Network Architecture Flashcards

1
Q

What is the mnemonic for the OSI model

A
All Presidents Since Truman Never Did Pot
A ppplication
P presentation
S session
T transport
N network
D data Link
P physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What layer(s) do we use data streams

A

Application, presentation, and session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do we call data packages in the transport layer?

A

TCP - Segment

UDP - Datagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What technology is found in the physical layer?

A

NICs, hubs, repeaters, concentrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the function of layer 1

A

Physical - Convert frame data into bits and transmit the bits across the physical medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the function of layer 2

A

Data Link - converts packets into frames. Some examples include: Ethernet, Token Ring, FDDI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the ARP do?

A

Performs IP to MAC lookups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the RARP do?

A

Reverse ARP…. MAC to IP lookup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the function of Layer 3

A

Network - Adds routing/ addressing information. Technology includes: Router, NAT, and Internet Protocol (IP), IPSEC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does a Brouter do and where does it operate?

A

Bridge router that attempts to route first and then bridge. Operates at level 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What happens in Layer 4?

A

Transport - Session management. TCP & UDP happens here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the TCP Handshake?

A

Syn
Syn/ Ack
Ack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens in Layer 5

A

Session - Establishes, maintains, and terminates sessions. Sessions are simplex, duplex, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What technology is found in the Session Layer

A

NFS, SQL, RPC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between full and half duplex?

A

Full is two way communication that can occur at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What happens at Layer 6

A

Presentation - Transforms the application data into a common OSI format (ASCII, JPEG, MPEG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What happens in Layer 7

A

Application - HTTP, FTP, EDI, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What layers exist in the TCP/IP model?

A

4 layers - Application, Transport, Internet, and Link

ATIL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the intersection points between OSI & TCP/IP?

A

TCP/IP Application layer combines OSI layers 5,6,&7 into 1 Application layer.

TCP/IP Link layer combines OSI layers 1&2 into 1 Link layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the function of a port?

A

Used in TCP to establish a connection between two systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How many ports exist in TCP?

A

65,536

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are service ports?

A

First 1024 ports in TCP used for well known applications (HTTP, FTP, Telnet, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are registered ports?

A

Registered by companies for products. Spans ports 1024-49151.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are dynamic ports?

A

Open use from 49152 - 65535

25
Q

How is a TCP session terminated?

A

2 Methods
FIN - Finish followed by Ack. Syncs up traffic
RST - Reset… hard stop.

26
Q

What is the transmission window?

A

Number of packets sent before an ACK is sent.

27
Q

What are the key TCP headers?

A
Unskilled Attackers Pester Real Security Folk
U - Urg, Urgent
A - Ack, Acknowledgement
P - PSH, Push
R - RST, Reset
S - Syn, Synchronization
F - FIN, Finish
28
Q

Class A subnet mask?

A

255.0.0.0 or /8

29
Q

Class B subnet mask?

A

255.255.0.0 or /16

30
Q

Class C subnet mask

A

255.255.255.0 or /24

31
Q

What is the function of ICMP?

A

Health check protocol. Technology used: PING, Traceroute, and pathping.

32
Q

What is IGMP

A

Internet Group Management Protocol - Supports multi-cast.

33
Q

What port does telnet use?

A

TCP - 23

34
Q

What port does FTP use?

A

TCP - 20 & 21

35
Q

What port does TFTP use?

A

UDP - 69

36
Q

What port does SMTP use?

A

TCP - 25

37
Q

What port does POP3 Use?

A

TCP - 110

38
Q

What port does IMAP use?

A

TCP - 143 This is an email client download utility.

39
Q

What port does DHCP use?

A

UDP - 67 & 68

40
Q

What port does HTTP use?

A

TCP - 80

41
Q

What port does SSL Use?

A

TCP - 443

42
Q

What port does LPD Use?

A

TCP - 515

43
Q

What port does X Windows Use?

A

TCP 6000-6003

44
Q

What port does BootP use?

A

UDP - 67 & 68

45
Q

What port does NFS Use?

A

TCP - 2049

46
Q

What port does SNMP use?

A

UDP 161 & 162

47
Q

What is encapsulation and what problems exist?

A

The ability to carry lower level TCP protocols inside higher layers. Is bad because hackers can hide inside higher layers.

48
Q

What is pre-admission philosophy?

A

Form of NAC that requires all policies be met before access to network is granted.

49
Q

What is post-admission philosophy?

A

For of NAC that denies activity based on user activity.

50
Q

What type of firewall filters traffic by inspecting the header against a rules table?

A

Static Packet

51
Q

What does an application firewall perform?

A

Acts as a proxy for things happening in the application layer.

52
Q

What is stateful packet inspection?

A

Firewall that looks at many pieces of information inside the packet including source and destination addresses or ports.

53
Q

What layer does a switch operate?

A

Layer 2

54
Q

What layer does a router operate?

A

Layer 3

55
Q

What is the CALEA Law?

A

States that the government must allow a Telco to provide wiretap support. (bypasses strict end to end encryption).

56
Q

What OSI model manages simplex & duplex communications?

A

Session

57
Q

What technology implements 802.3

A

Ethernet

58
Q

What is an example of a third generation firewall?

A

Stateful

59
Q

Can a firewall block viruses?

A

False