Network and Security Foundations

0.0(0)
studied byStudied by 12 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/149

flashcard set

Earn XP

Description and Tags

Notes for D315 class through Western Governor's University

Last updated 9:24 PM on 10/16/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

150 Terms

1
New cards

Physical Layer

Connection of devices in a network and deals with bits, signals/media, NIC card/cabling/fiber. Devices on this layer include hubs, repeaters, modems, cabling.

2
New cards

Data Link Layer

Provides for the flow and delivery of data and uses MAC addresses. Devices on this layer include switches, bridge devices, wireless/wired network cards.

3
New cards

Network Layer

Provides routing decisions and transmission of data and deals with packets and IP/IPX. Devices on this layer include routers and switches.

4
New cards

Transport Layer

Considered the “heart of OSI”, this layer provides and recieves services while ensuring error free packet delivery. Protocols on this layer include UDP and TCP.

5
New cards

Session Layer

This layer establishes, manages, and terminates sessions.

6
New cards

Presentation Layer

This layer is responsible for encryption and decryption.

7
New cards

Application Layer

This layer provides support for applications. Protocols on this level include HTTP, FTP, DNS, SMTP.

8
New cards

What layers of the OSI model match layer 1 of the TCP/IP model?

Layers 1 and 2

9
New cards

What layers of the OSI model match layer 2 of the TCP/IP model?

Layer 3

10
New cards

What layers of the OSI model match layer 3 of the TCP/IP model?

Layer 4

11
New cards

What layers of the OSI model match layer 4 of the TCP/IP model?

Layers 5-7

12
New cards

Hub

The device that connects the router to the network and it sends signals to all receivers. It operates on the 1st layer of the OSI model.

13
New cards

Modem

The device that translates digital signals to analog (and vice versa) which allows computers to transport digital information. It opperates on the 1st and 2nd layers of the OSI model.

14
New cards

Repeater

The devices that strengthens, replicates, and regenerates weakened signals. It operates on the 1st layer of the OSI model.

15
New cards

Switch

The devices that connects devices in a network and allows them to communicate by using MAC addresses to send traffic directly to the receiver without other devices being aware. It typically operates on the 2nd layer of the OSI model but sometimes can operate on the 3rd layer.

16
New cards

Bridge

The device that’s similar to a router but doesn’t analyze anything and instead just sends it. It operates on the 2nd layer of the OSI model.

17
New cards

Router

The device that connects networks to each other. It operates on the 3rd layer of the OSI model.

18
New cards

What OSI layer does a hub operate on?

Layer 1

19
New cards

What OSI layer does a modem operate on?

Layer 1 and 2

20
New cards

What OSI layer does a repeater operate on?

Layer 1

21
New cards

What OSI layer does a switch operate on?

Layer 2 (sometimes 3)

22
New cards

What OSI layer does a bridge operate on?

Layer 2

23
New cards

What OSI layer does a router operate on?

Layer 3

24
New cards

Cat3 Cable

10 Mbps for 100 meters, used for phone lines

25
New cards

Cat4 Cable

16 Mbps for 100 meters, was used for token rings but not really used any more

26
New cards

Cat5 Cable

100 Mbps for 100 meters, was used for Ethernet LANs but has been replaced

27
New cards

Cat5e Cable

1 Gbps for 100 meters, used for Ethernet LANs

28
New cards

Cat6 Cable

1 Gbps for 100 meter or 10 Gbps for 50 meters, good for server racks and used in Ethernet LANs and data centers

29
New cards

Cat6a

10 Gbps for 100 meters, higher quality cable that’s more resistant to interference and is most commonly used today

30
New cards

What UTP cables have 2 pairs of wires?

Cat3, Cat4, and Cat 5

31
New cards

What UTP cables have 4 pair of wires?

Cat5e, Cat6, and Cat6a

32
New cards

Coaxial Cables

Old analog cables mad of copper with metal shields to block interference that are basically only used today by TV companies.

33
New cards

Fiber Cables

Cables that use light instead of electricity that are more durable/secure and better for long distance.

34
New cards

Single Mode

Fiber cables with 10 micron strands that have a higher bandwidth and are better for submarine cabling.

35
New cards

Multimode

Fiber cables with 50-100 micron fibers that have a wider frequency of light and are cheaper across shorter distances.

36
New cards

Crossover Cable

A cable that directly connects two computing devices of the same type. On computers, it connects through the NIC or switches.

37
New cards

Patch Cable

A cable that connect a device to a patch panel.

38
New cards

Patch Panel

A panel that is wired to a switch.

39
New cards

ARP (Address Resolution Protocol)

The command used to displays the IP to physical address mappings for hosts in the cache and can be used to edit the cache.

40
New cards

Dig (Domain Information Groper)

The command used to query the DNS name servers. It’s helpful for troubleshooting and it replaced nslookup.

41
New cards

Finger

The command used to display information about a user on a remote system. It’s primarily used on Linux.

42
New cards

FTP

The command used to copy files from one host to another without encryption using TCP.

43
New cards

Ipconfig

The command used to provide a user with the IP, subnet mask, and default gateway for each network adapter.

44
New cards

Ifconfig

The command used to configure the kernel network interfaces and debugging/tuning the system. It’s primarily used on Linux.

45
New cards

Netstat

The command used to display information about active ports and their state. It’s useful for troubleshooting and capacity management.

46
New cards

Nmap

The command used to scan networks for hosts and open ports to determine what is deployed on a network. This information is used for vulnerability analysis and security scans. It’s not native to Linux or Windows.

47
New cards

Nslookup

The command used to display information for the DNS. It’s helpful for troubleshooting DNS problems.

48
New cards

Ping

The command used to test connectivity to other hosts by sending ICMP echo requests, listening for a reply, then displaying the time it took.

