Networking Flashcards

Networking (70 cards)

1
Q

What is the OSI model used for?

A

To standardize network communication across seven layers, from physical to application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the 7 layers of the OSI model.

A

Physical, Data Link, Network, Transport, Session, Presentation, Application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What protocol is used for assigning IP addresses dynamically?

A

DHCP (Dynamic Host Configuration Protocol).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the function of ARP?

A

ARP maps IP addresses to MAC addresses on a local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does DNS do in a network?

A

Resolves domain names (like google.com) into IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a subnet mask?

A

A value that defines the network and host portions of an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between a public and private IP address?

A

Public IPs are routable on the internet; private IPs are used internally and are non-routable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a default gateway?

A

A device (usually a router) that connects local devices to external networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is NAT (Network Address Translation)?

A

A method of remapping private IP addresses to a public IP address for internet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What command is used to view IP address configuration on Windows?

A

ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between TCP and UDP?

A

TCP is connection-oriented and reliable; UDP is faster but connectionless and less reliable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What port does HTTP use?

A

Port 80 (TCP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What port does HTTPS use?

A

Port 443 (TCP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What port does DNS typically use?

A

Port 53 (UDP, sometimes TCP for zone transfers).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the role of port 22?

A

Used by SSH (Secure Shell) for secure remote access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does a network packet contain?

A

Header (source, destination, protocol info) and payload (data).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is lateral movement in network security?

A

Movement from one host to another within a network after initial access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is packet sniffing?

A

Capturing network packets to analyze traffic (e.g., with Wireshark or tcpdump).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is beaconing behavior in network traffic?

A

Repeated outbound communication attempts to an external server (often for C2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a SYN flood attack?

A

A DoS attack where a target is overwhelmed with TCP connection requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the primary purpose of a firewall?

A

To allow or block traffic based on predefined security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the function of a proxy server?

A

Acts as an intermediary between client and server, often used for filtering and caching.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a DMZ in networking?

A

A demilitarized zone that separates internal networks from untrusted external networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is VLAN segmentation?

A

Logical separation of networks at the switch level for better security and management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
What is the difference between ingress and egress traffic?
Ingress is inbound to a network; egress is outbound from a network.
23
What is abnormal traffic on port 445 usually indicative of?
Possible SMB-based attacks, like EternalBlue (used in WannaCry).
24
What is a reverse shell in network terms?
A connection initiated from the victim to the attacker’s server, providing remote access.
25
What can excessive DNS queries from one host indicate?
Possible data exfiltration or malware beaconing.
26
What is ICMP used for?
Sending diagnostic information like ping and traceroute.
27
How do SOC analysts use netflow or PCAP data?
To analyze traffic patterns, detect anomalies, and investigate security incidents.
28
What is the primary function of a Web Server?
To host and deliver web content over HTTP or HTTPS.
28
What does a DNS Server do?
Resolves domain names into IP addresses.
29
What is an SMTP Server used for?
Sending outgoing emails.
30
What is the role of a POP3/IMAP Server?
Receiving and storing emails for client access.
31
What is an FTP Server used for?
Transferring files between systems over the network.
32
What does a DHCP Server provide?
Dynamically assigns IP addresses to devices on a network.
33
What is the role of a Database Server?
Stores, manages, and serves data to other systems or apps.
34
What is a Proxy Server used for?
Intermediates between client and internet to cache/filter requests.
35
What is a File Server?
Provides centralized storage and access to files for users and systems.
36
What does a Domain Controller do?
Authenticates and authorizes users in a Windows Active Directory environment.
37
What is an Application Server?
Hosts and runs specific applications for client use.
38
What does a RADIUS Server do?
Provides centralized Authentication, Authorization, and Accounting (AAA) services.
39
What is the role of an NTP Server?
Synchronizes the clocks of systems over the network.
40
What is a Mail Relay Server?
Forwards email between mail servers or domains.
41
What is a SIEM Server?
Collects, correlates, and analyzes logs from various sources for security monitoring.
42
What port does SSH use?
Port 22 (TCP)
43
Which port is used by FTP (data transfer)?
Port 20 (TCP)
44
What port does FTP (control command) use?
Port 21 (TCP)
45
Which port is used for SMTP?
Port 25 (TCP)
46
What port is used for DNS?
Port 53 (UDP/TCP)
47
Which port is used for HTTP?
Port 80 (TCP)
48
What port is used for HTTPS?
Port 443 (TCP)
49
What port is used for POP3?
Port 110 (TCP)
50
What port is used for IMAP?
Port 143 (TCP)
51
What port does SMB use?
Port 445 (TCP)
52
What port is commonly used for RDP?
Port 3389 (TCP)
53
What is a Man-in-the-Middle (MitM) Attack?
An attacker intercepts and possibly alters communication between two parties.
54
What is a DDoS Attack?
A Distributed Denial of Service attack overwhelms a server or service with traffic from multiple sources.
54
What port is used by LDAP?
Port 389 (TCP/UDP)
55
What is ARP Spoofing?
A technique where an attacker sends fake ARP messages to associate their MAC address with another device’s IP.
56
What is a DNS Poisoning Attack?
Corrupting the DNS cache to redirect traffic to malicious sites.
57
What is IP Spoofing?
Sending packets with a forged source IP to masquerade as a trusted system.
58
What is a Ping of Death?
Sending malformed or oversized packets to crash or disrupt a target system.
59
What is a TCP SYN Flood Attack?
An attacker sends many TCP SYN packets to exhaust server resources.
60
What is Port Scanning?
A technique to discover open ports and services on a system.
61
What is a Replay Attack?
An attacker captures legitimate data and resends it to trick the recipient.
62
What is Packet Sniffing?
Capturing and analyzing network traffic, often used in MitM attacks.
63
What is DNS Tunneling?
A method of data exfiltration or command/control using DNS protocol.
64
What is a Zero-Day Attack?
An attack that exploits a vulnerability before the vendor has patched it.
65
What is Lateral Movement in a network attack?
The technique used by attackers to move from one compromised host to others within a network.