Module 3 Flashcards

(50 cards)

1
Q

Ports

A

A # used to uniquely identify network connection & specify services as apps that is destined 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Open Ports

A

Means a device is listening or talking. If unused it can be a security risk in which the router will attempt to keep close aka firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Well Known Ports

A

Ports that are already reserved (0 - 1023). Mostly owned by big tech firms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Registered Ports

A

ports that can be registered with companies through (IANA) ( 1024 - 49,151)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Private Ports

A

ports ( 49,152 - 65535) that can be used by anyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet Assigned Numbers Authority - IANA

A

Organization that assigns ports & IP addresses to companies as well search for information on ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Transmission Control Protocol - TCP

A

it is connection-oriented makes sure there is a 3-way handshake. Aka TCP segment. Favors safety over speed & has Sequence & acknowledgment #s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP Cont.

A
  1. Orders the stream.
  2. Detects errors & connections.
  3. Flow control has a sliding window to control the amount of segment coming in or out.
  4. Congestion Control.
  5. Complex & heavyweights.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TCP Connection Establishment

A
  1. Source computer send SYN
  2. Destination Computer send an SYN + ACK.
  3. Source computer sends ACK.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TCP Connection Termination

A
  1. Device timeout or turns off.
  2. Source computer sends a FIN.
  3. Destination computers send ACK.
  4. Destination computer sends FIN + ACK.
  5. Source computer send ACK.
    (Session Closed)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

User Datagram Protocol - UDP

A

Gets there if it gets there. Called a UDP datagram. Favors speed over safety and has unreliable delivery. Used when loss can be tolerated. Has length & checksum. It is lightweight & fast, not ordered, and no congestion control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NETSTAT

A

(-a, -b, -n, -o,-r) to know more information about the traffic happening in your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port Forwarding - PF

A

Any traffic arriving on a specific TCP or UDP port will forward 2 a defined internal host & port. Punches a hole in firewall- FW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Domain Name System - DNS

A

resolves IP address based on Fully Qualified Domain Names (FQDNs). Lets us visits websites without knowing the long IP address #.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Nslookup

A

Used in command prompt/powershell to find the IP @.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fully Qualified Domain Names - (FQDNs)

A

identifies the specific server or host @ the Domain. Ex: www.google.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Uniform Resource Locator - URL

A

Includes the FQDNS & protocol such as HTTP, HTTPS, & FTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Public DNS Server

A

a free 2 use DNS server on the public internet. Resolves public FQDNs 2 IP addresses. ISP have their own DNS server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Private DNS Server

A

Provides internal hostname lookups within a private organization. These names are not part of the public DNS server and are associated w/ an organizations private IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Split Horizon DNS aka Split Brain

A

A mechanism 4 DNS server 2 supply different results based on the source. When a company hosts their own website with public facing DNS. Web will use DNS to lookup up internal private IP addresses to provide to the public facing DNS to website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Secure Shell - SSH

A

command line access to network nodes. Sessions are encrypted best to use v2 and replaces protocols like Telnet.

22
Q

Dynamic DNS - DDNS

A

is a method of automatically updating a name server in the Domain Name System (DNS), often in real-time, with the active DDNS configuration of its configured hostnames addresses or other information.

23
Q

TELNET

A

similar to SSH but unsecure. Can see clear/plain texts even passwords. Best to be disabled.

24
Q

Internet control Messaging Protocol - ICMP

A

Checks IP connectivity 2 any network node uses ping (echo request & echo reply). Works at L3 so no port#. traceroutes uses it but org. block to prevent DoS attacks.

25
Virtual Terminal Lines - VTY
mostly used 2 configure devices in the network.
26
File transfer Protocol - FTP
used to retrieve/transfer files from an FTP server on the network. It is connection oriented, work on ports 20 - FTP & 21 - FTP Data.
27
Trivial FTP
is a simple protocol for transferring files, connectionless, implemented on top of the UDP/IP protocols using well-known port# 69.
28
Open Systems Interconnected Devices - OSI Model
``` the International Standards Organization (ISO) developed a conceptual model as a way to reference inter computer communication processes. This 7 layer visual model was developed in 1984. 1. Application 2. Presentation 3. Session 4. Transport 5. Network 6. Data Link 7. Physical ```
29
OSI - Application Layer 7
Application services for end user processes such as file transfers, email, remote terminal access, domain name resolution, web transfer, network management etc. Protocols such as FTP & Telnet.
30
OSI - Presentation Layer 6
Provides translation to/from the application layer. Performs data encryption, decryption, compression and decompression. Associated with file formats such as JPEG, MPEG etc.
31
OSI - Session Layer 5
Coordinates, establishes, manages and tears down sessions between applications on either side of the connection. Maintains separate sessions for the different applications data streams.
32
OSI - Transport L4
Segments and reassembles data from upper layers and unites them into the same data stream. Provides flow control for data loss prevention as well as reliable and unreliable transport methods.
33
OSI - Network L3
Provides logical network addressing and path determination/routing services. Responsible for packet delivery, fragmentation, and sequencing. This is the layer where Internet Protocol resides.
34
OSI - Data Link L2
LLC & MAC
35
Logical link Control - LLC
includes the Logical Link Control (LLC) sublayer which provides error detection and control.
36
Media Access Control - MAC
delivers frames using unique hardware addressing via the Media Access Control (MAC) sublayer.
37
OSI - Physical L1
Turns raw bits into electrical signaling and defines physical network media such as copper cabling, fiber optics, and wireless transmission standards. Concerned with bit rates and transmission modes.
38
Protocol Data Unit - PDU
is used to describe the data as it moves through each layer. ex. Data (L7-5), Segment (L4), Packet (L3), Frame (L2), & Bits (L1)
39
Transport Layer Security - TLS
TLS is a cryptographic protocol that provides end-to-end communications security over networks and is widely used for internet communications and online transactions (IETF standard).
40
Secure Socket Layer - SSL
is a networking protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet.
41
Network Basic Input/Output System - NetBIOS
file & network sharing and of old age.
42
Password Authentication Protocol - PAP
is a password-based authentication protocol used by Point to Point Protocol (PPP) to validate users. It is unsecure yet supported by all devices.
43
Session Initiation Protocol - SIP
is a signaling protocol used for initiating, maintaining, and terminating real-time sessions that include voice, video and messaging applications. Part of VoIP.
44
Real-time Protocol - RTP
responsible for delivering audio and video over IP networks.
45
Encapsulating Security Payload - ESP
is a protocol within the IPSec for providing authentication, integrity and confidentially of network packets data/payload in IPv4 and IPv6 networks.
46
Enhanced Interior Gateway Routing Protocol - EIGRP
is an advanced distance-vector routing protocol that is used on computer networks for automating routing decisions and configuration.
47
Open Shortest Path First - OSPF
is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior gateway protocols (IGPs), operating within a single autonomous system (AS).
48
Transmission Control Protocol/ Internet Protocol - TCP/IP
The TCP/IP model was created for referencing protocols in the TCP/IP stack. It does not include things like physical wire and transmission specifications such as Ethernet. Created by DARPA aka a DOD model. A similar representation of the OSI model. 1. Application 2. Transport 3. Internet 4. Network (Link Layer)
49
Client to Server Model
client access resources via a centralized server. Server requires dedicated infrastructure & service.
50
Peer 2 Peer - P2P
peers simply share information with each other. Sharing of resources is local and uses remote sharing programs like BitTorrent, Filetopic, & Gnutella. Peer host can be both client & server, resources are not centralized, & difficult 2 administrate for large networks.