Network & Protocols Flashcards

1
Q

Router

A
  • Routers are “network traffic management devices used to connect different network segments together.”
  • Routers are located at gateways where two or more networks connect. They look at each packet and its destination address, and then determine optimal paths across a network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Switch

A
  • Routers operate at the network layer (layer 3) of the OSI model. Switches operate at the data link layer (layer 2). Switches connect together devices on a network.

Note: They pose a security risk because access means that an attacker can eavesdrop on all communications. Similar to routers, switches also have insecure methods of access (notably Telnet or older versions of SNMP, use SNMPv3 instead).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Control lists (ACL)

A

Routers use access control lists (ACL) to determine if a packet should be allowed to enter a network, based on its source address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Anti-Spoofing

A

Routers have insight into expected source IP addresses, so they can check the stated source IP address, which might be spoofed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Port Security

A
  • As switches move packets from inbound connections to outbound connections, it’s possible for them to inspect the packet headers.
  • Port security means that switches can control which devices connect on each port via allowed MAC addresses (still, they can be spoofed).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Loop Prevention

A

Switches use Open Shortest Path First (OSPF) to route traffic and the Spanning Tree Protocol (STP) to avoid loops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Flood Guard

A

Switches also commonly have flood guards to protect against flooding attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Proxy

A

Proxy servers are a way of filtering traffic and can be used to further the security goals of an organization. A proxy intercepts requests from a client and either forwards them to their intended destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Forward and reverse proxy

A
  • Proxies can be forward, meaning that they intercept a request and then forward them to the destination.
  • They can be reverse, meaning that they’re installed on the server-side of a connection and intercept incoming requests.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Anonymizing Proxies

A

Anonymizing proxies hide information about the client making the request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Load Balancer

A

Load balancers move loads across several resources. This helps to avoid overloading a server and helps increase fault tolerance. Load balancing is easiest in stateless systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Affinity Based Load Balancer

A

This means a host connects to the same server across a given session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Round-robin Load Balancer

A

This means that each new request goes to a new server in rotation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Active-passive Load Balancer

A

Load balancers can be active-passive, meaning that one system is balancing everything.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Access Point (AP)

A

Wireless access points (APs) are “the point of entry and exit for radio-based network signals into and out of a network.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Active-active Load Balancer

A

Active-active means that all the load balancers are active at once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SSID

A
  • An SSID is a service set identifier. This is a unique identifier for a network, at most 32 characters.
  • When a client wants to join the network, they have to perform a handshake to associate with an AP.
16
Q

MAC Filtering

A

AP:s can use MAC filtering for handshake.

17
Q

Signal Strength

A

The transmitting power of the AP, as well as the physical environment can play a role in signal strength.

18
Q

Band Selection/Width

A

Capacity of the AP.

19
Q

Fat/Thin Access Point

A
  • Access points can be “fat” (standalone) or “thin” (controller-based).
  • Standalone often includes encryption, authentication and channel management capabilities. Controller-based makes it easier to have centralized management.
20
Q

Border Gateway Protocol (BGP)

A

BGP makes the internet work. This routing protocol controls how packets pass through routers in an autonomous system (AS) – one or multiple networks run by a single organization or provider – and connect to different networks.

20
Q

Adress Resolution Protocol (ARP)

A

ARP translates IP addresses to MAC addresses and vice versa so LAN endpoints can communicate with one another.

21
Q

Domain name system (DNS)

A

DNS is a database that includes a website’s domain name and its corresponding IP addresses.

22
Q

Dynamic Host Configuration Protocol (DHCP)

A

DHCP assigns IP addresses to network endpoints so they can communicate with other network endpoints over IP.

23
Q

File Transfer Protocol (FTP)

A

FTP is a client-server protocol, with which a client requests a file and the server supplies it. FTP runs over TCP/IP – a suite of communications protocols – and requires a command channel and a data channel to communicate and exchange files

24
Q

Hypertext Transfer Protocol (HTTP/HTTPS)

A
  • A file sharing protocol that runs over TCP/IP. HTTP primarily works over web browsers and is commonly recognizable for most users
  • Another form of HTTP is HTTPS, which stands for HTTP over Secure Sockets Layer or HTTP Secure that encrypt a user’s HTTP requests and webpages.
25
Q

Transmission Control Protocol (TCP)

A

TCP is the other half of TCP/IP and arranges packets in order so IP can deliver them. Specifically, TCP numbers individual packets because IP can send packets to their destinations through different routes and get them out of order, so TCP amends this before IP delivers the packets.

25
Q

Simple Mail Transfer Protocol (SMTP)

A

SMTP is the most popular email protocol, is part of the TCP/IP suite and controls how email clients send users’ email messages.

26
Q

Internet Protocol (IP)

A

When users send and receive data from their device, the data gets spliced into packets. Packets are like letters with two IP addresses: one for the sender and one for the recipient.

27
Q

User Datagram Protocol (UDP)

A

UDP is an alternative to TCP and also works with IP to transmit time-sensitive data. UDP enables low-latency data transmissions between internet applications, making it ideal for VoIP or other audio and video requirements.

28
Q

OSI Model

A
  • The Open Systems Interconnection (OSI) model describes seven layers that computer systems use to communicate over a network.
  • The modern Internet is not based on OSI, but on the simpler TCP/IP model. However, the OSI 7-layer model is still widely used, as it helps visualize and communicate how networks operate, and helps isolate and troubleshoot networking problems.
29
Q

Application Layer 7 (OSI)

A

Human computer interaction layer where applications can access the network services.

30
Q

Presentation Layer 6 (OSI)

A

Ensures that data is in a usable format and is where data encryption occurs.

31
Q

Session Layer 5 (OSI)

A

Maintains connections and is responsible for controlling ports and sessions.

32
Q

Transport Layer 4 (OSI)

A

Transmits data using transmission protocols including TCP and UDP.

33
Q

Network Layer 3 (OSI)

A

Decides which physical path the data will take.

34
Q

Data Link Layer 2 (OSI)

A

Defines the format of data on the network.

35
Q

Physical Layer 1 (OSI)

A

Transmits raw bit stream over the physical medium.

36
Q
A