Networking and Security Study Guide

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

OSI Model

A framework that describes the functions of a networking system in seven layers.

2
New cards

Network Layer (Layer 3)

Responsible for routing and forwarding packets.

3
New cards

Presentation Layer (Layer 6)

Responsible for data translation, encryption, and compression.

4
New cards

Transport Layer (Layer 4)

Ensures reliable transmission with error checking and flow control.

5
New cards

Data Link Layer (Layer 2)

Handles the transfer of data between adjacent network nodes.

6
New cards

Application Layer (Layer 7)

Interacts directly with end users and applications.

7
New cards

Session Layer (Layer 5)

Manages sessions between applications.

8
New cards

Physical Layer (Layer 1)

Transmits raw bitstreams over a physical medium.

9
New cards

Hub

Operates at the Physical Layer (Layer 1) and connects multiple devices.

10
New cards

Switch

Operates at the Data Link Layer (Layer 2) and directs data frames.

11
New cards

Router

Operates at the Network Layer (Layer 3) and routes packets between networks.

12
New cards

Bridge

Connects two or more networks and filters traffic by MAC address.

13
New cards

Repeater

Regenerates and amplifies signals over long distances.

14
New cards

Access Point

Connects wireless devices to a wired network.

15
New cards

Ping Command

Tests reachability to another host using ICMP Echo Request.

16
New cards

ipconfig

Displays IP configuration on Windows.

17
New cards

ifconfig

Linux equivalent of ipconfig.

18
New cards

tracert Command

Shows the route a packet takes to a destination on Windows.

19
New cards

traceroute Command

Used to trace a packet route in Linux.

20
New cards

nslookup Command

Displays DNS information and troubleshoots name resolution.

21
New cards

netstat Command

Displays all active connections and listening ports.

22
New cards

ARP Command

Displays IP-to-MAC address mappings in the ARP cache.

23
New cards

dig Command

Analyzes DNS queries in detail.

24
New cards

scp Command

Securely copies files over SSH.

25
New cards

PAN

Personal Area Network interconnecting personal devices.

26
New cards

LAN

Local Area Network covering small geographical areas.

27
New cards

WAN

Wide Area Network spanning large geographical areas.

28
New cards

SAN

Storage Area Network providing block-level storage access.

29
New cards

CAN

Campus Area Network connecting multiple LANs.

30
New cards

MAN

Metropolitan Area Network covering a city or town.

31
New cards

Bus Topology

A single central cable with terminators at each end.

32
New cards

Star Topology

All devices connect to a central device like a switch or hub.

33
New cards

Ad-hoc Network

Peer-to-peer wireless network without a centralized access point.

34
New cards

Infrastructure Network

Devices connect through an access point and wired backbone.

35
New cards

Hypervisor

Software that runs virtual machines (VMs).

36
New cards

Type 1 Hypervisor

Runs directly on hardware.

37
New cards

Type 2 Hypervisor

Runs on a host operating system.

38
New cards

IaaS

Infrastructure as a Service, providing virtualized computing resources.

39
New cards

SaaS

Software as a Service, software accessed via a web browser.

40
New cards

PaaS

Platform as a Service for developers to build and deploy applications.

41
New cards

CIA Triad

Confidentiality, Integrity, and Availability.

42
New cards

Zero-Day Exploit

A vulnerability unknown to the vendor.

43
New cards

Phishing

A social engineering attack to obtain sensitive information.

44
New cards

Buffer Overflow Attack

Overwriting memory space leading to potential execution of malicious code.

45
New cards

Intrusion Detection System (IDS)

Monitors traffic for suspicious activity.

46
New cards

Honeypot

A decoy system to lure attackers and analyze their behavior.

47
New cards

Mandatory Access Control (MAC)

Access determined by system-enforced rules.

48
New cards

Role-Based Access Control (RBAC)

Access granted based on user role.

49
New cards

WPA3

Improved wireless security that replaced WEP.

50
New cards

Deauthentication Attack

A denial-of-service attack that forces clients off a wireless network.

51
New cards

nmap

Scans a network to discover hosts and open ports.

52
New cards

tcpdump

Captures and analyzes packets on a network.

53
New cards

telnet

Command-line tool for unencrypted remote connections.

54
New cards

ssh

Secure remote login over an encrypted connection.

55
New cards

FTP

File Transfer Protocol that uses TCP for file management.

56
New cards

TFTP

Trivial File Transfer Protocol that uses UDP and lacks authentication.