Networking Basics & Terms Flashcards

1
Q

What is a Hub?

A

The hub is a layer-1 device that simply receives a signal from one system and then sends the signal to all other ports on the hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are Hubs a security risk?

A

The drawback to the hub is that it uses up bandwidth by sending the data to every port on the hub. The other drawback to a network hub is that it is a security issue if all systems on the network receive the data—although they ignore the data because it is not for them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Switch?

A

A network switch is similar to a network hub in that it is used to connect all systems together in a network environment, but the difference is that a switch is a layer-2 device that filters traffic by the layer-2 address.

(Remember from the Network+ exam that the layer-2 address is the MAC address, or hardware address, that is assigned to the network card by the manufacturer.)

The switch is able to filter the traffic because it stores the MAC addresses of each system connected to the switch, and what port that system is connected to, in the MAC address table. The MAC address table is a table stored in memory on the switch and is responsible for tracking what ports each system is connected to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What other benefits do Switches provide?

A

Filtering: As mentioned, a switch filters traffic, which prevents others from capturing and viewing potentially confidential information.

Port mirroring: Port mirroring, also known as port monitoring, is a feature of some switches that allows the administrator to copy traffic from other ports to a single destination port (known as a monitoring port).

Port security: Port security is a feature of a network switch that lets you configure a port for a specific MAC address.

Disable ports: It is a security best practice that if you have ports on the switch that are not being used, you should disable them so that they cannot be used

Collision Domains: A collision domain is a group of networked systems that share the same network segment and therefore can have their data collide with one another.

VLANs: The purpose of a VLAN is to create multiple networks within the one network switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Router?

A

A router is a layer-3 device of the OSI (open systems interconnection) model that is responsible for routing, or sending, data from one network to another network. The router uses a routing table that resides in its memory to determine the networks that the router knows how to send data to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Load Balancer?

A

A load balancer is a device that is designed to split the load between components such as servers or routers. Load balancing is the concept of trying to improve performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Firewall?

A

A firewall is a network device that controls what traffic is allowed to enter or leave the network. The firewall filters traffic based on rules you place on the firewall indicating what traffic is allowed or not allowed to enter or leave the network. You typically start with a deny-all rule that states all traffic is denied, unless you specify otherwise by building a rule for a specific type of traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Proxy?

A

A proxy server is a type of firewall, but it is typically associated with being able to control outbound communication by limiting what web sites an employee can visit. Proxy servers also perform a high level of logging so that the administrator can see what sites are visited each day.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Network Cabling and what are the primary type?

A

Cabling is the transmission medium for data sent between hosts on the LAN. The three primary types of cable media that can be used to connect systems to a network are coaxial cable, twisted-pair cable, and fiber-optic cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Coaxial Cabling and what are the two types?

A

One strand (a solid-core copper wire) runs down the middle of the cable. Around that strand is a layer of insulation, and covering that insulation is braided wire and metal foil, which shields against electromagnetic interference. A final layer of insulation covers the braided wire. Because of the layers of insulation, coaxial cable is more resistant to outside interference than other cabling such as unshielded twisted-pair (UTP) cable.

The two types of coax cabling are thinnet and thicknet. The two differ in thickness and maximum cable distance that the signal can travel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Thinnet?

A

This refers to RG-58 cabling, which is a flexible coaxial cable about ¼-inch thick. Thinnet is used for short-distance communication and is flexible enough to facilitate maneuvering between workstations. Thinnet connects directly to a workstation’s network adapter card by using a British naval connector (BNC) and uses the network adapter card’s internal transceiver. The maximum length of thinnet is 185 meters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Thicknet?

A

Also known as RG-8 coax. Thicknet cable is about ½-inch thick and can support data transfer over longer distances than thinnet. Thicknet has a maximum cable length of 500 meters and usually is used as a backbone to connect several smaller thinnet-based networks. Due to its ½-inch thickness, this cable is harder to work with than thinnet cable. A transceiver often is connected directly to the thicknet cable by using a connector known as a vampire tap. Connection from the transceiver to the network adapter card is made using a drop cable to connect to the adapter unit interface (AUI) port connector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Twisted Pair Cabling?

A

Twisted-pair cabling gets its name from having four pairs of wires that are twisted to help reduce crosstalk or interference from outside electrical devices. Crosstalk is interference from adjacent wires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Unshielded Twisted Pair Cabling?

A

UTP cables are familiar to you if you have worked with telephone cable. The typical twisted-pair cable for network use contains four pairs of wires. Each member of the pair of wires contained in the cable is twisted around the other. The twists in the wires help shield against electromagnetic interference. The maximum distance of UTP is 100 meters.

UTP cable uses small plastic connectors designated as registered jack 45, most often referred to as RJ-45. RJ-45 is similar to the phone connectors, except that instead of four wires, as found in the home system, the network RJ-45 connector contains eight contacts, one for each wire in a UTP cable.
It can be easy to confuse the RJ-45 connector with the RJ-11 connector. The RJ-11 connector is a telephone connector. An RJ-11 connector has four contacts; hence, there are four wires found in the telephone cable. With RJ-45 and RJ-11, you will need a special crimping tool when creating the cables to make contact between the pins in the connector and the wires inside the cable.

