Networking Flashcards

learning for test

1
Q

LAN

A

Local Area Network

A network within a limited geographic area such
as a building or campus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WAN

A

Wide Area Network

Network covering a large geographic area often comprising
multiple LANS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WISP

A

Wireless Internet Service Provider

An ISP providing internet access wirelessly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WAP

A

Wireless Access Point

Connects wireless devices to a wired network via WI-FI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MAN

A

Metropolitan Area Network

Network spanning a city or large campus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NIC

A

Network Interface card

Hardware component enabling network connectivity for a
device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SAN

A

Storage area network

Network providing block-level storage access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

VPN

A

Virtual Private Network

Secure network over a public network like the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PAN

A

Personal Area Network

Network for connecting personal devices such as Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CAN

A

Campus Area Network

Network spanning a campus
Composed of multiple LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TCP

A

Transmission Control Protocol

Reliable, connection-oriented transport layer protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

UDP

A

User Datagram Protocol

Unreliable Connection-less transport layer protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IP

A

Internet protocol

Provides routing and addressing in the network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PDU

A

Protocol Data Unit

Packet of data specified in a protocol of a given layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FTP

A

File transfer protocol

Protocol for transferring files

Port 20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TFTP

A

Trivial File transfer protocol

Simplified FTP without authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

HTTP

A

Hypertext transfer protocol

Protocol for web browsing
port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

HTTPS

A

Hypertext transfer Protocol Secure

Secure version of HTTP using SSL/TLS
port 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SMTP

A

Simple mail Transfer protocol

Protocol for sending email

Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

POP

A

Post Office Protocol V3

Protocol for receiving emails

port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IMAP

A

Internet Message Access Protocol

Protocol for accessing and managing emails on a server

port 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DNS

A

Domain Name System

Resolves domain names to IP addresses

port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DHCP

A

Dynamic host configuration Protocol

Automatically assigns IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ARP

A

Address Resolution Protocol

Maps IP addresses to MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

SNMP

A

Simple Network Management protocol

Protocol for network management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

ICMP

A

Internet Control Message Protocol

Network layer protocol for diagnostic and error messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

NTP

A

Network Time Protocol

Protocol for synchronizing system clocks over a network
port 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

OSPF

A

Open Shortest Path first

Link-state routing protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

RIP

A

Routing Information Protocol

Distance-vector routing Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

LLDP

A

Link layer discovery protocol

Protocol used by devices to advertise information to neighbors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

BGP

A

Border Gateway Protocol

Protocol for exchanging routing information between autonomous systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

LACP

A

Link Aggregation Control Protocol

Protocol for bundling multiple physical links into a
single logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

SSH

A

Secure Shell

Secure remote login protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

SSL

A

Secure Sockets Layer

Protocol for encrypting data between client and server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Telnet

A

Teletype Network

provides access to virtual terminals of remote systems on local area networks or the Internet

Less secure than ssh as Telnet transfers the data in plain text while in SSH data is sent in encrypted format via a secure channel

Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

TLS

A

Transport layer security

Successor to SSL for securing data between client and server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

IPSec

A

Internet Protocol Security

Protocol suite for securing IP communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

ACL

A

Access Control List

Rules controlling access to a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

MAC

A

Media Access Control

Data link sublayer managing access to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

LLC

A

Logical Link Control

Data link sublayer for managing communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

NAT

A

Network Address Translation

Process of modifying IP address information in packet headers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

BYOD

A

Bring your own Device

Policy allowing personal devices for work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

QoS

A

Quality of Service

Mechanism for ensuring reliable delivery of content for all users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

VLAN

A

Virtual Local Area Network

Logical Grouping of devices to form a broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

SLA

A

Service Level agreement

Contract defining service expectations between provider and customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

IDS

A

Intrusion Detection System

Monitors network traffic for suspicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

IAB

A

Internet Architecture Board

Oversees the management and development of internet standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

ISOC

A

Internet Society

Promotes open development and evolution of internet use globally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

IPS

A

Intrusion Prevention System

Monitors Network Traffic and can prevent suspicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

IETF

A

Internet engineering Task Force

Develops updates and maintains internet and TCP/IP technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

ICANN

A

Internet Corporation for assigned names and numbers

Coordinates IP address allocation and domain name management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

IRTF

A

internet research task force

Focuses on long-term research related to internet and TCP/IP
protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

IANA

A

Internet assigned numbers authority

Manages IP address allocation, domain names and protocol identifiers for ICANN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

IEEE

A

Institute of Electrical and Electronics Engineers

Sets standards of various networking technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

