You are on page 1of 6

how 5g works - transmitors send very small frequency waves to the receiver in my

phone, the waves can carry a lot of data because they are short. my phones receiver
receives the data and decodes it.
what cables there are for internet - twisted pair - faster and cheaper, coaxial
cables - durable and less vaulnerable to noise so they can be longer, and fiber
optic cable which is fast and durable but expensive
ways to trasfer data except for electricity and light and - electrical, optical and
radio signals
what is osi model and is it used - a set of standarts used for internet
communication. indroduced 1983 adopted 1984 used to teach mostly, tcp/ip is widely
used
what layer is a transmitter and receiver - data link layer

how the data cap in a cable called - bandwidth


way to transfer data in an electrical cable - voltage varies and thats what symbols
1 and 0 - amplitude modulation (AM), frequency modulation (FM), or phase modulation
(PM). ////////////////////////////////////
llc and mac in data link -
llc logical link control - flow control - checks the lowest maximum flow a
device can receive and puts that info in a header
mac - data encapsulation and adds the mac address - data encapsulation,
error control
data link - flow control error control
types of twisted pair cables - sheilded twisted pair and unsheilded twistet pair -
shielded industrial - unsheilded home or business - 568a and 568b the orange and
green colours are swapped
- if both ends are the same its straight - crossover cable both ends are
differant used for similar devices other is differant
how 1 and 0 are translated back to data - analog to digital
converter ////////////////////////////////////////////////////////

whats a frame - data transmission unit - yehidat mida of data from the data link
layer
whats the name of an internet cable - cat3 cat5 cat5e e5c

how are several connected devices called - lan


dsl protocol - digital subscriber line - adsl asymmetrical upload and download
speed, sdsl symmetrical, vdsl very fast bitrate a fast version
optic fiber -
rj45 - the name of the standart connector for the ethernet protocol
what the name of sending data to a device - unicast, broadcast, multicast
cat5 vs cat5e
hows data being sent over light
how switch works

🟩🟨🟥

🟩optic fiber protocol name - FTTH or FTTP -


🟩protocols of layer 2 except for arp, wifi, bluetooth - PPP/PPTP/ATM/Frame Relay
🟩what happens when two devices send at the same time half duplex - a collision will
happened and the computers will send a jamming signal to notify the others,
-then wait a random amount of time before trying to resend the data
🟩^ the name of the protocol that deals with this - CSMA/CD - Carrier Sense Multiple
Access with Collision Detection
-CSMA/CA - Carrier Sense Multiple Access with Collision Avoidance - used
for wireless networks - waiting for no transmission, sending, if no ack then send
again
🟩types of switches - L2 and L3 switch
🟩why do we need both ip and mac - because ip addresses help us pinpoint the place
the data should be sent to, like a full address, and a mac is like a phone number,
where its harder to find the phone number of a home
🟩another device except for router layer 3 - l3 switch
🟩another device except for switches layer 2 -
🟩can full duplex work over one cable -
🟩how does a router know whats the next hop -
🟩how packet routing works, what are the several ways - static and dynamic
🟩^ whats the name of the protocol that does this - OSPF

🟩how many connections in a bridge - A simple bridge will have two ports and will
only connect two networks. A multiport bridge would provide bridging between
multiple networks
🟩whats segment in layer 2 -
🟩another protocol other than OSPF - BGP
🟩explain quic protocol -

🟩how DHCP protocol works


🟩what are the advantages of bridge over a switch
🟩what is a spanning tree
🟩whats a port
🟩saved ports over 1024

🟩does bridge have a mac address


🟩explain whats a vlan
🟩how do i know when a frame starts
🟩what headers are in a frame
🟩how is a window size selected
🟩what are network topologies
🟩explain CSMA/CA in detail

🟩whats a lan
🟩whats TAP
🟩explain about wifi standards (Wifi6 vs wifi5 etc.)
🟩how does a switch ignore a connection in spanning tree protocol:
STP port states are saved in the running configuration and the startup
configuration.
The running configuration is stored in RAM and is lost when the switch is powered
off.
The startup configuration is stored in NVRAM and is loaded into the running
configuration when the switch boots up.
when a packet arrives, the control plane of the switch accesses the ram and checks
if the switch is in a blocking state.
if it is, the frame is dropped, if not then according to the state.
the only thing it will do is process BPDUs
Bridge Protocol Data Units (BPDUs) are the messages that are transmitted across LAN
networks to enable switches to participate in Spanning Tree Protocol (STP) by
gathering information about each other.

