Introduction To Networking Concepts Flashcards

1
Q

Networking models

A

Transmission control protocol and internet protocol (TCP/IP)
Open systems interconnection (OSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The four layers of the TCP/IP model

A

Network interface
Network
Transport
Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The seven layers of the OSI model

A
  1. Physical
  2. Data link
  3. Network
  4. Transport
  5. Session
  6. Presentation
  7. Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the role of the network interface layer of the TCP/IP model?

A

Contains the physical cabling or the wireless spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the role of the network layer of the TCP/IP model?

A

Where the internet protocol (IP) and the internet control message protocol (ICMP) run?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the role of the transport layer of the TCP/IP model?

A

Ensures data is delivered to the correct application. Data transfer is done through TCP or user datagram protocol (UDP). TCP resends messages if not delivered, UDP does not. This makes UDP better for audio streaming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the role of the application layer of the TCP/IP model?

A

Handles communication protocols between nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the role of the physical layer of the OSI model?

A

Contains cabling and connectors. Establishes how a signal crosses a wire and/or the airwaves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of the data link layer of the OSI model?

A

Includes your network card which has the media access control (MAC) address. Functions like a bridge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the role of the network layer of the OSI model?

A

Where the internet protocol (IP) and the internet control message protocol (ICMP) run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of the transport layer of the OSI model?

A

Ensures data is delivered to the correct application. Data transfer is done through TCP or user datagram protocol (UDP). TCP resends messages if not delivered while UDP does not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the role of the session layer of the OSI model?

A

Establishes the session and ensures end to end functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of the presentation layer of the OSI model?

A

Data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of the application layer of the OSI model?

A

Communication protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Switch

A

A second layer (data link) device that keeps traffic between the source and destination parts from interfering with other devices in the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Router

A

A third layer (network) device that can connect your home network to the internet, or for businesses, your web server to your database server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Firewalls

A

Can operate between the second and 7th layers. Firewalls are like filters between layers in order to prevent malware from getting through.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Modems

A

Allows computers to transport digital information over analog lines.
First and second layer device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Bridge

A

A layer two device similar to a router but instead forwards messages without analyzing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Repeater

A

A layer one device used to strengthen weakened signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Hub

A

A layer one device that connects the router to the network, takes data packets from routers and sends them to all connected networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the four main types of cables?

A

Unshielded twisted pair (UTP)
Shielded twisted pair (STP)
Fiber optic
Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why are fiber optic cables preferred in the modern age?

A

Fiber optic cables use light instead of electrical signals which makes them more durable and secure. Data is transferred digitally, which reduces time needed to translate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Coaxial cable

A

Copper cables with a metal shield intended to block signal interference. Mainly used today for television

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Crossover

A

Used to connect two devices at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Patch

A

Used to connect a device to a wall outlet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

UTP connector types

A

RJ11: supports two pairs of wires typically used in telephones
RJ45: an end connector that is typically used with ethernet cables. Four pairs instead of two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Fiber optic connector types

A

Straight tip (ST): used with multi-mode cables till mid 2000s
Lucent (LC): most common in corporate data centers today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Sudo

A

Allows for super user access so a user can run commands as an administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

ifconfig

A

Shows how interfaces are set up in a machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

route

A

Defines the path a data packet takes between networks

32
Q

ping

A

Verifies connectivity and latency

33
Q

nslookup/dig

A

Helps resolve a name associated with an IP address

34
Q

traceroute/tracert

A

Finds the route a packet takes

35
Q

whois

A

Finds out who owns a domain and more information about the domain such as registry information and organization information

36
Q

tracepath

A

Similar to tracert but can be used by any user, not just admins

37
Q

ipconfig

A

Provides the user with information about each network adapter

38
Q

ARP

A

Displays the IP to physical (MAC) address mappings

39
Q

netstat

A

Displays information about active ports and their state

40
Q

scp

A

Securely copies files between servers

41
Q

ftp

A

Copies files from one host to another unencrypted

42
Q

tftp

A

Transfers files from a client to server or vice versa

43
Q

finger

A

Displays information about users (Linux)

44
Q

nmap

A

Scans Network for hosts and open ports

45
Q

tcpdump

A

Displays TCP/IP packets transmitted over network

46
Q

telnet/ssh

A

Allows a user to manage accounts and devices remotely. SSH is encrypted while telnet is not

47
Q

Personal area network (PAN)

A

Connects personal devices within 20 to 30 m

48
Q

Local area network (LAN)

A

Uses a router or switch to manage traffic.Works for single buildings

49
Q

Campus area network (CAN)

A

Works for multiple buildings. Connects LANs to create a CAN

50
Q

Metropolitan area Network (MAN)

A

City-wide network

51
Q

Storage area network (SAN)

A

A LAN used for storage to reduce interference from normal LAN traffic

52
Q

Wide area network (WAN)

A

In principal has no limits on coverage

53
Q

Client – server

A

Involves a server with the data and information and a machine that needs access to that data

54
Q

Peer-to-peer

A

Each machine on the network can act as both server and client

55
Q

Bus network topology

A

Commo in early networking. The ends of the cable are terminators which absorb stray electrical signals without these signal reflection occurs.

56
Q

Star Network Topology

A

Most common type for LANs

57
Q

Centralization

A

Nearly all computing and network power is centralized in a large data center, machines accessing that data are referred to as “dumb terminals”

58
Q

Decentralization

A

Can eliminate the need for a central data center. Microcomputers made this possible.Challenges include proper backup files, local security and incompatibility between files for users. Benefits include the ability to operate without a network connection and computers that do not rely on each other.

59
Q

Virtualization

A

The technique of converting a hardware-based resource in two software. Virtualization allows for deploying new devices quickly without physical installation, separating applications from single points of failure (SPoFs) and on demand resource allocation.

60
Q

Hypervisor

A

A special type of software that creates virtual hardware for devices

61
Q

Type 1 hypervisors

A

Operating systems that have complete access to the physical hardware administrators use a web browser to access.

62
Q

Type 2 hypervisors

A

Applications that must compete for resources with other applications

63
Q

Infrastructure as a service (IaaS)

A

The cloud service provider manages the underlying infrastructure, but the client controls the operating system and virtual machines

64
Q

Platform as a service (PaaS)

A

Service provider offers the platform on which to build the code on. The client controls the applications.

65
Q

Software as a service (SaaS)

A

The cloud provider runs the entire physical infrastructure including virtual machines, operating systems, middleware, and applications

66
Q

Private cloud

A

Equipment is hosted on or off premises in which the company/cliet has complete control/ownership of equipment.

67
Q

Public cloud

A

Cloud provider is responsible for the hardware and infrastructure instead of the client

68
Q

Community cloud

A

Data centers jointly owned and operated by the tenants

69
Q

Hybrid cloud

A

Combination of private and public clouds that require a dedicated connection between them

70
Q

Multi-cloud

A

The concept of leveraging the services of multiple public cloud providers

71
Q

Asset

A

A person, device, location, or information that security operations aims to protect from attacks.

72
Q

Attack

A

An action taken by a threat that exploits a vulnerability that attempts to either block authorized access to an asset or to gain unauthorized access to an asset.

73
Q

Risk

A

The potential of a threat to exploit a vulnerability via an attack

74
Q

SecOps

A

IT security operations; a discipline within IT responsible for protecting assets by reducing risk

75
Q

Threat

A

Something or someone that can exploit a vulnerability to attack an asset

76
Q

Vulnerability

A

A weakness in software, hardware facilities or humans that can be exploited by a threat