OSI Model & TCP/IP Flashcards

1
Q

Q1: What does the Physical Layer (Layer 1) of the OSI model do?

A

A: It is responsible for the transmission of raw bits over a physical medium (e.g., cables, Wi-Fi). This layer includes hardware like hubs, cables, and repeaters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q2: Name three devices that operate at the Data Link Layer (Layer 2).

A

A: Switches, bridges, and network interface cards (NICs). They handle MAC addressing and frame transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q3: What protocol is primarily used at the Network Layer (Layer 3)?

A

A: IP (Internet Protocol). It is responsible for routing packets between devices across different networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q4: What are the responsibilities of the Transport Layer (Layer 4)?

A

A: It ensures reliable data transfer, error detection, and flow control. Key protocols include TCP (connection-oriented) and UDP (connectionless).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q5: How does the Session Layer (Layer 5) differ from the Transport Layer (Layer 4)?

A

A: The Session Layer manages sessions between applications, such as starting, maintaining, and terminating communication, while the Transport Layer ensures reliable delivery of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q6: HTTP is an example of what Layer protocol?

A

A: Application Layer (Layer 7) protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q7: What is the purpose of Layer 6 (Presentation Layer)?

A

A: It translates data between the application and the network, ensuring data formats like encryption, compression, and encoding are handled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Q8: What layer would you troubleshoot if a file download is failing due to corrupted data?

A

A: Layer 4 (Transport Layer) because it is responsible for error detection and data reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Q9: What is encapsulation in the OSI model?

A

A: It is the process of adding headers and sometimes footers to data as it moves through the layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Q10: Which layer of the OSI model is responsible for MAC addresses?

A

A: Data Link Layer (Layer 2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Q11: Which layer of the OSI model is responsible for routing packets between networks?

A

A: Network Layer (Layer 3). Routers operate at this layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Q12: How does the Presentation Layer (Layer 6) support encryption?

A

A: It handles encryption and decryption to ensure secure communication between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Q13: What devices operate at the Physical Layer (Layer 1)?

A

A: Hubs, cables, and network interface cards (NICs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q14: Why is the Application Layer (Layer 7) crucial for user interaction?

A

A: It provides network services directly to user applications, enabling communication such as email and web browsing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Q15: What is the primary purpose of Layer 2 switching?

A

A: Forwarding frames based on MAC addresses within a local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Q16: How does the OSI model assist in troubleshooting?

A

A: By isolating issues to specific layers, such as checking physical connectivity at Layer 1 or routing at Layer 3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Q17: What does segmentation mean in the Transport Layer (Layer 4)?

A

A: It involves dividing data into smaller packets for transmission and reassembling them at the destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Q18: How does the Network Layer (Layer 3) handle routing?

A

A: It uses routing protocols (e.g., OSPF, BGP) to determine the best path for packets between networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Q19: What is the difference between broadcast and unicast at Layer 2?

A

A: Broadcast sends data to all devices in a network, while unicast sends data to a specific device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Q20: What type of address is used at Layer 2?

A

A: MAC addresses are used to identify devices within the same network segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Q21: What are the layers of the TCP/IP model?

A

A: Application, Transport, Internet, and Network Access (or Link).

22
Q

Q22: How does the Application Layer in TCP/IP differ from the OSI model?

A

A: The TCP/IP Application Layer combines the functionality of the OSI Application, Presentation, and Session layers.

23
Q

Q23: What protocols operate at the Internet Layer of the TCP/IP model?

A

A: IP (Internet Protocol), ICMP (Internet Control Message Protocol), and ARP (Address Resolution Protocol).

24
Q

Q24: Compare TCP and UDP at the Transport Layer.

A

A: TCP provides reliable, connection-oriented communication (e.g., HTTP), while UDP is connectionless and faster but less reliable (e.g., DNS, video streaming).

25
Q

Q25: What is the role of the Network Access Layer in TCP/IP?

A

A: It handles physical hardware and protocols required to transmit data over a network.

26
Q

Q26: Which protocol is used for routing packets in the TCP/IP Internet Layer?

