OSI and TCP/IP Models Flashcards

4.1.1 Study Guide

1
Q

What are the OSI Layers

A

Physical
Data Link
Network
Transport
Session
Presentation
Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What happens at the physical layer

A

Converts a frame into bits for transmission/receiving over the physical connection medium.
Network hardware devices that function at layer 1 include NICs, hubs, repeaters, concentrators, amplifiers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are physical layer protocol data unit (PDU)

A

Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are common physical layer protocols

A

Electrical signal (copper wire)
Light Signal (optical fibre)
Radio Signal (air)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some physical network topologies

A

Ring
Bus
Star
Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are physical layer attack vectors

A

Passive sniffing
Excessive Electrical Interference
Cutting a cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens at the Data Link Layer

A

Responsible for formatting a packet for transmission
Adds the source and destination hardware address to the frame
Address Resolution Protocol (ARP) operates at layer 2
Switches and Bridges function at this layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What sublayers of Data Link Layer

A

Logical Link Control (LLC)
Media Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the Logical Link Control do?

A

Controls packet synchronization, flow control, and error checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the Media Access Control do?

A

It controls how devices on a network gain permission to transmit data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are common Data Link Layer protocols

A

MAC, ARP, Ethernet 802.3 (Wired)
LLDP, HDLC, PPP, DSL, IEEE 802.11(Wireless), SONET/SDH, VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Data Link Attack Vectors

A

Address Resolution Protocol spoofing
Man in the Middle Attack
Session Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens at the Network Layer

A

Responsible for logical addressing Providing routing or delivery guidance (not necessarily verifying guaranteed delivery)
Manages error detection and traffic control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are common Network Layers protocols

A

IPv4
IPv6
IPSec
OSPF
EIGRP
ICMP
RIP
NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Network Layer Attack Vectors

A

Man in the Middle Attack
Denial of Service
Spoofing IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What happens at the Transport Layer

A

Responsible for managing the integrity of a connection and controlling the session. Providing transparent data transport and end to end transmission control
Defines session rules like how much data each segment can contain, how to verify message integrity, and how to determine whether data has been lost
Segmentation, sequencing, and error checking happen on this layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are common Transport layer protocols

A

TCP
UDP
SSL
TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are Transport layer attack vectors

A

SYN Flood Attack
Trojans and other malware tend to target specific TCP and UDP ports
Session Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What happens at the Session Layer

A

Responsible for establishing, maintaining, and terminating communication sessions between two computers
Uses data streams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the 3 communications session phases

A

Connection establishment
Data Transfer
Connection release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are common Session layer implemenations

A

RPC
NFS
SMB
NetBIOS

22
Q

What are Session Layer attack vectors

A

Protocols such as NFS and NetBIOS may be vulnerable to DoS and root privilege attacks

23
Q

What happens at the Presentation Layer

A

Responsible for transforming data into format that any system following the OSI model can understand
Uses data streams

24
Q

What are Presentation Layer tasks

A

data representation
character conversion
data compression
data encryption

25
Q

What are common Presentation layer implementations

A

Encryption protocols and Format types like
ASCII
EBCDICM
TIFF
JPEG,
MPEG
MIDI

26
Q

What are Presentation Layer Attack Vectors

A

Crytanalytic Attacks such as
Brute Force
Ciphertext Only
Know Plaintext
Frequency Analysis

27
Q

What happens at the Application Layer

A

Interfacing user applications, network services, or the Operating system with protocol stack
Identifying and establishing availabilty of communication partners
Determining resources availability
Synchronizing communication
Uses data streams

28
Q

What are common Application Layer implementations

A

HTTP
FTP
LDAP
Telnet

29
Q

What are the TCP/IP Layers

A

Link Layer (Physical and Data Link)
Internet Layer (Network)
Transport Layer (Transport)
Application Layer (Session, Presentation, and Application)

30
Q

What is the Protocol Data Unit (PDU) at the Data Link Layer

A

Frames

31
Q

Routing Protocols

A

Move routed protocol messages across a network.
Defined at the Network Layer and specify how routers communicate
Can be static or dynamic and categorized as interior or exterior
Include Internetwork Packet Exchange (IPX) and Internet Protocol (IP)

32
Q

Static Routing Protocol

A

Requires an admin to create/update routes on the router

33
Q

Dynamic Routing Protocol

A

Can discover routers and determine best route to a given destination
Routing table is periodically updated

34
Q

Distance Vector Router Protocol

A

An interior router protocol that makes routing decisions based on distance (hop count), and vector (router egress interface)

35
Q

Examples of Distance Vector routing protocol

A

Routing Information Protocol (RIP): uses hop count as it routing metric
Interior Gateway Routing Protocol (IGRP)
Enhanced Interior Gateway Routing Protocol (EIGRP)

36
Q

Link State Routing Protocol

A

An interior routing protocol that uses router characteristics(e.g. speed, latency, error rates) to make next hop routing decisions

37
Q

Examples of Link State routing protocols

A

Open Shortest Path First(OSPF) an interior gateway routing protocol developed for IP networks based on shortest path first or link state algorithm.
Intermediate System to Intermediate System (IS-IS)

38
Q

Interior Routing Protocol

A

As called “myopic” make next hop decisions based only on info related to the next immediate hop

39
Q

Exterior Router Protocols

A

As called “far-sighted” makes hop decisions based on the entire remaining path (i.e.) vector

40
Q

Border Gateway Protocol (BGP)

A

an exterior/path vector protocol

41
Q

Transmission Control Protocol (TCP)

A

Major transport protocol in the internet suite of protocols. Provides reliable, connection oriented, full duplex streams.
Use 3 way handshake: Synchronize (SYN), synchronize-acknowledge (SYN-ACK), and acknowledge(ACK)

42
Q

User Datagram Protocol (UDP)

A

Connectionless protocol that provides fast, best effort delivery of datagrams(self-container unit of data)

43
Q

What is the Protocol Data Unit (PDU) at the Transport Layer

A

Segments

44
Q

What is the Protocol Data Unit (PDU) at the Network Layer

A

Packets

45
Q

Simplex

A

A one way connection establishment in the session layer

46
Q

Half Duplex

A

A connection establishment in the session layer where both communication devices can transmit/receive but not at the same time

47
Q

Full Duplex

A

A connection establishment in the session layer where both communication devices can transmit/receive at the same time

48
Q

What is the Protocol Data Unit (PDU) at the Session Layer

A

Data

49
Q

What is the Protocol Data Unit (PDU) at the Session Layer

A

Data

50
Q

What is the Protocol Data Unit (PDU) at the Application Layer

A

Data