🟩how wifi works - first, either the wap advertise itself, sending its beacon frames
which contain the bssid and ssid everywhere and a client can decode them. or the
client sends a probe request to
🟩what is wifi automatic channel choosing (1, 6, 11) and how it chooses
🟩can you transfer data with ICMP
🟩llc and mac in data link -
llc logical link control - flow control - checks the lowest maximum flow a
device can receive and puts that info in a header
mac - data encapsulation and adds the mac address - data encapsulation,
error control

🟩whats the name for when changing a mac address


🟩is arp on wifi
🟩whats port mirroring
🟩a protocol that translates analog to digital signals in a router
🟩how can two vlans communicate with each other
when connecting two vlans to two different switches, and then connecting them
with each other, we can configure the connection as a trunk link.
the switch adds a tag header to the frame so that the other switch will know
what vlan to route the frame to. in this way we can just set the tag header
to an id of another vlan and thus communicate between two different vlans.

🟩what happens when two devices have the same ip


There would most likely be an error message from the OS like "IP address conflict
detected."
also the device might disconnect from the network repeatedly or be unable to
connect at all.
The conflict can create unnecessary traffic on the network, impacting the
performance of other devices.

🟩what are the saved private ip network addresses 172.16-172.31


🟩what are the NAT types
pat, dynamic and static: pat is the regular, dynamic is an ip from a pool, static
is preconfigured by the user
🟩what are the packet headers

🟩unicast multicast broadcast and two more - unicast multicast broadcast anycast
incast
🟩icmp uses that not a person does
🟩whats RIP
a routing protocol like ospf or bgp
max 15 hops
periodically sends updates to neighboring routers
works by least hops
slow update time which can lead to instability

🟩whats geocast

🟩why does udp have checksum -in order to determine whether the received data is
corrupted
🟩whats a tunnel/tunneling - a method to discretely transmit data across a public
network
its done by wrapping the ip packet with another ip packet, with the src and dst ips
as the entry and exit routers from the public network,
thus hiding the original ip addresses

🟩ping default port and tcp/udp


🟩what is sent in icmp packet when ping
🟩utf8, ascii, iso 8859-1
🟩whats the name of these ^ - character encoding formats - character to binary
🟩how base64 works

🟩whats rdp - remote desktop protocol used for remote display and input over network
fow windows
🟩whats smb - Server Message Block protocol protocol for providing shared access to
resources like files, printers
🟩how https works
🟩whats ssl
secure socket layer (transport layer security)

🟩🟨🟥

🟩explain about certificate hierarchy - when a website wants a certificate, it asks


an intermediate CA to issue it a certificate.
the certificate of the intermediate CA was issued beforehand by the root CA, the
CA's that are trusted and preloaded in the os or browser.
🟩whats the name of the place i buy ssl certificates from - ssl certificate
authority
🟩what are the certificate fields - issued to (the name of the website), issued by
(a trusted ca), validity period (the date issued and expiration), sha256
fingerprint ()
🟩where are the known certificate providers are saved in the browser
for chrome and edge, they are saved in windows in the registry
🟩explain about www
the www is all the public websites or pages that users can access through the
internet
they are interconnected through hyperlinks that users click on.
the internet on the other hand is the network of connected computers that the www
works on.
🟩difference between uri url and urn
uri - uniform resource identifier - both a url and a urn e.g. tel:
urn - -||- -||- name e.g. an isbn number assigned to every book
url - -||- -||- location - the location of the resource

🟩whats pki - public key infrastructure


the way to securely exchange data using certificates (asymmetric encryption)
🟩proxy vs vpn
a proxy is a server that sits between the user and the web. it can hide the ip but
the data is not encrypted
vpn on the other hand does the same and also encrypts the data so the isp cant read
anything
🟨4 rabbitmq ports and each one's uses
PORT 5672 RabbitMQ main port (AMQP) -
PORT 5671 TLS-encrypted AMQP (if enabled)
RabbitMQ Management console:
PORT 15672 for RabbitMQ version 3.x
PORT 15671 for RabbitMQ pre 3.x
🟥proxy types
forward proxy - filters malicious traffic, hides user identity (ip), single point,
logs user activity (if a company uses it for the users)
reverse proxy - single point of entry, block malicious traffic (ddos for example),
hides the ip of the servers, load balancing

