8.2 Ports, Protocols, and the OSI Mode Flashcards

1
Q

Networks use __________ to ensure messages are fully sent and understood.

A

Networks use protocols to ensure messages are fully sent and understood.

Similar to the military’s use of “over,” a network uses
the TCP message FIN to indicate the end of the transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PAP is used for ______________.

A

PAP is used for authenticating a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SMB is a Windows-based protocol for _________.

A

SMB is a Windows-based protocol for sharing files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NetBIOS allows computers to communicate on ___________.

A

NetBIOS allows computers to communicate on a local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NetBIOS allows computers to communicate on ___________.

A

NetBIOS allows computers to communicate on a local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three parts of packets?

A

Header - Sender’s IP address, receiver’s IP address, protocol

Payload - Data

Trailer - Indicates end of packet, error correction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

For example, the version field is indicated in the header. As the first field, it starts at the first bit and ends at the fourth bit.

True or False

The receiver will always find this information in this exact location.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does PAP stand for?

A

PAP (Password Authentication Protocol)

Ex. PAP Two-Way Handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False

Ports are like doors that can be opened, closed, or accessible only to certain individuals. Ports are the access points for transmitting and receiving data.

A

True

It’s important that IT professionals do not allow unauthorized access to these points of entry.

Unauthorized access can potentially lead to a breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Computers don’t have enough physical space for every protocol, so we use software to create_________.

A

Computers don’t have enough physical space for every protocol, so we use software to create virtual ports.

Every protocol is assigned a numerical virtual port number.

The corresponding port is the destination port. It’s where other machines send data to communicate with that protocol.

For example: A machine sending an HTTP message to
a web server sends traffic to the server’s port 80.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False

There are 65,536 virtual ports, numbered from 0 to 65535.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False

System Ports Range 1024-49151

A

False

System ports range from 0 - 49151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are common ports?

A

Port 80 Sending web traffic.
Port 443 Sending encrypted web traffic.
Port 21 Sending files.
Port 22 Securely operating network services.
Port 25 Sending emails.
Port 53 Translating domains into IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is port 80 commonly used for?

A

Sending web traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is port 443 commonly used for?

A

Sending ecrypted web traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wha is port 21 commonly used for?

A

Sending files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is poer 22 commonly used for?

A

Securely operating network services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is port 25 commonly used for?

A

Sending emails

19
Q

What is port 53 commonly used for?

A

Translating domains into IP addresses

20
Q

What are the 7 layers of the OSI model?

A
Layer 1:  Physical
Layer 2: Data Link
Layer 3: Network
Layer 4: Transport
Layer 5: Session
Layer 6: Presentation
Layer 7: Application
21
Q

The OSI model is a _______ layer framework that allows security analysts to ________________, by detailing the processes, devices, and protocols in place at each layer.

A

The OSI model is a seven layer framework that allows security analysts to understand how communication works on a network, by detailing the processes, devices, and protocols in place at each layer.

22
Q

Explain the Physical layer 1

A

The Physical layer is responsible for transmission of binary data through a physical medium. It handles how data is physically encoded and decoded.

23
Q

Explain the Data Link layer 2

A

The Data Link layer establishes links between nodes. It also ensures data gets to its final destination without corruption, thus protecting data integrity.

24
Q

Explain the Network layer 3

A

The Network layer routes data through physical networks using an IP address, deciding which physical path the data will take, and ensuring it gets to the correct destination.

25
Q

Explain the Transport layer 4

A

The Transport layer is responsible for actually transmitting data across the network. It puts data onto the network, and assigns source and destination ports.

26
Q

Explain the Session layer 5

A

The Session layer manages connections between ports on computers and handles data flow.

27
Q

Explain the presentation layer 6

A

The Presentation layer is is the translator for the network. It formats data to be presented to the Application layer, handles data representation, decryption and encryption, character set translation, and conversion.

28
Q

Explain the application layer 7

A

The Application layer represents data so the consuming application understands it. This is the layer an individual interacts with, such as a web or email application.

29
Q

Data moves through the layers, starting from Layer 7 and ending at Layer 1, in a process known as __________.

A

Data moves through the layers, starting from Layer 7 and ending at Layer 1, in a process known as encapsulation.

Encapsulation is the process of placing headers, and sometimes trailers, around the data to direct it to its destination.

30
Q

___________ is the process of removing the headers, and sometimes trailers, around the data to confirm the data reaches the destination.

A

Decapsulation is the process of removing the headers, and sometimes trailers, around the data to confirm the data reaches the destination.

31
Q

Whay is it important to understand the OSI model as cybersecurity professional?

A

The OSI model helps us more easily understand new protocals

The OSI model helps determine where problems in the network are occuring, even if we don’t have full knowldge of ths issue.

The OSI model makes it eaiser to communicate where a security attack has occured and what should be done.

32
Q

At which OSI layer each of the incidents occurred

A networking cable was cut in the Data Center and now no traffic can go out.

A

Physical cables that are cut or disconnected occur on Layer 1: the Physical layer.

33
Q

At which OSI layer each of the incidents occurred

A code injection was submitted from an administrative website, and it’s possible that an attacker can now see unauthorized directories from your Linux server.

A

Attacks that occur directly on the web application would occur on Layer 7: the Application layer.

34
Q

At which OSI layer each of the incidents occurred

The MAC address of one of your network interface cards has been spoofed and is preventing some traffic from reaching its destination.

A

Issues or attacks on the MAC Address would occur on the Layer 2: the Data Link layer.

35
Q

At which OSI layer each of the incidents occurred

Your encrypted web traffic is now using a weak encryption cipher and the web traffic is now vulnerable to decryption.

A

Encryption occurs on the Layer 6: Presentation layer.

36
Q

At which OSI layer each of the incidents occurred

The destination IP address has been modified and traffic is being routed to an unauthorized location.

A

IP Addresses and IP address routing occurs on Layer 3: the Network layer.

37
Q

At which OSI layer each of the incidents occurred

A flood of TCP requests is causing performance issues.

A

TCP and source and destination protocols occur on Layer 4: the Transport layer.

38
Q

At which OSI layer each of the incidents occurred

A SQL injection attack has been detected by the SOC. This SQL injection may have deleted several database tables.

A

Attacks occurring on the web application occur on Layer 7: the Application layer.

39
Q

At which OSI layer each of the incidents occurred

A switch suddenly stopped working and local machines aren’t receiving any traffic.

A

Switches use MAC Addresses to route traffic, so this would occur on Layer 2: the Data Link layer.

40
Q

At which OSI layer each of the incidents occurred

An ethernet cable was disconnected and the machine connected isn’t able to receive any external traffic.

A

Physical cables that are cut or disconnected occur on Layer 1: the Physical layer.

41
Q

At which OSI layer each of the incidents occurred

Traffic within the network is now being directed from the switch to a suspicious device.

A

Switches use MAC Addresses to route traffic, so this would occur on Layer 2: the Data Link layer.

42
Q

Networks communicate with sequences of binary data called packets. Wireshark is a _______________.

A

Networks communicate with sequences of binary data called packets. Wireshark is a packet capturing tool.

43
Q

True or False

Wireshark is a tool that allows us to look at real-time communication across a network, and monitor the activities of the devices connected to it.

In these packet captures, Wireshark collects and
analyzes the kinds of websites and webpages
individuals on the network are viewing, as well as the
type of communication occurring.

A

True

Wireshark does this analysis by inspecting individual packets.

Multiple packets collected into a file by Wireshark are called a packet capture. These have file extensions such as .cap, .pcap, and pcapng.