EIA

A

Electronic Industries Alliance

Develops standards related to electrical wiring and connectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

TIA

A

Telecommunications Industry Association

Develops standards for telecommunications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

ITU-T

A

International Telecommunications Union - Telecommunication Standardization Sector

Sets global standards for telecommunications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

EMI

A

Electromagnetic Interference

Disruptions of signals by external electromagnetic fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

AUX

A

Auxiliary Cable

Serial Cable for device management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

RFI

A

Radio Frequency Interference

Disruption of signals by radio frequency signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

UTP

A

Un-shielded Twisted Pair

Network cable with twisted pairs of wires and no shielding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

STP

A

Shielded twisted pair

Network cable with twisted pairs of wires and shielding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

SC

A

Subscriber Connector

Fiber optic connector with a push pull mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

FTTH

A

Fiber to the home

Fiber-optic connection directly to a home or business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

ST

A

Straight tip connector

Fiber optic connector with a bayonet mount

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

LC

A

Lucent Connector

Fiber optic connector with a smaller form factor than subscriber connectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

RAM

A

Random Access Memory

Volatile memory used for storing data temporarily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

NVRAM

A

Non-Volatile RAM

Non - volatile Memory saved for configuration data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

SVI

A

Switch Virtual Interface

Logical Interface on a switch for Layer 3 connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

CLI

A

Command line interface

Text-based interface for managing network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

GUI

A

Graphical user interface

Graphical interface for managing network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

OTDR

A

Optical Time Domain reflectometer

Instrument used to detect faults in fiber-optic cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

TCP vs UDP

A

TCP is a connection based protocol whereas UDP is a connection-less protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

VLSM

A

Variable length subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Host/end Device

A

Computer connected to a network. Where a message originates from

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Clients

A

Computers that send requests to servers to retrieve information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

PTP

A

Peer to peer Networking is when a device can be a client and a server in a Peer-to-peer network. Not secure,not scalable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Host Roles

A

Email: Runs email server software to allow clients to access emails
Web: Web servers allow clients to access web pages
File: Filer servers store corporate/user files. Client devices access files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Role of Intermediary Devices

A

Regenerate and retransmit data signals.
Maintain information about existing pathways through the internet
Notify other devices of errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Characteristics of LANs

A

Spans small geographic area
Admin by individual or single org
Provides high speed bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Characteristics of WANs

A

Admin by Multiple service providers
Wide geo areas such as cities
WANS provide lower speed links between LANS

82
Q

Intranet

A

Private collections of lans and wans to an org that is meant to be accessible only to the members or others with authorization.

83
Q

Extranet

A

Provides secure access to their network for those who work for different org but need to access data on their network

84
Q

DSL

A

Digital subscriber line

85
Q

Types of Network security

A

Network Infrastructure security (Physical security of devices)
Information Security (Security of data over networks)

86
Q

Goals of network security

A

Confidentiality
Integrity
Availability

87
Q

Cloud Computing

A

Global trend that allows us to store personal files or backup data on servers over the internet

88
Q

Types of Clouds

A

Public: Services and apps made available to public through pay per use
Private: Apps and services intended for specific entity
Hybrid: Made up of a public and private cloud using the same architecture
Custom

89
Q

External Security Threats

A

Viruses - program spreads fast by infecting system areas of computer, needs host computer
Worms - worms consume large volumes of memory and bandwidth and do not need a host computer
Trojan horses - appears as genuine program but is infected with malware. does not replicate itself
Spyware - programs which watch/record your data
Adware - programs which bombard you with advertisements without your consent

90
Q

Internal Security Threats

A

BYOD threats where a user has malware on their device and connects to an internal network.

91
Q

Solutions

A

AntiVirus/Spyware
Firewall filtering
Access control lists
Intrusion prevention systems
VPNs

92
Q

Ways to Access to CISCO IOS

A

Console Ports
SSH
Telnet

93
Q

Common elements of communication

A

Source
Destination
Channel

94
Q

Unicast

A

One to one delivery

95
Q

Multicast

A

one to many delivery

96
Q

Broadcast

A

One to all delivery

97
Q

Ethernet

A

Allows communicate over a data link and the physical transmission of data on the network media

98
Q

Protocol Suite

A

Set of protocols that work together to provide comprehensive network communication services

99
Q

Differences between virus trojan and worm

A

Virus: Infects programs, spreads through user actions, corrupts data.
Worm: Self-replicating network pest, exploits weaknesses, clogs systems.
Trojan Horse: Hidden threat, disguised as helpful software, steals data.

