Chapter 3 Flashcards

1
Q

Acronym and Definition

OSI model

A
  • Open Systems Interconnection model
  • Describes network communications using seven layers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the layers of the OSI model in order?

A
  1. Physical
  2. Data Link
  3. Network
  4. Transport
  5. Session
  6. Presentation
  7. Application

The lower the layer number, the closer you are to the actual wires and cabling of the network
“Please Do Not Throw Sausage Pizza Away “

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Physical layer of the OSI model

A

basic equipment of networking: copper wires, fibre optic cables, radio waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Link layer of OSI

A
  • This is where network switches reside.
  • Formats data into data frames and routes it between systems on the local network using their MAC addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network layer of the OSI model

A

Routers use IP addresses to send information between systems that are not on the same local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Transport layer of the OSI model

A

Provides end-to-end communication services for applications. TCP and UDP exist at this layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Session layer of the OSI model

A

establishes, manages, and terminates sessions between applications running on different devices, alowing them to commmunicate and exchange data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Presentation layer of the OSI model

A
  • Translates data into a standard format that can be understood by the application layer.
  • Provides encryption, compression, and other data transformation services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Application layer of the OSI model

A

Provides network services to application, allowing them to communicate with other applications over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Acronym

MAC

A

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Acronym

IP

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Acronym and definition

TCP

A
  • Transmission Control Protocol
  • A connection oriented protocol that provides guaranteed delivery

Uses three-way handshake process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Acronym and definition

UDP

A
  • User Datagram Protocol
  • A connectionless protocol that provides “best effort” delivery, to deliver data without using extra traffic

Many DoS attacks use UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Walkthrough the three way TCP handshake process

A
  1. To start the TCP session, the client sends a SYN (synchronize) packet
  2. The server responds with a SYN/ACK (synchronize/acknowledge) packet.
  3. The client completes the handshake with an ACK packet to establish the connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Acronym

DoS

A

Denial of Service

A type of network based attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Acronym and Definition

ICMP

A
  • Internet Control Message Protocol
  • Tests basic connectivity and includes ping and tracert
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Acronym and Definition

IP

A
  • Internet Protocol
  • Identifies hosts in a TCP/IP network and delivers traffic from one host to another using IP addresses
  • IPv4 uses 32 bit addresses
  • IPv6 uses 128 bit addresses using hexadecimal code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Acronym and Definition

ARP

A
  • Address Resolution Protocol
  • Resolves IPv4 addresses to MAC addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are use cases that may be associated with different protocols

A
  • Data in transit
  • Email and web
  • Directory
  • Voice and Video
  • Remote Access
  • Time Synchronization
  • Network Address Allocation
  • Domain Name Resolution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Acronym and Definition

FTP

A
  • File Transfer Protocol
  • Used to transfer files over networks in cleartext. Does NOT encrypt the transmission

This is an insecure protocol that should no longer be used to transfer data over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Acronym

TFTP

A

Trivial File Transfer Protocol

Not an essential protocol so is usually disabled by administrators. Used to transfer small amounts of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Acronym

SSL

A
  • Secure Sockets Layer
  • Used to be the primary method to secure and encrypt HTTP traffic as HTTPS and other types of traffic
  • Has been compromised and is not recommended for use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which protocols should not be used on modern networks

A
  • FTP
  • TFTP
  • SSL
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the secure alternatives for protecting data in transit?

A
  • TLS
  • IPsec
  • SSH
  • HTTPS
  • FTPS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Acronym

TLS

A
  • Transport Layer Security
  • Replacement for SSL
  • Encrypts FTPS

Should be used in place of SSL for browsers using HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Acronym

IPsec

A
  • Internet Protocol Security
  • Used to encrypt IP traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Acronym

SSH

A
  • Secure Shell
  • Encrypts SCP and SFTP
  • Uses TCP port 22
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Acronym

SFTP

A
  • Secure File Transfer Protocol
  • Uses SSH to transmit files in an encrypted format.

