Networking Flashcards

(74 cards)

1
Q

What is the OSI model?

A

A 7-layer framework that describes how data travels across a network. Each layer has a specific role.

Each layer has a specific role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the 7 layers of the OSI model in order.

A

7-Application, 6-Presentation, 5-Session, 4-Transport, 3-Network, 2-Data Link, 1-Physical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Layer 1 (Physical) do?

A

Transmits raw bits over physical media such as copper cables, fibre optics, or radio waves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Layer 2 (Data Link) do?

A

Manages data transfer within a single local network. Switches operate here and it’s also responsible for MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Layer 3 (Network) do?

A

Handles IP addresses and routes packets between networks. Routers operate here.

IP + Routing + Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Layer 4 (Transport) do?

A

Manages end-to-end delivery using port numbers. Uses TCP or UDP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Layer 7 (Application) do?

A

Provides network services directly to user applications. Protocols: HTTP, DNS, FTP, SMTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is TCP?

A

A connection-oriented protocol that guarantees reliable, ordered delivery of data. Uses a handshake before transferring data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is UDP?

A

A connectionless protocol with no delivery guarantee. Faster than TCP. Used when speed matters more than reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 3 steps of the TCP handshake?

A
  1. Client sends SYN. 2. Server replies SYN-ACK. 3. Client sends ACK. Connection established.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Give 3 examples of protocols that use TCP.

A

HTTP, HTTPS, SSH, SMTP, FTP — anything requiring reliable delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Give 3 examples of protocols that use UDP.

A

DNS, video streaming, VoIP, online gaming — anything where speed matters more than reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the main trade-off between TCP and UDP?

A

TCP = reliable but slower. UDP = fast but no delivery guarantee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an IPv4 address?

A

A 32-bit number written as four octets (e.g. 192.168.1.10). Each octet ranges from 0 to 255.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three private IPv4 ranges?

A

10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. These are not routable on the public internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the loopback address?

A

127.0.0.1 — always refers to the local machine itself. Also called localhost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does /24 mean in CIDR notation?

A

The first 24 bits are the network. Subnet mask: 255.255.255.0. Allows up to 254 usable host addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the difference between a public and private IP?

A

Public IPs are routable on the internet. Private IPs are used internally and need NAT to reach the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why was IPv6 introduced?

A

IPv4 was running out of addresses (only ~4 billion). IPv6 uses 128-bit addresses, providing a vastly larger address space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a port ?

A

A software-based location that organizes the sending and receiving of data between devices on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the three port ranges?

A

0–1023: Well-Known. 1024–49151: Registered. 49152–65535: Dynamic/Ephemeral.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What port does SSH use?

A

Port 22.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What port does HTTP use?

A

Port 80.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What port does HTTPS use?

