OSI and TCP/IP Models Flashcards

4.1.1 Study Guide

1
Q

What are the OSI Layers

A

Physical
Data Link
Network
Transport
Session
Presentation
Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What happens at the physical layer

A

Converts a frame into bits for transmission/receiving over the physical connection medium.
Network hardware devices that function at layer 1 include NICs, hubs, repeaters, concentrators, amplifiers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are physical layer protocol data unit (PDU)

A

Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are common physical layer protocols

A

Electrical signal (copper wire)
Light Signal (optical fibre)
Radio Signal (air)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some physical network topologies

A

Ring
Bus
Star
Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are physical layer attack vectors

A

Passive sniffing
Excessive Electrical Interference
Cutting a cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens at the Data Link Layer

A

Responsible for formatting a packet for transmission
Adds the source and destination hardware address to the frame
Address Resolution Protocol (ARP) operates at layer 2
Switches and Bridges function at this layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What sublayers of Data Link Layer

A

Logical Link Control (LLC)
Media Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the Logical Link Control do?

A

Controls packet synchronization, flow control, and error checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the Media Access Control do?

A

It controls how devices on a network gain permission to transmit data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are common Data Link Layer protocols

A

MAC, ARP, Ethernet 802.3 (Wired)
LLDP, HDLC, PPP, DSL, IEEE 802.11(Wireless), SONET/SDH, VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Data Link Attack Vectors

A

Address Resolution Protocol spoofing
Man in the Middle Attack
Session Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens at the Network Layer

A

Responsible for logical addressing Providing routing or delivery guidance (not necessarily verifying guaranteed delivery)
Manages error detection and traffic control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are common Network Layers protocols

A

IPv4
IPv6
IPSec
OSPF
EIGRP
ICMP
RIP
NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Network Layer Attack Vectors

A

Man in the Middle Attack
Denial of Service
Spoofing IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What happens at the Transport Layer

A

Responsible for managing the integrity of a connection and controlling the session. Providing transparent data transport and end to end transmission control
Defines session rules like how much data each segment can contain, how to verify message integrity, and how to determine whether data has been lost
Segmentation, sequencing, and error checking happen on this layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are common Transport layer protocols

A

TCP
UDP
SSL
TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are Transport layer attack vectors

A

SYN Flood Attack
Trojans and other malware tend to target specific TCP and UDP ports
Session Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What happens at the Session Layer

A

Responsible for establishing, maintaining, and terminating communication sessions between two computers
Uses data streams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the 3 communications session phases

A

Connection establishment
Data Transfer
Connection release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are common Session layer implemenations

A

RPC
NFS
SMB
NetBIOS

22
Q

What are Session Layer attack vectors

A

Protocols such as NFS and NetBIOS may be vulnerable to DoS and root privilege attacks

23
Q

What happens at the Presentation Layer

A

Responsible for transforming data into format that any system following the OSI model can understand
Uses data streams

24
Q

What are Presentation Layer tasks

A

data representation
character conversion
data compression
data encryption

25
What are common Presentation layer implementations
Encryption protocols and Format types like ASCII EBCDICM TIFF JPEG, MPEG MIDI
26
What are Presentation Layer Attack Vectors
Crytanalytic Attacks such as Brute Force Ciphertext Only Know Plaintext Frequency Analysis
27
What happens at the Application Layer
Interfacing user applications, network services, or the Operating system with protocol stack Identifying and establishing availabilty of communication partners Determining resources availability Synchronizing communication Uses data streams
28
What are common Application Layer implementations
HTTP FTP LDAP Telnet
29
What are the TCP/IP Layers
Link Layer (Physical and Data Link) Internet Layer (Network) Transport Layer (Transport) Application Layer (Session, Presentation, and Application)
30
What is the Protocol Data Unit (PDU) at the Data Link Layer
Frames
31
Routing Protocols
Move routed protocol messages across a network. Defined at the Network Layer and specify how routers communicate Can be static or dynamic and categorized as interior or exterior Include Internetwork Packet Exchange (IPX) and Internet Protocol (IP)
32
Static Routing Protocol
Requires an admin to create/update routes on the router
33
Dynamic Routing Protocol
Can discover routers and determine best route to a given destination Routing table is periodically updated
34
Distance Vector Router Protocol
An interior router protocol that makes routing decisions based on distance (hop count), and vector (router egress interface)
35
Examples of Distance Vector routing protocol
Routing Information Protocol (RIP): uses hop count as it routing metric Interior Gateway Routing Protocol (IGRP) Enhanced Interior Gateway Routing Protocol (EIGRP)
36
Link State Routing Protocol
An interior routing protocol that uses router characteristics(e.g. speed, latency, error rates) to make next hop routing decisions
37
Examples of Link State routing protocols
Open Shortest Path First(OSPF) an interior gateway routing protocol developed for IP networks based on shortest path first or link state algorithm. Intermediate System to Intermediate System (IS-IS)
38
Interior Routing Protocol
As called "myopic" make next hop decisions based only on info related to the next immediate hop
39
Exterior Router Protocols
As called "far-sighted" makes hop decisions based on the entire remaining path (i.e.) vector
40
Border Gateway Protocol (BGP)
an exterior/path vector protocol
41
Transmission Control Protocol (TCP)
Major transport protocol in the internet suite of protocols. Provides reliable, connection oriented, full duplex streams. Use 3 way handshake: Synchronize (SYN), synchronize-acknowledge (SYN-ACK), and acknowledge(ACK)
42
User Datagram Protocol (UDP)
Connectionless protocol that provides fast, best effort delivery of datagrams(self-container unit of data)
43
What is the Protocol Data Unit (PDU) at the Transport Layer
Segments
44
What is the Protocol Data Unit (PDU) at the Network Layer
Packets
45
Simplex
A one way connection establishment in the session layer
46
Half Duplex
A connection establishment in the session layer where both communication devices can transmit/receive but not at the same time
47
Full Duplex
A connection establishment in the session layer where both communication devices can transmit/receive at the same time
48
What is the Protocol Data Unit (PDU) at the Session Layer
Data
49
What is the Protocol Data Unit (PDU) at the Session Layer
Data
50
What is the Protocol Data Unit (PDU) at the Application Layer
Data