DNS Flashcards

1
Q

DNS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DNS REQUEST

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DNS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LOAD BALANCER

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CDN

A

CONTENT DELIVERY NETWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IP ADDRESS

A

FORMAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISP

A

INTERNET SERVICE PROVIDER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WHAT IS A WEB SERVER

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

STATIC CONTENT

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DYNAMIC CONTENT

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

FRONT END

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BACK END

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VIRTUAL HOST

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

LAN

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

VPN

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ETHERNET

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ROOT DNS SERVER

A

The root servers act as the DNS backbone of the internet; their job is to redirect you to the correct Top Level Domain Server, depending on your request. If, for example, you requestwww.tryhackme.com, the root server will recognise the Top Level Domain of .com and refer you to the correct TLD server that deals with .com addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RECURSIVE DNS SERVER

A

A Recursive DNS Server is usually provided by your ISP, but you can also choose your own. This server also has a local cache of recently looked up domain names. If a result is found locally, this is sent back to your computer, and your request ends here (this is common for popular and heavily requested services such as Google, Facebook, Twitter). If the request cannot be found locally, a journey begins to find the correct answer, starting with the internet’s root DNS servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AUTHORITATIVE DNS SERVER

A

An authoritative DNS server is the server that is responsible for storing the DNS records for a particular domain name and where any updates to your domain name DNS records would be made. Depending on the record type, the DNS record is then sent back to the Recursive DNS Server, where a local copy will be cached for future requests and then relayed back to the original client that made the request. DNS records all come with a TTL (Time To Live) value. This value is a number represented in seconds that the response should be saved for locally until you have to look it up again. Caching saves on having to make a DNS request every time you communicate with a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

COMMON HTML REQUEST HEADERS

A

HOST
USER-AGENT
CONTENT-LENGTH
ACCEPT-ENCODING
COOKIE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

HOST

A

Host:Some web servers host multiple websites so by providing the host headers you can tell it which one you require, otherwise you’ll just receive the default website for the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

USER-AGENT

A

User-Agent:This is your browser software and version number, telling the web server your browser software helps it format the website properly for your browser and also some elements of HTML, JavaScript and CSS are only available in certain browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CONTENT-LENGTH

A

Content-Length:When sending data to a web server such as in a form, the content length tells the web server how much data to expect in the web request. This way the server can ensure it isn’t missing any data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ACCEPT-ENCODING

A

Accept-Encoding:Tells the web server what types of compression methods the browser supports so the data can be made smaller for transmitting over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

COOKIE

A

Cookie:Data sent to the server to help remember your information (see cookies task for more information).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

COMMON HTTP RESPONSE HEADERS

A

SET-COOKIE
CACHE-CONTROL
CONTENT-TYPE
CONTENT-ENCODING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

SET-COOKIE

A

Set-Cookie:Information to store which gets sent back to the web server on each request (see cookies task for more information).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

CACHE-CONTROL

A

Cache-Control:How long to store the content of the response in the browser’s cache before it requests it again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

CONTENT-TYPE

A

Content-Type:This tells the client what type of data is being returned, i.e., HTML, CSS, JavaScript, Images, PDF, Video, etc. Using the content-type header the browser then knows how to process the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

CONTENT-ENCODING

A

Content-Encoding:What method has been used to compress the data to make it smaller when sending it over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

HTTP STATUS CODES
500-599

A

SERVER ERRORS
This is reserved for errors happening on the server-side and usually indicate quite a major problem with the server handling the request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

HTTP STATUS CODES
400-499

A

CLIENT ERRORS
Used to inform the client that there was an error with their request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

HTTP STATUS CODES
300-399

A

REDIRECTION
These are used to redirect the client’s request to another resource. This can be either to a different webpage or a different website altogether.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

HTTP STATUS CODES
200-299

A

SUCCESS
This range of status codes is used to tell the client their request was successful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

HTTP STATUS CODES
100-199

A

INFORMATION RESPONSE
These are sent to tell the client the first part of their request has been accepted and they should continue sending the rest of their request. These codes are no longer very common.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

COMMON STATUS CODES
201

A

CREATED
A resource has been created (for example a new user or new blog post).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

COMMON STATUS CODES
200

A

OK
The request was completed successfully.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

COMMON STATUS CODES
301

A

MOVED PERMANENTLY
This redirects the client’s browser to a new webpage or tells search engines that the page has moved somewhere else and to look there instead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

COMMON STATUS CODES
302

A

FOUND
Similar to the above permanent redirect, but as the name suggests, this is only a temporary change and it may change again in the near future.

38
Q

COMMON STATUS CODES
400

A

BAD REQUEST
This tells the browser that something was either wrong or missing in their request. This could sometimes be used if the web server resource that is being requested expected a certain parameter that the client didn’t send.

39
Q

COMMON STATUS CODES
403

A

FORBIDDEN
You do not have permission to view this resource whether you are logged in or not.

40
Q

COMMON STATUS CODES
401

A

NOT AUTHORIZED
You are not currently allowed to view this resource until you have authorised with the web application, most commonly with a username and password.

41
Q

COMMON STATUS CODES
404

A

PAGE NOT FOUND
The page/resource you requested does not exist.

42
Q

COMMON STATUS CODES
405

A

METHOD NOT ALLOWED
The resource does not allow this method request, for example, you send a GET request to the resource /create-account when it was expecting a POST request instead.

43
Q

COMMON STATUS CODES
500

A

INTERNAL SERVICE ERROR
The server has encountered some kind of error with your request that it doesn’t know how to handle properly.