A

A: IP (Internet Protocol). It routes packets based on IP addresses.

27
Q

Q27: What is the purpose of DNS in the Application Layer?

A

A: It resolves human-readable domain names (e.g., www.google.com) into IP addresses.

28
Q

Q28: How does the Transport Layer ensure data reliability?

A

A: By using mechanisms like acknowledgments, retransmissions, and flow control.

29
Q

Q29: What is the function of ARP in the TCP/IP model?

A

A: Address Resolution Protocol maps IP addresses to MAC addresses for local network communication.

30
Q

Q30: What is SMTP and what layer is the proctocol in TCP/IP model?

A

A: SMTP (Simple Mail Transfer Protocol) is an example of an Application Layer protocol used for email

31
Q

Q31: Why is the Internet Layer essential in the TCP/IP model?

A

A: It ensures packets are routed across multiple networks to reach their destination.

32
Q

Q32: What is the primary difference between IPv4 and IPv6?

A

A: IPv4 uses 32-bit addressing, while IPv6 uses 128-bit addressing to support more devices.

33
Q

Q33: Which protocol uses port 443?

A

A: HTTPS (Hypertext Transfer Protocol Secure).

34
Q

Q34: What is the three-way handshake in TCP?

A

A: It is a process to establish a reliable connection between two devices using SYN, SYN-ACK, and ACK packets.

35
Q

Q35: What is ICMP used for in the Internet Layer?

A

A: ICMP is used for diagnostic and error-reporting purposes, such as in ping requests.

36
Q

Q36: What is the difference between a subnet mask and an IP address?

A

A: An IP address identifies a device on a network, while a subnet mask defines the network’s size and range.

37
Q

Q37: What is the role of DHCP in the Application Layer?

A

A: DHCP assigns IP addresses dynamically to devices on a network.

38
Q

Q38: How does NAT work in the Internet Layer?

A

A: NAT translates private IP addresses to a public IP address, allowing devices on a private network to access the internet.

39
Q

Q39: What is a common use of port 22?

A

A: Port 22 is used by SSH (Secure Shell) for secure remote login.

40
Q

Q40: How does a firewall inspect traffic at the Transport Layer?

A

A: It examines TCP/UDP ports to allow or block specific types of traffic.

41
Q

Q41: Which OSI layer is most relevant for analyzing network traffic with Wireshark?

A

A: Layers 2-4 (Data Link, Network, and Transport Layers). These layers show MAC addresses, IPs, and ports, respectively.

42
Q

Q42: What is the importance of ports in the TCP/IP model?

A

A: Ports identify specific processes or services (e.g., HTTPS on port 443, DNS on port 53) for data communication.

43
Q

Q43: How would you identify a DDoS attack using the OSI model?

A

A: Look for excessive traffic or anomalies at Layers 3 and 4, focusing on IP addresses (Network Layer) and ports (Transport Layer).

44
Q

Q44: Why is it important to know the difference between TCP and UDP for a SOC analyst?

A

A: To understand the type of communication a protocol uses and identify anomalies (e.g., excessive UDP traffic could signal a DDoS attack).

45
Q

Q45: What layer of the OSI model would you investigate for VLAN hopping attacks?

A

A: Layer 2 (Data Link Layer), since VLANs are defined and managed here.

46
Q

Q46: How does SSL/TLS operate in the OSI model?

A

A: It operates at Layer 6 (Presentation Layer) to encrypt data.

47
Q

Q47: What tool can you use to monitor TCP/UDP connections on a system?

A

A: Netstat or Wireshark.

48
Q

Q48: Which TCP/IP layer is responsible for ensuring packets arrive in order?

A

A: Transport Layer, specifically with TCP.

49
Q

Q49: How do firewalls relate to the OSI model?

A

A: Firewalls typically operate at Layers 3 (Network Layer) and 4 (Transport Layer) to filter traffic.

50
Q

Q50: Why are logs from Layer 4 useful for a SOC analyst?

A

A: They provide information about port usage and help detect unauthorized services or anomalous traffic.