UTP cable is easier to install than coaxial because you can pull it around corners more easily due to its flexibility and small size. Twisted-pair cable is more susceptible to interference than coaxial, however, and should not be used in environments containing large electrical devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Straight Through Cabling?

A

CAT 5 UTP cabling usually uses only four wires when sending and receiving information on the network. The four wires of the eight that are used are wires 1, 2, 3, and 6. When you configure the wire for the same pin at either end of the cable, this is known as a straight-through cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Crossover Cable?

A

At some point, you may need to connect two computer systems directly together without the use of a switch (or hub) from network card to network card. Or you may find you need to connect one switch to another switch. In any scenario where you are connecting similar devices together, you would be unable to use a straight-through cable because the transmit pin on one end would be connected to the transmit pin on the other end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Shielded Twisted Pair Cabling?

A

STP cable is very similar to UTP cabling, but it differs from UTP in that it uses a layer of insulation within the protective jacket, which helps maintain the quality of the signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Fiber Optic Cabling?

A

Fiber-optic cabling is unlike coax and twisted-pair because both of those types of cabling use a copper wire that carries the electrical signal. Fiber-optic cables use optical fibers that carry digital data signals in the form of modulated pulses of light. An optical fiber consists of an extremely thin cylinder of glass, called the core, surrounded by a concentric layer of glass, known as the cladding. There are two fibers per cable—one to transmit and one to receive. The core also can be an optical-quality clear plastic, and the cladding can be made up of gel that reflects signals back into the fiber to reduce signal loss.

The two types of fiber-optic cables are single-mode fiber (SMF) and multimode fiber (MMF):
image 

Single-mode fiber  Uses a single ray of light, known as a mode, to carry the transmission over long distances
image 

Multimode fiber  Uses multiple rays of light (modes) simultaneously, with each ray of light running at a different reflection angle to carry the transmission over short distances

Fiber-optic cable supports up to 1,000 stations and can carry the signal up to and beyond 2 kilometers. Fiber-optic cables are also highly secure from outside interference such as radio transmitters, arc welders, fluorescent lights, and other sources of electrical noise. On the other hand, fiber-optic cable is by far the most expensive of these cabling methods

Fiber-optic cables can use many types of connectors, but the Security+ exam is concerned only with the two major connector types: the straight-tip (ST) connector and the subscriber (SC) connector. The ST connector is based on the BNC-style connector but has a fiber-optic cable instead of a copper cable. The SC connector is square and somewhat similar to an RJ-45 connector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an IP Address?

A

The IP address is a 32-bit value that uniquely identifies the system on the network (or the Internet). An IP address looks similar in appearance to 192.168.1.15. The four decimal values in an IP address are separated by decimal points. Each value is made up of 8 bits (1’s and 0’s), so with four decimal values, 8 bits × 4 = the 32-bit address.

Since each of the decimal values is made up of 8 bits (for example, the 192), we refer to each of the decimal values as an octet. Four octets are in an IP address. It is very important to understand that the four octets in an IP address are divided into two parts—a network ID and a host ID. The subnet mask determines the number of bits that make up the network ID and the number of bits that make up the host ID. Let’s see how this works.

IP is a layer-3 protocol of the OSI model and is responsible for logical addressing and routing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a Subnet Mask?

A

When looking at a subnet mask, if there is a 255 in an octet, then the corresponding octet in the IP address is part of the network ID. For example, if I had an IP address of 192.168.1.15 and a subnet mask of 255.255.255.0, the first three octets would make up the network ID, and the last octet would be the host ID. The network ID assigns a unique address to the network itself, while the host ID uniquely identifies the system on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Default Gateway?

A

The default gateway is the IP address of the router that can send data from your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are Address Classes?

A

Every IP address belongs to a distinct address class. The Internet community defined these classes to accommodate networks of various sizes. The class to which the IP address belongs initially determines the network ID and host ID portions of the address, along with the number of hosts that are supported on that network. The different class addresses are named class A, class B, class C, class D, and class E.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a Class A Address?

A

A class A address has a default subnet mask of 255.0.0.0, which means that the first octet is the network ID and the last three octets belong to the host ID portion of the address. Each octet can contain 256 possible values (0–255), so a class A address supports 16,777,216 hosts on the network (256 × 256 × 256). Actually, there are only 16,777,214 valid addresses to use on systems because two addresses are reserved on each IP network: the addresses with all host bits set to 0’s (the network ID) and with all host bits set to 1’s (the broadcast address). So with a class A address, you will not be able to assign n.0.0.0 or n.255.255.255 (where n is your network ID) to any hosts on the network.

You can always identify a class A address because the value of the first octet falls between 1 and 126. An address that starts with 127 is a class A address as well, but you are not allowed to use any address that starts with 127 because it is reserved for the loopback address.

Summary: Class A addresses have an IP address in which the first octet is between 1 and 126. Class A addresses also have a default subnet mask of 255.0.0.0. Also note that this subnet mask can be displayed as a /8 at the end of the address—for example, 12.0.0.10/8 means that the first eight bits make up the subnet mask.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a Class B Address?

