Section 1: Networking Concepts Flashcards

1
Q

What is Layer 1 in the OSI Model and what does it do?

A

Physical layer

How data travels physically by using cables etc

Cables, fiber, and the signal iteself

It involves hardware elements such as cables, switches, and electrical signals 4that transmit raw data bits over a network. It is how data physically travels from one device to another (through wires, fiber optics or radio waves).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Layer 2 in the OSI Model and what does it do?

A

Data Link Layer

How data moves between devices on the same network

Frame, MAC address, Extendted Unique Identifier (EUI-48, EUI-64, Switche

It uses MAC addresses to identify devices on the local network and helps prevent data collision by managing how multiple devices share the same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Layer 3 in the OSI Model and what does it do?

A

Network Layer

Decides where traffic goes and how it gets there

IP Address, Router, Pakcet

It uses IP address to identify devices and routers to forward data along the best route.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Layer 4 in the OSI Model and what does it do?

A

Transport Layer

Ensures reliable data transfer, error checking and flow control

TCP segment, UDP datagram

It uses protocols like TCP (for reliable, ordered delivery) and UDP (for faster, unordered delivery) to manage how data is sent and received, ensuring complete and accurate communication between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Layer 5 in the OSI Model and what does it do?

A

Session Layer

Keeps track of active connections between devices

Control Protocols and tunnelling protocols

It keeps connections organized and on track, making sure devices can pick up where they left if needed. Control Protocols and tunnelling protocols use this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Layer 6 in the OSI Model and what does it do?

A

Presentation Layer

Makes data readable

Application encryption (SSL/TLS)

Responsible for formatting and translating data so the application layer can understand it. It handles data encryption, compression, and conversion between different formats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Layer 7 in the OSI Model and what does it do?

A

Application Layer

The layer we see

Your eyes

Common protocols at this layer include HTTP, FTP, DNS, POP3 and many others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Router and what layer of the OSI model does it operate at?

A

Purpose: Routes traffic between IP subnets.

OSI Layer: Layer 3 (Network Layer).

Connections: Connects diverse network types (e.g., LAN to WAN) using copper or fiber cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Switch and what layer of the OSI model does it operate at?

A

Purpose: Forwards data using MAC addresses.

OSI Layer: Layer 2 (Data Link Layer).

Technology: Uses hardware bridging (ASIC - Application-Specific Integrated Circuit).

Design: Typically has many ports and advanced features for network connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Firewall and what layer of the OSI model does it operate at?

A

Purpose: Filters traffic by port number or application.

Security: Encrypts traffic with VPNs between sites.

OSI Layer: Often operates at Layer 3 (can function as a router).

Features: Supports NAT (Network Address Translation) and dynamic routing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is IDS / IPS?

A

IDS (Intrusion Detection System): Monitors and alerts on suspicious activity.

IPS (Intrusion Prevention System): Blocks threats before they enter the network.

Purpose: Protects the network from unauthorized or malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Load Balancer?

A

Purpose: Distributes traffic load across multiple servers.

Usage: Ideal for large-scale implementations; invisible to the end-user.

Benefits: Provides fault tolerance, so server outages don’t impact service; allows fast recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Proxy and how does it work?

A

Purpose: Acts as an intermediary between users and the external network.

Function: Receives user requests, reviews them, and forwards them to the destination.

Uses: Supports caching, access control, URL filtering, and content scanning.

Types: Some proxies are transparent (invisible to the user); some applications need configuration to use a proxy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NAS vs SAN

A

NAS (Network Attached Storage):

Shared storage on the network.
Uses file-level access: files are pulled across the network into system memory.

SAN (Storage Area Network):

Appears as local storage.
Uses block-level access: efficient for fast reads and writes.

Both: Require high bandwidth and may use isolated, high-speed network technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an Access Point and what layer of the OSI model does it operate at?

A

Purpose: Extends a wired network to a wireless network.

