TM256 B3 Flashcards

(120 cards)

1
Q

What are the two main types of assets in the context of cybersecurity, and how are they defined?

A

The two main types of assets are:
* Tangible assets: Anything that can be seen, touched, or experienced in some way (e.g., computer hardware, buildings).
* Intangible assets (or non-tangible): Information, intellectual property (e.g., copyright, trademarks), personnel, and corporate data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the definition of a critical asset?

A

A critical asset is an asset without which an individual or organisation cannot function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Provide two examples of tangible assets specifically related to a network within an IT infrastructure.

A

Two examples of tangible assets related to a network are:
* Network hardware, such as switches, routers, and cabling.
* Security elements, such as firewalls and intrusion detection systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Provide two examples of intangible assets in the context of cybersecurity.

A

Two examples of intangible assets are:
* Data held on servers and in databases.
* Software, such as antivirus protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

According to the text, what type of asset will be the main focus in relation to devices and equipment within a network and wider IT infrastructure?

A

Tangible assets will be the main focus in relation to the devices and equipment that exist as part of a network within a wider IT infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the typical components that form the foundations of a network infrastructure?

A

The foundations for a network infrastructure typically comprise networking hardware and media (e.g., cables or wireless) that allow communications between different devices, services and protocols, software, and mechanisms for security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

According to VMware, how is the security of a network infrastructure defined?

A

VMware describes the security of a network infrastructure as ‘a process of protecting the underlying networking infrastructure by installing preventative measures to deny unauthorized access, modification, deletion, and theft of resources and data’ (VMware, 2021).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is it helpful to think about network components in hierarchical terms?

A

Thinking about network components in hierarchical terms helps to understand where each device ‘sits’ within a network, how it connects, what its purpose is, the role of the end user and administrator, and what needs to be defended on a network infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three layers of the Cisco hierarchical model, and what is the primary function of each?

A

The three layers are:
* Access: Provides the entry point onto the network for end-users and devices.
* Distribution: Serves as the conduit between the access layer and the core layer, providing filtering and access to wide area network features.
* Core: Delivers large volumes of traffic between distribution layer devices at the highest speed possible; often referred to as the ‘network backbone’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of communication reference models like TCP/IP and OSI?

A

Communication reference models like TCP/IP and OSI help to define the protocols, devices, addressing techniques, and data transmission techniques found within a network infrastructure, and also help in understanding modularity and interoperability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

At which layer of the Cisco three-layer model do most devices critical to the operation and security of a network infrastructure exist?

A

Most of the devices critical to the operation and security of a network infrastructure exist at the Distribution layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the main function of a switch, and what are the two general types?

A

The main function of a switch is to provide an entry point from end-user devices onto a network. The two general types are unmanaged switches (typically for home use) and managed switches (usually found in production environments).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is MAC flooding, and what can be its consequence?

A

MAC flooding is when an attacker floods the MAC address table of a switch, which can cause the switch to overload and start acting as a hub, revealing addresses to an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two general functions performed by routers?

A

Routers generally perform path determination (building and maintaining a routing table) and packet forwarding (accepting a packet and deciding where to send it based on routing table information).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a significant security concern for home users regarding their broadband routers or modems?

A

A significant security concern is the prospect of manipulation and misdirection of packets into the wrong hands, especially when carrying out activities like internet banking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name two vulnerabilities specific to managed switches.

A

Two vulnerabilities specific to managed switches are:
* MAC address table flooding.
* VLAN manipulation attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name two vulnerabilities specific to routers.

A

Two vulnerabilities specific to routers are:
* Attacks on router services (e.g., manipulation of discovery protocols).
* Buffer overflows (e.g., from oversized ICMP echo request packets).
* Manipulation of routing tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What did Avast expect to see an increase in, regarding router attacks?

A

Avast expected to see an increase in attacks where routers were being used for content injection, for example, to send users to compromised banking apps to steal banking credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

List three common types of network media and their general vulnerability levels.