A

Class B addresses have a default subnet mask of 255.255.0.0, which means that the first two octets are the network ID and the last two octets are the host ID portion of the address. This means that we can have 65,536 hosts (256 × 256) on the network. Oh, but wait! Don’t forget to take off the two reserved addresses, so that gives us 65,534 addresses that can be assigned to hosts on the network.

Due to the number of hosts that are supported on a class B address, you usually find that a medium-sized company has a class B address. You can identify a class B address because the first octet starts with a number that falls between 128 and 191.

Summary: Class B addresses have an IP address in which the value of the first octet is between 128 and 191. Class B addresses have a default subnet mask of 255.255.0.0 or can be displayed as /16 at the end of the address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a Class C Address?

A

Class C addresses have a subnet mask of 255.255.255.0, which means that the first three octets are the network ID and the last octet is the host ID. Having only one octet as the host ID means that a class C address can support only 254 hosts (256 – 2) on the network.

You can identify a class C address because it has a value for the first octet that ranges between 192 and 223. For example, an IP address of 202.45.8.6 is a class C address because 202 falls between 192 and 223. We also know that this system has a subnet mask of 255.255.255.0 because it is a class C address.

Summary: Class C addresses have an IP address in which the value of the first octet is between 192 and 223. In addition, class C addresses have a default subnet mask of 255.255.255.0, which can be displayed as /24 at the end of the address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a Class D Address?

A

Class D addresses are used for special types of applications on the network known as multicasting applications. Multicasting applications send data to a number of systems at the same time by sending data to the multicast address, and anyone who has registered with that address will receive the data. A multicast address is what class D addresses are used for, so you will not be assigning them specifically to hosts on the network for normal network communication.

Class D addresses have a value in the first octet that ranges from 224 to 239. With that many ranges, class D has the potential for 268,435,456 unique multicast groups that users can subscribe to from a multicast application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a Class E Address?

A

The funny thing about class E addresses is that they were designed only for experimental purposes, so you will never see a class E address on a network. Class E addresses have a first octet with a value that falls in the range of 240 to 247.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a Loopback Address?

A

The loopback address is used to refer to the local system, also known as the localhost. If you want to verify that the TCP/IP software has initialized on the local system even though you may not have an IP address, you may ping the loopback address, which is typically referred to as 127.0.0.1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a Private Address?

A

A private address is an address that can be assigned to a system but cannot be used for any kind of Internet connectivity. The private addresses are nonroutable addresses, so any system using them will be unable to function off the network. The following are the three address ranges that are the private address ranges:
–> 10.0.0.0 to 10.255.255.255
–> 172.16.0.0 to 172.31.255.255
–> 192.168.0.0 to 192.168.255.255
Being unable to route data across the Internet when using these addresses will not pose a problem, because realistically, you will have these private addresses sitting behind a network address translation (NAT) server that will translate the private address to a public address that can be routed on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is Automatic Private IP Addressing?

A

Windows clients support a feature known as automatic private IP addressing (APIPA), which is a feature that provides that when a client cannot contact a DHCP server, Windows clients configure themselves automatically with a 169.254.x.y address. If something is wrong with the DHCP server and all the systems on the network cannot obtain an address from the DHCP server, the clients will all assign themselves an address within the 169.254 address range and then be able to communicate with one another.

APIPA does not assign a default gateway, so you will be unable to access resources on a remote network and the Internet—but you can still communicate with systems on your network. When troubleshooting to find out why a machine cannot communicate on the network, watch for systems that have the 169.254.x.y address range because it means they could not find a DHCP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are Illegal Addresses?

A

An illegal address is an address that is not allowed to be assigned to a host on the network such as a system or router. From a certification exam point of view, you need to be able to identify these illegal addresses. The following are considered illegal addresses:

  • -> Any address starting with 127  An IP address that starts with 127 is reserved for the loopback address and cannot be assigned to a system. An example of this type of illegal address is 127.50.10.23.
  • ->All host bits set to 0  You are not allowed to assign a system an IP address that has all of the bits in the host ID portion set to 0 because this is the network ID. An example of this type of illegal address is 131.107.0.0.
  • -> All host bits set to 1  You are not allowed to assign a system an IP address that has all the host bits set to 1 because this corresponds to the broadcast address of the network. An example of this type of illegal address is 131.107.255.255.
  • -> A duplicate address  You are not allowed to assign a system an address that another system is using because this results in a duplicate IP address error.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the Transmission Control Protocol?

A

The Transmission Control Protocol (TCP) is responsible for providing connection-oriented communication and for ensuring delivery of the data (known as reliable delivery).

Connection-oriented communication involves first establishing a connection between two systems and then ensuring data sent across the connection reaches the destination. TCP will make sure that the data reaches its destination by retransmitting any data that is lost or corrupt. TCP is used by applications that require a reliable transport, but this transport has more overhead than a connectionless protocol because of the construction of the session and the monitoring and retransmission of any data across that session.

Another factor to remember about TCP is that the protocol requires that the recipient acknowledge the successful receipt of data. Of course, all the acknowledgments, known as ACKs, generate additional traffic on the network, which reduces the amount of data that can be passed within a given time frame. The extra overhead involved in the creation, monitoring, and ending of the TCP session is worth the certainty that TCP will ensure that the data will reach its destination.