100
Q

TCP IP Communication Process

A
  1. Webserver prepares HTML and HTTP application layer sends the data to the transport later
  2. Transport layer breaks data into segments
    3.IP source and dest addresses are added, creating IP packet
    4.Ethernet info added creating data link frame
  3. Frame delivered to nearest router along path towards web client
101
Q

Client side of TCP IP process

A
  1. Ethernet header removed
  2. Then IP header.
  3. Then Transport layer
  4. Finally http info processed and sent to client web browser.
102
Q

Layered Model - OSI

A

Application - Contains protocols used for Process to process communications
Presentation - Provides for common representation of the data
Session - Provides services to the presentation layer to organize its dialogue and to manage data exchange.
Transport - Defines services to segment,transfer and reassemble the data
Network - Provides services to exchange the individual pieces of data over the network between identified end devices
Data link - methods for exchanging data frames between devices over a common media.
Physical - mechanical,electrical,function and procedural means to transmit bits across physical connections.

103
Q

Layered Model - TCP/IP

A

Application (x3) - Represents data to user plus encoding and dialog control
Transport - supports communication between various devices across networks
Internet - determines best path through network
Network access(x2) - controls hardware devices and media that make up the network

Note: by x3 and x2 I mean relative to the size of the OSI
The application in TCP/IP takes up the same as Application to session in OSI

104
Q

Benefits of Layered Model

A

Prevents technology changes in one layer affecting another
Fosters competition as products from different vendors can work together
Provides common language to describe network functions/capablities

105
Q

Differences between OSI/TCP IP

A

OSI model - Further broken up application and network layers to describe discrete functions that must occur at these layers

106
Q

Multiplexing

A

The way in which smaller pieces of data are sent and interleaved allows for many different conversations to be had.

107
Q

Encapsulation

A

As application data is passed down a protocol stack, information is added at each level.

108
Q

Encap Process

A

Data divided into segments
TCP segment encapsulated in IP packet
IP packet encapsulated in Ethernet frame

109
Q

Source IP address

A

IP address of sending device, original source of a packet

110
Q

Destination IP address

A

IP address of receiving device, final destination of packet

111
Q

Data Link address

A

used to deliver the data link frame from one network interface to another network interface on the same network

112
Q

Network Interface cards

A

Connects a device to a network and is used for wired and wireless connections

113
Q

Physical Layer

A

Provides means to transport bits that make a data link layer frame across network media.

113
Q

Physical Layer media

A

Electrical Signals- Copper cabling
Light pulses - Fiber optic cabling
Microwave signals - wireless signals

114
Q

Throughput

A

Measure of transfer of bits across a media over a given time

115
Q

Goodput

A

throughput minus traffic overhead for establishing sessions,acknowledgements and encapsulation

116
Q

Characteristics of Copper Media

A

Electrical Pulses
Attenuation - longer signal travels, more it deteriorates
EMI and RFI distort and corrupt copper data signals.

117
Q

Cable types

A

UTP
STP
Coaxial

118
Q

CATS!!

A

CAT3 - Phone lines, voice communication
CAT5/5E - Data transmission, 100-1000mb/s
CAT6 - 1000mb-10gb/s

119
Q

UTP testing parameters

A

Wire maps
Cable length
Signal loss
Cross talk

120
Q

Fiber optic

A

Bits encoded as light pulses
Used to interconnect network devices
Transmits data over long distances and at higher bandwidth

121
Q

Data link layer

A

Responsible for communication between end device NICs and allows upper layer protocols to access physical layer media and encapsulates layer 3 packets into layer 2 frames

Performs error detection and rejects corrupt frames.

122
Q

Data Link sublayers

A

LLC - Logical Link control communicates with the network layer and identifies which network layer protocol is being used ie iPv4 or 6

MAC - Media Access control defines media access process performed by the hardware. It provides data link layer addressing and access to various network technologies.

123
Q

Physical topology

A

Physical connections and identifies how end devices and infrastructure devices such as routers,switches and wireless access points are interconnected

124
Q

Logical Topology

A

Way a network transfers frames from one node to the next

125
Q

Common Physical WAN topologies

A

Point to point - permanent link between two end points
Hub and spoke -A central site interconnects branch sites using ptp links
Mesh - Requires every end system to be interconnected to every other system

126
Q

Physical LAN topologies

A

Star - end devices connected to central intermediate device
Extended star - additional Ethernet switches interconnect other star topologies
Bus - All end systems chained to each other and terminated in some form on each end
Ring - end systems connected to their respective neighbor forming a ring

127
Q

Straight through vs Crossover

A

Straight-through cables connect the TX pins of one device to the Receiving pins of another device, while crossover cables connect the transmit pins of one device to the transmit pins of another device.