A
  • Copper coaxial: High vulnerability (easily tapped).
  • Twisted Pair: Medium vulnerability (not as easy to tap, but port security is a concern).
  • Fibre-optic: Low vulnerability (difficult to tap).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the primary role of a server in a network infrastructure?

A

What is the primary role of a server in a network infrastructure?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

According to Patra, Naveen and Prabhakar (2016), what was the top recommended approach in basic server security?

A

The top recommended approach was a clearly defined policy for the organisation that ‘must be enforced consistently throughout the organisation to be effective’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is considered the biggest overall concern for servers on a network in terms of attacks?

A

DoS (Denial of Service) attacks are the biggest overall concern for servers on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

According to Watson and Jones (2013), what steps must be taken when installing new or upgraded IT cabling?

A

Watson and Jones (2013) state that: ‘When installing new or upgraded IT cabling, all possible steps must be taken to protect it from physical risks, to protect information from security threats, and to minimise possible risks from environmental hazards.’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are some other names for a wiring closet?

A

A wiring closet can also be referred to as a comms room, server room, or network distribution room.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
List three approaches organisations use to control physical access to locations like wiring closets.
Three approaches are: * Using locked doors and storing equipment inside locked cabinets. * Controlling access to locks through swipe or smart cards with varying levels of permission and biometric controls. * Restricting access to the building itself, as well as controlling access to the location of wiring closets. * Securing physical equipment to immovable objects. * Fitting tracking devices and/or security tags and alarms.
26
Based on the "Physical security" activity section, what are the three elements of information systems security?
The three elements of information systems security are: * Logical security – protecting system-based data from software- and communications-based threats. * Physical security – protecting systems that house data and the people who use the systems. * Premises security – protecting people and property within an entire area, building or facility.
27
Based on the "Physical security" activity section, what are Stallings' three main categories of threats to physical security, and what are the four categories of human-caused physical threat?
Stallings' three main categories of threats to physical security are environmental, technical, and human threats. The four categories of human-caused physical threat are: * Unauthorised physical access. * Theft. * Vandalism. * Misuse.
28
List the four common threats to a network mentioned in the text.
The four common threats to a network are: * Service disruption * Information theft * Data manipulation * Identity theft
29
What is an example of service disruption on a network?
An example of service disruption is DoS (Denial of Service) attacks on servers, network devices, and links, which prevent users from accessing services.
30
Name three inherently insecure network services or protocols mentioned, and explain why they are considered insecure.
FTP, HTTP, SMTP, and Telnet are mentioned. They are considered insecure because they pass unencrypted data across a network.
31
Why wasn't security a great concern when protocols like FTP and Telnet were initially developed?
Security wasn't a great concern because there weren't as many computers connected to networks (and internetworks) as there are now, and network encryption was not yet a common practice.
32
What is a vulnerability related to user accounts on a network?
Usernames and passwords being transmitted using insecure means and being intercepted, or passwords that are too weak, are vulnerabilities related to user accounts.
33
How can internet services and web browsers introduce vulnerabilities?
Vulnerabilities can arise from web services that are not kept up to date and use weak (unencrypted) methods for data delivery. Browsers with vulnerable or out-of-date plug-ins (like Java and JavaScript), or an out-of-date browser itself, can also be a source of vulnerability.
34
What is a potential security issue with software and hardware products regarding their default settings?
Software and hardware products can have security holes in their default settings, such as using poor default passwords.
35
How can misconfigured network equipment lead to security issues?
Poor configuration or errors in routers, switches, and firewalls can misdirect traffic or accidentally allow traffic into protected areas.
36
In the scenario described in Figure 3.4 (network sniffing), how does Employee B manage to obtain Employee A's FTP login details?