TCP ensures that data is delivered by using what known as sequence numbers and acknowledgment numbers. A sequence number is a number assigned to each piece of data that is sent. After a system receives a piece of data, it acknowledges that it has received the data by sending an acknowledgment message back to the sender, with the original sequence number being the acknowledgment number of the reply message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a TCP Three-way Handshake?

A

Before a system can communicate over TCP, it must first establish a connection to the remote system. To establish a connection to the remote system, TCP uses what is called the TCP three-way handshake. The three phases to the TCP three-way handshake are:

SYN: In the first phase, the sending system sends a SYN message to the receiving system. Each packet sent is assigned a sequence number, which is a unique number assigned to the packet. The SYN message contains the initial sequence number (ISN), which is the first sequence number to be used. In this example, Computer A is connecting to the web site on Computer B, so a SYN message is sent to port 80 on Computer B.

ACK/SYN: The second phase is known as the ACK/SYN phase because this message is acknowledging the first message but at the same time is indicating its initial sequence number. In this example, Computer B sends back the ACK/SYN message that is acknowledging that it has received packet 123 (by acknowledging that 124 is the next sequence number), but has also specified that its ISN is 326.

ACK: The final phase of the three-way handshake is the acknowledgment message, which acknowledges that the packet sent in the second phase has been received. In this example, Computer A sends the ACK to acknowledge that it has received packet 326 by acknowledging that the next packet will be sequence number 327.

34
Q

Describe a Disconnecting TCP Connection?

A

Just as TCP has a three-way handshake to create a connection between two systems that wish to communicate, TCP also has a process to have a participant disconnect from the conversation. Looking at Figure 1-17, you can see that if Computer A wants to disconnect from a TCP session, it must first send a FIN flag to signal that it wants to end the conversation.

When Computer B receives the FIN message, it replies with an acknowledgment and then sends its own FIN message back to Computer A. As a final step to this process, Computer A must acknowledge that it has received the FIN message from Computer B. This is similar to talking to someone on the phone—to end the conversation, you say goodbye and then wait for the other person to say goodbye before hanging up. I describe this as ending the conversation in a “polite” way.

There is also a way to end a conversation in an “impolite” manner. Back to the telephone analogy: you can end the conversation impolitely by hanging up the phone without saying goodbye. In the TCP world, you can “hang up” by sending a TCP message with the RST (reset) flag set.

35
Q

What are TCP Ports?

A

When applications use TCP to communicate over the network, each application must be uniquely identified by using a unique port number. A port is a unique address assigned to the application. When a client wants to communicate with one of those applications (also known as a service), they must send the request to the appropriate port number on the system.

36
Q

What is Port 20?

A

Service: FTP Data
Description: Port used by FTP to send data to a client.

37
Q

What is Port 21?

A

Service: FTP Control
Description: Port used by FPT commands sent to the server.

38
Q

What is Port 22?

A

Service: SSH
Description: Port used by Secure Shell (SSH) to encrypt remote access communication. It typically is used as a secure replacement to Telnet.

39
Q

What is Port 23?

A

Service: Telnet
Description: Port used by Telnet to remotely connect to a system such as a server or router.

40
Q

What is Port 25?

A

Service: SMTP
Description: Port used to send Internet e-mail.

41
Q

What is Port 53?

A

Service: DNS
Description: Port used for DNS zone transfers

42
Q

What is Port 80?

A

Service: HTTP
Description: Internet protocol for delivering web pages to the browser.

43
Q

What is Port 110?

A

Service: POP3
Description: Port used by POP3, which is the Internet protocol to read e-mail.

44
Q

What is Port 139?

A

Service: NetBIOS
Description: Port used by the NetBIOS session service and is used to establish a connection between two systems for NetBIOS communication.

45
Q

What is Port 143?

A

Service: IMAP
Description: Port used by IMAP, which is a newer Internet protocol to read e-mail.

46
Q

What is Port 443?

A

Service: HTTPS
Description: Port used for secure web traffic.

47
Q

What is Port 3389?

A

Service: RDP
Description: Port used by Remote Desktop Protocol (RDP) for remote administration of a Windows system.

48
Q

What are TCP Flags?

A

The TCP protocol uses what is known as TCP flags to identify important types of packets. The following are the common TCP flags you should be familiar with for the Security+ certification exam. Figure 1-18 displays the flags in a packet capture. Note that instead of showing the actual flag, the value is interpreted by Network Monitor and a description is shown instead. For example, instead of seeing the URG flag set to zero, you will see the first flag set to zero with a description of “No urgent data”:

SYN: The SYN flag is assigned to any packets that are part of the SYN phases of the three-way handshake.

ACK:  The acknowledgment flag acknowledges that a previous packet has been received.

PSH:  The push flag is designed to force data on an application.

URG:  The urgent flag specifies that a packet is an urgent packet.

FIN:  The finish flag specifies that you would like to finalize, or end, the connection. This is how a TCP connection is ended the polite way—it is like saying goodbye to end a phone conversation.