44
Q

COMMON STATUS CODES
503

A

SERVICE UNAVAILABLE
This server cannot handle your request as it’s either overloaded or down for maintenance.

45
Q

ENCAPSULATION

A
46
Q

OCTET

A
47
Q

BIT

A

B

48
Q

BYTE

A
49
Q

TCP

A

TRANSMISSION CONTROL PROTOCOL

50
Q

UDP

A

USER DATAGRAM PROTOCOL

51
Q

TCP USAGE

A

TCPis used for situations such as file sharing, internet browsing or sending an email. This usage is because these services require the data to be accurate and complete (no good having half a file!).

52
Q

UDP USAGE

A

STREAMING

53
Q

TCP ADVANTAGES

A

Guarantees the accuracy of data.

Capable of synchronising two devices to prevent each other from being flooded with data.

Performs a lot more processes for reliability.

54
Q

TCP DISADVANTAGES

A

Requires a reliable connection between the two devices. If one small chunk of data is not received, then the entire chunk of data cannot be used.

A slow connection can bottleneck another device as the connection will be reserved on the receiving computer the whole time.

55
Q

UDP ADVANTAGES

A

UDPis much faster than TCP.

UDPleaves the application layer (user software) to decide if there is any control over how quickly packets are sent.

UDPdoes not reserve a continuous connection on a device as TCP does.

56
Q

UDP DISADVANTAGES

A

UDPdoesn’t care if the data is received.

It is quite flexible to software developers in this sense.

This means that unstable connections result in a terrible experience for the user.

57
Q

TCP LAYER

A

TRANSPORT LAYER

58
Q

UDP LAYER

A

TRANSPORT LAYER

59
Q

OSPF

A

OPEN SHORTEST PATH FIRST

60
Q

MAC

A

MEDIA ACCESS CONTROL

61
Q

NIC

A

NETWORK INTERFACE CARD

62
Q

DHCP

A

DYNAMIC HOST CONFIGURATION PROTOCOL

RESPONSIBLE FOR ASSIGNING AN IP ADDRESS TO THE SYSTEMS THAT TRY TO CONNECT TO A NETWORK

63
Q

AUTHENTICATION

A
64
Q

AUTHORIZATION

A
65
Q

BROKEN ACCESS CONTROL

A
66
Q

PRINCIPLE OF LEAST PRIVILEGE

A
67
Q

OWASP TOP 10

A
68
Q

WHAT IS INJECTION

A
69
Q

HOW TO AVOID INJECTION

A

proper validation and sanitization of the user’s input.

70
Q

TCP PACKET

A
71
Q

TCP PACKET HEADER

A
72
Q

THREE-WAY- HANDSHAKE

A
73
Q

UDP PACKET

A
74
Q

UDP PACKET HEADER

A
75
Q

STATEFUL FIREWALL

A
76
Q

STATELESS FIREWALL

A
77
Q

PROXY FIREWALL

A
78
Q

NGFW

A

NEXT GENERATION FIREWALLS

79
Q

PACKET FILTERING FIREWALLS

A
80
Q

VPN TECHNOLOGY
PPP

A
81
Q

VPN TECHNOLOGY:
PPTP

A

ThePoint-to-PointTunnelingProtocol (PPTP) is the technology that allows the data from PPP to travel and leave a network.

PPTP is very easy to set up and is supported by most devices. It is, however, weakly encrypted in comparison to alternatives.

82
Q

VPN TECHNOLOGY:
IPSEC

A

Internet Protocol Security (IPsec) encrypts data using the existingInternetProtocol (IP**) framework.

IPSec is difficult to set up in comparison to alternatives; however, if successful, it boasts strong encryption and is also supported on many devices.

83
Q

VPN BENEFITS

A

ALLOWS NETWORKS IN DIFFERENT GEOGRAPHICAL LOCATIONS TO BE CONNECTED

OFFERS PRIVACY

OFFERS ANONYMITY

84
Q

WHAT IS A ROUTER

A

Routers are network devices responsible for forwarding packets between networks. They make intelligent decisions based on routing protocols and their understanding of network topology to send data to the correct destination.

It’s a router’s job to connect networks and pass data between them. It does this by using routing (hence the name router!).

85
Q

VPN USES

A

Uses: VPNs are often used to protect sensitive data and to hide the user’s IP address. They are also commonly used for remote access to a corporate network, for privacy when browsing, and to bypass geographical internet restrictions.

86
Q

WHAT LAYER IS ROUTING ON?

A

LAYER 3 OF OSI (NETWORK LAYER)

87
Q

WHAT IS ROUTING?

A

Routing is the label given to the process of data travelling across networks. Routing involves creating a path between networks so that this data can be successfully delivered.

88
Q

IP HEADERS

A

TIME TO LIVE
CHECKSUM
SOURCE ADDRESS
DESTINATION ADDRESS

89
Q

TIME TO LIVE

A

This field sets an expiry timer for the packet to not clog up your network if it never manages to reach a host or escape!

90
Q

SOURCE ADDRESS

A

The IP address of the device that the packet is being sentfromso that data knows where toreturn to.

91
Q

CHECKSUM

A

This field provides integrity checking for protocols such as TCP/IP. If any data is changed, this value will be different from what was expected and therefore corrupt.

92
Q

DESTINATION ADDRESS

A

The device’s IP address the packet is being sent to so that data knows where to travel next.

93
Q

PACKET VS FRAME

A