A

Port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What port does DNS use?
Port 53, primarily UDP.
26
What port does FTP use?
Port 21 (control) and port 20 (data transfer).
27
What port does RDP use?
Port 3389.
28
What port does SMTP use?
Port 25.
29
What does DNS do?
Translates domain names (e.g. google.com) into IP addresses (e.g. 142.250.185.46).
30
What is a recursive resolver?
A server that does the work of finding a DNS answer by querying other servers on your behalf. Example: 8.8.8.8 (Google DNS).
31
What is an authoritative name server?
The server that holds the actual DNS records for a domain and gives the final answer.
32
What is a DNS A record?
Maps a domain name to an IPv4 address. Example: google.com -> 142.250.185.46.
33
What is a DNS MX record?
Specifies the mail server responsible for receiving email for a domain.
34
What is a DNS CNAME record?
An alias that points one domain name to another. Example: www -> google.com.
35
What is DNS poisoning?
An attacker injects fake DNS records into a resolver's cache, redirecting users to a malicious site without their knowledge.
36
What is DNS tunnelling?
Encoding data inside DNS queries to bypass firewalls or secretly transfer data out of a network.
37
What is HTTP?
HyperText Transfer Protocol — used to request and deliver web pages and data between clients and servers. Operates on port 80.
38
What is the difference between HTTP and HTTPS?
HTTP sends data in plaintext. HTTPS encrypts traffic using TLS on port 443.
39
What does TLS do?
Encrypts data between client and server, verifies the server's identity, and ensures data is not altered in transit.
40
What is an HTTP GET request?
Requests data from a server. Parameters are visible in the URL.
41
What is an HTTP POST request?
Submits data to a server inside the request body, not the URL.
42
What do 4xx HTTP status codes mean?
Client-side errors. Example: 404 = Not Found, 403 = Forbidden.
43
What do 5xx HTTP status codes mean?
Server-side errors. Example: 500 = Internal Server Error.
44
What is NAT?
Network Address Translation — allows multiple devices with private IPs to share one public IP address. The router handles the translation.
45
What is a default gateway?
The IP address of the router a device sends traffic to when the destination is outside its local network. Usually the first address in a subnet (e.g. 192.168.1.1).
46
What is a routing table?
A list of known networks and the next hop needed to reach them. Routers use this to decide where to forward each packet.
47
What is the difference between static and dynamic routing?
Static: routes set manually, reliable but does not adapt to changes. Dynamic: routes learned automatically via protocols like OSPF, adapts to network changes.
48
What does a firewall do?
A network security device or software that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies. ## Footnote Allowing or blocking connections by IP, port, and protocol.
49
What is a stateful firewall?
A firewall that tracks the state of active connections. It knows whether an incoming packet belongs to an established session, not just its IP and port.
50
What is a packet filter firewall?
Checks each packet's IP, port, and protocol individually with no memory of previous packets. Simpler and faster but easier to bypass than a stateful firewall.
51
What is an implicit deny rule?
A rule at the end of a firewall policy that blocks all traffic not explicitly allowed. The default: deny everything unless permitted.
52
What is a WAF?
Web Application Firewall — inspects HTTP/HTTPS traffic at Layer 7 to detect attacks like SQL injection and cross-site scripting.
53
What is an IDS?
Intrusion Detection System — monitors traffic and generates alerts when suspicious activity is detected. It does not block traffic.
54
What is an IPS?
Intrusion Prevention System — monitors traffic and automatically blocks malicious activity in real time.
55
What is the key difference between IDS and IPS?
IDS is passive — it only detects and alerts. IPS is active — it detects and blocks.
56
What is signature-based detection?
Matches traffic against a database of known attack patterns. Accurate for known threats but cannot detect new unknown attacks.
57
What is anomaly-based detection?
Establishes a baseline of normal behaviour and alerts on deviations. Can catch unknown attacks but produces more false positives.
58
What is a false positive in IDS/IPS?
An alert triggered by legitimate, non-malicious traffic. Example: an internal port scan incorrectly flagged as an attack.
59
What is WEP?
Wired Equivalent Privacy (1997) — the first Wi-Fi security protocol. Uses RC4 encryption. Considered completely broken and should never be used.
60
What is WPA2?
Wi-Fi Protected Access 2 (2004) — uses AES-CCMP encryption. The most widely used Wi-Fi security standard. Vulnerable to offline attacks if a weak password is used.
61
What is WPA3?
The current Wi-Fi security standard (2018). Uses SAE handshake, which prevents offline password cracking even if the handshake is captured.
62
What is an evil twin attack?
A rogue access point that mimics a legitimate Wi-Fi network. Devices connect to it unknowingly, allowing the attacker to intercept their traffic.
63
What is a deauthentication attack?
Sending forged frames to disconnect a device from Wi-Fi. When it reconnects, the attacker captures the handshake to crack the password offline.
64
What is a VPN?
Virtual Private Network — creates an encrypted tunnel between a device and a network over the internet, protecting data in transit.
65
What is a remote access VPN?
Allows individual users to securely connect to a company network from a remote location, as if they were physically in the office.
66
What is a site-to-site VPN?
Permanently connects two separate office networks together via an encrypted tunnel between their routers.
67
What is split tunnelling?
Only company-bound traffic goes through the VPN. Personal browsing uses the local internet connection directly.
68
What is ICMP used for?
Testing network connectivity (ping) and reporting errors. Operates at Layer 3.
69
What is ARP?
Address Resolution Protocol — resolves an IP address to a MAC address on a local network.
70
What is DHCP?
Dynamic Host Configuration Protocol — automatically assigns IP addresses and network settings to devices when they connect to a network. Uses ports 67 and 68.
71
What is SMTP?
Simple Mail Transfer Protocol — used to send email between servers. Runs on port 25.
72
What is the difference between FTP and SFTP?
FTP transfers files in plaintext on port 21. SFTP transfers files encrypted over SSH on port 22.
73
What is packet sniffing?
The process of capturing, monitoring, and logging data packets as they traverse a network
74
What is encapsulation?
is a process performed by a VPN service that protects data in transit by wrapping sensitive data in other data packets.