Network Fundamentals Flashcards

1
Q

What is the “client-server” model?

A

The Client-Server model is a distributed application structure that manages tasks and
workloads by sharing them among providers of resources and services (servers) and
delivers responses to service requesters (clients).
An alternative method is to use broadcast or multicast channels to distribute
information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identify several common network protocols

A

HTTP (110), HTTPS (443), DNS (53), DHCP (67, 68), FTP (20,21), SMTP (25), SSH (22), ICMP (143)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the function of a “network model”?

A

Set standards that allow devices to communicate without requiring continuous configuration in
different device platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name the 7 layers and their functions in the OSI Model.

A

Physical, Data Link, Network, Transport, Session, Presentation, Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name a protocol associated with each of the OSI layers

A

Physical - Ethernet (IEEE802.3), Wi-Fi (IEEE 802.11), FDDI, RJ45
Data Link - Ethernet, Frame relay EEE 802.5/ 802.2,
Network - IP IPv4, IPv6, ICMPv4, ICMPv6, IPX
Transport - TCP, UDP, RTP, SCTP
Session - Tunneling. SQL NFS, NetBios names, RPC,
Presentation - Encryption, Encoding, SSL/TLS, ASCII, EBCDIC, TIFF, GIF, PICT,JPEG, MPEG, MID
Application - DNS, DHCP, SSH, HTTPS, FTP, SNMP, SMTP, POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is data “encapsulation”?

A

Data encapsulation refers to sending data where the data is augmented with successive layers of control information before transmission across a network. The reverse of data encapsulation is decapsulation, which refers to the successive layers of data being removed (essentially unwrapped) at the receiving end of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identify the 4 layers of the TCP/IP model?

A

Network Access, Internet, Transport, Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are TCP and UDP?

A

TCP and UDP are protocols that operate in Layer 4 (Transport Layer) and are used to
transmit data over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is TCP?

A

Transport Layer Protocol - TCP is trusted and more commonly used than UDP and is fully described in RFC 793.
It verifies the availability of all parties before initiating a connection by performing a
three-way handshake. It then marks packets and makes sure they are received in the
correct order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is UDP

A

UDP is less strict about data integrity and is more speed oriented. It simply sends
packets, without checking the data, even if no device is ready to receive them.
UDP is fully described in RFC 768.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the function of the 3-way handshake?

A

Communication between network devices that
use TCP.
The handshake is known as “3-way” because it includes 3 steps:
1. The client sends “SYN”.
2. The server responds with “SYN-ACK”.
3. The client finalizes with “ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is checksum?

A

Checksum is a piece of data that is calculated and represented as a number and is
used for data integrity and error detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a logical port?

A

Logical port is a number assigned to a “logical” connection, which
is used to represent a service or protocol on the end device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a “well-known” or “known” port?

A

Well-Known Ports (0-1023) - Port numbers in the “well-known” range are assigned to
commonly used and essential protocols. The port numbers are permanent,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the range of registered ports?

A

Registered Ports (1024-49151) - IANA assigned these ports for IT companies that want
to register them for proprietary applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the function of private ports?

A

Dynamic and Private Ports (49152-65535) - This group covers the remaining logical
ports that are available for any application. The port range is known as “client ports”
and is usually used for logical client connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the function of “netstat -ab”?

A

To inspect open ports, use the command netstat –ab, where: a represents ‘all’, and b
represents the names.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What functions does Wireshark provide?

A

Wireshark is a free application that enables the capture and viewing of data traveling
back and forth on the network. It is able to read the contents of each packet and apply
different filters.
Wireshark is commonly used to troubleshoot network problems and develop and test
software.

19
Q

What is the function of ARP?

A

ARP (Address Resolution Protocol),
that resolves a logical address (IP) to a physical address (MAC) and saves the results in
the host ARP cache.
ARP operates in Layers 2 and 3 of the OSI model.
Every Layer 3 device uses ARP

20
Q

What is the command to display an ARP table?

A

arp –a and arp –g displays the host ARP table.

21
Q

What is the relationship between ARP and encapsulation?

A

It adds header and trailers to the data to encapsulate

22
Q

What does OSI Stand for?

A

OSI (Open Systems Interconnection)

23
Q

What does SLIP stand for?

A

Serial Line Internet Protocol. SLIP is an Internet protocol that allows users to gain Internet access using a computer modem

24
Q

What is PPP?

A

PPP (Point-to-Point Protocol), which provides enhanced error detection and automatic configuration

25
Q

What is ICMP?

