F5-101 - Application Delivery Fundamentals Flashcards

1
Q

Explain the purpose of a switch’s forwarding database

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain the purpose and functionality of ARP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain the purpose and functionality of MAC addresses

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the purpose and functionality of a broadcast domain

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain the purpose and functionality of VLANs

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain the purpose and functionality of link aggregation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the purpose and functionality of IP addressing and subnetting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Given an IP address and net mask, determine the network IP and the broadcast IP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Given a routing table and a destination IP address, identify which routing table entry the destination IP address will match

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain the purpose and functionality of Routing protocols

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain the purpose of fragmentation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Given a fragment, identify what information is needed for reassembly

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain the purpose of TTL functionality

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Given a packet traversing a topology, document the source/destination IP address/MAC address changes at each hop

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the function of each OSI layer

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Differentiate between the OSI layers

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe the purpose of the various address types at different OSI layers

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Compare/Contrast purpose and functionality of MTU and MSS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Explain the purpose and functionality of TCP

A
20
Q

Explain the purpose and functionality of UDP

A
21
Q

Explain the purpose and functionality of ports in general

A
22
Q

Explain how retransmissions occur

A
23
Q

Explain the purpose and process of a reset

A
24
Q

Describe various TCP options

A
25
Q

Describe a TCP checksum error

A
26
Q

Describe how TCP addresses error correction

A
27
Q

Describe how the flow control process occurs

A
28
Q

Explain the purpose and functionality of HTTP

A
29
Q

Differentiate between HTTP versions

A
30
Q

Interpret HTTP status codes

A
31
Q

Determine an HTTP request method for a given use case

A
32
Q

Explain the purpose and functionality of HTTP keepalives, HTTP headers, DNS, SIP, FTP

A
33
Q

Differentiate between passive and active FTP

A
34
Q

Explain the purpose and functionality of SMTP

A
35
Q

Explain the purpose and functionality of a cookie

A
36
Q

Given a situation in which a client connects to a remote host, explain how the name resolution process occurs

A
37
Q

Explain the purpose and functionality of a URL

A
38
Q

AJAX

A

Asynchronous JavaScript and XML is a group of interrelated Web development techniques used on the client-side to create asynchronous Web applications

39
Q

JSON

A

JavaScript Object Notation is syntax for storing and exchanging text information. Much like XML. JSON is smaller than XML, faster and easier to parse.

40
Q

SOAP

A

SOAP, originally defined as Simple Object Access Protocol, is a protocol specification for exchanging structured information in the implementation of Web Services in computer networks. It relies on XML Information Set for its message format, and usually relies on other Application Layer protocols, most notablyHypertext Transfer Protocol (HTTP) or Simple Mail Transfer Protocol (SMTP), for message negotiation and transmission.

41
Q

XSS

A
  • Cross-site scripting attacks are a special case of code injection
  • can lead to an attacker gaining the ability to do anything a victim can do through their browser
  • two gereral types: reflected, stored
  • mitigate with validation and escaping on the server-side

<a><span>[</span>source<span>]</span></a> <a><span>[</span>source<span>]</span></a>

42
Q

Positive security model

A

A “positive” security model or “whitelist” is one that defines what is allowed, and rejects everything else.

43
Q

non-persistent or reflected XSS

A

XSS attack typically delivered via email or a neutral web site. an innocent-looking URL, pointing to a trusted site contains the XSS vector. If the site is vulnerable to the vector, clicking the link can cause the victim’s browser to execute the injected script.

44
Q

persistent or stored XSS

A

persistent or stored XSS vulnerability is a variant of a cross-site scripting flaw which occurs when the data provided by the attacker is saved by the server, and then permanently displayed on “normal” pages returned to other users

45
Q

HTTP/2

A

new iteration of the HTTP protocol

46
Q

Heartbleed

A

a buffer over-read bug which affects the open-source cryptography library OpenSSL versions 1.0.1- 1.0.1f, 1.0.2-beta

47
Q

TCP flags

Nobody can eat, until a poor router says finished.

A

NS - Nonce Sum
CWR - Congestion Window Reduced
ECE - Explicit Congestion Notification Echo
Urg
Ack
Psh
Rst
Syn
Fin