE 802.1X defines the use of encapsulated EAP to support a wide range of authentication options for LAN connections. The IEEE 802.1X standard is formally named “Port-Based Network Access Control.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Know about port security

A

Port security can mean the physical control of all connection points, such as RJ-45 wall jacks or device ports. Port security is the management of TCP and User Datagram Protocol (UDP) ports. Port security can also refer to the need to authenticate to a port before being allowed to communicate through or across the port (i.e., IEEE 802.1X).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Understand voice communications security

A

Voice communications are vulnerable to many attacks, especially as voice communications become an important part of network services. You can obtain confidentiality by using encrypted communications. Countermeasures must be deployed to protect against interception, eavesdropping, tapping, and other types of exploitation. Be familiar with voice communication topics, such as POTS, PSTN, PBX, and VoIP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Know the threats associated with PBX systems and the countermeasures to PBX fraud

A

Countermeasures to PBX fraud and abuse include many of the same precautions you would employ to protect a typical computer network: logical or technical controls, administrative controls, and physical controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Understand the security issues related to VoIP

A

VoIP is at risk for caller ID spoofing, vishing, call manager software/firmware attacks, phone hardware attacks, DoS, MitM/on-path attacks, spoofing, and switch hopping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Recognize what phreaking is

A

Phreaking is a specific type of attack in which various types of technology are used to circumvent the telephone system to make free long-distance calls, to alter the function of telephone service, to steal specialized services, or to cause service disruptions. A phreaker is an attacker who performs phreaking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Understand the issues of remote access security management

A

Remote access security management requires that security system designers address the hardware and software components of an implementation along with issues related to policy, work tasks, and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Know various issues related to remote access security

A

Be familiar with remote access, dial-up connections, screen scrapers, virtual applications/desktops, and general telecommuting security concerns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Understand multimedia collaboration

A

Multimedia collaboration is the use of various multimedia-supporting communication solutions to enhance distance collaboration and communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Know the purpose of load balancers

A

The purpose of load balancing is to obtain more optimal infrastructure utilization, minimize response time, maximize throughput, reduce overloading, and eliminate bottlenecks. A load balancer is used to spread or distribute network traffic load across several network links or network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Understand active/active

A

An active-active system is a form of load balancing that uses all available pathways or systems during normal operations. But has reduced capacity in adverse conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Understand active/passive

A

An active-passive system is a form of load balancing that keeps some pathways or system in an unused dormant state during normal operations. And is able to maintain consistent capacity during abnormal conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Understand how email security works

A

Internet email is based on SMTP, POP3, and IMAP. It is inherently insecure. It can be secured, but the methods used must be addressed in a security policy. Email security solutions include using S/MIME, PGP, DKIM, SPF, DMARC, STARTTLS, and Implicit SMTPS.

17
Q

Know how to protect data communications

A

Protections should include implementations of secure VoIP, VPNs, VLANs, and NAT.

18
Q

Understand virtualized networks

A

A virtualized network or network virtualization is the combination of hardware and software networking components into a single integrated entity. Examples include software-defined networks (SANs), VLANs, VPNs, virtual switches, virtual SANs, guest operating systems, port isolation, and NAT.

19
Q

Define tunneling

A

Tunneling is the encapsulation of a protocol-deliverable message within a second protocol. The second protocol often performs encryption to protect the message contents.

20
Q

Understand VPNs

A

VPNs are based on encrypted tunneling. They can offer authentication and data protection as a point-to-point solution. Common VPN protocols are PPTP, L2TP, SSH, TLS, and IPsec.

21
Q

Understand split vs. full tunnel

A

A split tunnel is a VPN configuration that allows a VPN-connected client system (i.e., remote node) to access both the organizational network over the VPN and the internet directly at the same time. A full tunnel is a VPN configuration in which all of the client’s traffic is sent to the organizational network over the VPN link, and then any internet-destined traffic is routed out of the organizational network’s proxy or firewall interface to the internet.

22
Q

Be able to explain NAT

A

NAT protects the addressing scheme of a private network, allows the use of the private IP addresses, and enables multiple internal clients to obtain internet access through a few public IP addresses. NAT is supported by many security border devices, such as firewalls, routers, gateways, WAPs, and proxies.

23
Q

Know about third-party connectivity

A

Most organizations interact with outside third-party providers. Most of these external entities do not need to interact directly with an organization’s IT/IS. However, for those few that do, it is important to consider the risks and ramifications. This includes partnerships, cloud services, and remote workers.

24
Q

Understand the difference between packet switching and circuit switching

A

In circuit switching, a dedicated physical pathway is created between the two communicating parties. Packet switching occurs when the message or communication is broken up into small segments and sent across the intermediary networks to the destination. Within packet-switching systems are two types of communication paths, or virtual circuits: permanent virtual circuits (PVCs) and switched virtual circuits (SVCs).

25
Q

Understand the various network attacks and countermeasures associated with communications security

A

Communication systems are vulnerable to many attacks, including distributed denial-of-service (DDoS), eavesdropping, impersonation, replay, modification, spoofing, and ARP and DNS attacks. Be able to supply effective countermeasures for each.