Network Architecture Flashcards

1
Q

What is the mnemonic for the OSI model

A
All Presidents Since Truman Never Did Pot
A ppplication
P presentation
S session
T transport
N network
D data Link
P physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What layer(s) do we use data streams

A

Application, presentation, and session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do we call data packages in the transport layer?

A

TCP - Segment

UDP - Datagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What technology is found in the physical layer?

A

NICs, hubs, repeaters, concentrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the function of layer 1

A

Physical - Convert frame data into bits and transmit the bits across the physical medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the function of layer 2

A

Data Link - converts packets into frames. Some examples include: Ethernet, Token Ring, FDDI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the ARP do?

A

Performs IP to MAC lookups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the RARP do?

A

Reverse ARP…. MAC to IP lookup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the function of Layer 3

A

Network - Adds routing/ addressing information. Technology includes: Router, NAT, and Internet Protocol (IP), IPSEC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does a Brouter do and where does it operate?

A

Bridge router that attempts to route first and then bridge. Operates at level 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What happens in Layer 4?

A

Transport - Session management. TCP & UDP happens here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the TCP Handshake?

A

Syn
Syn/ Ack
Ack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens in Layer 5

A

Session - Establishes, maintains, and terminates sessions. Sessions are simplex, duplex, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What technology is found in the Session Layer

A

NFS, SQL, RPC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between full and half duplex?

A

Full is two way communication that can occur at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What happens at Layer 6

A

Presentation - Transforms the application data into a common OSI format (ASCII, JPEG, MPEG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What happens in Layer 7

A

Application - HTTP, FTP, EDI, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What layers exist in the TCP/IP model?

A

4 layers - Application, Transport, Internet, and Link

ATIL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the intersection points between OSI & TCP/IP?

A

TCP/IP Application layer combines OSI layers 5,6,&7 into 1 Application layer.

TCP/IP Link layer combines OSI layers 1&2 into 1 Link layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the function of a port?

A

Used in TCP to establish a connection between two systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How many ports exist in TCP?

A

65,536

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are service ports?

A

First 1024 ports in TCP used for well known applications (HTTP, FTP, Telnet, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are registered ports?

A

Registered by companies for products. Spans ports 1024-49151.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are dynamic ports?

A

Open use from 49152 - 65535

25
How is a TCP session terminated?
2 Methods FIN - Finish followed by Ack. Syncs up traffic RST - Reset... hard stop.
26
What is the transmission window?
Number of packets sent before an ACK is sent.
27
What are the key TCP headers?
``` Unskilled Attackers Pester Real Security Folk U - Urg, Urgent A - Ack, Acknowledgement P - PSH, Push R - RST, Reset S - Syn, Synchronization F - FIN, Finish ```
28
Class A subnet mask?
255.0.0.0 or /8
29
Class B subnet mask?
255.255.0.0 or /16
30
Class C subnet mask
255.255.255.0 or /24
31
What is the function of ICMP?
Health check protocol. Technology used: PING, Traceroute, and pathping.
32
What is IGMP
Internet Group Management Protocol - Supports multi-cast.
33
What port does telnet use?
TCP - 23
34
What port does FTP use?
TCP - 20 & 21
35
What port does TFTP use?
UDP - 69
36
What port does SMTP use?
TCP - 25
37
What port does POP3 Use?
TCP - 110
38
What port does IMAP use?
TCP - 143 This is an email client download utility.
39
What port does DHCP use?
UDP - 67 & 68
40
What port does HTTP use?
TCP - 80
41
What port does SSL Use?
TCP - 443
42
What port does LPD Use?
TCP - 515
43
What port does X Windows Use?
TCP 6000-6003
44
What port does BootP use?
UDP - 67 & 68
45
What port does NFS Use?
TCP - 2049
46
What port does SNMP use?
UDP 161 & 162
47
What is encapsulation and what problems exist?
The ability to carry lower level TCP protocols inside higher layers. Is bad because hackers can hide inside higher layers.
48
What is pre-admission philosophy?
Form of NAC that requires all policies be met before access to network is granted.
49
What is post-admission philosophy?
For of NAC that denies activity based on user activity.
50
What type of firewall filters traffic by inspecting the header against a rules table?
Static Packet
51
What does an application firewall perform?
Acts as a proxy for things happening in the application layer.
52
What is stateful packet inspection?
Firewall that looks at many pieces of information inside the packet including source and destination addresses or ports.
53
What layer does a switch operate?
Layer 2
54
What layer does a router operate?
Layer 3
55
What is the CALEA Law?
States that the government must allow a Telco to provide wiretap support. (bypasses strict end to end encryption).
56
What OSI model manages simplex & duplex communications?
Session
57
What technology implements 802.3
Ethernet
58
What is an example of a third generation firewall?
Stateful
59
Can a firewall block viruses?
False