D315 Flashcards

(101 cards)

1
Q

OSI Layer: Application(Layer 7)

A

Application software, network applications. Anything you can see with your eyeballs like web browsers and email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application protocols

A

HTTP, FTP, SMIP, IMAP, SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OSI Layer: Presentation(Layer 6)

A

Protocol conversion, data translation. Data encryption/decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Presentation Protocols

A

SSL, ASCII, JPEG, MIDI, MPEG, GIF, MP3, MP4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OSI Layer: Session(Layer 5)

A

Establishes, manages and terminates sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Session Protocols

A

NFS, SQL, PPTP, NetBIOS, PAP, SCP(tunneling)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OSI Layer: Network(Layer 4)

A

Router, Layer 3 switches. Provides routing decisions. NAT, PAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OSI Layer: Transport(Layer 3)

A

Routing and addressing data packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Transport Protocols

A

TCP(Segments so no missing packets), UDP(datagrams for streaming), SCTP Unit: Segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network Protocols

A

IP, IPX, IPSec, RIP, IPv4, IPv6, ICMP Unit: Packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OSI Layer: Data Link(Layer 2)

A

Switches, NIC, Token Ring, Frame Relay, Bridge. Provides for flow of data. Bits pass over physical layer between devices on a LAN (collision domain)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Link Protocols

A

MAC addresses, ARP, PPP, HDLC, LLC Communication at MAC-address level - forwards packets on layer 2 devices like a bridge. Unit: Frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OSI Layer: Physical (Layer 1)

A

802.11, repeater, modem, bluetooth, ethernet, hubs, network cabling, Wi-Fi. Signals and Media. Transmits data over a physical medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Physical Protocol

A

DSL, ISDN, physical NICs, twisted pair cable, fiber. Medium means cabling. Unit: Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Traceroute(Linux)/Tracert(Windows)

A

Determine the number of hops required for a packet to reach its destination. Always shows IP address of destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Nslookup

A

Query the Domain Name System (DNS) and retrieve information about domain names and IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Ping

A

Tests the connectivity between two devices by sending ICMP echo request packets and measuring the round-trip time, indicating network health and potential issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Netstat -aL

A

Display network status, including active connections, listening ports, routing table information, and network interface statistics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Whois

A

Information about a webserver including contact information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ARP (Address Resolution Protocol

A

Displays the IP to physical (MAC) address mappings for hosts that have been discovered in the ARP cache.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Nmap (Network Mapper)

A

Allows scanning a system in various ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Fiber Optic

A

Uses light instead of electricity. Can go longer distances, faster. More durable and secure. Like transatlantic submarine cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Bus Topology

A

Coaxial cable, Thinnet. A bus network topology is a single line of devices connected together by one shared network cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Ring Topology