Transmits data using TCP port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Acronym

FTPS

A
  • File Transfer Protocol Secure
  • Uses TLS to encrypt FTP traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Acronym and definition

SMTP

A
  • Simple Mail Transfer Protocol
  • Transfers email between clients and SMTP servers

  • TCP port 25 for unencrypted email
  • SMTPS uses TCP port 587 for encrypted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Acronym

POP3

A
  • Post Office Protocol
  • Transfers emails from servers to end users

  • TCP Port 110 for unencrypted connections
  • TCP Port 995 for encrypted connections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Acronym

IMAP

A
  • Internet Message Access Protocol
  • Used to store email on a mail server and allows users to organize and manage email in folders on the server

  • TCP Port 143 for unencrypted connections
  • TCP Port 993 for encrypted connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Acronym

HTTP

A
  • Hypertext Transfer Protocol
  • Transmits unencrypted web traffic between web servers and browsers

  • TCP Port 80
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Acronym

HTTPS

A
  • Hypertext Transfer Protocol Secure
  • Adds TLS encryption

  • Port 443
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Acronym and Definition

SPF

A
  • Sender Policy Framework
  • Uses DNS records to define which IP addresses are authorized to send emails on behalf of a domain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Acronym and Definition

DKIM

A
  • DomainKeys Identified Mail
  • Uses Public key cryptography to sign and verify an email’s domain and content
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Acronym

DMARC

A

Domain-based Message Authentication, Reporting, and Conformance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What protocols protect users from spam, phising and other types of email based attacks?

A

SPF, DKIM, and DMARC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are email gateways

A

Network devices or software applications that filter incoming and outgoing emails for spam malware and other types of threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What port does LDAP use?

A

Port 389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What port does LDAPS use?

A

Port 636

42
Q

Acronym and Definition

(AD DS)

A
  • Microsoft Active Directory Domain Services
  • Provide authentication and authorization services for a network
43
Q

What does AD DS use when querying the directory?

A

LDAPS
(LDAP encrypted with TLS)

44
Q

What protocol is commonly used as the underlying protocol with live and video streaming?

A

UDP

45
Q

Acronym and Definition

RTP

A
  • Real-time Transport Protocol
  • Delivers audio and video over IP networks
46
Q

Acronym

VoIP

A

Voice over Internet Protocol

47
Q

Acronym and Definition

SRTP

A
  • Secure Real-time Transport Protocol
  • Provides encryption, message authentication, and integrity for RTP
48
Q

Acronym and Definition

SIP

A
  • Session Initiation Protocol
  • Used to initiate, maintain, and terminate voice, video and messaging sessions
49
Q

What do VoIP logs show?

A
  • Timestamps
  • Caller phone numbers
  • Recipient phone numbers
  • extensions (if used)
  • missed calls
50
Q

What do SIP log files show?

A
  • Timestamps
  • Sender IP addresses
  • Recipient IP addresses
51
Q

Acronym

GPO

A

Group Policy Object

52
Q

Acronym

RDP

A

Remote Desktop Protocol

53
Q

What TCP port does RDP use?

A

Port 3389

54
Q

Why do administrators use SSH instead of Telnet

A

Telnet sends data including usernames and passwords over the network in cleartext while SSH encrypts the data

55
Q

What is OpenSSH

A
  • A suite of tools that simplifies the use of SSH to connect to remote servers securely
  • Supports authentication using a passwordless SSH login
56
Q

Acronym and Definition

DHCP

A
  • Dynamic Host Configuration Protocol
  • Dynamically assigns IP addresses to hosts
57
Q

Acronym

ISP

A

Internet Service Provider

58
Q

Acronym

IANA

A

Internet Assigned Numbers Authority

59
Q

Acronym

IETF

A

Internet Engineering Task Force

60
Q

Acronym

DNS

A
  • Domain Name System
  • Resolves hostnames to IP addresses
61
Q

What are the DNS Zones and what data is kept in each zone?

A
  • A : hostname and IPv4 addresses
  • AAAA : hostname and IPv6 addresses
  • PTR
  • MX : identify mail servers
  • CNAME
    *
62
Q

What port doest DNS use for zone transfers

A

TCP Port 53

63
Q

What port does DNS use for client queries

A

UDP port 53

64
Q

Acronym and Definition

DNSSEC

A
  • Domain Name System Security Extensions
  • Provides validation for DNS responses by adding a RRSIG
65
Q

Acronym and Definition

RRSIG

A
  • Resource Record Signature
  • Provides data integrity and authentication and helps prevent DNS poisoning attacks
66
Q

What is DNS poisoning?

