networking Flashcards

1
Q

dns - how to configure dns so that www.domain.com and domain.com work

A

set an a record fo (blank) | hostname | IP AND www | hostname | IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

format for a HTTP protocol command

A

[Command] [Resource] [Protocol Name/Version] e.g. GET / HTTP/1.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

how does IP address spoofing work?

A

forging the packet header so it contains a different address than the computer sending it. # response goes to spoofer address, so only used when you the spoofer doesn’t care about the response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

linux - get tcpdump to ignore port 23

A

tcpdump not port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

linux - get tcpdump to log to a particular file

A

tcpdump -w capture_file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

linux - limit the number of packets dumped by tcpdump to 50

A

tcpdump -c 50

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

linux - print all packets from mysite.com

A

tcpdump src host mysite.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

linux - see all the routers used in getting to Google.com

A

traceroute www.google.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

linux - use tcpdump to only look at HTTP requests

A

tcpdump dst port 80 # destination port # often you’ll need to specify the device for tcpdump with -i so you might need to add this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

linux - what does -n option do tcpdump -n

A

turns off name resolution # you might want to do this since name resolution slows down interception… sometimes crippling it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

linux - what is tcpdump

A

a packet sniffer # able to capture traffic that passes through a machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

linux - what is the -i option with tcpdump

A

the network interface tcpdump -i en1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

linux – what is the final piece of info with tcpdump 10:15:15.571309 IP anon.63180 > sjc-not9.sjc.dropbox.com.http: P 1366488174:1366488582 (408) ack 2337505545 win 7240

A

Information about the packet. For instance, here we have TCP sequence numbers, flags, ARP/ICMP commands, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

linux – what is the first piece of info with tcpdump 10:15:15.571309 IP anon.63180 > sjc-not9.sjc.dropbox.com.http: Flags [.], ack 537, win 65535, options [nop,nop,TS val 388814076 ecr 999361453], length 0

A

the time this packet was received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

linux – what is the second piece of info with tcpdump 10:15:15.571309 IP anon.63180 > sjc-not9.sjc.dropbox.com.http: Flags [.], ack 537, win 65535, options [nop,nop,TS val 388814076 ecr 999361453], length 0

A

protocol name (here it’s IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

linux – what is the third piece of info with tcpdump output 10:15:15.571309 IP anon.63180 > sjc-not9.sjc.dropbox.com.http: Flags [.], ack 537, win 65535, options [nop,nop,TS val 388814076 ecr 999361453], length 0

A

source and destination IP address # only true of IP protocol normally. try appending -e to get the same info in other protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

networking - a subnet expressed like so means what 11.22.33.0/24

A

subnet is 11.22.33 with 24 significant bits (32 bits total (4X8) in an IPv4) (same as 255.255.255.0 subnet mask) # called the significant bit format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

networking - a T1 and a backup ISDN are connected to a router. how does the router know to use the ISDN if the T1 is down

A

configuration table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

networking - besides finding the fastest possible route on a second by second basis what is the second advantage of packet switching

A

redundancy - if one part of the network goes down the info still gets there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

networking - difference between how TCP and UDP transport packets

A

After UDP has placed a packet on the network (via the IP protocol), it forgets about it TCP keeps connection open and keeps sending the packet until it has been received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

networking - do all packets follow the same route on the network

A

not necessarily – each one follows the most efficient one… and this is determined by the hardware on a millisecond by millisecond basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

networking - how are subnets connected to one another?

A

with routers or gateways, which belong to multiple subnets, forwarding internet traffic from one subnet to the other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

networking - how do computers in subnets (e.g. in offices) get online

A

your computer directs all traffic destined to the internet through a gateway in your local subnet. The gateway substitutes its own IP address and port in place of your computer’s. When chunks of data arrive in reply, the gateway knows from the port number in the data that they must be forwarded to your computer and local port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

networking - how do DDOS attacks get around router’s specificity rules which block certain IP addresses

A

by spoofing the IP of the sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

networking - how do routers know when to reconfigure the path

A

they tell each other about line conditions, delays in transmission…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

networking - how do routers prevent networking clogging

A

stop information from going where it’s not needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

networking - how to give your computer a public ip address directly reachable via internet

A

connect modem to machine directly (instead of through router which could create a subnet) and make sure your ISP gives you a fixed IP adress and not a dynamic IP address

28
Q

networking - no computer is connected to each other online… instead it is connected to one or more

A

subnets # In order to successfully communicate with other computers throughout the internet, your computer must know what subnet it is part of, so that it knows what IP addresses are outside your local subnet and must be relayed through the gateway

29
Q

networking - the party initiating a TCP connection chooses what local port

A

usually chosen at random

30
Q

networking - what are private subnets

A

ranges of IP addresses reserved for private networks 10.0.0.0/8 (addresses from 10.0.0.0 to 10.255.255.255) 172.16.0.0/12 (addresses from 172.16.0.0 to 172.31.255.255) 192.168.0.0/16 (addresses from 192.168.0.0 to 192.168.255.255)

