Network + Network Security Flashcards

1
Q

what is the purpose of a router?

A

it is a device that connects different computer networks and direct data packets to their destination.(it uses the IP address in the packet header to determine where to send the packet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the purpose of a switch?

A

A switch is a device that connects other nodes (devices) to form a LAN and forwards data frames based on their MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the differnet network topologies and what are their advantages and disadvantages?

A

bus topology:
+ low cost + easy to connect + less cable length
- entire system fail if there is a break in the main connector or if T connector breaks

ring topology:
+ organised + all have equal access to resources
- slower than star topology since need pass through all the hosts between source and destination + if one down all down

fully mesh topology:
+ network traffic can be redirected to other nodes if one goes down
- expensive and requires most cable length

star topology:
+ if cable failure, only 1 node is affected
- if central device has any failure, entire system will fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the difference between the World Wide Web (www) and the Internet?

A

the internet is a global network of networks while the web is a collection of information which is accessed via the internet

internet is the infrastructure while the Web is the service on top of the infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how does a network device receive its IP address when it joins a network?

A

static IP address assignment:
- network administrator (the poor engineer) manually configure each device with an IP address, a subnet mask, a default gateway and a DNS server

dynamic IP address assignment:
- network device automatically obtains an IP address from a DHCP (dynamic host configuration protocol) server which is usually configured on the router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how does a DNS work? (domain name server)

A
  1. the dns resolver will first check its local cache to see if the IP address associated with the domain name is stored, if it is, then immediately return it
  2. if not, the query is routed to a recursive DNS resolver which is normally managed by the ISP.
  3. the recursive dns resolver forwards the request to a DNS root name server
  4. the root DNS servers return the IP address of the TLD (top-level domain) name server associated with the domain
  5. the TLD server directs to the authoritative DNS server
  6. the authoritative DNS servers return the IP address of the requested domain name to the local DNS
  7. the local DNS stores in the cache for future use for a specified time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the layers in the TCP/IP suite?

A

application layer
transport layer
internet layer
network access layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

why are the protocols arranged in layers in the TCP/IP suite?

A

to simplify the design aand implementation of the network system by dividing it into smaller and manageable modules

makes troubleshooting easiser since engineers can focus on a particular layer

each layer can be changed and modified with affecting the other layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

why do we even need protocols?

A

protocols ensure reliability, security and efficiency of data transmission

protocols provide a consistent and standardised way of communication, reducing errors and conflicts and enhances performance and functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what information is added into the head in each layer?

A

application layer:
- raw data

transport layer:
- source and destination ports
- sequence number (for reordering)
- acknowledgement number (in TCP)
- checksum (to check if the data is modified)

internet layer:
- source destination IP address
- TTL (time to live -> ensure that the packet isnt floating around forever if not sent)
- header checksum

network access layer:
- source destination MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the difference between TCP and UDP?

A

TCP is a connection-oriented protocol while UDP is a connectionless protocol. TCP estasblishes a connection with receiver before sending/receiver but UDP doesnt

TCP is more reliable than UDP as it ensures that every packet sent is received and acknowledged by receiver

UDP is faster than UDP (since it doesnt care if receiver actually receives the data)

twitch uses UDP while netflix uses TCP woahhh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is data packetisation?

A

(data segmentation + data packetisation)
it involves the breaking down of large data into smaller segments (transport layer). headers and trailers are added to the data segments which contains information like source and destination addresses and create packets that can be transmitted over the network. (internet layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

explain the term packet-switching

A
  1. it refers to the breaking down of large messages into smaller messages and sends them individually
  2. each packet travels from router to router until it reaches its destination
  3. since packets can arrive out of order, they will be reordered sequentially to recreate the original message
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

explain what is a packet-switching network

A
  1. its a network that transfers data by dividing to smaller packets
  2. packet contains header with information like source + destination address and contains a portion of the data
  3. packets are sent individually and may take different paths
  4. packets are reassembled to form the original data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are some types of malware?

A
  • virus
  • worm
  • trojan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how to prevent and remove malware?

A
  • use reputable antivirus / antimalware software
  • scan system regularly and remove suspicious or infected programs
  • avoid opening/downloading files from unknown/untrusted sources
  • backup important data and files regularly and store them in a safe location
17
Q

what are some types of cyberattacks?

A
  • DOS attack: tries to disrupt the normal traffic of a targeted server, service or network by sending a large number of requests or data to overload the server and cause it to slowdown or crash, preventing legitimate users from accessing it. (can be done using a botnet)
  • code injection attack: tries to execute malicious code on a target system
  • sql injection attack: inserts malicious sql statements into the input field for a database query (flashback to wenqi string formatting sql query gggggg)
  • malware attack: tries to install or run malicious software on a target system (can be done by opening email attachment/downloading sus files)
  • phishing attack: tries to obtain sensitive information from the user by impersonating a trsutworthy entity
18
Q

how does a firewall work?

A

its a network security system that monitors and controls incominig and outgoing network traffic based on predetermined security rules. it imposes restrictions on incoming and outgoing network packets and can be based on IP source address or port number

19
Q

how does a signature-based IDS work? (intruder detection system)

A

it monitors a network or system for malicious activity or policy violations. specifically, signature-based IDS looks for specific patterns such as byte sequences in network traffic or instruction sequences used by malware

+ it can easily detect known attacks
- it is difficult to detect new attacks

20
Q

how does an anomaly-based IDS work?

A

specifically used to detect unknown attacks due to the rapid development of malware.

21
Q

how does an IPS (intrusion prevention system) work?

A

as soon as IPS detects an intrusion event, it can reconfigure or reprogram the firewall to prevent similar attacks in the future. it also alerts the system administrator.

basically IPS can detect AND respond while IDS can only detect

22
Q

how does a digital signature work?

A
  1. document contents are hased to create a digest.
  2. the digest is encrypted using the sender’s private key
  3. digest is embedded in the document which is then sent
  4. the recipient decrypts the digest using the sender’s public key
  5. receipt calculates a hash from the document contents
  6. if the recalculated digest matches the decrypted digest, the document has not been tampered with since it was sent.
23
Q

what is a digital certificate?

A

they are the credentials that facilitate the verification of identities between users in a transaction. its used to validate the identity of someone.

24
Q

what are some methods of authentication?

A
  1. 2FA
  2. biometric authentication
  3. public key authentication
  4. password with pin
  5. SMS authentication
25
Q

What is the definition/purpose of Data Verification?

A

It checks that the data is accurate, complete and consistent with the original input or source

26
Q

What is the definition/purpose of data validation?

A

checks that the data conforms to the specific rules, formats, or constraints. it ensures that the data is in the correct format, range, or meet specific criteria