128
Q

Half duplex

A

Both devices can transmit and receive data but cannot do it simultaneously

129
Q

Full Duplex

A

Both devices can transmit and receive data at the same time

130
Q

Contention based access

A

Nodes in operate in half duplex
Compete for use of medium
One device send at time

131
Q

Controlled access

A

Each node has time to use medium

132
Q

CSMA

A

Carrier sense multiple access aka collision detection process is used in half duplex ethernet lans

If two devices transmit at one time,collision occurs and data sent by both devices will be corrupted and need to be resent.

133
Q

Parts of frames

A

header
data
trailer

134
Q

PDUS for each layer

A

Application - Data
Transport - segment
Network - Packet
Datalink - frame
Physical - bits

135
Q

Role each layer

A

Application - Exchange data between programs on source address to the destination address
Transport - Establishes a temporary connection between 2 applications
Network - allows devices to exchange data over a network
Datalink - Communication between an end device and the NIC
Physical - means to transport bits and make up a frame

136
Q

Address each layer

A

Application - Port number
Transport - Port address
Network - IP
Datalink - MAC
Physical - Logical address

137
Q

IPv6 telling:

FF
FE80
2000
:1/128

A

Multicast
Link local
Global
Loopback

138
Q

Forwarding Methods On switches

A

Store and Forward - Receives entire frame, computes CRC, if crc valid, looks up destination address and determines outgoing interface
Cut-through - Forwards frame before it is entirely received and at a minimum the destination address of the frame must be read before the frame can be forwarded.

139
Q

MAC Sublayer responsibilities

A

Data Encapsulation
Media Access control

140
Q

Data Encapsulation Functions

A

Frame Delimiting
Addressing
Error detection

141
Q

MAC address

A

Media access control address is a 48 bit binary value as 12 hex digits.
AKA BIA or burned in address encoded in the Read only memory chip permanently.

142
Q

Frame processing

A

When device is forwarding message to ethernet network,
it attaches header information to the frame

The header info contains source and dest mac address

When a NIC receives an Ethernet frame, it examines the dest mac address to see if it matches the physical mac address that is stored in RAM. If there is a match it passes the frame up the OSI layers where the de encapsulation process occurs

143
Q

Unicast MAC address

A

Unique address used when frame sent from single transmitting device to single destination device. If it is unicast it will look for a match in its MAC address table and if it is there it will forward the frame out the specific port

144
Q

Broadcast mac address

A

Broadcast packets contain destination IPv4 addresses that has all 1s in the host portion indicating that all hosts on that local network will receive and process the packet.
The frame is flooded out all ports except incoming port

145
Q

Multicast mac address

A

Allows source device to send a packet to a group of devices. The frame is flooded out all ports except incoming port

146
Q

ARP

A

Address resolution protocol determines the destination MAC address.
It resolves IPv4 addresses to MAC addresses and maintains a table of mappings

147
Q

ARP Tables

A

A device will search its ARP for a destination IPv4 address and a corresponding MAC adress

If on same network it will seaarch arp table for destination ipv

if not it will search for the ipv4 default gateway

148
Q

ARP Request

A

Broadcast frame sent when a device needs a mac address associated with an IPv4 address and it does not have an entry for the address in its arp table

it includes the target ipv4 address and a target mac address

149
Q

Why IPv6 not implemented

A

Compatibility Constraints
Due to NAT

150
Q

ARP Reply

A

Includes sender’s IPv4 address
Sender’s mac address

151
Q

ARP Spoofing

A

Attackers can respond to requests and pretend to be providers of services.

152
Q

Network layer protocols

A

IPv4
IPv6

153
Q

Processes to avoid end to end transport

A

Addressing of end devices
Encapsulation
Routing
De-encapsulation

154
Q

Characteristics of IP

A

Low overhead
Not designed to track and manage flow of packets
Connectionless
Unreliable - no guarantee all packets sent will be received

155
Q

Limitations of IPv4

A

Limited number of unique public IPv4 addresses - 4 billion
Large number of routes can slow donw a router
Lack of end to end connectivity - NAT created for devices to share single IPv4 address

156
Q

Advantages of IPv6

A

Increased addressing space - 128 bit vs 32 bit
Improved packet handling
Eliminates need for NAT

157
Q

Host forwarding decision

A

Host can send a packet to:
Itself
Local Host
Remote host

158
Q

Default Gateway

A

Network device that route our traffic out to other networks.

