DNS Flashcards

(95 cards)

1
Q

DNS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DNS REQUEST

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DNS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LOAD BALANCER

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CDN

A

CONTENT DELIVERY NETWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IP ADDRESS

A

FORMAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISP

A

INTERNET SERVICE PROVIDER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WHAT IS A WEB SERVER

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

STATIC CONTENT

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DYNAMIC CONTENT

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

FRONT END

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BACK END

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VIRTUAL HOST

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

LAN

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

VPN

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ETHERNET

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ROOT DNS SERVER

A

The root servers act as the DNS backbone of the internet; their job is to redirect you to the correct Top Level Domain Server, depending on your request. If, for example, you requestwww.tryhackme.com, the root server will recognise the Top Level Domain of .com and refer you to the correct TLD server that deals with .com addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RECURSIVE DNS SERVER

A

A Recursive DNS Server is usually provided by your ISP, but you can also choose your own. This server also has a local cache of recently looked up domain names. If a result is found locally, this is sent back to your computer, and your request ends here (this is common for popular and heavily requested services such as Google, Facebook, Twitter). If the request cannot be found locally, a journey begins to find the correct answer, starting with the internet’s root DNS servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AUTHORITATIVE DNS SERVER

A

An authoritative DNS server is the server that is responsible for storing the DNS records for a particular domain name and where any updates to your domain name DNS records would be made. Depending on the record type, the DNS record is then sent back to the Recursive DNS Server, where a local copy will be cached for future requests and then relayed back to the original client that made the request. DNS records all come with a TTL (Time To Live) value. This value is a number represented in seconds that the response should be saved for locally until you have to look it up again. Caching saves on having to make a DNS request every time you communicate with a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

COMMON HTML REQUEST HEADERS

A

HOST
USER-AGENT
CONTENT-LENGTH
ACCEPT-ENCODING
COOKIE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

HOST

A

Host:Some web servers host multiple websites so by providing the host headers you can tell it which one you require, otherwise you’ll just receive the default website for the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

USER-AGENT

A

User-Agent:This is your browser software and version number, telling the web server your browser software helps it format the website properly for your browser and also some elements of HTML, JavaScript and CSS are only available in certain browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CONTENT-LENGTH

A

Content-Length:When sending data to a web server such as in a form, the content length tells the web server how much data to expect in the web request. This way the server can ensure it isn’t missing any data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ACCEPT-ENCODING

