Networking Flashcards

1
Q

HTTP

A

Hypertext Transfer Protocol
Port 80
TCP
Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HTTPS

A

Hypertext Transfer Protocol Secure
Port 443
TCP
Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DNS

A

Domain Name System
Translate domain names to IP addresses
Port 53
UDP for queries
TCP for Zone Transfer
Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DHCP

A

Dynamic Host Configuration Protocol
Automatically assigns IP addresses
Port 67/68
UDP
Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OSI

A

Open System Interconnection
Networking framework to implement protocols in layers. It conceptually divides computer network architecture into a logical seven-layer progression.

When network traffic is generated, it is assembled (encapsulated) from the top layer to the bottom layer.
When received, traffic goes through the model in the reverse direction: from bottom to top (decapsulation).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OSI Layers

A

Layer 7 Application
Layer 6 Presentation
Layer 5 Session
Layer 4 Transport
Layer 3 Network
Layer 2 Data Link
Layer 1 Physical
Encapsulated Layer 7-1 All People Seem To Need Data Processing
Decapsulated Layer 1-7 Please Do Not Throw Sausage Pizza Away

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Layer 7

A

Application

Users interact directly with applications that operate at Layer 7. Examples of Layer 7 applications include web browsers such as Google Chrome, Firefox, and Safari, and other applications, such as SSH and FTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layer 6

A

Presentation

Data formatting: encryption and decryption
Ensure data is in useable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Layer 5

A

Session

Inter-host communication
The session layer is responsible for creating a session between two devices. Controls ports and sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Layer 4

A

Transport

Data transmission.
UDP and TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layer 3

A

Network

Decides what path the data will take
Layer 3.
Diagnostic tools, such as ping and tracert, operate in this layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Layer 2

A

Data Link

Physical addressing/MAC
Decides format of data.
Switches operate in this layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Layer 1

A

Physical

How data is physically sent through the network.
This layer determines how bits are electrically or optically transferred by hardware devices that interface directly with a network medium, such as coaxial cable, optical fiber, or twisted-pair copper wire.
Hubs operate in this layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FTP

A

File Transfer Protocol

File Transfer protocol is used to transfer files over the network.
For example, the FTP service can be used to transfer files to another device over the
network.
Port 20 data transfer/ 21 authentication
TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SSH

A

Secure SHell

Secure SHell is a secure command-line protocol that allows the user to run remote commands on a remote machine.
Any data that passes through SSH is encrypted.
Port 22
TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP/IP

A

Transmission Control Protocol/Internet Protocol

The model describes how data is exchanged over the Internet, including how data should be divided into packets, addressed, transmitted, routed, and received by the destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TCP/IP Layers

A

Layer 4 Application
Layer 3 Transport
Layer 2 Internet
Layer 1 Network Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ipconfig

A

Displays a computer’s IP configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Private IP Space

A

Non-Routable
RFC1918
Class A 10.0.0.0/8
Class B 172.16.0.0/12
Class C 192.168.0.0/16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ping

A

Used to check connectivity between computers over the network.
It also provides information, such as connection speed and reliability.
ICMP is its protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

nslookup

A

Sends a query to get the name of a computer by its IP address.
It can also do the opposite - query an IP address by the domain name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

tracert

A

Displays all the stations (hops) along the route taken by the information to its
destination.
It can work with a domain name or an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

netsh

A

It allows the configuration of the IP address, DNS, default gateway, and various network
functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

TCP 3 way handshake

A
  1. The client sends a SYN
  2. The server responds with a SYN-ACK
  3. The client finalizes with ACK
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Segment

A

A broken piece of a packet with a TCP header in each of them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Frame

A

The protocol data unit at the data link layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Packet

A

A data fraction transmitted over the network layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

UDP

A

User Datagram Protocol: connectionless protocol. Faster, less strict about data integrity. Doesn’t rearrange data packets or check for errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

TCP

A

Transmission Control Protocol: connection-oriented protocol. High reliability, rearranges data packets in order, detects errors. 3 way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

RDP

A

Remote Desktop Protocol
TCP
Port 3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

SMTP

A

Simple Mail Transfer Protocol
Used in sending and receiving email
TCP
Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

SMB

A

Server Message Block
A network file sharing protocol that allows applications on a computer to read and write to files
TCP
Port 445

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

netstat

A

Provides statistics about all active connections so you can find out which computers or networks a PC is connected to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

TFTP

A

Trivial File Transfer Protocol (TFTP) is a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host.
UDP
Port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

