Networking Fundamentals Flashcards

1
Q

Fundamentals

Framework that the major n/w and s/w components can be placed to give every item a common reference point

A

Open systems Interconnection Model
(OSI) model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Fundamentals

OSI Layer 7 -
Application

A

APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fundamentals

OSI Layer 6 -
Data conversion

A

Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fundamentals

OSI Layer 5
Sessions tracking/naming

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fundamentals

OSI Layer 4
End-to-end communication

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fundamentals

OSI Layer 3
Router
Ip addresses
Internet protocols

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fundamentals

OSI Layer 2
Switch

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fundamentals

OSI Layer 1
Cables
Wierless
NIC

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fundamentals

What happens to frames at layer 1

A

they are turned into 1s and 0z and transmitted as bits and bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fundamentals

sublayer of the Data Link Layer is responsible for flow control and error management functions, which were used in the past by now obsolete protocols. It was also used to multiplex protocols, when IP wasn’t the end-all-be-all protocol as it is today. You’ll only see the 802.2 LLC header today for management protocols, like VTP (VLAN Trunking Protocol), CDP (Cisco Discovery Protocol), and STP (Spanning Tree Protocol).

A

Logical Link Control (LLC)

LLC Sublayer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fundamentals

sublayer is responsible for addressing network devices by using the physical address—that’s the MAC address burned in to the ROM chip of each NIC. The physical address for both the sending and receiving devices are placed in the Layer 2 frame header. This layer also adds and verifies the FCS.

A

Medium/Media Access Conrol (MAC)

Mac sublayer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fundamentals

These do not exist at any other layer and should not be stated as
“Ethernet packet”
“TCP packet”
“UDP Packet”

A

IP packets only exist on layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fundamentals

data from OSI layers 7 through 5 is encapsulated into a TCP segment or UDP datagram at

A

Layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fundamentals

The segment or datagram is encapsulated in an IP packet at

A

Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fundamentals

IP packet is encapsulated inside a frame at

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fundamentals

Frames are transmitted as 1s and 0s at

A

Layer 1

17
Q

Fundamentals

TCP flag is a relic of the past and is not really used by modern protocols. It used to be a way to tell a destination system to prioritize data in a segment, at a location specified by the Urgent Pointer field in the TCP header.

A

URG

18
Q

Fundamentals

TCP flag used to tell the sending system to push the data down and out immediately without waiting for a buffer to accumulate (which would normally happen for efficient data transfer when many TCP segments are sent), as well as to tell the receiving system to push the received data up to the receiving application without waiting for a buffer to accumulate (which would normally happen for efficient data transfer when many TCP segments are received). The PSH flag is used at the end of an HTTP or TLS session, when there’s no more data to be sent or received, as well as during an SSH session, where the keystrokes need to be sent immediately to a remote system, in addition to other instances. Without the PSH flag there could be significant latency, making the communication unbearable.

A

PSH

19
Q

Fundamentals

TCP flag is used to tear down an established TCP connection in a similar fashion to the way that the SYN flag is used to establish the connection. The teardown process uses four steps (two separate two-way handshakes), unlike the TCP three-way handshake, which uses three steps. First, the side that starts the TCP connection termination (also known as the TCP teardown) sends a TCP segment with the FIN flag set. Second, the other side sends a TCP segment with the ACK flag set. Third, the same side that sent the segment with the ACK flag set in the second step now sends another segment, this time with the FIN flag set. Fourth, the side that started the teardown sends a segment with the ACK flag set.

Sequence and acknowledgment numbers are used here as well. The sequence numbers pick up from where they were at the end of the data exchange process, and the acknowledgment numbers increment the sequence numbers sent with the FINs by 1.

A

FIN

20
Q

Fundamentals

TCP connection can be terminated gracefully with the FIN flag from each side or abruptly with the RST flag. Reasons for sending an RST to abort a connection include receiving an invalid header, not having enough resources present to support the connection, not receiving any response from the other side, and even optimizing—getting rid of the other side as quickly as possible instead of a graceful close with FINs that take more time and resources.

A

RST

21
Q

Fundamentals

Unskilled attackers pester real security folks

A

URG, ACK, PSH, RST, SYN, FIN)

22
Q

Fundamentals

Maximum transmission unit (MTU) of Ethernet is

A

1500 bytes

23
Q

Fundamentals

if a packet exceeds 1500 bytes - consisting of an IP header and data

A

cant be placed inside of an Ethernet fram.

24
Q

Fundamentals

Fragments of the same packet are linked together with the same value that acts as a label to group frames togehter

A

Identification (2-byte value)

25
Q

Fundamentals

field consists of Reserved bit (always 0), Don’t Fragment (more on this in a bit—pun intended), and More Fragments (all fragments but the last will have a value of 1, indicating to the destination that more fragments are on the way).

A

Flags (1-bit values)

26
Q

Fundamentals

This field helps the destination put received fragments in order. The first fragment offset is 0, and each subsequent offset increases by the size of the previous fragment. For example, fragments in a sequence could have offsets of 0, 1480, 2960, and 4440. These numbers allow the fragments to be reassembled, like puzzle pieces, should they arrive in nonsequential order (which is common).

Path MTU Discovery, described in RFC 1191, takes a different approach. Imagine the path between a Web server and Web client has an MTU of 1000 between two routers. The Web server would send 1500 bytes in a single packet, which would be fragmented into two packets, and then reassembled at the destination. When routers fragment packets and when hosts reassemble fragments, this creates latency. A Web server and Web client would both prefer to cut down on the latency.

A

Fragment offset (2-byte value)

27
Q

Fundamentals

This flag starts off the TCP three-way handshake

A

The SYN (Synchronize) fla