S13 - Network Configurations Flashcards

(94 cards)

1
Q

stand for TCP/IP

A

Transmission Control Protocol / Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Link/Network interface layer

A

Puts frames in the physical network’s transmission media (copper wires/WI-FI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where can the data get to on the Link/Network Layer

A

Through the Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Internet Layer

A

Used to address packets and router them across the network, where to send the packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Common Protocols in Transport layer

A

TCP & UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Transport layer

A

Shows how to send the packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Application layer

A

contains all the protocols that perform higher level functions (e.g. email, encryption etc) Which format the data should be sent as

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do the 0s in the subnet mask refer to

A

Host bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do the 1s in the subnet mask refer to

A

Network bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define classful mask

A

A network class being aligned with perfect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define classless inter-domain routing (CIDR)

A

Allows for borrowing of some host bits and reassigning them to the network portion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the /24 after an IP refer to

A

the amount of network bits e.g. (255.255.255.0 = 24 bits to network and 8 to host)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

2 types of IPv4 IPs

A

Public (Routable), Private (Non-routable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Public IP

A

Can be accessed over the internet and is assigned to the network by an internet service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Private IPs

A

Can be used by anyone at any time, only within LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Network Address Translation (NAT)

A

Allows for less IP consumption, translates public to private and vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define Automatic Private IP addresses (APIPA)

A

Used when a device doesn’t have a static IP or cannot reach a DHCP address 169.254.0.0 - 169.254.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DHCP proccess

A

DORA - Discover, Offer, Request, Acknowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is static assignment

A

Manually typing the Ip for the host, subnet mask, default gateway, DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the components of a fully configured host

A

IP, subnet mask, default gateway, server address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define domain name system (DNS)

A

Translates the domain names used by the website into the IP address of its server. Names to numbers, numbers to names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define Windows Internet name service (WINS)

A

Identifies NetBIOS systems on a TCP/IP network and convert those NetBIOS names to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

4 protocols for dynamic assignment of critical info

A

BOOTP, DHCP, APIPA, ZeroConf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define BOOTP

