Chapter 2 System Fundamentals Flashcards

1
Q

Physical Layout (List 5 types)

A

Bus, ring, star, mesh, & hybrid topologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bus Topology

A
  • lays out all connecting nodes in a single run that acts as the common backbone connection for all connected devices
  • Analogy: such as a person on a bus, signals get on, travel to their destination, and get off
  • Downside to its simplicity is its vulnerability. All connectivity is lost if the bus backbone is damaged
  • Imagine Christmas lights, if one turns off, they all turn off
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Token

A

A token is used to be passed around for permission to transmit

This token-based method is only used by the Bus Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ring Topology

A

the common backbone is looped in a ring; some ring layouts use a concentric circle design to provide redundancy if one ring fails (not required).

each client or node attaches to the ring & delivers packets according to its designated turn or availability of the token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Star Topology

A

one of the most common bc of its ease of setup & isolation of connectivity problems, meaning a single node of a star can go offline without affecting other nodes;

A star topology attaches multiple nodes to a centralized NW device, a hub or a switch, that ties the NW together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mesh Topology

A

essentially a web of cabling that attaches a group of clients or nodes to each other;

can look a little messy and convoluted, but this setup is often used for mission critical services bc of its high level of redundancy & resistance to outages.

The internet was designed to survive a nuclear attack and is built as one large mesh NW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hybrid Topology

A

By far most common in use today;

A hybrid layout combines different topoologies into one mixed topology; it takes the best of other layotus and uses them to its advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OSI

A

Open Systems Interconnection Model is an industry standard for data communication; data travels from one end to another, & each layer communicates with the next

The OSI model has 7 layers

  1. Application Layer (App Layer)
  2. Presentation Layter (App Layer)
  3. Session Layer (App Layer)
  4. Transport Layer (Host 2 Host Transport)
  5. NW Layer (Internet Layer, strictly deals with IP addresses)
  6. Data Link Layer (NW Interface Layer, strictly deals with MAC addresses)
  7. Physical (NW Interface Layer)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Layer 1: Physical Layer

A

consists of the physical media & devices that make up the infrastructure of our NWs;

  • Attack considerations are aligned with the physical security of site resources*
  • Examples: cabling, connections, fiber optics, microwave transmission equipment*
  • Stuxnet - a worm named Stuxnet shows up on the scene - wreaking havac & destroying industrial equipment; it replicated itself via removable drives (physical layer)*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Layer 2: Data Link Layer

A

works to ensure that the data it transfers is free of errors;

Functions such as media access control (MAC) & link establishment occur at this layer; as well as basic protocols such as 802.3 for Ethernet & 802.11 for WiFi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MAC

A

Media Access Control - unique identifier assigned to network interfaces for communications on the physical network segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Layer 3: NW Layer

A

determines the path of data packets based on protocol used;

At this layer, we see IP addressing for routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Routing Information Protocol

A

prevents routing loops by limiting the # of hops allowed in a path from source to destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Layer 4: Transport Layer

A

ensures the transport or sending of data is successful;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Layer 5: Session Layer

A

identifies established system sessions between different NW entities

When accessing a system remotely, you are creating a session between your computer & the remote system;

NetBIOS & RPC is found here

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NetBIOS

A

Network Basic Input/Output System - a program that allows applications on different computers to communicate within a LAN

17
Q

Most attacks reside within layers

A

3,4,5 which is NW, Transport, Session

18
Q

Layer 6: Presentation Layer

A

provides translation of data that is understandable by the next receiving layer

& can optionally be encrypted with protocols such as SSL (Secure Sockets Layer)

19
Q

SSL

A

Secure Sockets Layer - standard security technology for establishing an encrypted link between web server & browser

20
Q

Layer 7: Application Layer

A

functions as a user platform in which the user & SW processes within the system can operate & access NW resources

Apps & SW suites that we use on a daily basis are under this layer; includes protocols such as FTP and HTTP

21
Q

TCP

3 way handshake

A

connection-oriented protocol that establishes connection & verifies the packets sent across that connection make it to their destination

3 way handshake - Process starts with a SYN packet that tells the receiving system that another system wants to connect; (random seq #1000)

The receiving system responds with a SYN-ACK (random seq #2585)

Then an ACK is sent back verifying and connection is initiated (#1001)

22
Q

IP Address 150.215.017.009

If this NW is divided into 14 subnets, identify the subnet mask and subnet address

A

For the Subnet Mask, the first 16 bits (network address) are all set to 1.

