Network (v-lan, segmentation, firewalls, monitoring) Flashcards

1
Q

What is the OSI-Model?

A
  1. It is a conceptual framework that describes how network protocols communicate with each other.
  2. It consists of 7 layers that represent different functions and protocols in the process of transmitting data across a network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the 7 layers in the OSI-Model.

A
  1. Physical Layer.
  2. Data Link Layer.
  3. Network Layer.
  4. Transport Layer.
  5. Session Layer.
  6. Presentation Layer.
  7. Application Layer.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the physical layer do?

A

It deals with the physical connection between devices and the transmission of raw data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the data link layer do?

A

It provides reliable data transmission across the physical link, error detection, and correction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the network layer do?

A

It manages the movement of packets across the network, routing, and congestion control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the transport layer do?

A

It ensures reliable and orderly delivery of data between endpoints, handling flow control and error recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the session layer do?

A

It provides for the establishment and management of connections between applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the presentation layer do?

A

It deals with the representation of data and the conversion of data into a suitable format for transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the application layer do?

A

It provides services to end-user applications, such as email, file transfer, and web browsing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In reference to the OSI-model, what does it mean when each layer only ‘see’ the corresponding layer?

A

Each layer only interacts with the layer immediately above it and the layer immediately below it.

This means that each layer has a specific role and responsibility and communicates only with its adjacent layers, which helps to ensure that data is transmitted accurately and efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is TCP/IP?

A

It is a set of communication protocols that are used to connect devices on the internet.

  1. It provides end-to-end communication across networks, and is responsible for transmitting data packets from one device to another.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the importance of TCP/IP in the OSI-model?

A
  1. It provides the underlying foundation for network communication and it maps to some of the layers in the OSI model.
  2. TCP/IP defines how data is sent over a network, while the OSI model provides a conceptual framework for understanding how different network protocols and technologies interact with each other.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is UDP?

A

It is a communication protocol used in computer networks that allows for fast data transmission without error-checking or resending lost packets.

It’s often used for real-time applications such as video conferencing, online gaming, and live streaming where speed is more important than reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is ICMP?

A

It is a protocol used in computer networks to send error messages and operational information about the network.

It is typically used for diagnostics such as the ‘Ping’ service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are cables?

A

They are used to physically connect devices in a network, allowing them to communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are NIC’s/network cards?

A

They are hardware components that are installed on computers to provide them with network connectivity.

They allow computers to send and receive data over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are hubs?

A

They are devices that allow multiple devices to be connected to a network.

They work by broadcasting data to all connected devices, regardless of whether the data is intended for that device or not.

18
Q

What are switches?

A

They are similar to hubs in that they allow multiple devices to be connected to a network, but they are more intelligent.

They use a process called “switching” to direct data only to the device it is intended for, increasing network efficiency and security.

19
Q

What are routers?

A

They are devices that connect multiple networks together and allow data to be transmitted between them.

20
Q

What are Vlan’s?

A

They are a way to create multiple virtual networks within a single physical network.
This allows network administrators to group devices into separate networks for better security and easier management.

21
Q

What is an IP-address?

A

It is a unique identifier assigned to every device connected to a network.

22
Q

What is a network mask?

A

It is a set of numbers that is used to identify which part of an IP address is for the network and which part is for the host.

It helps to determine which devices are on the same network.

23
Q

What is a gateway?

A

It is a device or a computer program that connects two or more networks and forwards packets between them.

24
Q

What is a subnet mask?

A

It is a number that determines how many bits of an IP address represent the network part and how many represent the host part.

It is used to divide a large network into smaller subnetworks, which can help manage network traffic and improve network performance.

25
Q

Which ports are the most important to remember in this course?

A
  1. 22 (SSH).
  2. 80 (HTTP).
  3. 3306 (MySQL).
  4. ???
26
Q

What is DNS?

A

It is a system that translates domain names (such as www.example.com) into IP addresses that computers use to identify each other on the internet.

27
Q

What is the DHCP server?

A

It is a network protocol that automatically assigns IP-addresses and other network configuration parameters to devices on a network.

It is responsible for managing and assigning IP addresses to devices that request them, eliminating the need for manual IP configuration.

28
Q

what is a firewall and which layers in the osi model does the firewall operate?

A
  1. It is a security device that monitors and controls incoming and outgoing network traffic based on an organization’s previously established security policies.
  2. It operates at the Network layer (Layer 3) and Transport layer (Layer 4).
29
Q

What is the firewall’s purpose in the two layers?

A

Layer 3: It can inspect IP addresses, packet headers, and port numbers to determine whether to allow or block traffic.

Layer 4: It can inspect the contents of the packet payload to determine whether to allow or block traffic.

30
Q

What is a firewall rule?

A
  1. It is a specific instruction that determines how incoming or outgoing network traffic should be handled.
  2. Each rule is typically composed of several parts, such as the source and destination IP addresses, ports, and protocols.

Example: A rule might be created to allow traffic from a specific IP address to a specific port on a server, while another rule might block traffic from a known malicious IP address

31
Q

Can firewall rules protects us from SQL-injections and Smurf attacks?

A

Yes, a properly configured firewall can help protect against SQL injection and Smurf attacks by blocking unauthorized traffic and preventing malicious packets from reaching their intended target.

32
Q

What is IDS?

A

It is a passive security system that monitors network traffic and analyzes it for signs of unauthorized access, attacks, or other security threats.

It can detect and alert the network administrator when suspicious activities are detected, but it does not take any action to stop the attack.

33
Q

What is IPS?

A

It is an active security system that not only monitors network traffic but also takes actions to prevent attacks. When a potential security threat is detected, IPS can block the suspicious traffic, modify it, or terminate the connection.

34
Q

What is Onion security?

A

?

35
Q

What is a honey pot?

A

It is a decoy system designed to look attractive to attackers, but actually, it is isolated and monitored to gather information about the attacker’s behavior and methods.

36
Q

What are honey pots used for?

A

They are used to detect and learn about new threats or attack techniques, which can then be used to improve the security of the real systems.

37
Q

What are phony users?

A

These are computer-generated user accounts that are created for specific purposes, such as testing or security.

38
Q

Which steps do you go through to set up a network for internal security?

A
  1. You use local IP-ranges.
  2. NAT.
  3. You segment the network.
  4. You audit the log and monitor.
39
Q

What is NAT?

A

It is a technique used in computer networking to allow devices on a private network to communicate with the Internet.

40
Q

How does NAT work?

A

It works by translating private IP addresses into public IP addresses that can be used on the Internet. This allows multiple devices to share a single public IP address and can provide an additional layer of security by hiding the private IP addresses from the public network.

41
Q

How do you segment your network by using Vlan’s?

A
  1. Use switches you can administer remotely from one platform rather than visiting all patchpanel in the building
  2. By using vlan you can design network zones freely without respecting the phyical cabling.
  3. By making zones we protect vital traffic and make sure confidential traffic isn’t broadcasted.