A

Internet Control Message Protocol (ICMP) is used for reporting errors and performing network diagnostics. In the error reporting process, ICMP sends messages from the receiver to the sender when data does not come though as it should.

26
Q

What is FTP?

A

File Transfer Protocol FTP is a connection-oriented service as it uses TCP ports for secure file transfer. Port 20 and 21 FTP requires authentication, FTP needs more memory than TFTP. TFTP can fit into a diskless workstation also.

27
Q

What is TFTP?

A

Trivial File Transfer Protocol Client server port based on UDP port 69 for the TFTP server. TFTP is an unsecured protocol and does not support authentication. TFTP incorporates idle − RQ (stop and wait) error recovery mechanism. Every TFTP data unit bears a sequence number. Can only transfer bite size

28
Q

What is NTP?

A

NTP is an internet protocol that’s used to synchronise the clocks on computer networks to within a few milliseconds of universal coordinated time (UTC). It enables devices to request and receive UTC from a server that, in turn, receives precise time from an atomic clock.

29
Q

What is the characteristic of IMAP4?

A

Enables sending email messages from client devices and Enables email exchange between mail servers port 143
Offers improved functionality in comparison to POP3
Serves the same function as POP3

30
Q

What is Secure Shell?

A

Secure Shell is a secure command line protocol that allows the user to run remote
commands on a remote machine. Port 22 Data is encrypted

31
Q

What is ICMP?

A

Internet Control Message Protocol is used by network devices to generate error
messages when IP packets are not able to reach their destinations port

32
Q

What is SMTP?

A

Simple Mail Transfer Protocol is the standard protocol for mail transfer over the internet. port 25
Sending email messages between mail servers
Sending email messages from a client device

33
Q

What is SNMP?

A

SNMP is used to collect data related to network changes or to determine the status of network-connected devices. An application layer protocol

34
Q

What is LDAP?

A

Lightweight directory access protocol (LDAP) is a protocol that helps users find data about organizations, persons, and more. LDAP has two main goals: to store data in the LDAP directory and authenticate users to access the directory. Port 389

35
Q

What is HTTPS?

A

HTTPS uses an encryption protocol to encrypt communications. The protocol is called Transport Layer Security (TLS), although formerly it was known as Secure Sockets Layer (SSL). This protocol secures communications by using what’s known as an asymmetric public key infrastructure.

36
Q

What is SMB/CIFS?

A

Server Message Block (SMB) Protocol is a network file sharing protocol. The set of message packets that defines a particular version of the protocol is called a dialect. The Common Internet File System (CIFS) Protocol is a dialect of SMB
Provides shared access to files, directories, and devices
Used mainly by computers running Microsoft Windows operating systems

37
Q

What is SIP Protocol?

A

Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, and terminating communication sessions that include voice, video and messaging applications. SIP is used in Internet telephony, in private IP telephone systems, as well as mobile phone calling over LTE (VoLTE).

38
Q

Which part of the IPsec protocol suite provides authentication and integrity?

A

Authentication Header (AH) is a protocol and part of the Internet Protocol Security (IPsec) protocol suite, which authenticates the origin of IP packets (datagrams) and guarantees the integrity of the data.

39
Q

Which part of IPsec provides authentication, integrity, and confidentiality?

A

IPSec contains the following elements: Encapsulating Security Payload (ESP): Provides confidentiality, authentication, and integrity. Authentication Header (AH): Provides authentication and integrity. Internet Key Exchange (IKE): Provides key management and Security Association (SA) management.

40
Q

Which of the IPsec modes provides entire packet encryption?

A

IPsec is used in tunnel mode or transport mode. Security gateways use tunnel mode because they can provide point-to-point IPsec tunnels. ESP tunnel mode encrypts the entire packet, including the original packet headers.

41
Q

What is the difference between tunnel mode and transport mode?

A

tunnel mode is better because it establishes a connection while transport mode simply encrypts packets. it creates a secure connection between two endpoints by encapsulating packets in an additional IP header. Tunnel mode also provides better security over transport mode because the entire original packet is encrypted. Requires a secure connection.

transport mode is that it is more compatible with certain firewalls and it offers higher levels of security but does not encrypt packets

42
Q

User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake, which is a set of initial steps required to establish network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).

A

False it is connectionless

43
Q

Three characteristics of Telnet?

A

Provides username and password authentication
Transmits data in an unencrypted form
Enables remote login and command execution