Note: Not the same as a wireless router.

OSI Layer: Operates at Layer 2 (Data Link Layer).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Wireless LAN Controller and what functions does it have?

A

Purpose: Centralized management of multiple access points.

Functions: Deploy new access points, monitor performance and security, configure and update settings, and report on access point usage.

Design: Usually proprietary, paired with specific access points for seamless integration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does CDN stand for and what does it do?

A

Content Delivery Network

Purpose: Speeds up data delivery to users.

How it Works: Uses geographically distributed caching servers, so users get data from a nearby server.

User Experience: Invisible to the end user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a VPN and what does it do?

A

Virtual Private Network

Purpose: Secures private data over a public network.

Integration: Often built into firewalls.

Options: Available as hardware or software with specialized encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does QoS stand for and what is it?

A

Quality of Service

Purpose: Controls bandwidth and data rates.

Function: Prioritizes important applications over others for better performance.

Management: Configurable in settings of routers, switches, firewalls, or dedicated QoS devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does TTL stand for and what does it do?

A

Time To Live

Purpose: Sets a timer (in hops or seconds) for data availability.

Function: Stops data from circulating indefinitely; used to drop looping packets or clear cache entries.

Applications: Helps prevent network loops and manage cache expiration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is TTL in IP, and why is it important?

A

TTL (Time To Live): A countdown built into data packets to prevent endless travel in network loops.

  1. Packets are data pieces that travel across networks.
  2. Hops refer to each router a packet passes through.
  3. TTL Countdown: Each hop reduces the packet’s TTL by 1.
  4. TTL Zero: If TTL reaches zero, the router drops the packet, stopping it from looping indefinitely.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is NFV, and how does it benefit network infrastructure?

A

Network Function Virtualization

Purpose: Replaces physical network devices with virtual ones, managed via a hypervisor.

Functions: Provides routing, switching, load balancing, firewalls, and more—just like physical devices.

Advantages: Quick and easy deployment from the hypervisor.

Deployment Options: Can be deployed as virtual machines, containers, with fault tolerance, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a VPC, and how is it typically secured and connected?

A

Virtual Private Cloud

Purpose: A pool of resources in a public cloud, commonly set up to support multiple application environments.

Connections: VPCs connect through a transit gateway (cloud router) to communicate with each other.

Security: Often secured with a VPN, as VPCs are typically on separate IP subnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How do VPC gateways help connect private and external resources in the cloud?

A

VPC Gateway: Connects internet users to cloud resources.

VPC NAT Gateway: Allows private cloud subnets to access external resources.

Security: External resources cannot initiate connections to the private cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Network Security Lists vs. Network Security Groups

A

Network Security List:

  • Broad rules for an entire IP subnet, applying to all devices in it.
  • Easier to manage but lacks granular control.

Network Security Group:

  • Specific rules for each device’s virtual NIC.
  • More granular, requires more management, and provides better control.
  • Best practice for cloud security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the main Cloud Deployment Models?

A

Public: Accessible to anyone over the internet.

Private: Dedicated to a single organization; like a virtualized local data center.

Hybrid: Combines both public and private cloud environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is SaaS (Software as a Service) and how does it benefit users?

A

On-demand: No installation, access via the internet.

Managed remotely: Data and apps are centrally managed.

Ready-to-use apps: Complete solutions like Gmail or Office 365, no setup needed.

Ready-to-use software.

27
Q

What is IaaS (Infrastructure as a Service) and how does it work?

A

Outsourced equipment: Hardware is provided, but you manage it.

Control: Data is external but under your control.

Example: Web server hosting.

Also known as: HaaS (Hardware as a Service).

Managed hardware, user controls setup.

28
Q

What is PaaS (Platform as a Service) and what does it offer?

A

No infrastructure needed: No servers or maintenance required.

Limited control: You manage the app, not the backend.

App development: Build apps using platform tools.