31
Q

networking - what does a packet contain

A

HEADER 1 sender’s IP address 2 recipient’s IP address # so it knows where it’s going 3 count of packets email(/whatever) was broken into 4 number of this particular packet PAYLOAD 1 data (e.g. 1000 bytes of data) TRAILER data to show end of packet

32
Q

networking - what does this subnet mask communicate? 255.255.255.0

A

the last byte indicates computers in the network, the rest indicates the subnet itself 4 bytes (byte = 8 bits = 1111(binary) = 255) Therefore, 255.255.255.0 means that the first 3 bytes of the subnet IP address (11.22.33) indicate the actual subnet, and the last byte can be variable (and indicates computers in the subnet)

33
Q

networking - what info is contained in a MAC

A

first 3 bytes - manufacturer last 3 bytes - serial number of NIC itself

34
Q

networking - what information goes in a router’s configuration table

A

info on which connections lead to which addresses priorities for connections

35
Q

networking - what is a datagram

A

packets of an unreliable service that do not notify the user if delivery fails e.g. in UDP

36
Q

networking - what is a loopback address

A

IP shorthand for your computer. special IP address (127.0.0.1) that isn’t physically connected to any network hardware

37
Q

networking - what is a NIC

A

Network Interface Card # used to connect computers to networks

38
Q

networking - what is a socket?

A

: # e.g. website (port 80) 41.199.222.3:80

39
Q

networking - what is a typical subnet

A

group of consecutive IP addresses, such as all IP addresses from 11.22.33.0 to 11.22.33.255.

40
Q

networking - what is a VPN?

A

A private network that runs over the public Internet. Virtual Private Network

41
Q

networking - what is an egress firewall

A

filters outbound connections from your machine to the internet - software which tries to control what programs on your machine access the internet

42
Q

networking - what is an ingress firewall

A

stops wider internet from accessing services on certain ports on your machine (meant only to be accessed by locally trusted subjects)

43
Q

networking - what is an internet

A

a series of two or more connected TCP/IP networks that can be reached by routing.

44
Q

networking - what is an IP address

A

the numeric address of a computer

45
Q

networking - what is an MAC

A

Media Access Control physical address stored in a specific memory location of an NIC

46
Q

networking - what is CRC

A

Cyclic Redundancy Check (CRC) error checking in packets. sum of all the 1s in the packet stored in hex. If tge recalculation of CRC on receipt doesn’t match the number originally sent then that packet is resent.

47
Q

networking - what is IPv4

A

32 bit IP address (127.0.0.1)

48
Q

networking - what is IPv6

A

a 128 bit IP address 0:0:0:0:0:0:0:1

49
Q

networking - what is MIME for?

A

server responds to client HTTP request saying what kind of information is contained in the file

50
Q

networking - what is Network Address Translation (NAT)

A

Helps the Internet not run out of IP addresses by translating an IP address (perhaps not unique) on one network to another IP address on a different network — usually, the Internet # no longer needed with IPv6

51
Q

networking - what is port forwarding/virtual server

A

the router which connects the private subnet to the internet can be configured to forward all incoming connections on a certain port to one of the computers inside the private network used if your computer is on a private subnet

52
Q

networking - what is the normal range for ports?

A

1-65535

53
Q

networking - what to remember about IP addresses when using port forwarding

A

public IP address is not the server, but rather the forwarder

54
Q

networking - what transport layer does DNS use?

A

UDP DNS sends a UDP packet to a DNS server to look up the domain. When the server finds the domain, it returns the domain’s IP address in another UDP packet. (not kept open like TCP)

55
Q

networking - why do DDOS attacks hurt others besides the target

A

the routers just upstream get highly taxed …. thus they lose bytes and internet is slowed down

56
Q

networking - why do HTTP and FTP use TCP?

A

since losing a chunk of a file or HTTP page is undesirable

57
Q

networking - why do online videos and streaming choose UDP over TCP?

A

doesn’t matter if chunks of data are lost… more important data arrives quickly

58
Q

networking - why do ports exist?

A

In order to handle multiple simultaneous connections with the same computer, your computer must be able to distinguish them

59
Q

networking - why does a connection need two ports

A

you need to have one on your machine and one on the other # the party initiating the connection must know which port he wants on the other machine

60
Q

networking - why does TCP’s robustness cost it responsiveness

A

Before any data can be sent using TCP, the two computers must engage in a short back-to-forth to establish a TCP connection.

61
Q

networking - why might an office choose proxy over NAT?

A

With a proxy the office can more easily restrict and monitor your traffic and permit or deny access selectively based not just on port numbers, but the content being accessed and protocols being used.

62
Q

networking - with a gateway in place all connections coming from computers in the subnet appear to computers outside the subnet as coming from….

A

the gateway itself

63
Q

port 23 is…

A

telnet # by default… although you can set this as something else

64
Q

security - why is authentication based on IP a weak measure

A

since a hacker could bypass it with IP spoofing

65
Q

When wiring up a URL you typically need to hook up both:

A

example.com www.example.com

66
Q

Wiring up domains needs to be done both on …. side and …. side

A

server side domain provider side