Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
10.0.0.0 - 10.255.255.255 |
|
|
Term
|
Definition
172.16.0.0 - 172.31.255.255 |
|
|
Term
|
Definition
192.168.0.0 - 192.168.255.255 |
|
|
Term
|
Definition
private ip address that cannot be routed.. period |
|
|
Term
|
Definition
private ip addresses that can be routed within an organization, but cannot be routed to the internet. |
|
|
Term
|
Definition
Automatic Private IP Addressing and Range 169.254.0.1 - 169.254.255.254 Class B Subnet |
|
|
Term
|
Definition
This address identifies multiple interfaces, and the anycast packet is delivered to only one address. This address can also be called one-to-one-to many |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Class A and B Shared CIDR Values |
|
Definition
|
|
Term
Class A, B, and C Shared CIDR Values |
|
Definition
|
|
Term
Components of a VPN Connection |
|
Definition
Server and client software must have same: 1) Tunneling Protocol 2) Authentication Methods 3) Encryption Methods
Public Key Encryption Centralized Accounting |
|
|
Term
ifconfig -a -s [int] up down netmask [addr] broadcast[addr] [addr] |
|
Definition
-a: Information about all interfaces -s: Returns summary about interface activity [int]: Information about [int] interface up: Activates an interface. eg ifconfig eth0 up down: Deactivates an interface netmask [addr]: set the netmask for a particular interface broadcast[addr]: set the broadcast addr [addr]: Set the address of a particular interface |
|
|
Term
|
Definition
-t: continuous ping -a: Resolves addresses to hostnames -4: forces ipv4 -6: forces ipv6 |
|
|
Term
|
Definition
NetBIOS provides three distinct services:
Name service for name registration and resolution. Session service for connection-oriented communication. Datagram distribution service for connectionless communication. |
|
|
Term
nbtstat -n -c -R -RR -a name -S |
|
Definition
-n: Displays name locally registered -c: displays NetBIOS name cache entries -R: Purges the NetBIOS name cache and reloads it from Lmhosts file -RR: Releases local NetBIOS names registered with WINS server and then renews their registration -a name: Displays NetBIOS name table and MAC address of computer specified -S: Lists the current NetBIOS sessions, w/ stats |
|
|
Term
PPTP is succeptible to what type of attack |
|
Definition
|
|
Term
What is the earliest OS that L2TP can run on? |
|
Definition
Windows 2000 Professional L2TP also authenticates the end of the tunnel using digital certificates. |
|
|
Term
What layer does IPSec operate at? |
|
Definition
|
|
Term
What are the three main security services provided by IPSec? |
|
Definition
Data verification: data appears to be from the source it originated from. Protection from data tampering Privacy of transactions |
|
|
Term
Remote Access Services(RAS) is capable of providing security by using what protocols? |
|
Definition
PPTP and L2TP Note: RAS provides access to a LAN type environment. |
|
|
Term
What authentication options are available with PPP |
|
Definition
Password Authentication Protocol(PAP) Challenge Handshake Authentication Protocol(CHAP) Extensible Authentication Protocol(EAP) |
|
|
Term
What does the server sent the client, when the client makes an authentication request in CHAP? What does the client do with them? |
|
Definition
The server sends a nonce(random value) and an ID. The client sequences them using the shared secret(a text phrase shared btw the client and server), and then generates a hash value using MD5 on sequenced result. The server compares its hash value to the clients hash value. If they match, the client is authenticated. |
|
|
Term
What version of MS-CHAP is most common? What advantage does V2 offer over V1? |
|
Definition
MS-CHAP V2 Two way authentication |
|
|
Term
Kerberos prevents replay attacks by doing what? |
|
Definition
By using temporary keys. Also TGT expire as soon as they're used at key distribution centers. |
|
|
Term
What are the advantages of TACACS+ over RADIUS? |
|
Definition
-The RAS server receives acknowledgments from the TACACS server that the authentication request has been received from the RAS. -It encrypts the entire body of the packet that is passed from the RAS to the TACACS+ server |
|
|
Term
What are keys stored in in public key encryption? |
|
Definition
|
|
Term
What are the servers and services that verify a user's identity and track the certificate in PKI? |
|
Definition
|
|
Term
What is the difference between public keys and private keys in PKI? |
|
Definition
Public are used by the sender to encrypt the message. The public key is not the sender's but the recipient's. The recipient, decrypts the message using its private key. |
|
|
Term
|
Definition
When someone believed to be on the network, a spoofer, pings the broadcast address of a segment. |
|
|
Term
How does one prevent rogue access points? |
|
Definition
Install adequate physical security as well as authentication between devices. |
|
|
Term
|
Definition
Security threats are identified with a signature ID, and the prevention technique can be deployed using the signature ID. These can be programmed. |
|
|
Term
|
Definition
serial point to point connections and for dial-up, but is not a tunneling protocol. It provides authentication, encryption, and compression to remote clients. |
|
|
Term
ICA allows clients using what operating systems to access windows application on a windows server? |
|
Definition
Linux, UNIX, or Mac Note: High resource requirements |
|
|
Term
What are the two major protocols in IPSec |
|
Definition
Authentication Header: authenticator
Encapsulating Security Payload (ESP): Both authentication and encryption. |
|
|
Term
What are the two modes IPSec works in? |
|
Definition
Transport Mode: Creates a secure connection between two hosts. Authenticates and encrypts data only. No tunnel. Tunnel Mode: Entire packet is encapsulated. Creates a secure tunnel, where the transport protocol cannot be identified. |
|
|
Term
What are the two stages in PPPoE and what happens in each? |
|
Definition
Discovery Stage: A secure connection is made using the MAC addresses of the end points. A session ID is created, and is needed to continue data transmission. Session Stage: A point-to-point connection is created. |
|
|
Term
What addresses should be denied with ACLs? |
|
Definition
Internal Addresses Local host addresses Reserved Private Addresses Any IP multicast addresses (224.0.0.0/4) |
|
|
Term
What type of protocol is IP known as? |
|
Definition
|
|
Term
What type of protocols are payload protocols encapsulated in for tunneling? |
|
Definition
|
|
Term
What accounting information does TACACS+ provide? |
|
Definition
Connection start and stop time Number of bytes sent and received by the user The number of packets sent and received The reason for disconnection |
|
|
Term
IEEE 802 Networking Standards |
|
Definition
802.1: LAN/MAN Management 802.2: Logical Control 802.3: CSMA/CD 802.4: Token Passing Bus 802.5: Token Passing Ring 802.6: Distributed Queue Dual Bus (DQDB) Metropolitan Area Network(MAN) 802.7: Broadband Local Area Networks 802.8: Fiber-Optic LANs and MANs 802.9: Isochronous LANs 802.10: LAN/MAN Security 802.11: Wireless LAN 802.15: Wireless Personal Area Network (Bluetooth) 802.16: WiMAX 802.18: LAN/MAN Standards Committee |
|
|