Chapter 3: Exploring Network Technologies & Tools Flashcards
(125 cards)
What is the Open Systems Interconnection (OSI) model?
A conceptual framework that divides network communication into seven layers, each responsible for specific tasks in data transmission.
What are the seven layers?
Physical, Data, Network, Transport, Session, Presentation, and Application (Please Do Not Throw Sausage Pizza Away).
What is the first layer of the OSI model?
The physical layer, and it’s all about the basic equipment of networking such as copper wires, fiber optic cables, and radio waves.
What is the second layer of the OSI model?
The data link layer where network switches reside. It formats data into data frames and routes it between systems on the local network using their media access control (MAC) addresses.
What is the third layer of the OSI model?
The network layer which introduces IP addresses. Routers use IP addresses to send info between systems that are not located on the same local network. The Internet Protocol (IP) is the primary protocol used at this layer.
What is the fourth layer of the OSI model?
The transport layer which provides end-to-end communication services for applications. The Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) exist at this layer.
What is the fifth layer of the OSI model?
The session layer which establishes, manages, and terminates sessions between applications running on different devices, allowing them to communicate and exchange data.
What is the sixth layer of the OSI model?
The presentation layer which translates data into a standard format that can be understood by the application layer. It also provides encryption, compression, and other data transformation services.
What is the seventh layer of the OSI model?
The application layer which provides network services to applications, allowing them to communication with other applications over the network.
What is the Transmission Control Protocol (TCP)?
Provides connection-oriented traffic with guaranteed delivery. Uses a three-way handshake.
What is the User Datagram Protcol (UDP)?
Provides connection-less sessions without a three way handshake and no guarantee of delivery.
What is the Internet Protocol (IP)?
A set of rules that defines how data is addressed, routed, and delivered across networks, ensuring devices can communicate with each other.
What is the Internet Control Message Protocol (ICMP)?
A network protocol used for sending error messages and diagnostic information about network operations, such as unreadable destinations or packet loss.
What is the Address Resolution Protocol (ARP)?
A data link layer protocol used to map an IP address to a corresponding MAC address within a local network, enabling devices to communicate directly.
What is Data In Transit?
Any traffic sent over a network.
What is Personally Identifiable Information (PII)?
Any info that can be used to identify an individual (e.g. full legal name, SSN, date of birth).
What is the File Transfer Protocol (FTP)?
An insecure protocol used for transferring files between a client and server over a network, allowing users to upload, download, and manage files remotely.
What is the Trivial File Transfer Protocol (TFTP)?
A simple, lightweight protocol for transferring files over a network, using UDP for faster but less reliable communication and no authentication. It is not secure.
What is the Secure Socket Layer (SSL)?
A cryptographic protocol that provides secure communication over a network by encrypting data, authenticating parties, and ensuring integrity, though it is largely replaced by TLS since it has been compromised.
What is the Transport Layer Security (TLS)?
A cryptographic protocol that provides secure communication over a network by encrypting data, authenticating parties, and ensuring data integrity, replacing SSL as the modern security standard.
What is the Internet Protocol Security (IPSec)?
A suite of protocols used to secure IP communications by encrypting and authenticating each packet of data, providing confidentiality, integrity, and authentication. Commonly used in VPNs.
What is the Secure Shell (SSH)?
A cryptographic network protocol that provides secure remote access to devices, allowing users to execute commands and transfer files securely over an insecure network.
What is the Secure Copy Protocol (SCP)?
A network protocol for securely transferring files between a local and a remote machine, or between two remote machines, using SSH encryption for protection.
What is the Secure File Transfer Protocol (SFTP)?
SFTP operates over SSH to encrypt data, provide authentication, and ensure data integrity during file transfers.