Networking Flashcards

1
Q

What are some examples of network hardware?

A

Network interface card (NIC), Hub, Switch, Modem, Router, Access point, Bridge / gateway, firewall, patch panel, and CAT cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a NIC?

A
  • hardware component, typically a circuit board or chip, installed on a computer so it can connect to a network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a hub?

A

The dumb versions of switches
● Message is broadcast to every port on the hub
● Considered obsolete due to inefficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a switch?

A

Connects multiple devices together and forwards data packets to/from those devices
● Only sends data to the device it is intended for
● Contains memory and knows which node is on which port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a modem?

A

Processes signal from internet service provider and interfaces with local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a router?

A

Creates local network, routes service to devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an access point?

A

Allows devices to connect to a network wirelessly, often combined with a router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a bridge/gateway?

A

connects multiple sub-networks to create a single, larger network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a firewall?

A

Monitors traffic to and from your network. It allows or blocks traffic based on a defined set of security rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a patch panel?

A

Mounted hardware assembly that contains ports used to connect and manage incoming and outgoing LAN cables. Enables flexible physical connectivity into a network and keeps cables organized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a CAT cable?

A

Made of unshielded twisted pair (UTP) wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the speeds of CAT 1 - CAT 8?

A

CAT 1 - 1 Mbps
CAT 2 - 4 Mbps
CAT 3 - 10 Mbps / 100m
CAT 4 - 16 Mbps/ 100m
CAT 5 - 100 Mbps / 100m
CAT 5e - 1 Gbps / 100m
CAT 6 - 1 Gbps/ 100m or 10 Gbps/ 55m
CAT 6a - 10 Gbps / 100m
CAT 7 - 10 Gbps
CAT 8 - 40 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some network architecture models?

A

Client-server model, peer-to-peer (P2P), and web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the client-server model

A

Centralized network where one or more devices, or servers, provide services and resources to other devices, or clients.
● Clients request and receive data from servers which handle processing and storage
● More reliable, secure, and efficient than P2P
● High cost, complex, and require maintenance
● Require specialized hardware and software and depend on the functionality and available of the servers
● Suitable for large-scale, permanent, or formal applications, such as web hosting, email, or database management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe P2P

A

Each machine on the network can act as both server and client (like Bitcoin and Tor)
● Easy to setup – minimal hardware and software requirements
● Users control their own data and resources
● Limited performance, reliability, and security
● Suitable for small-scale, temporary, or informal applications (gaming, file sharing, and messaging)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe web server model

A

software and hardware that uses HTTP and other protocols to respond to client requests made of the web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some network topologies?

A

Bus, star, ring, mesh, tree, point to point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe a bus topology

A

A single line of devices connected together by one shared network cable, outdated
● Computers connect to the network by physically tapping into the network cable
● Devices cannot send and receive simultaneously due to collision along single line of communication
● Not secure or private, all computers attached to the network will receive any and all traffic sent on the network
● Inexpensive, easy to install, and difficult to reconfigure
● Failure on the network cable means complete network failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Describe a star (hub and spoke) topology

A

Composed of a central network device connected to various network devices by individual network cables
● All communication is sent through a central access point
● Most common type of network found in LANs
● Versatile. Cables can be run through a building, making moving and hooking up equipment easier
● Break in comm line only affects a single device
● Failure of switch means complete network failure

20
Q

Describe a ring topology

A

Connects devices with exactly two neighboring devices
● Doesn’t have to actually look like a ring.
● Data flows in one direction (can be made bidirectional by having 2 connections between each node called a 2 ring topology)
● Reduces collision since everything travels in one direction
● Cheap to install and expand
● Pass tokens. A token is a frame of data transmitted between network points.
● Break in the connection means complete network failure

21
Q

Describe a mesh topology

A

Connects every device to every other device
● Very high fault tolerance
● Not reasonable at high numbers
● Expensive to add new nodes
● Can establish new connections around failed nodes as needed
● Usually Wi-Fi with multiple routers

22
Q

Describe a tree topology

A

a variation of the star topology with a hierarchical flow of data
● Multi-point connection and a non-robust topology because if the backbone fails the topology crashes
● Allows the network to get isolated and prioritize from different computers
● Error detection and correction are easy
● High installation cost (due to cabling)
● Adding devices can make reconfiguration difficult

23
Q

Describe point to point topology

A

A point-to-point network topology is a simple network structure where two networking devices are directly connected to each other through a dedicated communication link. This type of topology is typically used for simple and straightforward communication needs, allowing for direct data transfer between the two devices without the need for any intermediate networking devices or paths.

24
Q

What are some network protocols?