Example: Salesforce.com.

Build apps, no infrastructure.

29
Q

What is TCP and how does it work?

A

Transmission Control Protocol

Connection-oriented: Establishes a connection before data transfer.

Reliable: Sends acknowledgments (ACKs) for received packets.

Flow control: Allows the receiver to manage data flow.

30
Q

What is UDP and how does it work?

A

User Datagram Protocol

Connectionless: No formal setup or close of connection.

Unreliable: No error recovery or data reordering.

No flow control: The sender controls the data transmission rate.

31
Q

What are the main differences between TCP and UDP?

A

TCP: Reliable, connection-oriented, flow-controlled.

UDP: Unreliable, connectionless, no flow control.

OSI Layer: Both operate at Layer 4 (Transport Layer) and are encapsulated by IP.

32
Q

How are port numbers used and categorized in network communication?

A

Non-ephemeral (Permanent) Ports: Range 0 – 1,023, often used by servers.

Ephemeral (Temporary) Ports: Range 1,024 – 65,535, typically used by clients.

Flexibility: Servers can use ephemeral ports, and clients can use non-ephemeral.

Purpose: Port numbers are for communication, not security.

Distinct Protocols: TCP and UDP have separate port ranges.

33
Q

What is Unicast, and how is it used in networking?

A

Unicast is a one-to-one communication method in networking where a single sender transmits data directly to a specific receiver.

It is used for tasks like web browsing or file transfers, delivering data to a device using its unique IP address.

IPv4 and IPv6 use it

34
Q

What is Multicast, and when is it typically used?

A

One-to-Many
Sends information from one device to a group of chosen devices.

Example: Like a teacher handing out study sheets to specific students in class.

Used in both IPv4 and IPv6 - Extensive use in IPv6

35
Q

What is Anycast, and what’s its primary purpose in networking?

A

one-to-one-of-many
communication method where data is sent from a single sender to the nearest or optimal receiver among multiple possible receivers.

It is used for load balancing, improving response times, and enhancing reliability in services like DNS and content delivery networks (CDNs).

Use in IPv4 and IPv6

36
Q

What is Broadcast, and who receives the information?

A

One-to-All
communication method where data is sent from a single sender to all devices on the network segment.

It is used for tasks like network discovery, where information needs to reach every connected device, such as in ARP requests or DHCP.

IPv6 doesn’t use broadcast; it uses multicast to reach specific groups

37
Q

What is fiber communication, and what makes it unique?

A

Transmission by Light: Uses light instead of electrical signals.

No RF Signal: Doesn’t emit radio waves.

Long Distance: Can send data far without degrading quickly.

Interference-Free: Immune to radio interference.

38
Q

What is multimode fiber, and when is it used?

A

Purpose: Used for short-range communication (up to 2 km).

Light Source: Uses an inexpensive LED light source.

Ideal For: Short-distance data transmission with lower cost.

39
Q

What is single-mode fiber, and when is it best used?

A

Purpose: Used for long-range communication (up to 100 km).

Light Source: Uses a more expensive laser beam for high accuracy.

Ideal For: Long-distance data transmission over vast areas.

40
Q

What is twisted pair copper cabling, and how does it work?

A

Structure: Two wires with equal and opposite signals (Transmit/Receive pairs).

Signal: Uses electrical signals over copper.

Cable Speeds: Cable doesn’t have a speed; the signal encoding does.

Categories: Categorized by type (e.g., CAT 5 for 1000BASE-T).

41
Q

What is a coaxial cable, and where is it commonly used?

A

An RG-6 cable typically used in TV and digital cable services, inclduing high-speed internet over cable

42
Q

What is twinaxial cable, and why is it used in networking?

A

Structure: Two inner conductors (also known as “Twinax”).

Use: Commonly used for 10 Gb Ethernet.

Features: Full duplex, low cost, low latency, up to 5 meters.