transparent proxy
anonymous proxy

2 forward and 2 reverse proxy types


certificate spoofing
egp
igp
icmp types

🟩pdu meaning - power distribution unit


🟩first layer pdu - symbol
🟩what pdu's have a "trailer" - frame and the pdu of ms-rpce protocol
🟩whats http - a protocol used to load web pages using hypertext links.
🟩http resource full name - maybe web resource
🟩status code types - 100s: Informational codes indicating that the request
initiated by the browser is continuing., 200s: Success codes returned when browser
request was received, understood, and processed by the server., 300s: Redirection
codes returned when a new resource has been substituted for the requested
resource., 400s: Client error codes indicating that there was a problem with the
request., 500s: Server error codes indicating that the request was accepted, but
that an error on the server prevented the fulfillment of the request.
🟩whats html - HyperText Markup Language
🟩can a router have a proxy - yes
🟩100 - Continue - the initial part of the request has been received by the server
and that the client should proceed with the request or ignore the response if the
request has already finished
🟩201 - created
🟨203 - Non-Authoritative Information - indicates that the request was successful
but the enclosed payload has been modified by a transforming proxy from that of the
origin server's 200 (OK) response.
🟩400 - bad request
🟩401 - unauthorized
🟩500 - internal server error
🟨url structure - protocol://_______/directory/subdirectory/resource
🟩vpn meaning - Virtual private network
🟥domain vs domain name
🟥program vs application
🟥how a proxy knows where to return the data
🟥whats a diode
🟥dns flow
🟥whats tap
🟥how is an http request built
🟥whats memory
🟥ddos types
🟥how to prevent http ddos
🟥whats vpn
🟥proxy vs vpn
🟥whats ngnix

🟩subnet first and last saved ip - first is saved to identify the network (devices
know what networks they are connected to), last is saved for broadcast (also send
broadcast to another network with its subnet last ip)
🟩how to communicate between two computers in two local networks w/o ports - static
nat (send to a public ip that is always mapped to a private ip with a static nat)
🟩dhcp saved ip - 169.254.0.0/16 - apipa, they self assign an ip and check from time
to time if the dhcp server is back up
🟩whats cidr - classless inter-domain routing - variable length subnet masks (marked
with a slash notation)

🟩can a firewall be a physical device - yes, yes it can


🟩how load balancing works - the most common algorithm for load balancing is the
least connections algorithm. (the relative computing capacity is factored in)
🟩how traffic travels through a vpn - the traffic first travels through a tunnel
created by the vpn client to the server (the package is encapsulated with another
tcp and ip packets and the is forwarded like it was intended for the vpn server),
the the server decapsulates the packet, changes the src ip to its own, and when it
returns from the original dest it returns it with another tunnel.
🟩how a proxy knows where to return the package he received - when a request is
received, the proxy creates an entirely new connection to the server, and then
returns the requested package to the already made connection
firewall types - packet blocking(ip port protocol blocking), stateful inspection
(same as packet inspections, but also keeps track of connections (was safe before
so safe now)), proxy firewall (a proxy server with a firewall that utilizes deep
packet inspection (searches for signatures of malware) (its in a proxy to anonymize
the ip of users))

🟩read about nextgen firewall - a nextgen firewall includes standard firewall


capabilities like stateful inspection, and also: integrated intrusion prevension,
application awareness and control to see and block risky apps, threat intelligence
sources, upgrade paths to include future information feeds, techniques to address
evolving security threats.
🟩whats waf - a waf is a web application firewall, it monitors http traffic
🟩layer 3 vs 4 vs 7 firewall
Layer 3 firewalls (i.e. packet filtering firewalls) filter traffic based solely on
source/destination IP, port, and protocol.
Layer 4 firewalls do the above, plus add the ability to track active network
connections, and allow/deny traffic based on the state of those sessions
Layer 7 firewalls (i.e. application gateways) can do all of the above, plus include
the ability to intelligently inspect the contents of those network packets. For
instance, a Layer 7 firewall could deny all HTTP POST requests from Chinese IP
addresses. This level of granularity comes at a performance cost, though.
🟩how a firewall rule looks like
Source address | Source port | Destination address | Destination port | Action:
Any | Any | 10.10.10.1 | Any | Deny
10.10.10.0 | Any | Any | Any | Allow

You might also like