Networks Flashcards

1
Q

Name the two types of Networking Conceptual Models

A

OSI “Open System Interconnect” and TCP/IP “ Transfer Control Protocol/ Internet Protocol”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the layers present in the OSI model

A
  1. Application
  2. Presentation
  3. Session
  4. Transport
  5. Network
  6. Data link
  7. Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name the layers included in the TCP/IP model

A
  1. Application
  2. Transport
  3. Internet
  4. network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the Application level do??

A

Computer Interaction level in which the user can interact with the data present.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the Presentation level do??

A

“Compression/ Decompression”

Data encryption change data packets into a useable format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the Session level do??

A

“Timing”

Maintains the connections, and is responsible for controlling the parts/ sessions. Makes sure the data can get accessed by the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the Transport level do??

A

Transmits data using transmission protocols including TCP and UDP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the Network Link level do??

A

Defines the path that the data will take.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the Data Link level do??

A

Defines the format of data on the network.

E.g. JPEG or GIF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the Physical level do??

A

Transmits raw bit data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What Layers make the data into Packets or Streams??

A
  1. Transport Layer
  2. Network Link
  3. Data Link Level
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define “Vulnerability”

A

A weakness a system already has.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define “Threat”

A

Something that could happen because of a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name the most important IP addresses

A

FTP Data: 20
FTP Control: 21
HTTP: 80
HTTPS: 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a “Port Number”??

A

A set of numbers that defines a software or protocol.
E.g. 80 for HTTP

It tells a Computer what Application to send the data too.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an “IP Address”??

A

A set of numbers that define a Server or Device.

It tells a Network to connect to a specific device.

17
Q

List the features of a Firewall

A
  1. Network Security System
  2. It creates a barrier for personal devices
  3. They filter legitimate data from Mal. data
  4. Doesn’t work with encrypted data
  5. Can be Hardware and Software
18
Q

What is a “Proxy Server”??

A

Servers that can confuse harmful data. It does this by performing fake actions.

Like a Server Cloak.

19
Q

List some Network Vulnerabilities

A
  1. Hackers can see what ports are being most used E.g. Port 80, then it can be attacked
  2. External Storage Devices can be used to bring Mal. code into a network.
  3. Ports can be Open and Unsecure, meaning all ports are at risk of being hacked. A Firewall can block any unused ports to increase security.
20
Q

Define “Network Access Control” (NAC)

A

A set of instructions/ protocols that define how devices need to act on a network.

21
Q

How is NAC implemented??

E.g. What questions are asked??

A
  1. What Device is it??
  2. What Software or Applications have been Downloaded onto the device??
  3. Where is the device Located??
  4. Who has Access to that device??
22
Q

Define “Principle of Least Privilege”

A

A user can join a Network, but that are given very limited accessibility and actions.

23
Q

Define “Mandatory Access Control”

A

Anyone that has joined a Network can only access data if they have appropriate clearance.

24
Q

Define “Discretionary Access Control”

A

A user that joins a Network will need the Data Owners permission to access a specific file.

25
Q

Define “Role-Based Control”

A

Only certain Permissions are given to a specific user/ group on a Network.

26
Q

Define “Rule-Based Control”

A

A set of Permissions that are Condition-Specific.

E.g. Certain times of day.

27
Q

Define “Data Access Control” (DAC)

A

After a device has joined a Network, a DAC must give the appropriate Permissions.

28
Q

Define “Packet Filtering”

A

The firewall inspects the Packet coming into the network. If the Packet is flagged, then it is NOT authorised.

29
Q

Define “Application Level”

A

“Application Level” controls the packets coming in and out of an application.

30
Q

Define “Inbound - Outbound”

A

Set of rules a packet must follow when entering or exiting a network/ application.

31
Q

_____ “Allow the traffic through”

A

Accepted

32
Q

_____ “Dropped with the ‘Unreachable’ reply”

A

Rejected

33
Q

_____ “Dropped with no reply”

A

Dropped