RST:  The reset flag is used to end a TCP conversation impolitely. This is like hanging up the phone without saying goodbye.

49
Q

What is a TCP Header?

A

Every packet that is sent using the TCP protocol has a TCP header assigned to it, which contains TCP-related information such as the source port, destination port, and the TCP flags. Figure 1-19 displays the different fields in the TCP header. A quick description of each field follows:

Source Port: This 16-bit field identifies the port number of the sending system.

Destination Port: This 16-bit field identifies the port number the packet is destined for on the destination system.

Sequence Number: This 32-bit field identifies the sequence number of the packet.

Acknowledgment Number: This 32-bit field identifies the packet that this packet is acknowledging.

Offset: This 4-bit field indicates where the data begins.
Reserved: This 6-bit field is always set to 0 and was designed for future use.

Flags: This 6-bit field is where the TCP flags are stored. There is a 1-bit field for each of the flags mentioned earlier in this section.

Window Size: This 16-bit field determines the amount of information that can be sent before an acknowledgment is expected.

Checksum: This 16-bit field is used to verify the integrity of the TCP header.

Urgent Pointer: This 16-bit field is used only if the URG flag is set and is a reference to the last piece of information that is urgent.

Options: This field is a variable-length field that specifies any additional settings that may be needed in the TCP header.

50
Q

What is the User Datagram Protocol?

A

The User Datagram Protocol (UDP) is used by applications that do not want to be concerned with ensuring the data reaches the destination system. UDP is used for connectionless communication (unreliable), which means that data is sent to the destination and no effort is made to track the progress of the packet and whether it has reached the destination.

51
Q

What is Port 53?

A

Service: DNS
Description: UDP port 53 is used for DNS queries.

52
Q

What is Port 67 & 68?

A

Service: DHCP
Description: UDP port 67 is used by the DHCP service and UDP port 68 is used by client requests.

53
Q

What is Port 69?

A

Service: TFTP
Description: Trivial File Transfer Protocol is used to download files without requiring authentication.

54
Q

What is Port 137 & 138?

A

Service: NetBIOS
Description: UDP 137 and 138 are used by the NetBIOS name service and datagram service.

55
Q

What is Port 161?

A

Service: SNMP
Description: UDP port 161 is used by the Simple Network Management Protocol.

56
Q

What is a UDP Header?

A

Because the UDP protocol does not have to acknowledge the receipt of a packet, the structure of the UDP header is much simpler than the TCP header. For example, the UDP header does not need a sequence number or acknowledgment number; it also does not need flags to indicate special packets such as a SYN message because there is no three-way handshake (because UDP is connectionless).

Source Port  A 16-bit field that indicates the port used by the sending application on the sending system.

Destination Port  A 16-bit field that indicates the port used by the application on the destination system.

Length  A 16-bit field that specifies the size of the UDP header in bytes.

Checksum  A 16-bit field used to verify the integrity of the UDP header.

57
Q

What is the Internet Protocol?

A

The Internet Protocol (IP) provides packet delivery for protocols higher in the model. It is a connectionless delivery system that makes a “best-effort” attempt to deliver the packets to the correct destination. IP does not guarantee delivery of the packets—that is the responsibility of transport protocols; IP simply sends the data.

The IP protocol is also responsible for the logical addressing and routing of TCP/IP and therefore is considered a layer-3 protocol of the OSI model. The IP protocol on the router is responsible for decrementing (usually by a value of 1) the TTL (time to live) of the packet to prevent it from running in a “network loop.” Windows operating systems have a default TTL of 128.

58
Q

What is the IP Header?

A

The IP header in the packet contains information that helps the packet make its way from the source to the destination.

Version: A 4-bit field that identifies the version of IP being used, for example, 4 or 6.

Header Length:  A 4-bit field that indicates the size of the IP header.

Type of Service:  An 8-bit field that indicates how the packet should be handled by the system. For example, if the low delay option is specified here, it means that the system should deal with the packet right away.

Total Length:  A 16-bit field that indicates the size of the IP header.

Identification:  A 16-bit field. Networks can only handle packets of a specific maximum size—known as a maximum transmission unit (MTU)—so the system may break the data being sent into multiple fragments. This field uniquely identifies the fragment.

IP Flags:  A 3-bit field that specifies how fragments are going to be dealt with. For example, a More Fragments (MF) flag indicates more fragments are to come. Also, a bit known as Don’t Fragment (DF) specifies not to fragment the packet.

Fragment Offset:  A 13-bit field that specifies the order that the fragments are to be put back together when the packet is assembled.

Time to Live (TTL):  An 8-bit field that specifies when the packet is to expire. The TTL is a value that is decremented with every router the packet passes through. When the TTL reaches 0, the packet is discarded.

Protocol:  An 8-bit field that specifies what layer-4 protocol (TCP or UDP) the packet should use.

Header Checksum:  A 16-bit field that verifies the integrity of the IP header.

Source Address:  A 32-bit field that represents the IP address of the sending system. This is how the receiving system knows where to send the reply message.

Destination Address:  A 32-bit field that represents the IP address of the system the packet is destined for.

IP Options:  A variable-length field that is used to specify any other settings in the IP header.

59
Q

What is the Internet Control Message Protocol?

