STUFFFFFF Flashcards

1
Q

Transport Layer

A

End-to-end error control.
End-To-End connection between hosts.
What allows data to be transfered be tween hosts
Think TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Presentation Layer

A

Coding 1s and 0s; encryption, compression.
This is what formats and encrypts data to be sent across the network.
SSL sits here, whgich encrypts the link between web server and browser.
This layer is also responsible for formatting and translating data into text or information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Layer 4

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Layer 7

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Layer 6

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Layer 1

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network Layer

A

Network addressing, routing and switching technology. (Layer 3 issues are usually happen to do with routers and switches, or things like RIP, OSPF.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layer 3

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical Layer

A

Think NICS, ethernet devices physically, topologies.
Maintains the data rate (how many bits a sender can send per second) through different physical technologies and limits of those technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define VPN

A

A Virtual Private Network is an encrypted connection between two locations on an already existing network. A VPN is commonly chosen between a Site-To-Site, or client-to-site VPN. A site-to-site VPN links two networks remotely in order for them to communicate as if they were local over an encrypted connect. A Client-to-site VPN is an encrypted connection between a single host and a network. This is commonly used for connecting to a work site from home in order to perform remote work or access data that you dont want to be seen over the regular internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define OSPF

A

Open Shortest Path First is an Ip routing protocol that is a link-state protocol, meaning it exchanges information with its closest neighbours. The entire topology or “map” of the network allows all routers in the OSPF group to calculate the shortest path it needs to travel to deliver data to its destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Session Layer

A

Authentication, permissions, session restoration. Responsible for syncrhonizing information from different sources (think taking two people and initiating a session so they can talk)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between HTTP and HTTPS?

A

HTTPS is HTTP with encryption and verification. The only difference between the two protocols is that HTTPS uses TLS (SSL) to encrypt normal HTTP requests and responses, and to digitally sign those requests and responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do you feel about Agile? Can you explain its benefits and drawbacks?

A

______________________________-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between a firewall and proxy server?

A

A firewall monitors and filters traffic based on a set of defined rules and limits ingoing AND outgoing. A proxy server allows external hosts to connect to services on an internal network, without actually viewing the information of that internal network. (Think of it as what is used to connect to a webserver from the internet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Layer 5

A

Session Layer

17
Q

What is the difference between a Router and a switch?

A

A router allows for an ip address to be shared to other routers across a network or multiple networks. A switch allows multiple devices to be connected to each other over a LAN or private network.

18
Q

What is the difference between a vulnerability and an exploit?

A

A vulnerability is a weakness in a service, application, system etc that puts it at risk. An exploit is a tool used to take advantage of a vulnerability.

19
Q

Application Layer

A

Message format, Human-Machine Interfaces (How the user interacts)

20
Q

Data Link Layer

A

Error detection, flow control on physical link. This is essentially what divides packets into frames, and adds the header (source and dest address, error control bits). This is the MAC, and the LLC.

21
Q

What is the difference between symmetric and asymmetric encryption?

A

Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses a Public Key for encryption , and a Private Key for decryption

22
Q

Layer 2

A

Data Link Layer