The host address is determined by how much space is needed for the 14 subnets. 16 is the closest bit to turn on to accomodate the 14 subnet addresses, so 256-16 = 240 making the subnet mask 255.255.240.0

As for the subnet address, it becomes the inverse, 255.255.16.0

23
Q

What are bits, nibbles, & a byte

A

Bits are 1s and 0s

Nibbles are 4 bits

A byte is 2 nibbles

24
Q

Registered Ports

A

These ports are the ones that have been identified as usable by other applications running outside of the user’s present purview.

Registered ports range form 1025-49151.

  1. WINS 1512
    • Windows Internet Naming Service - maps NetBIOS names to IP addresses; solves problem of NetBIOS name resolution in routed environments
  2. Socks5 1080
    • routes NW packets between client & server through an application proxy which is different from a normal proxy; An example would be when using HTTP proxy, you are actually fowarding an HTTP request, and the HTTP proxy server then performs the request on your behalf
  3. Nessus Server 1241
  4. SQL Server 1433, 1434
  5. Citrix Applications 1494, 2598
  6. Oracle Listener 1521
  7. Citrix Mgmt 2512, 2513
  8. RDP 3389
  9. IRC 6662-6667
    • Internet Relay Chat - Application layer protocol that facilitates transfer of messages in the form of text
25
Q

Proxy Server

A

a server that sits between client applications, such as between a web browser and server

26
Q

Dynamic Ports

A

free ports available for use by TCP, UDP requests made by an application

These ports range from 49152 - 65535

27
Q

DNS

DNS Hacking

AD

A

database that contains the translated names to IP addresses that can be queried by any DNS-aware applications

The internet root servers, or top level servers, contain addresses of the DNS servers for all top-level domains, .com, .org, etc. Each top-level server contains a DNS database of all names & addresses in that domain

Local NWs isolated from the Internet may use their own domain name systems through use of DNS mgmt SW. These names are typically same as those used by internet implementation

Hacking - if an attacker manipulates DNS, in modern day environments, applications may not work without DNS present & functioning; Ex. Microsoft AD wouldn’t work without DNS present or accessible

Active Directory - special purpose database for windows that handles a large # of read & search operations

28
Q

broadcast domain

A

A broadcast domain allow traffic to be broadcast to all connected nodes

29
Q

Identify OSI Layers for Equipment:

Hub, Switch, Router, Proxy

A

Hub: Layer 1 - Physical

Switch: Layer 2 - Data Link

Router: Layer 3 - Network

Proxy: Layer 7 - Application

30
Q

IPS & IDS

A

both used to cover your tracks, keep a low profile

IDS - intrusion detection system - detect any suspicious NW activity & notifies admin, passive in nature; similar to a burglar alarm that alerts you, but doesn’t stop the burglar

IPS - intrusion prevention system - proactive & preventive, senses potential malicious activity on NW & takes steps to prevent further damage and thwart further attacks

31
Q

Full backup

A
  1. - full back up resets the archive bit of all files & backs them up accordingly
32
Q

Differential backup

A
  • backs up all changed files since last successful full backup. Does not reset archive bit; creates one large file and fully restores off of latest differential backup (full is not needed)
33
Q

Incremental Backup

A
  • backs up all changed files since last full back up OR since the last incremental; does not reset archive bit; creates several small backup jobs; last full back up + incrementals are needed to restore
34
Q

Collosion domains

A

Collosion domains are NW segments in which traffic sent will potentially collide w/ other traffic; In a collion domain, traffic will not be sent to a broadcast, it will collide w/ other traffic on the wire

35
Q

ARP

A

ARP requests (Address Resolution Protocol), which are sent to the NW to resolve HW addresses, are an example of broadcast domain

36
Q

RPC

A

Remote Procedure Call - inter-process communication that allows a computer program to execute in another address space