A

Internet Control Message Protocol (ICMP) enables systems on a TCP/IP network to share status and error information. You can use the status information to detect network trouble. ICMP messages are encapsulated within IP datagrams so that they can be routed throughout a network. Two programs that use ICMP messages are Ping and Tracert.

You can use Ping to send ICMP echo requests to an IP address and wait for ICMP echo responses. Ping reports the time interval between sending the request and receiving the response. With Ping, you can determine whether a particular IP system on your network is functioning correctly. You can use many different options with the Ping utility.

Tracert traces the path taken to a particular host. This utility can be very useful in troubleshooting internetworks. Tracert sends ICMP echo requests to an IP address while it increments the TTL field in the IP header by a count of 1 after starting at 1 and then analyzing the ICMP errors that are returned. Each succeeding echo request should get one further into the network before the TTL field reaches 0 and an “ICMP time exceeded” error message is returned by the router attempting to forward it.

ICMP is the protocol in the TCP/IP protocol suite that is responsible for error and status reporting. Programs such as Ping and Tracert use ICMP.

60
Q

What are ICMP Types and Codes?

A

ICMP does not use port numbers, but instead uses ICMP types and codes to identify the different types of messages. For example, an echo request message that is used by the Ping request uses ICMP type 8, while the Ping reply comes back with an ICMP type 0 message.

Some of the ICMP types are broken down to finer levels with different codes in the type. For example, ICMP type 3 is a destination unreachable message, but because there are many possible reasons why a destination is unreachable, the type is subdivided into different codes.

61
Q

What is the ICMP Header?

A

The ICMP header is a very small header compared to the IP header and the TCP header.

Type:  An 8-bit field that indicates the ICMP type being used.

Code:  An 8-bit field indicating the ICMP code being used.

Checksum:  A 16-bit field that is used to verify the integrity of the ICMP header.

Other:  A field that stores any data within the ICMP header. For example, Microsoft operating systems place part of the alphabet in this field for echo request messages.

62
Q

What is Address Resolution Protocol?

A

Address Resolution Protocol (ARP) provides logical-address-to-physical-address resolution on a TCP/IP network, which is converting the IP address to a MAC address.

To accomplish this feat, ARP sends out a broadcast message with an ARP request packet that contains the IP address of the system it is trying to find. All systems on the local network see the message, and the system that owns the IP address for which ARP is looking replies by sending its physical address to the originating system in an ARP reply packet. The physical/IP address combo is then stored in the ARP cache of the originating system for future use.

All systems maintain ARP caches that include IP-address-to-physical-address mappings. The ARP cache is always checked for an IP-address-to-physical-address mapping before initiating a broadcast.

ARP is responsible for converting an IP address (layer-3 address) to the physical MAC address (layer-2 address).

63
Q

What is HTTP and HTTPS?

A

The Hypertext Transfer Protocol (HTTP) is used on the Internet to allow clients to request web pages from web servers and to allow client interaction with those web servers. HTTP is a stateless protocol, meaning that the web servers are unaware of what a client has or has not requested and cannot track users who have requested specific content. This system does not allow for good interaction with the web server, but does allow for retrieving the HTML pages stored on web sites. To aid in tracking client requests, we use cookies—small files stored on the client computer that allow the web server to store data on the client that the client will send back with each request to the server.

The Hypertext Transfer Protocol, Secure (HTTPS) allows you to connect to a web site and to receive and send content in an encrypted format using Secure Sockets Layer (SSL). HTTPS is most commonly used on e-commerce sites to allow you to send personal information, especially credit card numbers and other confidential data, without worrying that an Internet hacker is viewing this information. You can determine when HTTPS is being used because the address of the web site starts with https:// and not http://, which marks the regular HTTP protocol. Another sign that HTTPS is in use: in Internet Explorer a lock appears in the status bar of a page—the lock is either closed or locked

Normally, HTTPS is not used for an entire e-commerce site because the encryption and decryption processes slow the connection time, so only the part of the site that requests personal information uses HTTPS.

64
Q

What is DNS?

A

The Domain Name System (DNS) service is used to convert fully qualified domain names (FQDNs) to IP addresses. When accessing Internet sites or servers on the Internet, you use names such as www.gleneclarke.com to connect to the system. Before a connection is attempted, your system queries a DNS server over UDP port 53 and asks the DNS server for the IP address of that system. Once your system has the IP address of the target system, it makes a connection to that system by using the IP address.

65
Q

What is Simple Mail Transfer Protocol?

A

The Simple Mail Transfer Protocol (SMTP) is used to send or route mail over a TCP/IP network such as the Internet. Most e-mail server products support SMTP (TCP port 25) in order to send e-mail out of the corporation and onto the Internet.

66
Q

What is Post Office Protocol 3?

A

The Post Office Protocol version 3 (POP3) is the Internet protocol used to retrieve e-mail from a mail server down to the POP3 client over TCP port 110. The e-mail is “popped” or downloaded to the client after the client has been authenticated to its mailbox. POP3 has limited capabilities as far as folder support is concerned. A POP3 client supports only an inbox, an outbox, sent items, and deleted items. If additional folder support is required, you would need to use an IMAP4 client.