A

An attacker modifies a DNS cache with a bogus IP address, sending users to a malicious website

67
Q

What is a host?

A

Any device with an IP address.

Also referred to as a client or a node

68
Q

What is Unicast?

A
  • A method IPv4 uses to address TCP/IP traffic
  • One hosts sends traffic to another host using a destination IP address

One to one traffic

69
Q

What happens to a unicast packet on a network when it is sent to a specific host?

A

Other hosts on the same network may see the packet, but they will not process it because it isn’t addressed to them.

70
Q

What is broadcast?

A
  • One-to-all traffic
  • Every host that receives a broadcast will process it
71
Q

What is one difference in broadcasting between switches and routers?

A

Switches pass broadcast traffic between their ports but routers do not pass broadcast traffic

72
Q

What does a switch do?

A
  • Connects computers and other devices to each of its physical ports
  • Map MAC addresses to physical ports
73
Q

What is port security and how does it enhance network security on switch ports?

A

Port security limits access to switch ports by:
* Limiting the number of MAC addresses allowed per port. (mac filtering)
* Disabling unused ports to prevent unauthorized access

74
Q

How does a switching loop affect a network

A

Floods a network with traffic and can disable a switch

75
Q

Acronym

STP and RSTP

A
  • Spanning Tree Protocol
  • Rapid Spanning Tree Protocol

They provide both broadcast storm prevention and loop prevention for switches

76
Q

Acronym

BPDU

A
  • Bridge Protocol Data Unit
  • STP sends BPDU messages in a network to detect loops
77
Q

What is a BPDU guard

A

A feature that monitors the ports for any unwanted BPDU messages. If it receives any it disables the port

Blocks BPDU attacks

78
Q

What is a router

A

Connects multiple network segments into a single network and routes traffic between the segments

79
Q

Router ACLs

A

Provide basic packet filtering. They filter packets based on IP addresses, ports, and protocols

80
Q

What is implicit deny

A

The last rule in an ACL. Indicates that unless something is explicitly allowed, it’s denied

81
Q

What is the route command?

A

a command used to view and manipulate a systems routing table

82
Q

Acronym and Definition

SNMP

A
  • Simple Network Management Protocol
  • Monitors and manages network devices such as routers or switches
83
Q

What ports do SNMP use?

A

UDP ports 161 and 162

84
Q

What is the purpose of a host based firewall?

A

To filter incoming and outgoing traffic for a single host or between networks

85
Q

What is a stateless firewall?

A

A firewall that uses rules implemented in ACLs to identify allowed and blocked traffic

86
Q

Acronym

WAF

A

Web Application Firewall

87
Q

Acronym

NGFW

A

Next Generation Firewall

88
Q

Acronym

DMZ

A
  • Demilitarized Zone also known as a screened subnet
  • A security zone between a private network and the Internet
89
Q

Acronym and Definition

NAT

A
  • Network Address Translation
  • A protocol that translates pubilc and private IP address either way and hides IP addresses on the internal network from users on the Internet
90
Q

Dynamic NAT

A

uses multiple public IP addresses

91
Q

Static NAT

A

Uses a single public IP address in a one to one mapping

92
Q

Acronym

SCADA

A

Supervisory Control and Data Acquisition

93
Q

What is an air gap

A

An air gap isolates one network from another by ensuring there is physical space between all systems and cables

94
Q

Acronym

VLAN

A

Virtual Local Area Network

95
Q

What do proxy servers/ forward proxy servers do

A

They forward requests for services from a client

96
Q

What do reverse proxy servers do?

A

Accept traffic from the Internet and forward it to one or more internal web servers

97
Q

What is a cache?

A

Temporary storage

98
Q

Acronym

UTM

A

Unified Threat Management

99
Q

What is a jump server

A

A hardened server used to access and manage devices in a different security zone

100
Q

Acronym

ZTNA

A
  • Zero Trust Network Access
  • We don’t make trust decisions based on network location