Network Flashcards
(42 cards)
Used to explain network communications between a host and remote device over LAN or WAN
OSI Model
Layer of OSI Model represent the actual network cables and radio waves used to carry date over network
Physical Layer
A data carried over a network to Physical layer
Bits
Describes how a connection is established, maintained and transferred over the physical layer and uses physical addressing
MAC Addresses
Data Link Layer
Its a group of bits in the data link layer
Frames
Uses logical address to route or switch information and between host, the network and the internetworks
Network Layer
At network layer the frames are taken and group. An example of this are the IP addresses.
Packets
Manages and ensures transmission of the packets occurs from a host to a designation using either TCP or UDP
Transport layer
Manages the establishment, termination and synchronization of a session over the network
Session Layer
Translate the information into a format that the sender and receiver both understand
Presentaion Layer
Layer from which the message is created, formed and originated. It consist of high level protocols like HTTP, SMTP and FTP
Application Layer
It is the combine evolution of hubs and bridges. It improves the data transfer and security through the intelligent use of MAC Addresses being able to figure out where a device is and only sending information out that particular port of the switch and ignoring the rest.
Switch
Attempt to overwhelmed the limited switch memory set aside to store the MAC address for each port and this is known as the content addressable memory or CAM table
MAC Flooding
Occurs when an attacker masks their own MAC address to pretend they have the MAC address of another device
MAC Spoofing
It is a man in the middle (MitM) attack that allows the attacker to intercept the communication between network devices. The forge the responses advertise that the correct MAC address for both IP addressess, belongin to the router and workstation, is the attacker’s MAC address ( MAC Spoofing). Mac spoofing is often combine with this attack.
ARP Spoofing/ ARP Poinsoning
Occurs when an attacker attempts to gain physical access.
Physical tampering
It operates at layer lll
Used to connect two or more networks to form an internetwork
It rely on a packets IP Addresses to determine the proper destination
Once on the network, it conducts an ARP request to find final destination
Routers
It can be configure on router’s interface to control the flow of traffic into or put of a
Certain part of the network.
It is an ordered set of rules that a router uses to decide where to permit or deny traffic based upon given characteristics like its source or destination IP address the ports associated with it and the application.
Access Control List
It is used to trick a router’s ACL
IP Spoofing
Focuses on providing controlled access to publicly available servers that are hosted within your organization network
De-Militarized Zone DMZ
Can be created to provide addtional protection for some servers
Sub zones
Specialized type of DMZ that is created for your partner organization to access overa wide area network
Extranet
Used when only one company is involved
Intranet
Any host that accepts inbound connections from the internet
Internet-facing host