A

HTTP, TCP/IP, UDP, DHCP, Syslog, ARP

25
Q

Describe the hypertext transfer protocol

A

HTTP, Runs on top of other layers of the network protocol stack. Used to load web pages using hypertext links

26
Q

Describe the transmission control protocol

A

TCP - Ensures successful delivery of data and messages

27
Q

Describe the internet protocol

A

Network interface identification and location addressing

28
Q

Describe dynamic host configuration protocol

A

Dynamically and automatically assigns an IP address to any device, or node, on a network so it can communicate using IP. Limited to a specific LAN

29
Q

Describe the syslog protocol

A

Send event data logs to a central location for storage. Logs can be accessed by analysis and reporting software to perform audits, monitoring, troubleshooting, and other essential IT operational tasks.

30
Q

Describe the address resolution protocol

A

Translates IP addresses to media access control (MAC) addresses and vice versa

31
Q

Define ‘port’

A

Logical connection. Determines which program or service on a computer or server is going to be used.
● Identified by a unique number 0-65535
● Always associated with an IP Address to identify the device where the port is

32
Q

What are the specs of IPv4?

A

Four sets of numbers ranging 0-255, separated by periods

33
Q

What are the specs of IPv6?

A

Eight sets of four hexadecimal digits, separated by colons

34
Q

What are some system ports?

A

0-1023
■FTP (File Transfer Protocol)
●tcp/20 Data, tcp/21 Control
■SSH (Secure Shell)
●tcp/22 Encrypted
■Telnet (Telecommunications network)
●tcp/23 Non encrypted
■SMPT (Simple Mail Transfer Protocol)
●tcp/25 Send email
■DNS (Domain Name System)
●udp/53 Converts names to IP addresses
■DHCP (Dynamic Host Configuration Protocol)
●udp/67, udp/68 Automated configuration of leased IP addresses
■HTTP (Hypertext Transfer Protocol)
●tcp/80 Web server
●tcp/443 Web server with encryption
■POP3 (Post Office Protocol version 3)
●tcp/110 Basic email reception
■IMAP4 (Internet Message Access Protocol)
●tcp/143 Mailbox management and email reception
■SMB (Server Message Block)
●udp/137 NetBIOS find devices by name, old
●udp/139 NetBIOS set up session for transfer
●tcp/445 Direct connection between devices
■SNMP (Simple Network Management Protocol)
●udp/161 Network queries
●udp/162 Network alerts or traps
■LDAP (Lightweight Directory Access Protocol)
●tcp/389 Query Microsoft Active Directory
■RDP (Remote Desktop Protocol)
●tcp/389 Windows remote sharing
■Syslog Protocol
●udp/514 System logs
●tcp/1468 System logs with confirmed delivery

35
Q

What are some user registered ports?

A

1024-49151
■ Can be registered by companies and developers for a price
■ Examples: 1102 Adobe, 1416 Novell, 1433 Microsoft SQL Server, 1537 Oracle

36
Q

What are some dynamic or private ports?

A

49152-65535
■ Client computer assigns temporarily to itself
- Ephemeral ports

37
Q

What are the layers of OSI from bottom up, and a brief summary of what they relate to?

A

“All People Say They Never Download Porn”
1. Physical - cable media
2. Data link - Physical addressing (MAC addresses)
3. Network - Routing data, logical addressing, fragments packets
4. Transport - End-to-end communication, assembles packets
5. Session - Communication management, Control protocols
6. Presentation - Data format, encryption, SSL, TLS
7. Application - UI, FTP, HTTP, IMAP, SMTP

38
Q

What are the layers of TCP/IP protocol from bottom up?

A

“Never Ingest Terrible Apples”
1. Network
2. Internet
3. Transport
4. Application

39
Q

Describe IDS

A

Intrusion detection system Monitors the network to detect threats
● Passive listening
● Works well in tap mode, connected to network to view traffic
● Sends an alert to the administrator about suspicious behavior

40
Q

Describe IPS

A

Intrusion prevention system– intercepts and blocks threats (acts)
● Must be positioned in in-line mode, actively block malicious traffic
● Nodes use routed cables connected to IPS device to create a choke point
● Invisible on the network

41
Q

Describe UTM

A

Unified threat management system is a combination of IDS, IPS, next-gen firewall (NGFW), antivirus, VPN, web-filtering, data loss prevention, and anti-malware in a single device or service
● Essentially does all the things

42
Q

What is AAA network security?

A

Authentication, Authorization, and Accounting

43
Q

Describe Authentication in AAA

A

the process of confirming a person’s identity
○ Username and password
○ 2-factor authentication
○ Using a 3rd party ACS (access control system) server
○ Biometrics (fingerprint scans, Face ID, retina scans)

44
Q

Describe Authorization in AAA

A

determine what resources the user can access and the operations that can be performed

45
Q

Describe Accounting in AAA

A

monitoring and capturing the events done by the user while accessing the network resources (it’s just auditing)