A

Each node connects to exactly two other nodes, forming a single continuous pathways for signals through each node. Nodes connected to each other with a backbone cable that loops around and ends at the same point it started.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Star Topology
Hub or switch in center. Each device is only connected to the central switch. All device-to-device communication is sent through the switch at the center of the network and then forwarded by the switch to the proper destination.
26
Mesh Topology
Connects every node to every other node in the network. Mesh topologies are often drawn as a web of direct connections between computers or nodes in a network. Mesh networks are typically used where communication within a network must be highly available and redundancy is needed. The nodes within a mesh network can communicate with each other, and these connections can be changed dynamically if one node were to fail.
27
PAN
Personal Area Network- any bluetooth/network device connected to your PC.
28
LAN
Local Area Network- Small network like home if not wireless.
29
WLAN
Wireless LAN- Small network that is wireless like my home.
30
WAN
Wide Area Network - The world wide web
31
VLAN
Virtual LAN use a switch to create virtual segment within a LAN i.e. HR department might be on its own VLAN
32
Type 1 Hypervisor
A physical hypervisor acts like a server and creates virtual computers
33
Type 2 Hypervisor
A hypervisor on the OS that allows for the creation of virtual machines.
34
Cloud service/Cloud Computing
An outsourced an hosted computing environment that delivers IT services via a network. ie. Gmail, OneDrive, etc.
35
Infrastructure as a Service (IaaS)
A cloud service model that offers the physical hardware like servers, and storage.
36
Platform as a Service(PaaS)
Gives the hardware and virtual machines. Useful for testing code and development.
37
Software as a Service(SaaS)
Gives everything including, hardware, software, OS, etc.
38
Public Cloud
Services are paid for and offered over the internet. Hardware is shared by multiple organizations.
39
Private Cloud
The cloud is owned and operated by the entity. They own the server and storage space and allow members of their company to access it.
40
Community Cloud
This cloud infrastructure offers two or more organizations exclusive access to the infrastructure and computing resources. These organizations may share common policies that allow them to operate in a distributed mode. Like police from different counties can log into the state software.
41
Hybrid Cloud
The company owns server space but may also purchase some from a 3rd party.
42
Penetration testers
InfoSec job tasked with attempting to compromise a networks security.
43
Vulnerability Testers
Scan servers and network devices for known vulnerabilities. Typically good guys. Outside consultants may scan the network and point out vulnerabilities and how to fix.
44
CIA Triad
Confidentiality, Integrity, Availability
45
Confidentiality
The access to information should be granted only on a need-to-know basis.
46
Integrity
The information should not be tampered with from source to destination. Any time data is changed. Man in the middle attacks, employee changes their salary in the database.
47
Availability
The service of an organization should be available. Denial of service distributed denial of service attacks. Unable to access the system. User locked out after 3 tries.
48
AAA
Authentication, Authorization and Accounting
49
Authentication
Who and what are you?(First Step) Username/Password issues.
50
Authorization
What are you allowed to do?(Second Step) Access rules. Admin limitations.
51
Accounting
Keeps track of what you do(Final Step) Log files - anything with log files
52
Ad-hoc
All wireless communication is performed in a peer-to-peer fashion and does not require or involve a WAP(Wireless Access Point).
53
Infrastructure
A wireless router or WAP is used to connect wireless devices to the network.
54
Symmetric encryption
Have same key.
55
Asymmetric encryption
One public and one private key.
56
SSL
Secure socket layer uses an asymmetric key pair.
57
TLS
Transport layer security. Successor to SSL.
58
IDS
Intrusion Detection System can detect attacks but cannot stop them.
59
IPS
Intrusion Prevention System. Can stop attacks.
60
Packet Shaper
A device that sits between a campus network and an outside network and is configured with a set of rules that are used to prioritize data traffic for shaping the bandwidth.
61
3DES encryption
A symmetric-key block cipher, which applies DES cipher algorithm three times to each data block.
62
VLAN hopping
Layer 2(Data Link) A method of attacking networked resources on a VLAN. An attacking host on a VLAN gains access to traffic on other VLANS that would normally not be accessible.
63
VLAN Hopping solution
Configure the switch Access Control File.
64
T1 Cable
a communications line that transmits voice and data digitally over copper wires, fiber optics, or wireless connections. T1 lines are often used in commercial buildings.
65
T3 Cable
an Internet connection providing high-speed T3 bandwidth of 45Mbps delivered over fiber optic or coax cables.
66
Coaxial cable
a type of electrical cable that transmits signals like video, data, and voice.