Employee B uses a network sniffer to inspect FTP packets on the network and can see Employee A's login details because they are transmitted in plaintext.
37
What is one important point that arises from the network sniffing scenario concerning the installation of server software?
An employee should not be able to install ‘rogue’ insecure server software onto devices within the organisation.
38
What is one important point that arises from the network sniffing scenario concerning the use of protocol analysers?
An employee within an organisation should not be able to install protocol analyser (sniffer) software to perform reconnaissance on the network for malicious purposes.
39
According to the text, when should insecure software like FTP or Telnet be allowed on a network?
Insecure software like FTP or Telnet should not be allowed on the network unless it is using appropriate encryption methods, like SSH.
40
What is the main purpose of reconnaissance activity for an attacker?
The main purpose of reconnaissance activity is for attackers to discover the types of systems, services, and existing vulnerabilities on a network, so they can build a map of vulnerabilities and plan their attack.
41
Name three tools or methods used in reconnaissance attacks
* Internet query (using search engines, ‘nslookup’, ‘whois’). * Ping sweep (using tools like ‘gping’ and scanner software). * Port scanning (using tools like ‘nmap’).
42
What is the main aim of a Denial of Service (DoS) attack?
The main aim of a DoS attack is to bring disruption to a network, user services, devices, and applications, in order to make them unavailable.
43
List two ways a DoS attack is normally carried out.
A DoS attack is normally carried out by: * Flooding a target computer with an overwhelming amount of traffic. * Forwarding maliciously formed packets that the receiver cannot process (e.g., a buffer overflow attack). * (Physical aspect) Disconnection of power from servers and network equipment.
44
According to Panek (2020), what are the three general types of DDoS attacks?
According to Panek (2020), what are the three general types of DDoS attacks?
45
What is a "botnet" in the context of a DDoS attack?
A botnet is a group of computers (bots, zombies, or slaves) that have likely been infected with malware, allowing a master attacker to control them to collectively attack a victim resource.
46
Name two techniques implemented in routers that can be used for mitigating DoS attacks.
Two techniques are: * Blackholing (or null routing). * Limiting requests. * Network diffusion (using load balancing).
47
What is spoofing in the context of network security?
Spoofing is when traffic that seems to be originating from a particular (seemingly trusted) source is in fact originating from another source using falsified information.
48
What is the difference between non-blind spoofing and blind spoofing?
* Non-blind spoofing: The attacker can see the traffic that is being sent across the network. * Blind spoofing: The attacker cannot see the traffic between source and destination; this is the most common type in DoS attacks.
49
Briefly describe IP spoofing.
In an IP spoofing attack, an IP packet has a forged source address to protect the identity of the attacker. This type of attack takes place at the network layer (layer 3).
50
How does DNS spoofing work, and what can be its outcome?
DNS spoofing happens when an attacker intercepts a DNS request and responds before the actual DNS server can. This can lead to the victim being directed to a falsified website designed to conduct malicious activities.
51
What happens in a man-in-the-middle attack?
In a man-in-the-middle attack, an attacker places themselves in the flow of traffic between source and destination hosts, allowing them to transparently monitor, capture, and control the traffic across the network, potentially inspecting and modifying packets.
52
What is the primary role of a firewall in network security?
A firewall primarily acts as a barrier between an internal network and the outside world, filtering traffic to protect the network and its users from attackers.
53
List the three general types of firewalls mentioned in the text.
The three general types of firewalls are: * Packet filter * Stateful packet inspection * Stateless inspection
54
How does stateful packet inspection differ from basic packet filtering?
Stateful packet inspection not only checks packet details against rules (like source IP, protocol, destination port) but also examines other packets in the conversation to understand the context. This allows it to detect certain attacks (like DoS from a stream of ICMP packets or spoofing) and can inspect the data payload for malicious content.
55
What is the main difference in how stateless and stateful firewalls make decisions about traffic?
A stateless firewall uses an access control list and permits or denies traffic based on source and destination information (addresses, ports, protocols). A stateful firewall uses a state table to record and track 'established' connections between two endpoints, making decisions based on the state of the connection.
