Networking Final Flashcards

1
Q

Give the order of the OSI model (top to bottom)

A

Application
Presentation
Session
Transport
Network
Data Link
Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Application layer and give an example

A

Completes an identification of communication partners, provides resources, and synchronizes communications

Set of protocols and services to access resources

Example: http

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Presentation layer and give an example

A

Designed to identify the type of information being sent/received

Example: PDF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Session layer and give an example

A

Establishes and teardown of a session

Determines if data is local or remote

Checkpoint so only the data sent after a network failure needs to be resent

Implements Class of Service

Example: FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Transport layer and give an example

A

Responsible for mechanics of setup, teardown, and maintenance of a session

Encapsulate data into packet

Provides reliable or unreliable delivery of data
(Reliable requires a check after each data packet is sent, unreliable does not require a check after sending)

Example: TCP, UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Network Layer and give an example

A

Connections between hosts on different networks

Defines local topology of a network

Find the logical path from source to destination

Relies on IP addresses (32 bit and 128 bit)

Routers operate on this layer (Network info updated to reflect state of network, Information stored in the routing table, used for traffic encryption)

Example: IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Data-Link Layer and give an example

A

Uses MAC addresses

Defines mechanics of physical communication

4 types of data type:
Unicast - One destination
Broadcast - Everyone on the broadcast domain
Multicast - Groups of destinations
Anycast - Data sent to receiver closest in network

Switches implemented on this layer

Ethernet and wifi for protocols

Communicate between nodes within a local layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Physical layer and give an example

A

Wiring

Hub acts as a physical connection

Booster will reproduce and boost the signal, increasing the maximum length

Example: Cat 5, Fibre Optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Class of Service

A

Method of managing traffic in a network grouping similar types of traffic together and treating type as a class with its own level of service priority

Does not guarantee a level of service (bandwidth and delivery of time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Quality of Service

A

Provide priority for certain types of data (i.e video transmission gets priority over file transfer)

Manages reliability, delay, jitter, bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a router

A

Passes information between networks

The router calculates how to send packets of data between networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a switch

A

Reads MAC addresses

Multiple devices can talk at once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a hub

A

Signal repeated everywhere, talk and everyone hears it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a bridge

A

Bridge collects information from devices in a network to determine most efficient path for data transfer without having to send to every device in the network

Only one device can talk at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does RAID stand for

A

Redundant Array of Independent Disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What methods are used to distribute data in a RAID system

A

Striping- The process of storing consecutive segments of data across different storage devices, and allows for better throughput and performance.

Parity Bits- Write parity into a drive, allows to rebuild data if a disk fails.

Mirroring- the replication of data across two or more disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What RAID system does CMS use and what methods does that RAID use

A

RAID 5, Striping and parity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Recall the Ethernet naming convention

A

Physical mediums:
T - Twisted Pair
F - Fibre Optic
S - Short range fibre
L - Long range fibre
K - Copper backplane
C - Balanced copper cable
B - Two wavelengths over a single optical cable
S - short-range multi-mode optical cable
L - long-range single/multi-mode optical cable
E - extended range optical cable
Z - long-range single-mode cable at high wavelength

Frequencies:
BASE - Baseband, single signal on cable
BROAD - Broadband, can have multiple signals on same channel
PASS - Passband, Wireless comms

Lanes:
1 - serial
4 or 10 - copper wire

Encoding:
X - 4B/5B Block coding for fast ethernet or 8B/10B block coding for gigabit ethernet
R - 64B/66B block coding

10Base2 - Thinnet
10Base5 - Thicknet

19
Q

Draw thinnet coax cable

A

Look it up I can’t insert photos :(

20
Q

Draw thicknet coax cable

A

Look it up I can’t insert photos :(

21
Q

Draw fibre optic cable

A

Look it up I can’t insert photos :(

22
Q

Bandwidth vs. throughput

A

Bandwidth - Amount of packets/data that can be transmitted over a network or communication channel in a given period of time

Throughput - actual amount of data that is transmitted over a network or communication channel in a given period of time

23
Q

What is latency

A

Network latency is the delay in network communication. It shows the time that data takes to transfer across the network. Networks with a longer delay or lag have high latency, while those with fast response times have low latency.

24
Q

What is jitter

A

jitter is a variance in latency, or the time delay between when a signal is transmitted and when it is received

25
Q

Lossy vs. Lossless data compression

A

Lossless - Group patterns together and repeat them to shrink packet size (chair in a white background example from class)

Lossy - Lose quality to shrink file size

26
Q

What is packet shaping

A

Delay certain types of packets so that other packets can get higher speed

27
Q

What is caching

A

storing copies of files in a cache, or temporary storage location, so that they can be accessed more quickly [i.e you want to re-visit a website you just closed]

28
Q

What is a firewall

A

Used to filter traffic and lower the risk of malicious packets traveling over the internet

29
Q

What is a VPN (Virtual Private Network)

A

an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely.

30
Q

What is tunneling

A

Tunnels are a method for transporting data across a network using protocols that are not supported by that network. Tunneling works by encapsulating packets: wrapping packets inside of other packets

Use with VPNs.

31
Q

What is a hash function

A

A function used to map data to a fixed size

Use a hash table to provides fast lookup of data

32
Q

What is symmetric encryption

A

Both sender and receiver of info have same key

33
Q

What is asymmetric encryption

A

Sender and receiver have different keys (public vs. private keys)

Public key given to public to encrypt information to send to you

Private key can decrypt information

Private key linked mathematically to private

34
Q

What are the types of symmetric encryption

A

Data Encryption Standard - breaks up data into small chunks to encrypt using a key, NOT computationally secure

Advanced Encryption Standard - computationally secure, 128 bits

35
Q

What are digital signatures

A

Verify senders’ identity

Private key encryption, anyone with public key can verify who signed the message

36
Q

What is the Diffie-Hellman algorithm

A

Exchange crypto keys over a public network

At end of communication both parties have the same key

Study slides for actual algorithm can’t add pics and too lazy to type out

37
Q

What is the goal of cybersecurity

A

Confidentiality, integrity, availability, non-repudiation

38
Q

What is a cyber attack

A

An attack is any attempt to expose, alter, disable, destroy, steal or gain access to an asset

39
Q

What is the cyber killchain

A

Steps are as follows:
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and Control
Actions on objectives

To be successful in a cyber attack, must follow the kill chain stpes

40
Q

Syntactic vs. Semantic attacks

A

Syntactic - straightforward attack, uses malicious software (viruses, worms, trojan)

Semantic - Trick user into carrying out an action (user installs anti-virus that’s actually remote access application)

41
Q

Virus vs. Worm vs. Trojan

A

Virus - replicates itself by modifying other computer programs and inserting its own code

Worms - Spread by exploiting vulnerabilities in operating systems , spread across a network

Trojans - Malware that misleads users of its true intent

42
Q

What is Tempest

A

Telecommunications Electronics Materials Protected from Emanating Spurious Transmissions

Certification to equipment for EMI protection

Level I - Stringent
Level II
Level III - Relaxed

43
Q

Thin client vs. Thick client

A

Thin client - Computer system that runs on a server-based computing environment, connects to a remote server where applications and data is stored

Thick client - System that can be connected to the server without the network, have own OS and software applications