A

Accept-Encoding:Tells the web server what types of compression methods the browser supports so the data can be made smaller for transmitting over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
COOKIE
**Cookie:** Data sent to the server to help remember your information (see cookies task for more information).
26
COMMON HTTP RESPONSE HEADERS
SET-COOKIE CACHE-CONTROL CONTENT-TYPE CONTENT-ENCODING
27
SET-COOKIE
**Set-Cookie:** Information to store which gets sent back to the web server on each request (see cookies task for more information).
28
CACHE-CONTROL
**Cache-Control:** How long to store the content of the response in the browser's cache before it requests it again.
29
CONTENT-TYPE
**Content-Type:** This tells the client what type of data is being returned, i.e., HTML, CSS, JavaScript, Images, PDF, Video, etc. Using the content-type header the browser then knows how to process the data.
30
CONTENT-ENCODING
**Content-Encoding:** What method has been used to compress the data to make it smaller when sending it over the internet.
31
HTTP STATUS CODES 500-599
SERVER ERRORS This is reserved for errors happening on the server-side and usually indicate quite a major problem with the server handling the request.
32
HTTP STATUS CODES 400-499
CLIENT ERRORS Used to inform the client that there was an error with their request.
33
HTTP STATUS CODES 300-399
REDIRECTION These are used to redirect the client's request to another resource. This can be either to a different webpage or a different website altogether.
34
HTTP STATUS CODES 200-299
SUCCESS This range of status codes is used to tell the client their request was successful.
34
HTTP STATUS CODES 100-199
INFORMATION RESPONSE These are sent to tell the client the first part of their request has been accepted and they should continue sending the rest of their request. These codes are no longer very common.
35
COMMON STATUS CODES 201
CREATED A resource has been created (for example a new user or new blog post).
35
COMMON STATUS CODES 200
OK The request was completed successfully.
36
COMMON STATUS CODES 301
MOVED PERMANENTLY This redirects the client's browser to a new webpage or tells search engines that the page has moved somewhere else and to look there instead.
37
COMMON STATUS CODES 302
FOUND Similar to the above permanent redirect, but as the name suggests, this is only a temporary change and it may change again in the near future.
38
COMMON STATUS CODES 400
BAD REQUEST This tells the browser that something was either wrong or missing in their request. This could sometimes be used if the web server resource that is being requested expected a certain parameter that the client didn't send.
39
COMMON STATUS CODES 403
FORBIDDEN You do not have permission to view this resource whether you are logged in or not.
40
COMMON STATUS CODES 401
NOT AUTHORIZED You are not currently allowed to view this resource until you have authorised with the web application, most commonly with a username and password.
41
COMMON STATUS CODES 404
PAGE NOT FOUND The page/resource you requested does not exist.
42
COMMON STATUS CODES 405
METHOD NOT ALLOWED The resource does not allow this method request, for example, you send a GET request to the resource /create-account when it was expecting a POST request instead.
43
COMMON STATUS CODES 500
INTERNAL SERVICE ERROR The server has encountered some kind of error with your request that it doesn't know how to handle properly.
44
COMMON STATUS CODES 503
SERVICE UNAVAILABLE This server cannot handle your request as it's either overloaded or down for maintenance.
45
ENCAPSULATION
46
OCTET
47
BIT
B
48
BYTE
49
TCP
TRANSMISSION CONTROL PROTOCOL
50
UDP
USER DATAGRAM PROTOCOL
51
TCP USAGE
TCP is used for situations such as file sharing, internet browsing or sending an email. This usage is because these services require the data to be accurate and complete (no good having half a file!).
52
UDP USAGE
STREAMING
53
TCP ADVANTAGES
Guarantees the accuracy of data. Capable of synchronising two devices to prevent each other from being flooded with data. Performs a lot more processes for reliability.
54
TCP DISADVANTAGES
Requires a reliable connection between the two devices. If one small chunk of data is not received, then the entire chunk of data cannot be used. A slow connection can bottleneck another device as the connection will be reserved on the receiving computer the whole time.
55
UDP ADVANTAGES
UDP is much faster than TCP. UDP leaves the application layer (user software) to decide if there is any control over how quickly packets are sent. UDP does not reserve a continuous connection on a device as TCP does.
56
UDP DISADVANTAGES
UDP doesn't care if the data is received. It is quite flexible to software developers in this sense. This means that unstable connections result in a terrible experience for the user.
57
TCP LAYER
TRANSPORT LAYER
58
UDP LAYER
TRANSPORT LAYER
59
OSPF
OPEN SHORTEST PATH FIRST
60
MAC
MEDIA ACCESS CONTROL
61
NIC
NETWORK INTERFACE CARD
62
DHCP
DYNAMIC HOST CONFIGURATION PROTOCOL RESPONSIBLE FOR ASSIGNING AN IP ADDRESS TO THE SYSTEMS THAT TRY TO CONNECT TO A NETWORK
63
AUTHENTICATION
64
AUTHORIZATION
65
BROKEN ACCESS CONTROL
66
PRINCIPLE OF LEAST PRIVILEGE
67
OWASP TOP 10
68
WHAT IS INJECTION
69
HOW TO AVOID INJECTION
proper validation and sanitization of the user’s input.
70
TCP PACKET
71
TCP PACKET HEADER
72
THREE-WAY- HANDSHAKE
73
UDP PACKET
74
UDP PACKET HEADER
75
STATEFUL FIREWALL
76
STATELESS FIREWALL
77
PROXY FIREWALL
78
NGFW
NEXT GENERATION FIREWALLS
79
PACKET FILTERING FIREWALLS
80
VPN TECHNOLOGY PPP
81
VPN TECHNOLOGY: PPTP
The Point-to-Point Tunneling Protocol (**PPTP**) is the technology that allows the data from PPP to travel and leave a network.  PPTP is very easy to set up and is supported by most devices. It is, however, weakly encrypted in comparison to alternatives.
82
VPN TECHNOLOGY: IPSEC
Internet Protocol Security (IPsec) encrypts data using the existing **Internet Protocol (**IP**) framework. IPSec is difficult to set up in comparison to alternatives; however, if successful, it boasts strong encryption and is also supported on many devices.
83
VPN BENEFITS
ALLOWS NETWORKS IN DIFFERENT GEOGRAPHICAL LOCATIONS TO BE CONNECTED OFFERS PRIVACY OFFERS ANONYMITY
84
WHAT IS A ROUTER
Routers are network devices responsible for forwarding packets between networks. They make intelligent decisions based on routing protocols and their understanding of network topology to send data to the correct destination. It's a router's job to connect networks and pass data between them. It does this by using routing (hence the name router!).
85
VPN USES
Uses: VPNs are often used to protect sensitive data and to hide the user's IP address. They are also commonly used for remote access to a corporate network, for privacy when browsing, and to bypass geographical internet restrictions.
86
WHAT LAYER IS ROUTING ON?
LAYER 3 OF OSI (NETWORK LAYER)
87
WHAT IS ROUTING?
Routing is the label given to the process of data travelling across networks. Routing involves creating a path between networks so that this data can be successfully delivered.
88
IP HEADERS
TIME TO LIVE CHECKSUM SOURCE ADDRESS DESTINATION ADDRESS
89
TIME TO LIVE
This field sets an expiry timer for the packet to not clog up your network if it never manages to reach a host or escape!
90
SOURCE ADDRESS
The IP address of the device that the packet is being sent **from** so that data knows where to **return to**.
91
CHECKSUM
This field provides integrity checking for protocols such as TCP/IP. If any data is changed, this value will be different from what was expected and therefore corrupt.
92
DESTINATION ADDRESS
The device's IP address the packet is being sent to so that data knows where to travel next.
93
PACKET VS FRAME