67
Q

What is Internet Message Access Protocol 4?

A

The Internet Message Access Protocol version 4 (IMAP4) is another protocol similar to POP3 that allows clients to retrieve messages from a mail server using TCP port 143. IMAP4 allows additional folders other than the four basic ones provided with POP3. For example, you can use an IMAP4 client to connect to public folders stored on an Exchange Server.

68
Q

What is Simple Network Management Protocol?

A

The Simple Network Management Protocol (SNMP) is an Internet standard that provides a simple method for remotely managing virtually any network device that supports SNMP over UDP port 161. A network device can be a network card in a server, a program or service running on a server, or a network device such as a hub, switch, or router.

The SNMP standard defines a two-tiered approach to network device management: a central management system and the management information base (MIB) located on the managed device. The management system can monitor one or many MIBs, allowing for centralized management of a network. From a management system, you can see valuable performance and network device operation statistics, enabling you to diagnose network health without leaving your office.

The goal of a management system is to provide centralized network management. Any computer running SNMP management software is referred to as a management system. For a management system to be able to perform centralized network management, it must be able to collect and analyze many types of data, including the following:

–>Network protocol identification and statistics

–>Dynamic identification of computers attached to the network (referred to as discovery)

–>Hardware and software configuration data

–>Computer performance and usage statistics

–>Computer event and error messages

–>Program and application usage statistics

69
Q

What is File Transfer Protocol?

A

The File Transfer Protocol (FTP) is a TCP/IP protocol that exists to upload and download files between FTP servers and clients. Like Telnet and Ping, FTP can establish a connection to a remote computer by using either the hostname or the IP address and must resolve hostnames to IP addresses to establish communication with the remote computer.

When TCP/IP is installed on the system, an FTP utility is available, but a number of third-party graphical user interface (GUI) FTP clients are also available for all operating systems. If you use FTP a great deal, a GUI FTP client could save you a lot of time and frustration in dealing with FTP commands.

70
Q

What is Trivial File Transfer Protocol?

A

The Trivial File Transfer Protocol (TFTP) is a simple protocol compared with FTP and supports only reading and writing to files. TFTP does not support features such as listing directory contents or authentication. TFTP uses UDP as the transport protocol, and FTP uses TCP. TFTP is typically used to copy router and switch configuration from the device to the TFTP server over UDP port 69. TFTP can also be used to boot a device by loading the configuration that is stored on a TFTP server.

71
Q

What is Secure File Transfer Protocol?

A

The Secure File Transfer Protocol (SFTP) is an interactive file transfer protocol similar to FTP, but it encrypts all traffic between the SFTP client and the SFTP server. SFTP supports additional features such as public key authentication and compression. Unlike TFTP, SFTP does support a number of commands in its interactive shell such as listing directory contents, creating directories, downloading files, and uploading files.

72
Q

What is Telnet?

A

Telnet is a terminal emulation protocol that runs on TCP port 23 and allows a client to run or emulate the program running on the server. A number of devices allow you to telnet into the device and perform remote administration of the network device using the command set available to the telnet session.

73
Q

What is Secure Shell?

A

The Secure Shell (SSH) is a program used to create a shell, or session, with a remote system using a secure connection over TCP port 22. Once the remote session is established, the client can execute commands within this shell and copy files to the local system. The major purpose of SSH is to support remote shells with support for secure authentication and encrypted communication.

74
Q

What is Secure Copy Protocol?

A

The Secure Copy Protocol (SCP) is responsible for copying files from a remote server to the local system over a secure connection, ensuring that data in transit is kept confidential. A number of SCP products use an SSH connection to ensure the security of the secure copy operation.

75
Q

What is Network Time Protocol?

A

The Network Time Protocol (NTP) is used to synchronize the clocks of PCs on a network or the Internet. This is accomplished by configuring a server to be the time server, which then is the server from which all other PCs on the network synchronize their time.

On earlier Windows networks, you can manage time synchronization by placing a command in a logon script to synchronize the time on the client with the time server.

Newer Microsoft networks such as Active Directory networks have the PDC (Primary Domain Controller) emulator provide the time to all servers and clients automatically, so there is no need to create a logon script for the clients to synchronize the time with the time server. PDC emulators can also retrieve their time from Internet NTP servers.

Time servers on the Internet allow you to synchronize your PC’s clock with the exact time kept by atomic clocks. The time synchronization takes into account time zone settings of your operating system and allows you to synchronize with a time server even if it is not set for your local time zone.

76
Q

What is Lightweight Directory Access Protocol?

A

The Lightweight Directory Access Protocol (LDAP) is the TCP/IP protocol for directory service access that is supported by all the principal directory services such as Novell’s eDirectory and Microsoft’s Active Directory. LDAP is a protocol that allows LDAP clients to connect to the network database, or directory, and to query the database for information about its objects such as user accounts and printers. For example, a user on the network could find the phone number of another user by using the LDAP protocol.

LDAP is the industry-standard protocol for accessing a directory service and is supported by Active Directory and Novell’s eDirectory. LDAP uses TCP port 389 by default.

77
Q

What is NetBIOS?