NTP

A

Network Time Protocol (NTP)
Synchronizes computer clocks
UDP
Port 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Switch

A

Designed to forward frames from source to destination according to specific MAC addresses in the Frame.
Layer 2 device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

MAC Address Table

A

A way to map each and every port to a MAC address.
Dynamic- Automatic configured MAC address
Static- Manually configured MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Store-and-Forward Switch

A

Buffers the entire frame upon receipt. Checks for errors. Slow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Cut-Through Switching

A

Faster. Only the first 6 bytes of the incoming frame is buffered (MAC address). Forwards immediately. No error checking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Fragment-Free Switching

A

Buffers the first 64 bytes including MAC address data and the frames payload. Provides partial error checking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Auto-Negotiation

A

Tells connected devices to announce their capabilities. Bases on the settings, chooses the optimal speed and duplex mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Cisco IOS

A

Internetwork Operating System
User mode
Exec (enable) mode
Config term
interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

ARP

A

Address Resolution Protocol (ARP)
Procedure for mapping a dynamic IP address to a permanent physical machine address in a local area network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Telnet

A

Manage devices from anywhere.
Not encrypted
TCP
Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Hexadecimal

A

0-9
A-F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Router

A

Forwards packets
Layer 3 device

47
Q

NAT

A

Network Address Translation
Changes your IP address to a new IP address before sending it to a different network

48
Q

Default Gateway

A

Routes traffic to and from other networks
Used when you want to find an IP that is not on your network

49
Q

Routing Process

A

Examination
Decapsulation
Decision-Making
Encapsulation
Forwarding

50
Q

IPv4

A

32 bits
4 octets-each 8 bits
separated by a .

51
Q

Broadcast

A

Sent to all devices on network
255.255.255.255 or FF:FF:FF:FF:FF:FF
Routers block

52
Q

APIPA

A

Automatic Private IP Addressing
169.254.0.0/16

53
Q

Loopback Address

A

127.0.0.0/8
Allow for a device to send and receive its own data packets

54
Q

show ip interface brief

A

Shows up/down status of your IP interfaces.
Displays critical info about a lot of interfaces on one easy to read page

55
Q

show interface

A

Detailed output of each interface

56
Q

show version

A

Shows info about your software and hardware

57
Q

show ip route

A

Shows your routing table

58
Q

show running-config

A

Tells you how the box is configured right now. Also, “show startup-config” will tell you how the router will be configured after the next reboot

59
Q

show port

A

Gives you the status of ports on a switch.

60
Q

Static Routing

A

User enters every network manually
Used for Stub Networks & Small Networks

61
Q

Stub Network

A

Uses 1 router that sends and receives non-local traffic by a single path

62
Q

Class A IP Addresses

A

1-127
Default Subnet Mask 255.0.0.0

62
Q

Class B IP Addresses

A

128-191
Default Subnet Mask 255.255.0.0

63
Q

Class C IP Addresses

A

192-223
Default Subnet Mask 255.255.255.0

64
Q

RIP

A

Routing Information Protocol
Administrative Distance 120
15 max hops
Changes the routing table every time
In CLI (command line) shown as R

65
Q

OSPF

A

Open Shortest Path First
AD 110
Keeps track of changes in topology
Bases metric calculation on the bandwidth of the links along the path to the destination
In CLI show as O

66
Q

EIGRP

A

Enhanced Interior Gateway Routing Protocol
AD 90
In CLI it is shown as D

67
Q

Slash Notation
/24
/25
/26
/27
/28
/29
/30
/31
/32

A

/24= 256 255.255.255
/25= 128 255.255.255.128
/26= 64 255.255.255.192
/27= 32 255.255.255.224
/28 16 255.255.255.240
/29= 8 255.255.255.248
/30= 4 255.255.255.252
/31= 2 255.255.255.254
/32= 1 255.255.255.255

68
Q

Static Route

A

AD 1

69
Q

VLAN Switchport Mode Access

A

Access ports carry traffic only on the VLAN they belong to.

70
Q

VLAN Switchport Mode Trunk

A

Carry traffic for different VLANs and devices. Adds a tag so it gets where it needs to go.

