Chapter 3 Exploring network technologies and tools

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

OSI Model

Open system interconnection model

2
New cards

Seven layers of OSI

Physical, Data link, Network, Transport, Session, Presentation, Application

3
New cards

Physical

Basic equipment of networking, copper wires, fiber optic cables, radio wavs

4
New cards

Data Link

Network Switches and media access control (MAC) addresses

5
New cards

Network

Introduces IP addresses

6
New cards

Transport

End to end comms services for apps.

Transmission control protocol (TCP) and User datagram protocol (UDP)

7
New cards

Session

Establishes, manages, and terminates sessions between apps.

8
New cards

Presentation

Translates data into a standard format that can be understood.

Provides encryption, compression and data transformation

9
New cards

Application

Provides network services to app communications with other apps over the network

10
New cards

Transmission control protocol (TCP)

Connection oriented traffic

11
New cards

User datagram protocol (UDP)

Provides connectionless sessions

Best effort to deliver data without extra traffic

12
New cards

Insecure protocols for data transfer

File transfer protocol (FTP)

trivial file transfer protocol (TFTP)

Secure sockets layer (SSL)

13
New cards

Secure alternatives for data in transit

Transport layer security (TLS)

Internet protocol security (IPSEC)

Secure shell (SSH)

Secure file transfer protocol (SFTP)

File transfer protocol secure (FTPS)

14
New cards

Secure Shell (SSH)

Encrypts traffic in transit

Uses TCP port 22

15
New cards

Common email and web protocols

Simple mail transfer protocol (SMTP)

Post office protocol (POP3)

Internet message access protocol (IMAP)

Hypertext transfer protocol (HTTP)

16
New cards

simple mail transfer protocol (SMTP)

Transfers email between clients

uses TCP port 25

TCP port 587 for added TLS encryption

17
New cards

Post office protocol (POP3)

Transfer emails from servers to end users

Use TCP port 110 for unencrypted

Use TCP port 995 for encrypted

18
New cards

Internet message access protocol (IMAP)

Store email on a mail server, organize and manage email in folders

Use TCP port 143 unencrypted

993 for encrypted

19
New cards

Hypertext transfer protocol (HTTP)

Transmits web traffic between servers

Use TCP port 80

Use TCP port 443 with TLS encryption

20
New cards

Enhancing email security

Sender policy framework (SPF)

Domain keys identified mail (DKIM)

Domain based message authentication, reporting and conformance (DMARC)

21
New cards

Lightweight Directory access protocol (LDAP)

LDAPS (LDAPSecure)

Formats and methods used to query directories

Use TCP port 389 for unencrypted

port 636 for encrypted

22
New cards

Voice and video use cases protocols

real time transport protocol (RTP)

voice over internet protocol (VOIP)

secure real time transport protocol (SRTP)

Session initiation protocol (SIP)

23
New cards

Remote desktop protocol (RDP)

Used to connect to other systems remotely

uses TCP port 3389, usually is blocked by firewall

24
New cards

Domain name system (DNS)

Primary purpose is for domain name resolution.

Resolves hostnames to IP adresses.

25
New cards

Risk of DNS

DNS poisoning

26
New cards

Switches

Connects devices on a local network.

Media access control (MAC) addresses to physical ports

27
New cards

Hardening switches

Port security

MAC filtering

28
New cards

Routers

Connects networks to each other based on destination IP address

Use firewalls and access control lists (ACL) to allow/block traffic

29
New cards

Implicit deny

Unless something is explicitly allowed, it is denied

30
New cards

Route command

used to view and manipulate the routing table.

31
New cards

Firewall

filters incoming and outgoing traffic for host or between networks

32
New cards

Types of firewalls

Stateless, stateful, Web app, Next Gen

33
New cards

Fail-open

Allows all traffic to pass when security device fails

34
New cards

Fail-closed

Closes all traffic if device fails

35
New cards

Network address translation (NAT)

Translates IP public to private and vice versa

Hides IP addresses on internal networks from the internet

36
New cards

Physical isolation and air gap

Ensures networks aren’t connected to another

37
New cards

Segmentation

routers use ACL for traffic

firewalls filter traffic using packet-filter rules

38
New cards

Logical separation

Virtual local area network (VLAN) segments traffic between logical groups

39
New cards

Proxy servers

Forward requests for servers from clients mostly HTTP and HTTPS

40
New cards

Jump server

Placed between different security zones and provide secure access from devices in one zone to another