A

Network Basic Input/Output System (NetBIOS) is an application programming interface (API) that is used to make network calls to remote systems and is used for session management functionality. NetBIOS is a session layer protocol that is installed with other routable protocols such as IPX/SPX or TCP/IP to allow NetBIOS traffic to travel across networks. NetBIOS has two communication modes:

Session mode:  Used for connection-oriented communication in which NetBIOS would be responsible for establishing a session with the target system, monitoring the session to detect any errors in transmission, and then recovering from those errors by retransmitting any data that went missing or was corrupt.

Datagram mode:  Used for connectionless communication in which a session is not needed. Datagram mode also is used for any broadcast by NetBIOS. Datagram mode does not support error detection and correction services, which are therefore the responsibility of the application using NetBIOS.

Microsoft uses NetBIOS names, also known as computer names, as a method of identifying systems on the network. A NetBIOS name can be a maximum of 16 bytes long—15 bytes for the name and 1 byte for the NetBIOS name suffix (a code at the end of the name representing the service running). The NetBIOS computer name must be unique on the LAN.

78
Q

What are Network Storage Protocols?

A

There are multiple protocols that allow a system to communicate with a disk storage device located on the network:

Fibre Channel:  A technology that transmits data of up to a projected 4 Gbps and uses special optical cables to connect the shared storage devices to servers.

iSCSI:  Internet Small Computer Systems Interface, an IP-based protocol used to communicate with storage devices. iSCSI traffic carries SCSI disk commands from a host to a storage device on the network. The benefit of iSCSI compared to Fibre Channel is that you do not require special hardware to connect to the shared disk solution; you can use your existing network infrastructure, along with iSCSI, to communicate with shared disks on the network.

FCoE:  Stands for Fibre Channel over Ethernet and is a protocol used to carry Fibre Channel commands over an Ethernet network in Ethernet frames. It is important to note that Fibre Channel runs at layer 2, so it is not routable across IP networks (whereas iSCSI is IP-based, so it is routable).

79
Q

What is IPv6 Addresses?

A

An IPv6 address is a 128-bit address that is displayed in the hexadecimal format and not in the dotted-decimal notation that is used by IPv4. The IPv6 address is divided into eight 16-bit groups, each separated by a colon (:). the IPv6 loopback address, 0:0:0:0:0:0:0:1.

An IPv6 address is not case-sensitive, and you do not need to place leading zeros at the beginning of the address when referencing a system that has leading zeros at the beginning. You can also replace consecutive zeros with double colons (::) when referencing an address that has a group of zeros in the address. For example, the loopback address in IPv6 is 0:0:0:0:0:0:0:1 and can be shortened to ::1, with the :: replacing all the consecutive zeros at the beginning of the address. This process is known as compressing zeros.

IPv6 uses three types of addresses—unicast, multicast, and anycast:

  • -> Unicast:  Used for one-to-one communication.
  • -> Multicast:  Used to send data to a group of systems.
  • -> Anycast:  Applied to a group of systems providing a service. Clients that send data to the anycast address could have the data sent to any of the systems that are part of the anycast address.

To make life more complicated, you should be familiar with different types of unicast addresses for the Security+ exam: global unicast, site-local unicast, and link-local unicast addresses handle different types of unicast traffic. Following is a quick breakdown of each of the different types of unicast addresses:
image Global unicast  A public IPv6 address that is routable on the Internet. The address assigned to the host must be unique on the Internet. This address type is equivalent to a public IP address with IPv4.
image Site-local unicast  A private address for the IPv6 protocol; the address always starts with FEC0. Assigning a site-local address to a system is equivalent to using a private address in IPv4 such as 10.0.0.0. The site-local address cannot be used to communicate off the local site or network and is not reachable by other sites or systems on the Internet.

Link-local unicast:  An address that is self-assigned and is used to communicate only with other nodes on the link. Link-local addresses always start with FE80. This address type is equivalent to an APIPA address with IPv4.

You should be familiar with two of the reserved addresses in IPv6: the loopback address, which is 0:0:0:0:0:0:0:1 (or ::1), and the address for a system with no address specified, 0:0:0:0:0:0:0:0 (or ::).

80
Q

IPv6 Protocols

A

The new version of IP is responsible for logical addressing and routing functions, as was IPv4. It is a connectionless protocol that relies on upper-layer protocols such as TCP to guarantee delivery.
ICMPv6  The ICMP protocol is responsible for error and status information as in IPv4, but it has been changed. ICMPv6 uses codes, while ICMPv4 used types and codes. For ICMPv6, each code indicates the type of message. Codes from 0 to 127 are used by error messages, while codes 128 to 255 are for information messages. For example, the echo request message is code 128 with ICMPv6, and the echo reply message is code 129.

ICMPv6 has expanded on its features from the ICMPv4 days. You should be familiar with the following two features of the ICMPv6 protocol:

Multicast Listener Discovery (MLD):  Replaces the multicast protocol in IPv4 known as Internet Group Management Protocol (IGMP) and is used for multicast communication

Neighboring Discovery (ND):  Replaces ARP from the IPv4 days by performing the same function, but it’s also responsible for neighboring router discovery, automatic address assignment, and duplicate address detection, to name a few features