71
Q

DTP

A

Dynamic Truck Protocol
Cisco protocol to automate the creation of trunk links.
Dynamic Auto- Default, does not negotiate
Dynamic Desirable- Actively attempts to change the mode

72
Q

Default VLAN
Reserved

A

VLAN 1
1002-1005

73
Q

Data VLAN

A

2-1001

74
Q

Syslog

A

System Logs
Standard for logging messages
Severity Levels 0 (emergency) 7 (debugging)

75
Q

ACL

A

Access Control List
Configure basic traffic filtering
Improve network performance and secure the network
1-99 and 1300-1999

76
Q

Failover Cluster

A

Method used to back up a network in case of a failure.
Acts like a single system
Cluster software becomes a single point of failure

77
Q

Load Balancer

A

Device that distributes traffic across multiple devices.

78
Q

IDS

A

Intrusion Detection System

79
Q

IPS

A

Intrusion Prevention System

80
Q

AAA

A

Authentication, Authorization, Accounting
Verify user identity, enforce user permissions, track user activity

81
Q

RADIUS

A

Remote Authentication Dial-In User Service
AAA protocol

82
Q

TACACS+

A

Terminal Access Controller Access Control System Plus
AAA protocol

83
Q

802.1X

A

Security protocol (port-based network access control)
Supplicant: Receives credentials from user and submits to the authenticator
Authenticator: Relays credentials received to the authentication server
Authentication Server: Validates credentials. Determines level of access

84
Q

EAP

A

Authentication framework that provides transport for the requests and response parameters

85
Q

CAM Table

A

Stores MAC addresses on a switch
Limited space
CAM table flooding makes the switch act like a hub

86
Q

Port Security

A

Not enabled on switches by default
Restricts input to an interface
Limits the number of MAC addresses that can access a specific physical port

87
Q

Port Security Violation Modes

A

Shutdown (default mode) port shuts down automatically-notification sent
Restrict - drops frames with unfamiliar source MAC address-notification sent
Protect - frames with unknown MAC addresses are dropped-no notification sent

88
Q

Switch Spoofing

A

VLAN Hopping
Manipulates DTP (Dynamic Trunking Protocol)
DTP negotiation is enabled by default, even if it runs in access mode

89
Q

Double Tagging

A

VLAN Hopping
Takes advantage of 802.1q tagging process
Switch removes the first tag
Next switch in line will process the second tag

90
Q

Encoding

A

Convert to coded form
Base64 ends in = or == (padding)

91
Q

Hashing

A

Consists of character and numbers
MD5: 128 big length unique key

92
Q

Salt/Salting

A

Adding unique characters after a password, before hashing to create a different hash value

93
Q

Pepper/Peppering

A

Adds unique characters like salting but it is not stored alongside a password hash

94
Q

Rainbow Table

A

Used for hash cracking
Predefined list of hashes
Saves time in Brute-Force attacks

95
Q

Symmetric Cipher

A

Uses the same key to encrypt and decrypt the text

96
Q

Asymmetric Cipher

A

Uses 2 keys, 1 for encryption and another for decryption

97
Q

Diffie-Hellman

A

First key-sharing protocol designed to solve the problem of key distribution

98
Q

PKI

A

Public Key Infrastructure
System for creating, storing, and distributing digital certificates

99
Q

Firewall

A

Monitors and filters network traffic
Can be software, hardware, or cloud service

100
Q

Firewall Actions

A

Accept: Allow traffic to pass through
Drop: Blocks packet without notification
Reject: Blocks a packet with an error notification

101
Q

Stateless Filtering

A

Permits or denies packets based on their source or destination IP address and ports

102
Q

Stateful Filtering

A

Requires the server to store connection states and session information

103
Q

Fail-Open

A

Allows access even if the device is in a failed state. Availability is more important than security.

104
Q

Fail-Close

A

Blocks access if the device is in a failed state. Security is more important than availability.

105
Q

SNMP

A

Simple Network Management Protocol
Application layer protocol that allows devices on a network to share info

106
Q

NetFlow

A

Network monitoring protocol used to collect IP traffic.
Eye on performance and resource allocation

107
Q

Nagios

A

Open-source network monitoring software

108
Q

Packet Inspection Levels

A

Shallow: Inspects only packet headers
Medium: Compares data with a list of specific packet and data format types
Deep: Inspects all traffic from a designated IP address

109
Q

Analyst Workflow

A
  1. Review alert and associated rules
  2. Gather additional info from the system related to the incident
  3. Investigate the alert and its cause
  4. Summarize conclusions about alert and recommend the next step
110
Q

AES

A

Advanced Encryption Standard

111
Q

VPN Protocols

A

IPsec
PPTP
L2TP/IPsec

112
Q

CDP

A

Cisco Discovery Protocol

113
Q

LLDP

A

Link Layer Discovery Protocol