49
New cards

Route

The command used to display current route tables on a host and determine where to send traffic. It can also add or remove routes.

50
New cards

SCP (Secure Copy Protocol)

The command used to securely copy files between servers by using SSH for authentication and encryption.

51
New cards

Tcpdump

The command used to display TCP/IP and other network packets being transmitted over the network system in a human-readable format which makes it helpful for troubleshooting, security analysis, etc.. It is not native to Linux or Windows.

52
New cards

Telnet

The command that allows users to manage accounts and devices remotely and is NOT encrypted.

53
New cards

SSH

The command that allows user to manage accounts and devices remotely and IS encrypted.

54
New cards

TFTP (Trivial File Transfer Protocol)

The command used to transfer files between client and servers using UDP.

55
New cards

Traceroute

The command used to trace the route an IP packet takes by displaying the IP address and time it took for each hop. Needs special authorization to use.

56
New cards

Tracepath

The command used to Trace the route an IP packet takes by displaying the IP address and time it took for each hop. Does not need special authorization so anyone can use it.

57
New cards

Whois

The command used to look up who owns a domain or block of IP addresses.

58
New cards

PAN (Personal Area Network)

A network centered around a person and their devices. Ex. computer, mouse, printer, headphones, cellphone

59
New cards

LAN (Local Area Network)

A network with devices connected within a limited area. Ex. a home, lab, office building

60
New cards

WLAN (Wireless Local Area Network)

A network with devices wirelessly connected within a limited area.

61
New cards

SAN (Storage Area Network)

A network dedicated to storage device and the servers that need to access them. The reason to use these is to reduce the interference from normal LAN traffic during data transfer.

62
New cards

CAN (Campus Area Network)

A network for multiple LANs across a limited area. Ex. university campus, group of buildings owned by one company

63
New cards

MAN (Metropolitan Area Network)

A network that spans across an area larger than a CAN but smaller than a WAN and is made up of many LANs owned by multiple organizations, government entities, etc.. Ex. a city

64
New cards

WAN (Wide Area Network)

A network that covers a large geographical area. Ex. international companies, satellites

65
New cards

Bus Topology

The topology that has a single line of devices connected together by one shared network cable.

66
New cards

Ring Topology

The topology that connects devices to two other devices and pass information in a circular path.

67
New cards

Star Topology

The topology that has a central network device connected to various network devices.

68
New cards

Mesh Topology

The topology where every device has direct access to another device.

69
New cards

Centralized Network Architecture

Network architecture where data is stored on one machine and users use other machines to access the data.

70
New cards

Decentralized Network Architecture

Network architecture where data is stored on the device using it.

71
New cards

Client-Server Model Network Architecture

Network architecture where applications store data in a centralized data center and used a decentralized computer to access the server.

72
New cards

Peer-to-Peer Model Network Architecture

Network architecture where client computers act as servers and workstations by sharing files and printers while also being used for normal tasks.

73
New cards

What is the advantage of a wired network?

There is a more stable connection and a higher bandwidth in some cases.

74
New cards

What is the advantage of a wireless network?

There is better portability.

75
New cards

What is the difference between a Type 1 and Type 2 hypervisor?

A type 1 is installed directly on the hardware as the OS while a type 2 is treated as an application on top of the OS.

76
New cards

IaaS

Provider takes care of hypervisors, server/storage, and physical networks.

77
New cards

PaaS

Provider takes care of the OS, virtual networks, hypervisors, servers/storage, and physical networks.

78
New cards

SaaS

Provider takes care of applications, the OS, virtual networks, hypervisors, servers/storage, and physical networks.

79
New cards

Private Cloud

Where only the people who own the cloud have access to its data.

80
New cards

Public Cloud

Where lots of people can access the cloud and the provider is responsible for upkeep.

81
New cards

Community Cloud

Where the cloud is jointly owned and operated by the tenants.

82
New cards

Hybrid Cloud

Where the cloud is a combination of private and public.

83
New cards

Multi-Cloud

Where the cloud leverages the services of multiple public cloud providers.

84
New cards

SecOPs

IT security operations

85
New cards

Dictionary Attack

A method of breaking passwords by using a library of common words/phrases to guess possible passwords.

86
New cards

Brute Force Attack

A password attack where the attacker uses all possible combination of characters until a password match is found.

87
New cards

Advanced Persistent Threat

A virus that remains undetected while it sits idle for long periods of time waiting for the right time.

88
New cards

Zero-day

When a vulnerability is not yet known by the public and there is no patch available to fix it.

89
New cards

Red team

Attackers who attempt to compromise security.

90
New cards

Blue team

Attackers who attempt to defend against the attacker team.

91
New cards

White team

Team who observes or referees.

92
New cards

Purple team

When attacker teams and defender teams go until a certain criteria is met then get together to cross train.

93
New cards

White Hat

IT professionals who specialize in penetrating and compromising network security to help a company improve.

94
New cards

Black Hat

Attackers who posses knowledge to hack and will breach systems for profit.

95
New cards

Gray Hat

Attackers who have no malicious intent but may not have prior permission for the attack.

96
New cards

Script Kiddie

Attackers without a lot of knowledge or training who hack out of curiosity or entertainment.

97
New cards

Packet Sniffer

Allows an attacker to listen and record traffic on a network.

98
New cards

Port Scanning

When an attacker sends packets to TCP ports to find out which ones are being used.

99
New cards

SQL Injection Attack

When an attacker takes control of a server by inserting coded commands into an input box instead of plain text.

100
New cards

Buffer Overflow Attack

When an attacker purposefully enters text that is too large and causes the overwriting of neighboring areas of memory with code that will grant the attacker control of the server.