56
What is another term for an application gateway, and what is its primary function in application layer filtering?
An application gateway is sometimes referred to as an application proxy. Its primary function is to filter specific types of application and protocol being used (e.g., HTTP and FTP) by negotiating connections between clients and destinations.
57
Name and briefly describe the three types of proxy servers mentioned.
* Transparent proxy: Receives and forwards data without modifying it, often used for caching content for efficiency; clients may be unaware of it. * Anonymous proxy: Does not pass the client's IP address details but identifies itself as a proxy, useful for private web Browse. It can also distort information and pass false IP details. * High anonymity proxy: Periodically changes the source IP address, making it difficult to track the user's location and source (e.g., the Tor network).
58
What is a "host-based firewall," and what is a key consideration for its security?
A host-based firewall is normally implemented as software on a host that is part of an existing network. A key consideration is the security (or hardening) of the host's operating system, as this may compromise the security of the firewall itself.
59
Describe the "screened host" firewall implementation.
A screened host implementation uses a combination of methods, such as a screening device (which permits or denies traffic) and a bastion host (a network host specifically designed to withstand attacks). The screening device controls traffic coming from the bastion host.
60
What is a "dual-homed" firewall, and how does it differ from a standard router in handling packets?
A dual-homed firewall is a dedicated device with routing functionality and two network cards, connecting one network to another. Instead of simply forwarding (routing) packets, it only does so based on pre-defined rules specifying what is allowed and where packets can go.
61
What type of firewall technology is commonly found in home (broadband) routers, and what is its basic function?
Home routers commonly have built-in firewall technology that performs basic packet filtering, allowing or denying IP addresses or applications based on port numbers.
62
What is "port forwarding" in the context of a home router?
Port forwarding is a technique for allowing devices running designated services on an internal network to communicate with other hosts outside the network by mapping an external port to an internal IP address and port.
63
who is responsible for registering and maintaining port numbers?
The IANA (Internet Assigned Numbers Authority) is responsible for registering and maintaining port numbers.
64
What are Access Control Lists (ACLs) in the context of Cisco routers, and what type of firewall are they very similar to?
Access Control Lists (ACLs) on Cisco routers provide packet filtering functionality based on information like source/destination addresses, applications, and ports. They are very similar to a stateless firewall.
65
What are the two main examples of ACL implementations on a Cisco router, and how do they differ?
* Standard access list: Checks the source address and permits or denies protocol suites (e.g., TCP). * Extended access list: Checks both source and destination addresses, and can be specific about source and destination protocols, applications, and protocol types (e.g., TCP, UDP, ICMP, IP).
66
What is a "bastion host" in the context of a screened host firewall implementation?
A bastion host is a network host specifically designed and configured to withstand attacks.
67
What can an anonymous proxy do with IP address details to make a user appear to be from another location?
An anonymous proxy can distort information and pass false IP address details, so that the user appears to be from another location.
68
What is the definition of a "network boundary" according to Cloudflare (2021)?
The network boundary is ‘the boundary between an organization’s secured internal network and the Internet – or any other uncontrolled external network’.
69
What are two devices typically found at the boundary of a network, and how do boundary devices compare to intermediary devices?
Two devices typically found at the boundary are a firewall and a proxy device. Boundary devices are essentially the same as intermediary devices as they both allow traffic to pass through them; however, a boundary device may have more security features.
70
What are the two common methods for deploying an IDS/IPS, and how do they differ?
The two common methods for deployment are: * Screened: Monitors traffic that comes through a screening device (e.g., a firewall), which reduces the amount of traffic being monitored for more accurate results. * Unfiltered: Monitors the stream of data before it reaches the screening device, which is prone to unreliability due to monitoring much higher volumes of traffic.
71
What is the primary purpose of a honeypot in network security?