67
UTP Cable
Unshielded Twisted Pair, a type of copper cable used for networking and telephony.
68
Fiber Optic Cable
a type of network cable that transmits data using light pulses through thin strands of glass fibers encased within an insulated covering,
69
Switch
A device that allows other devices on the same network to communicate with each other physically. (MAC address)
70
Repeater
a device that strengthens and rebroadcasts signals to extend the range of a network. Repeaters are also known as signal boosters or range extenders.
71
Hub
Like a switch but broadcasts to all devices on the network.
72
Router
a device that connects networks and devices to the internet, and allows them to communicate with each other wirelessly using IP addresses. Routers can also create local area networks (LANs).
73
Modem
a device that connects your home network to your internet service provider (ISP). It translates data between your home network and the internet, allowing you to access websites, send emails, and more.
74
Smurf DDoS
Rather than one computer sending ICMP packets, multiple computers are replying to the ICMP packet. It spoofs the source address for all ICMP packets
75
Deauth Attack
Deauthentication (abbreviated deauth) is a denial-of-service (DoS) attack where the attacker can force any client (or even every client) off of the network.
76
Phishing/ Spear Phishing
User clicks on a link to a nefarious site which tricks them into entering their name/email address or other secure info. Ie; sending an email about your PayPal account which isn’t from PayPal. Spear Phishing targets a person with extremely specific information – hacking a CEO’s phone with a specific calendar invite for their kid’s soccer practice.
77
Ping of Death
Attacker pings the target & sends a ICMP packet over the max of 65,535 bytes and causes the victim’s system to crash or stop functioning. Causes buffer overflow and crashes.
78
Zero Day
Exploits a vulnerability in the OS software—requires a patch to be remedied. Zero day refers to the fact that the exploit was released before security vendors can issue protection against them. The public has no way to fix until a patch is released.
79
Virus
Attaches itself to a file or host. (Many types!). Anti-virus software to mitigate.
80
Worms
Do not attach to a host file, they are self-contained programs. Don’t download attachments. Anti-virus software.
81
Trojans
Hides in a useful program. Use firewall software to mitigate.
82
Rootkits
Malware hidden in a host’s file system, quite hard to detect. Avoid opening suspicious emails & don’t download cracked software. Anti-malware w/rootkit detection. Keep OS updated.
83
Ransomware
Blocks victim’s data—threatens to publish it or delete it unless a ransom is paid. Scan all emails for known malware strains, and keep firewalls and endpoint protections up to date with the latest known malware signatures.
84
Firewall
Scans packets on the network using a set of rules and blocks unauthorized packets. Can be hardware or software.
85
Packet filtering Firewall
FIlters using a predefined set of rules.
86
Stateful inspection Firewall
Tracks active network connections.
87
Stateless Firewall
Does not keep track of active connections.
88
Proxy Server
Firewall at the application layer.
89
MAN
Metro Area Network a computer network that connects devices within a large geographic area. MANs are larger than local area networks (LANs) but smaller than wide area networks (WANs
90
Credential Stuffing
A type of cyberattack in which the attacker collects stolen account credentials
91
Session Hijacking
a cyberattack in which bad actors gain unauthorized access to a user's active website or application session.
92
Man-in-the-middle attack
a hacker secretly positions themselves between two communicating parties, intercepting and potentially altering their data exchange without either party knowing, usually to steal sensitive information like login credentials, credit card numbers, or personal details.
93
Pharming
online fraud that involves the use of malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data.
94
Role-Based Access Control
a security model where user access to systems, applications, and data is determined by their assigned role within an organization
95
Wi-Fi Hardening
changing your password, encrypting your network, and using a firewall. You can also disable unused features and turn off SSID broadcasting.
96
Context Based Access Control
a security model that dynamically adjusts access permissions to resources based on real-time contextual factors like user location, device status, time of access, and network conditions,
97
WPA2
a security protocol that protects wireless networks by encrypting data
98
DoS
a cybercrime that attempts to make a network or machine unavailable to its intended users. Prevention: Monitor traffic patterns.
99
Least Privilege
a security practice that limits user access to only what's necessary for their job.
100
IfConfig(linux)
Display and configure network interface parameters, including IP addresses, subnet masks, and MAC addresses
101
IpConfig(windows)
Displays and manages TCP/IP network configuration information, including IP addresses, subnet masks, and default gateways, for each network interface