Week 8 Flashcards

1
Q

What are Domain Names?

A

Devices are labeled with numeric IP addresses

Domain names are names for the numeric IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a DNS?

A

DNS translates human-readable domain names into machine readable IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Shared Hosting?

A

An IP address mapped to multiple host names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 4 DNS requirements?

A

Scalability

Efficiency

Reliability

Maintainability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the scalability part of the DNS mean?

A

Hierarchial Design:

Root

Top Level Domain

Second Level Domain

Third Level Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the Redundancy part of the DNS mean?

A

Each logical root server refers to multiple physical ones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the Reliability part of the DNS mean?

A

No single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Root DNS servers?

A

Top Level, represented by (.)

First point of contact if a DNS resolver can’t resolve a name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Top-Level Domain Servers?

A

Organizational
(com, org, edu, gov, net)

or

Geographical
(uk,us,eg,sp,de)

Managed by ICANN (Internet Corporation for Assigned Names and Numbers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Authoritative Servers?

A

Hold the complete data for a domain’s DNS records

Source of DNS responses

To ensure maintainability authoritative servers must be updated automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Sub-domains?

A

Web addresses may utilise multiple subdomains separated by periods (pronounced “dot) in a hierarchical fashion

Each domain manages its subdomains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is DNSSEC?

A

Attackers exploit vulnerabilities in the DNS - it doesn’t check for credentials before accepting an answer

DNSSEC adds a layer of trust on top of DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does DNSSEC use?

A

Asymmetric Encryption

Hash Functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Asymmetric Encryption?

A

Uses pair of keys (private and public)

Using encryption key as the public key (private communication)

Using decryption key as public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Hash Functions?

A

Hash function takes data of arbitrary size, M, and returns a fixed-size number, H(M)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is a Digital Signature created?

A

DNS Data is put through hash function which gets hash value

Then encrypted with private key to make digital signature which is then attached to DNS data

Which makes Signed DNS Data (DNS data + digital signature)

17
Q

How is a DNS Response verified?

A

DNS is put through hash function to get Hash Value

Encrypted Hash decrypted with public key to get Hash Value

If Hash Values are equal then DNS Response is Verified

18
Q

What is the Hourglass Model?

A

Internet Protocols have an hourglass shape

19
Q

What are the 2 protocols the transport layer provides?

A

Transmission Control Protocol (TCP)

The User Datagram Protocol (UDP)

20
Q

How is information sent in networking?

A

Information is sent by combining headers (supplemental data) and payloads (the actual contents that you wish to send)

21
Q

How is application level data used? (hint: chopped)

A

Application level data is chopped up into smaller pieces. TCP pairs up each such piece of data with a TCP header to form segments

22
Q

What are Networking Ports?

A

Ports are used to map data to the correct process

Some port numbers are reserved for use by specific application layer protocols, eg. port 80 for HTTP

23
Q

What are all the features of TCP services?

A

Connection-oriented communication

End-to-end communication

Complete reliability

Full duplex communication

A stream interface

Reliable connection startup

Graceful connection shutdown

24
Q

What is Connection-Oriented Communication?

A

TCP provides connection oriented communication - an application sets up a connection, uses it, and tears it down

25
Q

What is End-to-end communication?

A

TCP provides end-to-end communication - a connection has exactly two endpoints

26
Q

What is Complete Reliability?

A

Data will be received exactly as sent even if that means resending

27
Q

What is Full-Duplex Communication?

A

Data may be sent and received simultaneously

28
Q

What is a Stream Interface?

A

A continuous stream of data is sent and received

29
Q

What is Reliable Connection Startup?

A

TCP provides reliable connection start-up through a three-way handshake - communication always starts properly

30
Q

Why are Sequence Numbers important?

A

If all connections start numbering segments from the same number, the receiver might confuse segments from different sequential connections

31
Q

What is Graceful Connection Shutdown?

A

TCP provides Graceful Connection shutdown through a four-way handshake - communication always finishes properly

32
Q

What are the 4 fields of the UDP Header?

A

Source Port

Destination Port

Length

Checksum

33
Q

What are the 4 Services of the UDP?

A

Connectionless communication

End-to-end communication

Best-effort reliability

A message interface

34
Q

What is Connectionless Communication?

A

Application does not set up or tear down a connection

35
Q

What is End-to-end communication?

A

Connection has exactly 2 endpoints

36
Q

What is Best Effort Reliability?

A

Data may be lost, duplicated or delayed

37
Q

What is a Message Interface?

A

Individual data items are sent and recieved

38
Q

What are the benefits of TCP vs UDP?

A

TCP provides full reliability, with high latency

UDP provides best effort reliability with minimal latency