43
Q

What is a plenum space, and why is it used in cabling?

A

Definition: Space between the dropped ceiling and actual ceiling where cables are routed.

Purpose: Allows organized cable management and easy access in buildings.

44
Q

What makes plenum-rated cables different from traditional cables?

A

Material: Fire-rated jacket made from Fluorinated Ethylene Polymer (FEP) or low-smoke PVC.

Durability: Less flexible than standard PVC cables.

Use: Safe for use in plenum spaces due to reduced smoke in case of fire.

45
Q

What is a transceiver, and what is it used for in networking?

A

Function: Combines a transmitter and receiver in one component.

Use: A transceiver in networking is used to send and receive data signals over network cables or optical fibers.

Interface: Modular connection for devices.

Types: Available for Ethernet and Fibre Channel (not compatible).

Media: Works with both fiber and copper cables.

46
Q

What are SFP and SFP+ transceivers, and how are they different?

A

SFP (Small Form-factor Pluggable):
* Common for 1 Gbit/s fiber networks.
* Also available in 1 Gbit/s RJ45 for copper.

SFP+ (Enhanced SFP):
* Same size as SFP, but supports up to 16 Gbit/s.
* Often used for 10 Gigabit Ethernet.

47
Q

What are QSFP and QSFP+ transceivers, and why are they beneficial?

A

QSFP (Quad SFP):
* Combines 4 SFPs in one, with 4x 1 Gbit/s channels (totaling 4 Gbit/s).
* Saves on fiber and equipment by consolidating connections.

QSFP+ (Enhanced Quad SFP):
* Same design as QSFP but supports 4x 10 Gbit/s channels (totaling 40 Gbit/s).
* Ideal for high-speed connections with less hardware.

48
Q

What is a Star or Hub and Spoke topology, and where is it used?

A

Structure: All devices connect to a central device, like a switch.

Usage: Common in large networks.

Example: The switch sits in the middle and manages all connections.

49
Q

What is a Mesh topology, and what is it used for?

A

Structure: Multiple connections between devices for redundancy.
* Full Mesh: Every device connects to every other device.
* Partial Mesh: Only some devices have multiple connections, creating a mix of direct and indirect paths.

Features: Provides fault tolerance and load balancing.

Usage: Often used in Wide Area Networks (WANs).

50
Q

What is a Hybrid topology, and why is it popular?

A

Structure: Combines 2 or more physical topologies (e.g., star, mesh).

Usage: Common in most networks for flexibility.

Benefits: Takes advantage of different topologies’ strengths.

51
Q

What is a Spine and Leaf topology, and where is it commonly used?

A

Structure: Each leaf switch connects to each spine switch; spine switches connect only to leaf switches.

Usage: Popular in data centers for simple, redundant, and fast connections.

Note: Can be costly to expand with additional switches.

52
Q

What is a Point-to-Point topology, and when is it used?

A

Structure: A direct connection between two devices.

Usage: Previously common in older WAN links.

Benefit: Simple, direct communication.

53
Q

What are the three layers of a Three-Tier Architecture, and what do they do?

A

Core: Central part of the network, where web servers, databases, and applications are located. Accessible by many users.

Distribution: Connects core and access layers, managing communication paths to users.

Access: Where users and devices (e.g., computers, printers) connect to the network.

54
Q

What is a Collapsed Core, and when is it used?

A

Definition: A simplified two-tier version of the Three-Tier Architecture.

Usage: Suitable for smaller organizations,
combining core and distribution layers into one.

Benefit: Reduces complexity and cost.

55
Q

How does a Three-Tier Architecture compare to a Collapsed Core?

A

Three-Tier
Complex
Costly
Complex

Collapsed Core
Easier to design
Less expensive
Not as resilient

56
Q

What are east-west and north-south traffic flows in a network?

A

East-West: Traffic between devices within the same data center, typically faster.

