Basics of Networking Flashcards

1
Q

In simple words, what does the NAT protocol do?

A

The Network Address Translation protocol is a method of mapping one IP address to another. So it ensures that any external response to traffic coming from a device comes back to the correct locally assigned IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why does the NAT protocol accept connections out and responses back, but does not allow connections in?

A

Because the local IP address is unknown and a local address shouldn’t be routed across the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What defines the layer 1 of the OSI Model?

A

The physical layer is how the devices are physically connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If a device uses more than one layer, in which one do we classify it?

A

We classify a device by its greater layer. If a device uses layers 1 and 2, it will be classified as a layer 2 device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Data Link layer?

A

It’s the layer responsible to transfer data between adjacent network nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Does the Data Link layer transmit data over different networks?

A

No, it only traverses a single network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the ARP protocol do?

A

The Address Resolution Protocol translates an IP address to a MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Will your MAC address be recorded in the logs of an internet web server you access? Why?

A

No. ARP traffic is not routed beyond the local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Does the first three octets of a MAC address identify the manufacturer?

A

Yes. The first octets are called the OUI, Organitonally Unique Identifier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Can a MAC address be spoofed?

A

Yes. There’s ways to spoof it at a software level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Can a MAC address be spoofed?

A

Yes. There’s ways to spoof it at a software level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the Network Layer do?

A

Transmit data to different networks. Routes packages between different networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does the IP address 192.168.101.42 would be on a network with a netmask of 255.255.255.0?

A

It would be 192.168.101.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Subnet Masks used for?

A

They are used to identify the different parts of the IP address. Which bits will refer to the network address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which operation can be used on the IP address and subnet mask to determine the network identifier?

A

A bitwise AND.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the advantage in using CIDR?

A

CIDR allows for much more flexible subdivisions of network space because any number of bits can be used to define the network portion.

17
Q

What could be happening in the following situation: Computers on your network are being assigned the wrong DNS server IP address and all of them are using DHCP.

A

Someone has setup another DHCP server. An attacker could setup a rogue DHCP server and take control of the DNS, resulting in attacker controlled responses to all DNS queries.

18
Q

What is routing?

A

Is the process of moving packets between networks.

19
Q

In how many networks can a router be simultaneously connected?

A

A router can be connected to two or more networks simultaneously.

20
Q

How do we prevent infinite routing loops?

A

For each hop the TTL is decremented by 1. When it hits 0, the packet expires in transit.

21
Q

What is a hop?

A

Is each router between a source and destination,

22
Q

At which layer can fragmentation occur? Why?

A

At layer 3. Because fragmentation is a feature of IPv4, which operates at layer 3.

23
Q

Why does NAT help with the IPv4 address exhaustion?

A

Because it’s used to map a public IP address to a single private address. With that, multiple devices can share a single public IP address.

24
Q

True or false: Your computer has an IP address of 192.168.100.5. When you access www.sans.org, 192.168.100.5 will be recorded in their web server logs.

A

False. The request will be sent by the router, so the router’s public IP will be stored in the logs. The response will be mapped to the local IP address of the device (192.168.100.5) using the NAT protocol.

25
Q

Which of the following network IP addresses must use NAT to access resources on the internet?
- 10.5.4.2
- 172.16.52.4
- 192.168.1.4

A

All of the above. Because IP addresses starting with 10., 172. or 192. are reserved to private local networks.

26
Q

For what is the ICMP protocol used for?

A

It’s used to communicate status and diagnostic information, and to help control the flow of information on a network.

27
Q

When a host, port or network is unreachable, which protocol is used to communicate this?

A

The ICMP protocol (Internet Control Message Protocol).

28
Q

How TRACERT.EXE (In linux traceroute) identifies all the hops in a route?

A

It increments the TTL value and receive a ICMP time exceeded in transit messages. Only the final host returns a ICMP echo response.

29
Q

You want to configure your firewall to allow people inside your network to ping anyone, but not allow anyone outside your network to traceroute anything behind your firewall. How should you configure it?

A

Block all outbound ICMP time exceeded in transit messages. This would still allow the ICMP echo responses for the ping command and would block the responses used by the traceroute command.

30
Q

What is a recursive DNS server?

A

It’s the server responsible for attending the DNS requests made by the user. It also has a local cache for optimize the response time when possible.

31
Q

What are Root Name servers?

A

Servers in the root of the DNS hierarchy. They can give the ip of TLD servers.

32
Q

What are TLD servers?

A

Top-Level Domain servers are responsible for the domain extensions, such as .com, .edu, .org, etc…

33
Q

What is a authoritative server?

A

Server responsible for returning the useful information i.e. the ip of the requested server. It has the ip addresses of specific domains saved.