A honeypot is used as a means of trapping attackers by diverting them away from real targets. It also uses tools to identify new vulnerabilities and exploits, and to learn about attacker identities and patterns of attack, providing surveillance and an early warning facility.
72
List the three types of honeypots mentioned in the text based on their use.
The three types of honeypots are: * Production-based (used in a live environment). * Research-based (used to research sophisticated tools and attacks). * Email (spam)-based (used for analysis of spam email).
73
In the honeypot example (Figure 3.11), what two devices are shown to direct malicious traffic to the honeypot?
In the honeypot example (Figure 3.11), what two devices are shown to direct malicious traffic to the honeypot?
74
What is a Security Information and Event Management (SIEM) system designed to provide?
A SIEM system is designed to provide a holistic view of security management through a combination of monitoring, alerting, and analysis.
75
According to McAfee (2021), how do SIEM solutions enhance threat detection, compliance, and security incident management?
SIEM solutions enhance these areas through the gathering and analysis of real-time and historical security event data and sources.
76
List three of the five key benefits of SIEM as defined by McAfee.
Three of the five key benefits of SIEM are: * Key to managing the strategic, tactical, and operational aspects of threat hunting. * Reduced response times using enhanced situational awareness. * Better security integration and real-time visibility. * Better staffing of security resources. * Enhanced compliance with auditing and governance. (Any three of the five listed would be correct)
77
List three hardening techniques an administrator can implement on a managed switch for security.
Three hardening techniques are: * Disabling unused ports. * MAC filtering (mapping device MAC addresses directly to a switchport). * MAC address duplication detection (which can cause a switch to disable a port). * Port-based network access control (802.1x).
78
How does port-based network access control (802.1x) offer better control over port access compared to other switchport security features?
Port-based network access control (802.1x) offers better control because users are required to authenticate before accessing the switch.
79
What is switch flooding, and how can attackers exploit it?
Switch flooding occurs when a switch receives a frame with no destination recorded in its MAC table, causing it to flood the frame to all ports (except the receiving one) to find the destination. Attackers can exploit this by flooding the network with spoofed addresses, potentially overloading the MAC table.
80
How can flood protection be enabled on a switch?
Flood protection can be enabled on a switch by defining a limit on switchports. If the switch detects excessive floods from a port, it closes it down.
81
Name three popular risks associated with wireless networking.
Three popular risks are: * Wireless sniffing (analysing for unencrypted connections to capture traffic). * Piggybacking (joining unsecured wireless networks for malicious activity). * Evil twin (impersonating a public wireless access point). * Device theft (stealing a mobile device already connected to wireless networks).
82
What is an "evil twin" attack in the context of wireless security?
An "evil twin" attack is where an attacker impersonates a legitimate public wireless access point to trick users into connecting to it.
83
List three popular techniques used in securing wireless networks.
Three popular techniques are: * Changing default passwords of wireless access points and using strong passwords. * MAC address filtering. * Configuring the access point to not broadcast the SSID. * Enabling strong data encryption (like WPA3). * Keeping access point firmware up to date and frequently patched.
84
What is the current standard for wireless network encryption mentioned in the text?
The current standard for wireless network encryption mentioned is WPA3.
85
What vulnerability in WPA2 was discussed in the 2017 Electrical Marketing article by Doug Chandler?
The article discussed the KRACK vulnerability, which exposes flaws in WPA2.
86
According to the discussion following the reference to the Doug Chandler (2017) article, what steps does the article recommend to keep wireless networks secure?
The article recommends standard practices such as better password security, patching/updating, and the use of secure connections, like VPNs.
87
What is the minimum number of Tor relay servers that data passes through when entering onto the network?
Three.
88
What are three practical uses of Tor?
Preventing tracking; journalists communicating; open-source intelligence gathering.
89
At which layer does Tor encrypt data?
The application layer.
90
What is the name of the location at which data passing through Tor leaves the network?
The exit node.
91
What is the starting point for any secure network design, as mentioned in the text?
What is the starting point for any secure network design, as mentioned in the text?
92