North-South: Traffic entering or leaving the network (to/from external devices) with different security needs.

57
Q

What is SDN, its key components, and benefits?

A

Software Defined Networking

Components:
* Application Layer
* Control Layer (Controller)
* Infrastructure Layer (Devices)

Key Feature: Centralized software control of network devices.

Benefits: Flexible, scalable, easy to manage, and improves security.

Use Cases: Data centers, cloud networks, IoT.

58
Q

What is a VXLAN and why would you use it in networking?

A

Virtual Extensible LAN

An overlay protocol that extends Layer 2 networks over Layer 3 using UDP encapsulation.

It overcomes the 4096 VLAN limit, supports up to 16 million segments, enables isolated tenant networks, and enhances scalability in large data centers.

  • Extends Layer 2 over Layer 3 networks.
  • Uses UDP port 4789 for encapsulation.
  • Supports up to 16 million VNIs (24-bit identifier).
  • Uses VTEPs (VXLAN Tunnel Endpoints) for traffic forwarding.
  • Solves the 4096 VLAN limit by allowing more network segments.

Example Use Case:
VXLAN is commonly used in data centers to create isolated tenant networks in a cloud environment. It enables multiple virtual networks to run on the same physical infrastructure, allowing VMs to communicate seamlessly across different servers without being limited by VLAN restrictions.

59
Q

What is Zero Trust and the ZTA (Zero Trust Architecture)

A

Zero Trust is a security model where no one is trusted by default, even if they are inside the network. Every user, device, and application must be verified and authenticated continuously before accessing resources. It operates on the principle of “never trust, always verify.

Zero Trust Architecture (ZTA):

  1. Policy-based authentication: Every access request is verified, regardless of location.
  2. Authorization: Users and devices must prove their identity continuously.
  3. Least privilege access: Grants only the minimum level of access required to complete tasks.
60
Q

What does SASE stand for and what is it?

A

Secure Access Service Edge

(In short)
Is a cloud-based service that combines networking and security to provide secure, fast access to apps and data from anywhere.

(In long)
Combines networking and security services into a single cloud-based platform. It provides secure and optimized access to applications and data from anywhere, integrating technologies like SD-WAN, Zero Trust, and firewall as a service (FWaaS).

Example:
A company using SASE can provide employees with secure access to internal applications while working remotely, using a single cloud-based service that combines VPN, firewall, and Zero Trust policies.

61
Q

What is Infrastructure as Code (IaC) and what are its key features?

A

IaC Definition: Uses code to manage and automate IT infrastructure, ensuring consistency.

Key Features:
* Automation: Uses playbooks and templates for repeatable tasks.
* Prevent Drift: Fixes configuration drift and maintains compliance.
* Upgrades: Automates updates, reducing manual work.
* Dynamic Inventories: Tracks resources automatically

62
Q

How does source control work with IaC, and what are its benefits?

A

Source Control Definition: Manages code changes with tools like Git, enabling collaboration.

Benefits:
* Version Control: Tracks all changes, allowing rollbacks (e.g. Git).
* Central Repository: Stores code in shared platforms (e.g., GitHub).
* Conflict Detection: Identifies and resolves overlapping changes.
* Branching: Enables safe testing of new features.

63
Q

What is IPv6 addressing, and how does it help mitigate address exhaustion?

A

IPv6 Addressing: Uses a 128-bit address format, significantly increasing the number of available IP addresses.

Mitigates Address Exhaustion: Provides 3.4 x 10^38 addresses, solving the limitations of IPv4 (which has only 4.3 billion addresses).

64
Q

What are the 3 compatibility methods used for IPv6 and IPv4 networks?

A

Tunneling: Encapsulates IPv6 traffic inside IPv4 packets for compatibility.

Dual Stack: Runs both IPv4 and IPv6 on the same network, allowing devices to use either protocol.

NAT64: Translates IPv6 addresses to IPv4, enabling communication between the two types of networks.