Shared Flashcard Set

Details

Network+ Studying
Notecards for Network+ Exam
59
Other
Undergraduate 2
09/30/2010

Additional Other Flashcards

 


 

Cards

Term
Class A Range
Definition
1-126
Term
Class B Range
Definition
128-191
Term
Class C Range
Definition
192-223
Term
Private IP Range
Class A
Definition
10.0.0.0 - 10.255.255.255
Term
Private IP Range
Class B
Definition
172.16.0.0 - 172.31.255.255
Term
Private IP Range
Class C
Definition
192.168.0.0 - 192.168.255.255
Term
link-local
Definition
private ip address that cannot be routed.. period
Term
unique local
Definition
private ip addresses that can be routed within an organization, but cannot be routed to the internet.
Term
APIPA
Definition
Automatic Private IP Addressing and Range
169.254.0.1 - 169.254.255.254
Class B Subnet
Term
Anycast Address
Definition
This address identifies multiple interfaces, and the anycast packet is delivered to only one address. This address can also be called one-to-one-to many
Term
2^4
Definition
16
Term
2^5
Definition
32
Term
2^6
Definition
64
Term
2^7
Definition
128
Term
2^8
Definition
256
Term
2^9
Definition
512
Term
2^10
Definition
1024
Term
2^11
Definition
2048
Term
2^12
Definition
4096
Term
2^13
Definition
8192
Term
2^14
Definition
16384
Term
CIDR /16
Definition
255.255.0.0
Term
/24
Definition
255.255.255.0
Term
/28
Definition
255.255.255.240
Term
/20
Definition
255.255.240.0
Term
Class A
CIDR Values
Definition
/8 through /15
Term
Class A and B Shared
CIDR Values
Definition
/16 through /23
Term
Class A, B, and C Shared
CIDR Values
Definition
/24 through /30
Term
Components of a VPN Connection
Definition
Server and client software must have same:
1) Tunneling Protocol
2) Authentication Methods
3) Encryption Methods

Public Key Encryption
Centralized Accounting
Term
ifconfig
-a
-s
[int]
up
down
netmask [addr]
broadcast[addr]
[addr]
Definition
-a: Information about all interfaces
-s: Returns summary about interface activity
[int]: Information about [int] interface
up: Activates an interface. eg ifconfig eth0 up
down: Deactivates an interface
netmask [addr]: set the netmask for a particular interface
broadcast[addr]: set the broadcast addr
[addr]: Set the address of a particular interface
Term
ping
-t
-a
-4
-6
Definition
-t: continuous ping
-a: Resolves addresses to hostnames
-4: forces ipv4
-6: forces ipv6
Term
NetBIOS
Definition
NetBIOS provides three distinct services:

Name service for name registration and resolution.
Session service for connection-oriented communication.
Datagram distribution service for connectionless communication.
Term
nbtstat
-n
-c
-R
-RR
-a name
-S
Definition
-n: Displays name locally registered
-c: displays NetBIOS name cache entries
-R: Purges the NetBIOS name cache and reloads it from Lmhosts file
-RR: Releases local NetBIOS names registered with WINS server and then renews their registration
-a name: Displays NetBIOS name table and MAC address of computer specified
-S: Lists the current NetBIOS sessions, w/ stats
Term
PPTP is succeptible to what type of attack
Definition
Man-in-the-middle Attack
Term
What is the earliest OS that L2TP can run on?
Definition
Windows 2000 Professional
L2TP also authenticates the end of the tunnel using digital certificates.
Term
What layer does IPSec operate at?
Definition
The Network Layer
Term
What are the three main security services provided by IPSec?
Definition
Data verification: data appears to be from the source it originated from.
Protection from data tampering
Privacy of transactions
Term
Remote Access Services(RAS) is capable of providing security by using what protocols?
Definition
PPTP and L2TP
Note: RAS provides access to a LAN type environment.
Term
What authentication options are available with PPP
Definition
Password Authentication Protocol(PAP)
Challenge Handshake Authentication Protocol(CHAP)
Extensible Authentication Protocol(EAP)
Term
What does the server sent the client, when the client makes an authentication request in CHAP? What does the client do with them?
Definition
The server sends a nonce(random value) and an ID.
The client sequences them using the shared secret(a text phrase shared btw the client and server), and then generates a hash value using MD5 on sequenced result. The server compares its hash value to the clients hash value. If they match, the client is authenticated.
Term
What version of MS-CHAP is most common?
What advantage does V2 offer over V1?
Definition
MS-CHAP V2
Two way authentication
Term
Kerberos prevents replay attacks by doing what?
Definition
By using temporary keys. Also TGT expire as soon as they're used at key distribution centers.
Term
What are the advantages of TACACS+ over RADIUS?
Definition
-The RAS server receives acknowledgments from the TACACS server that the authentication request has been received from the RAS.
-It encrypts the entire body of the packet that is passed from the RAS to the TACACS+ server
Term
What are keys stored in in public key encryption?
Definition
Certificates
Term
What are the servers and services that verify a user's identity and track the certificate in PKI?
Definition
Certificate Servers
Term
What is the difference between public keys and private keys in PKI?
Definition
Public are used by the sender to encrypt the message. The public key is not the sender's but the recipient's. The recipient, decrypts the message using its private key.
Term
What is a smurf attack?
Definition
When someone believed to be on the network, a spoofer, pings the broadcast address of a segment.
Term
How does one prevent rogue access points?
Definition
Install adequate physical security as well as authentication between devices.
Term
Signature identification
Definition
Security threats are identified with a signature ID, and the prevention technique can be deployed using the signature ID. These can be programmed.
Term
What is PPP used for?
Definition
serial point to point connections and for dial-up, but is not a tunneling protocol. It provides authentication, encryption, and compression to remote clients.
Term
ICA allows clients using what operating systems to access windows application on a windows server?
Definition
Linux, UNIX, or Mac
Note: High resource requirements
Term
What are the two major protocols in IPSec
Definition
Authentication Header: authenticator

Encapsulating Security Payload (ESP): Both authentication and encryption.
Term
What are the two modes IPSec works in?
Definition
Transport Mode: Creates a secure connection between two hosts. Authenticates and encrypts data only. No tunnel.
Tunnel Mode: Entire packet is encapsulated. Creates a secure tunnel, where the transport protocol cannot be identified.
Term
What are the two stages in PPPoE and what happens in each?
Definition
Discovery Stage: A secure connection is made using the MAC addresses of the end points. A session ID is created, and is needed to continue data transmission.
Session Stage: A point-to-point connection is created.
Term
What addresses should be denied with ACLs?
Definition
Internal Addresses
Local host addresses
Reserved Private Addresses
Any IP multicast addresses (224.0.0.0/4)
Term
What type of protocol is IP known as?
Definition
Payload Protocol
Term
What type of protocols are payload protocols encapsulated in for tunneling?
Definition
Delivery
Term
What accounting information does TACACS+ provide?
Definition
Connection start and stop time
Number of bytes sent and received by the user
The number of packets sent and received
The reason for disconnection
Term
IEEE 802 Networking Standards
Definition
802.1: LAN/MAN Management
802.2: Logical Control
802.3: CSMA/CD
802.4: Token Passing Bus
802.5: Token Passing Ring
802.6: Distributed Queue Dual Bus (DQDB) Metropolitan Area Network(MAN)
802.7: Broadband Local Area Networks
802.8: Fiber-Optic LANs and MANs
802.9: Isochronous LANs
802.10: LAN/MAN Security
802.11: Wireless LAN
802.15: Wireless Personal Area Network (Bluetooth)
802.16: WiMAX
802.18: LAN/MAN Standards Committee
Supporting users have an ad free experience!