In the example of network segmentation (Figure 3.12), how many hosts can each default class C network segment accommodate?
Each default class C network segment can accommodate 254 hosts.
93
Each default class C network segment can accommodate 254 hosts.
We subtract two addresses because they represent the network address and the broadcast address for that segment.
94
According to SAQ 3.3, can the different network segments shown in Figure 3.12 (e.g., Staff network 192.168.10.0, Sales network 192.168.20.0) communicate with each other directly?
No, they cannot communicate with each other directly as they are on different networks.
95
No, they cannot communicate with each other directly as they are on different networks.
A router would be needed to enable communication between the different networks.
96
According to SAQ 3.3, how many available host addresses would a default class B network address scheme (with 16 bits in the host portion) provide? Show your working.
According to SAQ 3.3, how many available host addresses would a default class B network address scheme (with 16 bits in the host portion) provide? Show your working.
97
Based on SAQ 3.3, why might using a default class B network (with 65,534 available addresses) for a single segment not be a viable solution?
It is not viable as there would be too many devices on the network, which will lead to traffic management issues.
98
What is a demilitarized zone (DMZ)?
A demilitarized zone (DMZ) is a location where public-facing systems (like web and email servers) are held, connecting to an untrusted network, usually created between an external-facing firewall and an internal firewall (or router/screening device).
99
What is the main security benefit of placing public-facing systems in a DMZ?
What is the main security benefit of placing public-facing systems in a DMZ?
100
What is the main security benefit of placing public-facing systems in a DMZ?
What is the main security benefit of placing public-facing systems in a DMZ?
101
What is a Virtual Local Area Network (VLAN)?
What is a Virtual Local Area Network (VLAN)?
102
What is a Virtual Local Area Network (VLAN)?
What is a Virtual Local Area Network (VLAN)?
103
How can traffic be routed between different VLANs?
A router can be connected to allow the routing of traffic between different VLANs.
104
A router can be connected to allow the routing of traffic between different VLANs.
A router can be connected to allow the routing of traffic between different VLANs.
105
A router can be connected to allow the routing of traffic between different VLANs.
A router can be connected to allow the routing of traffic between different VLANs.
106
A router can be connected to allow the routing of traffic between different VLANs.
A router can be connected to allow the routing of traffic between different VLANs.
107
A router can be connected to allow the routing of traffic between different VLANs.
A virtual machine manager is also known as a ‘hypervisor’. It allows the creation of virtual machines and subsequently manages the allocation of physical hardware resources to a virtual machine.
108
What are the two general types of hypervisors, and how do they differ?
* Type 1: Essentially an operating system in its own right, onto which virtual machines can be installed. * Type 2: A piece of software installed onto an existing operating system (e.g., Windows or Linux), onto which virtual machines can be installed.
109
What is an example of a type 2 hypervisor mentioned in the text?
Oracle VirtualBox is given as an example of a type 2 hypervisor.
110
Oracle VirtualBox is given as an example of a type 2 hypervisor.
* They provide isolation from other systems, allowing sandbox testing. * They provide good fault tolerance (e.g., services in a DMZ on VMs can be easily recovered).
111
How is the Tor network implemented in terms of topology?
How is the Tor network implemented in terms of topology?
112
How is the Tor network implemented in terms of topology?
How is the Tor network implemented in terms of topology?
113
How is the Tor network implemented in terms of topology?
How is the Tor network implemented in terms of topology?
114
How is the Tor network implemented in terms of topology?
How is the Tor network implemented in terms of topology?
115
According to the professor, how many relay servers will Tor typically relay traffic through?
According to the professor, how many relay servers will Tor typically relay traffic through?
116
In the Tor network, what is the "exit node"?
The exit node is the last Tor relay where the encrypted traffic exits to the public internet destination.
117
Why is the exit node in the Tor network typically the target of surveillance?
Why is the exit node in the Tor network typically the target of surveillance?
118
Why is the exit node in the Tor network typically the target of surveillance?
Why is the exit node in the Tor network typically the target of surveillance?
119
How does Tor ensure that each relay server only knows the next hop in the circuit?
How does Tor ensure that each relay server only knows the next hop in the circuit?
120