Networks Flashcards

1
Q

Name the two types of Networking Conceptual Models

A

OSI “Open System Interconnect” and TCP/IP “ Transfer Control Protocol/ Internet Protocol”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the layers present in the OSI model

A
  1. Application
  2. Presentation
  3. Session
  4. Transport
  5. Network
  6. Data link
  7. Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name the layers included in the TCP/IP model

A
  1. Application
  2. Transport
  3. Internet
  4. network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the Application level do??

A

Computer Interaction level in which the user can interact with the data present.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the Presentation level do??

A

“Compression/ Decompression”

Data encryption change data packets into a useable format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the Session level do??

A

“Timing”

Maintains the connections, and is responsible for controlling the parts/ sessions. Makes sure the data can get accessed by the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the Transport level do??

A

Transmits data using transmission protocols including TCP and UDP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the Network Link level do??

A

Defines the path that the data will take.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the Data Link level do??

A

Defines the format of data on the network.

E.g. JPEG or GIF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the Physical level do??

A

Transmits raw bit data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What Layers make the data into Packets or Streams??

A
  1. Transport Layer
  2. Network Link
  3. Data Link Level
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define “Vulnerability”

A

A weakness a system already has.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define “Threat”

A

Something that could happen because of a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name the most important IP addresses

A

FTP Data: 20
FTP Control: 21
HTTP: 80
HTTPS: 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a “Port Number”??

A

A set of numbers that defines a software or protocol.
E.g. 80 for HTTP

It tells a Computer what Application to send the data too.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an “IP Address”??

A

A set of numbers that define a Server or Device.

It tells a Network to connect to a specific device.

17
Q

List the features of a Firewall

A
  1. Network Security System
  2. It creates a barrier for personal devices
  3. They filter legitimate data from Mal. data
  4. Doesn’t work with encrypted data
  5. Can be Hardware and Software
18
Q

What is a “Proxy Server”??

A

Servers that can confuse harmful data. It does this by performing fake actions.

Like a Server Cloak.

19
Q

List some Network Vulnerabilities

A
  1. Hackers can see what ports are being most used E.g. Port 80, then it can be attacked
  2. External Storage Devices can be used to bring Mal. code into a network.
  3. Ports can be Open and Unsecure, meaning all ports are at risk of being hacked. A Firewall can block any unused ports to increase security.
20
Q

Define “Network Access Control” (NAC)

A

A set of instructions/ protocols that define how devices need to act on a network.

21
Q

How is NAC implemented??

E.g. What questions are asked??

A
  1. What Device is it??
  2. What Software or Applications have been Downloaded onto the device??
  3. Where is the device Located??
  4. Who has Access to that device??
22
Q

Define “Principle of Least Privilege”

A

A user can join a Network, but that are given very limited accessibility and actions.

23
Q

Define “Mandatory Access Control”

A

Anyone that has joined a Network can only access data if they have appropriate clearance.

24
Q

Define “Discretionary Access Control”

A

A user that joins a Network will need the Data Owners permission to access a specific file.

25
Define "Role-Based Control"
Only certain Permissions are given to a specific user/ group on a Network.
26
Define "Rule-Based Control"
A set of Permissions that are Condition-Specific. | E.g. Certain times of day.
27
Define "Data Access Control" (DAC)
After a device has joined a Network, a DAC must give the appropriate Permissions.
28
Define "Packet Filtering"
The firewall inspects the Packet coming into the network. If the Packet is flagged, then it is NOT authorised.
29
Define "Application Level"
"Application Level" controls the packets coming in and out of an application.
30
Define "Inbound - Outbound"
Set of rules a packet must follow when entering or exiting a network/ application.
31
_____ "Allow the traffic through"
Accepted
32
_____ "Dropped with the 'Unreachable' reply"
Rejected
33
_____ "Dropped with no reply"
Dropped