Section 1 Flashcards
Network protocol
Set of rules used to exchange information
Topology
architecture used to connect the network equipment
explain token ring vs a ring or star network
token ring passes a “token” back and forth from one network device to the next ensuring an opportunity for each device to communicate
what are disadvantages of a token ring network
token pattern changes or device failure or disconnection will stop the token from circulating
what topology is most common in today’s LANs
Star
what is one difference between a hub and a switch
hub broadcasts data to all devices on network
What is the OSI model
Developed by ISO in 1984, contains 7 layers as a guide for connecting different types of networks
what are the three basic steps in isolating a network problem
- is the connection to the machine down?
- is the network down?
- is a service on a specific machine down?
which OSI layer uses binary transmission
physical
which OSI layer conains the MAC address
data
which OSI layer defines where routing occurs and uses IP addresses
networking
which OSI layer provides flow control and enables TCP/UDP connections
tranpsort
which OSI layer controls establishment management and termination of sessions
session
which OSI layer handles formatting and structuring of data
presentation layer
which OSI layer presents networking services to end users
application
what is encapuslation
the adding of data as it moves across OSI layers (i.e. header information)
bits are what OSI layer
physical
frames are what OSI layer
data
packets are what OSI layer
Network
segments are what OSI layer
transport
in what format is information on an ethernet network exchanged
frame
what cmd command would you use to get the mac address of a machine
ipconfig/all
difference between a router and a switch
router moves network traffic, switch connects devices on a network
what is stateful packet inspection
a firewall process that inspects incoming packets to ensure they correspond to an outgoing request
what is the process that assigns private IP addresses to individual devices on a private network
Network Address Translation
what is the process by which NAT translates the home network’s private IP to the single public address provided by the ISP
overloading
what ethernet protocol verifies communication between two ethernet devices have been 3established
link integrity test
what is a cross connected port
allows transmit and receive pairs in a RJ-45 connection
which command uses Internet control message protocol to verify networking devices are communicating
ping
what cmd command allows you to see devices on the network, see your own information, share, and stop network services
net
Which OSI layer combines messages or segments into packets
network
Which OSI layer is considered the media access control layer?
data layer
Which OSI layer is responsible for adding a header that includes routing information?
network
Which OSI layer is responsible for data compression and encryption?
presentation
Expand the acronym OUI. Where is the OUI used?
OUI stands for organizationally unique identifier. The OUI is found in the first 3 bytes of the MAC address.
Expand the acronym CSMA/CD. What protocol uses CSMA/CD
CSMA/CD stands for carrier sense multiple access with collision detection, and Ethernet uses CSMA/CD
What does the OUI represent?
The OUI identifies the manufacturer of the network device. First 3 bytes of mac address
a port on a hub or switch that can be used as either a cross-connected or straight-through input. It is used to connect multiple hubs/switches together.
uplink port
What do the link lights on a hub indicate
whether the transmit and receive pairs of the cable are properly aligned
What command would you use to ping 10.3.9.42 indefinitely
ping -t 10.3.9.42
OSI layer that handles error recovery, flow control (synchronization), and sequencing
data layer
OSI layer accepts outgoing messages and combines messages or segments into packets, adding a header that includes routing information
network layer
OSI layer that is concerned with message integrity between source and destination
transport
OSI Layer provides the control functions necessary to establish, manage, and terminate the connections
session
OSI Layer accepts and structures the messages for the application
presentation
IEEE
Institute of Electrical and Electronics Engineers - standards setting body
phsyical input/output interfaces to networking hardware
ports
OSI
Open Systems Interconnection
format that provides grouping of information for transmission
frame
the portion of an IP address that defines which network an IP packet is originating from or being delivered to
network number
The portion of an IP address that defines the location of a networking device connected to the network;
host number/address
verifies that messages are being delivered
ICMP internet control message protocol
a way of providing access to a network by giving each network device a fixed time interval to access the network.
deterministic
The minimum size of the data payload in an Ethernet frame is
46 bytes
what are RX and TX in ifconfig
Packets and errors received and Packets and errors transmitted
what network command used on linux and is used to configure the kernel network interfaces
ifconfig
which network command displays current route tables on a host
route
which network command displays current route tables on a host
route
which network command displays packets being transmitted over the network
tcpdump
which network command scans networks to find hosts and open ports, and helps determine what is deployed on a network
nmap
which network command displays information about a user or users on a remote system
finger
Which command should be run in Linux to ping an IP address 192.168.0.15 eight times before it automatically terminates the process?
ping -c 8
what is the difference between a ping flood and a smurf attack`
ping flood is forged source packets from one computer, smurf specifies the victim’s computer as source address on network
at what OSI layer/s does a packet filter operate on
Transport and Network
a device that operates as a middleman between two or more systems to help conceal the true identity of the client and server
circuit-level gateway
allows a firewall to identify traffic as conversational and automatically create temporary firewall rules to permit the response traffic to flow back to the sender
stateful inspection
what layer/s does a stateful firewall operate at
Session, Transport, Network
what is tap mode
attach to a network in listening mode only
802.3 Ethernet and 802.11 Wi-Fi are at what OSI layer
Data link
a radio jammer attack occurs at which OSI layer
1
ARP poisoning is on which OSI layer
2
this attack sends special ethernet frames over the network to overwhelm the switch’s internal traffic handling database
ARP Poisoning
attack which sends pings to a arge number of IP addresses to detect which computers are online and may, therefore, be susceptible to other attacks.
ping sweep
attack which impersonates a computer’s IP or MAC address
spoofing
which OSI layer allows computers to differentiate between the connections within a service on the same host
Session
remote procedure call (RPC) operates at what layer
Session
encoding and decryption of end user data occurs at which layer
Presentation
TLS and SSL operate at which layer
Presentation
man in the middle attacks occur at which layer
Presentation
http is at which layer
application
vulnerability scanners work best at what level
application
vlan hopping is a vulnerability at which layer
data link
AES-256 is a common example of what kind of encryption
symmetric encryption
https/TLS is a common example of what kind of encryption
asymmetric encryption
creates a secure channel over the internet between a client computer and a server by exchanging a public key in the form of a certificate.
TLS
gives WPA a significant security boost by generating a new 128-bit encryption key for every packet sent on the network.
temporal key integrity protocol (TKIP)
provides network access control at the port level, whether physical or wireless, and it provides an authentication standard based on the Extensible Authentication Protocol (EAP)
802.1x security standard
what is AAA
authetnication, authorization, and accounting
which command defines the path a data packet takes in a network
route
which command lets you find an ip from a domain name
nslookup
which command displays info about active ports
netstat
a switch operates at what OSI layer
Data link and network
a modem operates at what OSI layer/s
physical and data link