Networking Flashcards

(33 cards)

1
Q

What is a network (technically and practically)?

A

A network is a system of interconnected devices that communicate using standardized protocols (like TCP/IP). Data is broken into packets, sent across physical or wireless connections, and reassembled at the destination. ISSOs care because every connection is a potential attack path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an IP address and how is it used in communication?

A

An IP address uniquely identifies a device on a network and allows routing systems to determine where packets should be sent. When you send data, it includes a source IP and destination IP so routers can direct traffic correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between private and public IPs and why does it matter?

A

Private IPs (e.g., 192.168.x.x) are used inside networks and are not routable on the internet. Public IPs are globally reachable. ISSOs care because systems with public IPs are exposed to external threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a port in technical terms and how does it function?

A

A port is a logical communication endpoint tied to a specific service or application. When traffic reaches a device, the port number tells the OS which service should handle the request (e.g., web server, RDP service).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why do ports exist instead of just using IP addresses?

A

Because a single system runs multiple services simultaneously. Ports allow the system to distinguish between traffic types (web, remote access, email, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does it mean when a port is “open” at a system level?

A

A service is actively listening on that port and will accept incoming connections. This means external or internal systems can attempt to communicate with that service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is an open port a security risk?

A

Each open port exposes a service that could contain vulnerabilities. If the service is misconfigured or outdated, attackers can exploit it to gain access, execute code, or move laterally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of communication uses port 443 and why is it commonly open?

A

HTTPS (secure web traffic). It is commonly open because most applications require encrypted web communication. It uses TLS to encrypt data in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of communication uses port 3389 and why is it risky?

A

RDP (Remote Desktop Protocol). It allows remote login to systems. It’s risky because attackers often brute-force credentials or exploit vulnerabilities to gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of communication uses port 22 and when is it used?

A

SSH (Secure Shell). Used for secure remote command-line access to systems (commonly Linux servers). It encrypts traffic but is still a target if exposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of communication uses port 21 and why is it insecure?

A

FTP (File Transfer Protocol). It transfers files without encryption, meaning credentials and data can be intercepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a firewall and how does it actually work?

A

A firewall inspects incoming and outgoing traffic based on rules (IP, port, protocol) and decides whether to allow or block it. It acts as a gatekeeper controlling access to systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a firewall rule look like in practice?

A

Allow TCP 443 from any → enables web access
Deny TCP 3389 from internet → blocks remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is firewall configuration critical for ISSOs?

A

Misconfigured rules can expose sensitive services, allowing attackers direct access into systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What actually happens when you type a website into a browser?

A
  1. DNS resolves domain → IP
  2. Browser sends request to server via TCP/443
  3. Server responds with data
  4. Browser renders content
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is DNS doing behind the scenes?

A

It translates human-readable names into IP addresses so systems can communicate.

16
Q

Why is DNS a security concern?

A

If compromised, it can redirect users to malicious sites (DNS spoofing).

17
Q

What is TCP and how does it work?

A

TCP establishes a connection (3-way handshake), ensures all packets arrive, and retransmits missing data. Used when reliability is critical.

18
Q

What is UDP and how does it work differently?

A

UDP sends data without establishing a connection or verifying delivery. It’s faster but doesn’t guarantee packets arrive or arrive in order.

19
Q

Why would UDP be used despite being unreliable?

A

For applications where speed matters more than accuracy, like video streaming, VoIP, and gaming.

20
Q

What does a router do at a technical level?

A

It examines destination IP addresses and determines the best path to forward packets between networks.

21
Q

What does a switch do differently from a router?

A

It operates within a local network and directs traffic based on MAC addresses to specific devices.

22
Q

Why does an ISSO need to understand ports and services?

A

To determine whether exposed services are necessary and compliant with security policies.

23
Q

What question should an ISSO ask when seeing an open port?

A

“What service is running, and is it required for operations?”

24
What is “attack surface” in networking terms?
The total number of exposed services, ports, and entry points attackers can use.
25
How does closing ports reduce risk?
It eliminates unnecessary entry points, limiting opportunities for exploitation.
26
If you find port 3389 open externally, what is the risk?
Unauthorized remote access attempts, brute-force attacks, and potential full system compromise.
27
If a server only needs web access, what ports should be open?
Typically 80 (HTTP) and/or 443 (HTTPS), nothing else.
28
What does it mean if a system is “exposed to the internet”?
It is reachable from outside the internal network and can be accessed by anyone.
29
Why is internal traffic not automatically safe?
Insider threats and compromised systems can move laterally within a network.
30
What is lateral movement?
When an attacker moves from one compromised system to others within the network.
31
Why is segmentation important?
It limits how far an attacker can move within a network.
32