A

legacy method of dynamically assigning IPs and allow workstation to load a copy of boot image over network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the modern version of BOOTP
DHCP
26
Benefit of IPIPA
Allows for quick config of a LAN without need for DHCP server
27
Drawback of APIPA in terms of communication
IPIPA devices can't be routed outside of network, can only communicate with IPIPA devices
28
Define Zero-Conf
New version of APIPA
29
Define DHCP reservation
Excludes some IP addresses from being handed to devices unless they meet a certain condition (e.g. assigning printers to having a certain IP)
30
Define Fully-Qualified Domain Name (FQDN)
Domain name under a top-top level provider (www/ftp/etc)
31
Define Uniform Resource Locator (URL)
Contains he FQDN with the method of accessing information (https://, http:/, ftp://)
32
Define Sender Policy Framework (SPF)
Method of configuring who can send emails to host
33
Define DomainKeys Identified Mail (DKIM)
provides the cryptographic authentication mechanism using a public key published as a DNS record
34
Define domain-based message authentication, reporting & conformance (DMARC)
Framework that is used for proper application of SPF and DKIM, using a policy that is published as a public DNS record
35
Define internal DNS
allows cloud instances on the same network access each other using internal DNS names
36
Define External DNS
records created around the domain names from a central authority and used on the public internet
37
Define Time to live (TTL)
tells the DNS resolver how long to cache a query before requesting a new one
38
Define DNS resolver/DNS cache
makes a local copy of every DNS entry it resolves when connecting to websites
39
Define recursive lookup
DNS server communicates with several other DNS servers to hunt down the IP address and return to the client
40
Define iterative lookup
Each DNS server responds directly to the client with an address for another DNS sever that may have the correct IP address
41
Define Virtual local area network (VLAN)
allows different networks to share the same physical hardware and provided added security and efficiency
42
Define VPN
Extends a private network across a public network and enables sending and receiving of data across shared/public networks
43
3 types of VPN configs
site to site, client to site, clientless
44
Define full tunnel VPN
Routes and encrypts all network requests through the VPN connection back to the headquarters
45
define split tunnel VPN
Routes and encrypts only the traffic bound for the HQ over the VPN, sends the rest of the traffic over regular internet
46
For VPNs in terms of security and performance which should we use
Security: Full tunnel Performance: Split tunnel
47
Define clientless VPN
Creates a secure remote-access VPN tunnel using a web browser without requiring any software or hardware clients
48
Define Secure Socket Layer (SSL)
[outdated] Provides cryptography and reliability using the upper layers of the OSI model (5,6,7)
49
Modern alternative to SSL
TLS
50
Define Transport Layer Security (TLS)
Provides secure web browsing over HTTPS
51
Benefits over IPv6
Larger address space, No broadcasts, No fragmentation, Can coexist with IPv4, simplified header (5 headers instead of 12)
52
Define Dual Stack
Simultaneously runs both the IPv4 and IPv6 protocols on the same network devices
53
Define tunneling
Allows an existing IPv4 router to carry IPv6 traffic
54
What does IPv6 use to represent itself
Hexadecimal, 128 bits
55
How to identify a mac address
6x2 e.g. 12:34:56:78:90:AB
56
Define Unicast address
Used to identify a single interface
57
Define Globally-routed
Similar to IPv4's unicast class A,B,C addresses and begins with 2000-3999
58
Define Link-Local/Local use
Used like a private IP in IPv4 that can only be used on the local area network and begins with FE80
59
Define Stateless Address Auto Config (SLAAC)
Eliminates the need to obtain addresses or other config information from a central server
60
Define Multicast address
Used to identify a set of interfaces and begins with FF
61
How do we identify a multicast address
begins with FF
62
Define anycast address
Used to identify a set of interfaces so that a packet can be sent to any member of a set
63
Define Extended Unique Identifier (EUI)
Allows a host to assign itself a unique 64-bit IPv6 interface identifier called EUI-64
64
Define DHCP Protocol
Allows DHCP to automatically assign addresses from a DHCPv6 server
65
Define Neighbour Discovery Protocol (NDP)
Used to determine the layer 2 addresses that are on a given network, used on IPv6
66
Define Port
Logical communication endpoint that exists on a computer or a server
67
Define Inbound port
Opening on a server that is listening for connection from a client
68
Define Outbound port
Opening created on a client in order to call out to a server that is listening for a connection
69
Port range
0-65,535
70
Define well-known ports
ports 0-1023 are considered well-known and are assigned by the internet assigned numbers authority (IANA)
71
Define registered ports
ports 1024 to 49151 are considered registered and are usually assigned to proprietary protcolos
72
Define Dynamic or Private ports
Ports 49152 to 65535 can be used by an application without being registered with IANA
73
What are dynamic or private ports usually used for
gaming, instant messaging and chat
74
FTP port + function
20,21 + provides insecure file transfers
75
Secure Shell (SSH) port + function
22 + secure remote control of another machine using a text- based environment
76
Telnet port + function
23 + Provides insecure remote control of another machine using a text-based environment
77
Simple Mail Transfer Protocol (SMTP) + function
25, Provides the ability to send emails over the network
78
Domain Name Service (DNS) port + function
53, Domain Names to IP addresses and Ip addresses to Domain Names
79
Dynamic Host Control Configuration (DHCP) Port + function
67,68 + Automatically provides network parameters such as assigned IP address, subnet mask, default gateway, and the DNS server
80
Hypertext Transfer Protocol (HTTP) Port + function
80, insecure web browsing
81
Post Office Protocol Version 3 (POP3) Port + function
110 + Used for receiving incoming emails
82
Network Basic I/O System (NetBIOS) Port + function
137,139 + File or printer sharing in a WINDOWS network
83
Internet Mail Application Protocol (IMAP) Port + function
143, A newer method of retrieving incoming emails, better version of POP3
84
Simple Network Management Protocol (SNMP) port + function
161,162 + Used to collect data about network devices and monitor their status
85
Lightweight Directory Access Protocol (LDAP) port + function
389 + provides directory services to your network
86
Hypertext Transfer Protocol - Secure (HTTPS) port + function
443 + Secure and encrypted version of web browsing
87
Server Message Block (SMB) port + function
445 + Windows file and printer sharing services
88
Remote Desktop Protocol (RDP) port + function
3389 + graphical remote control of another client/server
89
Define Transmission Control Protocol (TCP)
Connection-oriented protocol, which means it's a reliable way to transport segments across the network, involves checks to see if the data was transmitted successfully
90
What is involved in the 3 way handshake
SYN, SYN/ACK, ACK
91
Define User Datagram Protocol (UDP)
Unreliable and it transmits segments called datagrams, great for audio and visual streaming
92
TCP (connection-oriented) is used for
SSH, HTTP, HTTPS
93
UDP (connectionless) is used for
Audio/Video streaming, DHCP, TFTP
94
Trivial File Transfer Protocol (TFTP) port + function
69 + connectionless protocol that uses UDP as its transport