159
Q

Flash

A

NVRAM used as permanent storage for the IOS

160
Q

Components of a Router

A

Power supply
fan
SDRAM
NVRAM
CPU
Heat shields
AIM

161
Q

SDRAM

A

Synchronous dynamic ram

162
Q

AIM

A

Advanced integration module

163
Q

Network portion

A

First 3 octets

164
Q

Host portion

A

last octet

165
Q

3 IPv4 must be configured on a host

A

Unique address of host
Default gateway - IP address of local router interface
Subnet mask - Identifies network host portion of IPv4 address

166
Q

Types of Addresses

A

Network addresses - Host portion all 0s
First host address - host portion is all 0s and ends with one
Last host - host portion is all 1s and ends with 0
Broadcast address - host portion all 1s

167
Q

Need for IPv6

A

Depletion of IPv4
Issues with NAT
IoT

168
Q

Techniques IPv4 to 6

A

Dual stack
Tunneling
Translation

169
Q

SLAAC

A

Stateless address auto configuration is where a device can obtain its prefix,prefix length, default gateway address and other info from ipv6

170
Q

Reasons for subnetting

A

Reduces network traffic
Improves network performance
Enables admin to implement security policies such as which subnets can communicate together

171
Q

Number of subents

A

if given bits borrowed 2^n

if given amount of subnets log2(n)

172
Q

Number of hosts

A

(2^n-)2

log2(n-2)

173
Q

Transport layer

A

Establishes temporary communication session between tow application
Link between application layer and lower layers

174
Q

Transport responsibilities

A

Segmentation
Tracks conversation
Identifies applicaiton

175
Q

Transmission control protocol

A

Considered reliable
Additional Fields needed in header, increase size and delay

176
Q

User datagram protocol

A

Unreliable
Faster than tcp

177
Q

TCP Responsibilities

A

Numbers and tracks data segments
Acknowledges received data
Retransmits unacknowledged data

178
Q

UDP responsibilities

A

Best effort delivery

179
Q

TCP Connection Establishment

A
  1. Initiating client requests a session with session
  2. Server acknowledges and requests a session with client
  3. Client acknowledges communication session with server
180
Q

TCP three way handshake

A

Client sends syn to server
Server sends syn and ack to client
Client sends ack to server

181
Q

TCP Congestion

A

Causes retransmission of lost TCP segments
retransmission can make congestion even worse
Tcp employs several congestion handling mechanisms, timers and algorithms

182
Q

UDP Datagram reassembly

A

UDP reassembles data in order received and forwards to application
Application must identify proper sequence

183
Q

Applications of TCP

A

WWW,email,ssh

184
Q

Applications of UDP

A

Live video
Request and reply

185
Q

Application layer

A

Closest to end user, used to exchange data between programs running on source destination hosts

186
Q

Presentation Layer

A

Formats data at the source device into compatible form for receiving data

187
Q

Session Layer

A

Creates and maintains dialogs between source and destination applicaitons

188
Q

P2P networks

A

Bitcoin
BitTorrent
eDonkey

189
Q

HTML & HTTP

A

When a web address or URL is typed into a web browser, the web browser establishes a connection the web service running on the server using the HTTP protocol.

190
Q

URL

A

Uniform resource locator

191
Q

Three common HTTP message types

A

GET - client request for data
POST - uploads data files to the web server
PUT - Uploads resources or content to the web server

192
Q

Domain Name Server

A

Domain Names convert the numeric address into a simple recognizable name

193
Q

DNS Protocol

A

The service that provides the IP address of a website or domain name so a host can connect to it without using the numerical IP address.

194
Q

DHCP

A

Dynamic host configuration protocol for ipv4 automates the assignment of the ipv4 addresses,subnet masks and other parameters

195
Q

DHCP Attacks

A

Spoofing
Starvation

196
Q

DHCP Steps

A

Host A - Hey I need an IP address? Can anyone help?
- DHCP Discover - Looks for DHCP server (usually router or server)
Hey, I’m your router. I have an IP address for you
- DHCP Offer - DCHP server offers an address
Hi, yeah that looks good, give it to me!
- DHCP Request - Host requests to take that address
Alright chief, here you go
- DHCP ACK - DCHP server gives them that address
Address isn’t permanent. Device must renew after a time that was specified or it will be removed!

UDP Port:
Client: 68
Server: 67

197
Q

SMB

A

Server message block is a client/server file sharing protocol. Client establish a long term connection to servers and can access the resources on the server as if the resource is local to the client host.

198
Q

Types of threats in networks

A

Data loss and manipulation
Information theft
Identity theft
Disruption of Service

199
Q

Reconnaissance Attacks

A

Discovery and mapping of systems,services or vulnerabilities

200
Q

Access Attacks

A

Exploitation of known vulnerabilities