Networking Flashcards

1
Q

Explain the OSI model and the TCP/IP protocol stack.

A
  • OSI model and the TCP/IP protocol stack are both frameworks that conceptualize network communication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does the OSI and TCP/UDP stack relate to each other

A
  • the layers in both models can be correlated
  • Application = Application, Presentation, and Session
  • Internet = Network
  • Transport = Transport
  • Network Interface = Data, Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the key differences between OSI model and TCP/UDP stack?

A
  • they differ in their approach and layer organization.
  • OSI is 7 layers (Application to Network)
  • TCP/UDP is 4 layers (Network Interface, Internet, Transport, and Application)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the process of DNS resolution

A

DNS resolution is the process of translating human-readable domain names into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a web browser translate a domain name into an IP address

A
  1. it sends a DNS query to the local DNS resolver
  2. If the resolver doesn’t have the mapping cached, it contacts the authoritative name server responsible for the domain
  3. authoritative server replies with the IP address
  4. the resolver caches the result for future use
  5. the resolver provides the IP address to the browser
  6. the browser establishes a connection to the web server using the IP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of subnetting in IP addressing?

A
  • dividing a larger IP network into smaller, more manageable sub-networks or subnets
  • aids in efficient network design by segmenting traffic, improving security, and optimizing resource usage
  • helps in IP address allocation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the benefits of using Variable Length Subnet Masks (VLSM)

A
  • VLSM enables the allocation of different-sized subnets within a single network
  • conserves IP address space
  • accommodates varying subnet requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain the differences between TCP and UDP

A
  • TCP: connection-oriented and offers reliable, ordered, and error-checked data delivery
  • UDP: connectionless and offers lightweight, low-latency communication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When would you choose TCP or UDP?

A
  • TCP for applications where data integrity is crucial
  • UDP for applications where speed is prioritized over reliability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Provide examples of applications that use TCP or UDP and justify your choices

A
  • TCP: web browsing, file transfer (FTP), and email (SMTP)
  • UDP: streaming media (UDP-based streaming services), online gaming (UDP minimizes latency for real-time interactions), WiFi authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Discuss the concept of NAT (Network Address Translation)

A

NAT involves translating private IP addresses used within an internal network to a single public IP address for external communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the significance of NAT in modern networking

A
  • helps conserve the limited pool of public IPv4 addresses
  • enables multiple devices to share a single public IP
  • NAT became a workaround to address the scarcity of IPv4 addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are the implications for NAT use and IPv4 address exhaustion and IPv6 adoption

A
  • NAT poses challenges for direct peer-to-peer communication
  • NAT complicates network configurations
  • NAT hinders the deployment of IPv6 due to its widespread use
  • IPv6 adoption is crucial to overcome address exhaustion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some TCP benefits

A
  1. Flow control
  2. Error correction
  3. Retransmission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does TLS provide?

A

Provides encryption and authenticity for TCP-based protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does TLS work?

A

Certs are verified by validating a certificate chain and that the hostname of the server matches the name in the certificate

17
Q

What do you need to do to get a certificate?

A
  1. Have the Correct Website Information
  2. Decide Which SSL Certificate You Need
  3. Choose a Certificate Authority
  4. Generate a Certificate Signing Request (CSR)
  5. Submit the CSR to Your Certificate Authority
  6. Await Validation by Your Certificate Authority
  7. Install Your SSL Certificate
18
Q

How does a web browser determine a certificate is valid?

A

Browsers have a list of trusted Certificate Authorities (CAs) they use to validate the cert chain

19
Q

If a key is compromised, how do you revoke it?

A
  1. The CA can revoke a certificate
  2. Revocation data is published via:
    Certificate Revocation Lists or
    Online Cert Status Protocol