Network Security

Card Set Information

Network Security
2015-07-07 16:28:06

Show Answers:

  1. Port 20,21
    FTP(File Transfer Protocol) TCP Layer 7
  2. Port 22
    SSH (Secure Shell), SFTP(Secure File Transfer Protocol), and SCP(Secure Copy Protocol) All are TCP Layer 7
  3. Port 23
    Telnet Layer 7 TCP
  4. Port 25
    SMTP(Simple Mail Transfer Protocol) TCP Layer 7
  5. Port 53
    DNS( Domain Name Service) Layer 7 TCP
  6. Port 80 
    Port 443
    • HTTP(Hypertext Transfer Protocol) Layer 7
    • HTTPS(Hypertext Transfer Protocol Secure) Layer 7
  7. Port 88
    Kerberos- An authentication scheme that uses tickets(unique keys) embedded within messages. UDP
  8. Port 110
    What is it used for?
    • POP3(Post Office Protocol) version 3
    • Used to download email from a SMTP
  9. Port 119
    NNTP( Network News Transport Protocol) TCP Layer 7
  10. Port 123
    NTP (Network Time Protocol) TCP Layer 7
  11. Port 137, 139
    NetBIOS(Network Basic Input/Output System) TCP Layer 5
  12. Port 67, 68
    DHCP(Dynamic Host Control Protocol) UDP Layer 7
  13. Port 69
    TFTP(Trivial File Transfer Protocol) Layer 7 UDP
  14. Port 1812, 1813
    Radius(Remote Authentication Dial-In User Service) Layer 5
  15. Port 1723
    PPTP(Point to Point Tunneling Protocol) TCP Layer 2
  16. Port 1701
    L2TP( Layer 2 Tunneling Protocol) Layer 2
  17. Port 443
    HTTPS and TLS
  18. Port 500
    IPsec(Internet Protocol Security)Layer 3
  19. Port 3389
    RDP(Remote Desktop Protocol)should always be block by the firewall rule for inbound traffic
  20. PORT 161, 162
    SNMP(Simple Network Management Protocol) UDP
  21. Which Protocols provide Loop protection?
    • STP Spanning Tree Protocol
    • RSTP Rapid Spanning Tree Protocol
  22. What are two examples of Port Security?
    Disabling unused ports and MAC address filtering
  23. What are ACLs?
    Where are they implemented?
    • Access Control Lists
    • on Routers and firewalls
  24. Port 860 and 3260
    • iSCSI and iSCSI (Default)
    • Internet Small Computer System Interface
    • links computers & peripheral devices
  25. Port 49
    TACACS+ (Terminal Access Controller Access-Control System
  26. What is FCP?
    Fiber Channel Protocol
  27. What is FCoE?
    • Fiber Channel over Ethernet
    • Layer 3 protocol and requires 10Gbps thernet to support it
  28. What is the purpose of a Proxy Server?
    • To forward requests for services. Ex: HTTP
    • It also improves performance over the network by cache web content
  29. Describe the OSI Model
    • Layer 1-Physical 
    • Layer 2-Data Link
    • Layer 3-Network
    • Layer 4-Transport
    • Layer 5-Session
    • Layer 6-Presentation
    • Layer 7-Application
  30. What are the Email Protocols?
    • SMTP port 25, POP3 port 110, IMAPv4 port 143
    • all TCP
  31. What are the Encryption Protocols?
    SSH, SCP, SSL, TLS, IPsec
  32. What are the Application Protocols?
    HTTP, HTTPS, FTP, SFTP, FTPS, Telnet, SNMP, NetBIOS, LDAP, Kerberos, Microsoft SQL server, RDP
  33. What is an IDS?
    What are the different types?
    • Intrusion Detection System- helps detect attacks on systems and networks.
    • HIDS, NIDS, anomaly-based/heuristic-based, passive, active IDS.
  34. IDS and IPS include what?
    Sniffing capabilities
  35. What are the examples of a DNS Record Types?
    • A-Returns a 32-bit IPv4 address
    • CERT-Certificate Record
    • NS-name servers
    • AAAA- IPv6 Address Record
  36. What is DNS poisoning?
    Incorrect DNS data that is introduced into a primary DNS server
  37. What is Tunneling?
    • Virtual dedicated connection between two systems or networks
    • Sends private data across a public network by encapsulation
    • Most popular:L2TP
  38. What types of authentication is used in L2TP?
    What protocol does it use to provide encryption?
    • IPSec-Internet Protocol Security
  39. What is PPP
    Point-to-Point Protocol- No Encryption
  40. What is a VPN?
    • Virtual Private Network
    • established via Tunneling Protocols 
    • -L2TP
    • -PPTP
  41. What does IPsec use to find IPv6 addresses
    NDP Neighbor Discovery Protocol
  42. What does IP protocol #50 and 51 represent?
    50 represents Encapsulating Security Payload(ESP) Uses AES, 3DES or DES

    • 51 represents Authentication Header(AH)
    • Uses HMAC with SHA-1 or MD5
  43. What are they referring to with SA?
    Security Association regarding IPSec
  44. What is ISAKMP?
    Internet Security Association and Key Management Protocol
  45. IKE
    • Internet Key Exchange
    • based on two protocols ISAKMP and Oakley
  46. _____ Allows many hosts to share a single IP address by multiplexing streams differentiated by TCP/UDP port numbers
    PAT Port Address Translation
  47. ____ converts private ip addresses into a public address
    NAT Network Address Translation
  48. What are the three types of NAT's?
    • Dynamic NAT
    • Static NAT
    • Port Address NAT
  49. ____ is a single device that handles large numbers of VPN Tunnels
    • VPN Concentrator 
    • SSL or IPSec
  50. ____ contains public facing servers
    DMZ-Demilitarized Zone
  51. ___ internal network
  52. ___segment of your network set aside for trusted partners, organizations
  53. _____ unsecured security zone
  54. ______ is a security appliance that combined multiple security controls into a single solution.
    UTM Unified threat management
  55. ____ has the ability to prevent some flooding DoS attacks
    Flood Guard
  56. What are the three layers of Cloud Computing?
    • Software as a Service(application)
    • Platform as a Service(platform)
    • Infrastructure as a Service (infrastructure)
  57. Maas
    • Monitoring as a Service
    • Platform as a Service
    • Software as a Service
  58. Passive IDS
    Takes no action
  59. What are the two methods of IDS?
    Signature Based & Anomaly-based or Heuristic
  60. ___evaluates system security status before connecting to the network
    Network Access Control
  61. Network Access Control (NAC) covers what?
    • Anti-virus status 
    • System update level
    • Configuration settings
    • Software firewall enabled
  62. Which Wireless Standard follows NIST and FIPS 140-2 compliance
    • WPA2 
    • NIST stands for National Institute of Standards