Chp 5 Infrastructure Flashcards
OSI
The Open Systems Interconnection (OSI) model is a conceptual framework used to understand and implement network protocols in seven distinct layers.
OSI Physical Layer (Layer 1):
Function: Deals with the physical connection between devices and the transmission and reception of raw bitstreams over a physical medium.
Key Components: Cables, switches, hubs, repeaters, and network interface cards (NICs).
OSI Data Link Layer (Layer 2):
Function: Responsible for node-to-node data transfer and error detection and correction. It ensures that data transferred from one node to another is free of errors.
Key Components: Bridges, switches, and protocols like Ethernet and Wi-Fi.
OSI Network Layer (Layer 3):
Function: Manages device addressing, tracks the location of devices on the network, and determines the best way to move data between them. It handles packet forwarding, including routing through different routers.
Key Components: Routers and layer 3 switches.
Protocols: IP (Internet Protocol), ICMP (Internet Control Message Protocol).
OSI Transport Layer (Layer 4):
Function: Ensures complete data transfer with error recovery, flow control, and data integrity. It manages end-to-end communication and the segmentation and reassembly of data.
Key Components: Gateways and firewalls.
Protocols: TCP (Transmission Control Protocol), UDP (User Datagram Protocol).
OSI Application Layer (Layer 7):
Function: Closest to the end-user. It interacts with software applications to implement a communicating component. It provides network services directly to end-user applications.
Key Components: Web browsers, email clients, and other network-based applications.
Protocols: HTTP (Hypertext Transfer Protocol), FTP (File Transfer Protocol), SMTP (Simple Mail Transfer Protocol), DNS (Domain Name System).
FQDN
A Fully Qualified Domain Name (FQDN) is the complete domain name for a specific computer or host on the internet.
Star Topology
is BAD. is a network configuration where all devices (nodes) are connected to a central hub or switch.
Central Point of Failure: The entire network depends on the central hub or switch. If it fails, the whole network is disrupted.
The network segment is also “flat” in terms of security.
logical segmentation
Helps the Layer 3 of OSI by switch, router, and firewall configuration where hosts on one network segment are prevented from or restricted in communicating with hosts on other segments.
In IPv6, how are the 128 bits of an IP address divided and used?
A. The last 32 bits are the host’s interface ID, and the first 96 bits contain network information.
B. The last 64 bits are the host’s interface ID, and the first 64 bits contain network information. The first 48 bits are used by ISPs to determine the network’s location on the global Internet, and the remaining 16 bits are used for subnetting by the site administrator.
C. The last 128 bits are the host’s interface ID, and there are no bits for network information.
D. The first 64 bits are the host’s interface ID, and the last 64 bits contain network information. The first 48 bits of the last 64 bits are used by ISPs to determine the network’s location on the global Internet, and the remaining 16 bits are used for subnetting by the site administrator.
B. The last 64 bits are the host’s interface ID, and the first 64 bits contain network information. The first 48 bits are used by ISPs to determine the network’s location on the global Internet, and the remaining 16 bits are used for subnetting by the site administrator.
ARP
Address Resolution Protocol (ARP) is a protocol used in IPv4 networks to map IP addresses to MAC (Media Access Control) addresses. ARP is essential for communication between devices on a local network.
security zones
An area of the network (or of a connected network) where the security configuration is the same for all hosts within it. In physical security, an area separated by barriers that control entry and exit points.
Attack Surface Layer 1/2
—allows unauthorized hosts to connect to wall ports or wireless networks and communicate with hosts within the same broadcast domain.
Attack Surface Layer 3
—allows unauthorized hosts to obtain a valid network address, possibly by spoofing, and communicate with hosts in other zones.
RADIUS
Remote Authentication Dial-In User Service (RADIUS)
AAA protocol used to manage remote and wireless authentication infrastructures.
PNAC
Port-based Network Access Control (PNAC), commonly implemented using the IEEE 802.1X standard, is a method used to control access to a network by requiring devices to authenticate themselves before gaining access to network resources.
Attack Surface Layer 4/7
—allows unauthorized hosts to establish connections to TCP or UDP ports and communicate with application layer protocols and services.