1.
What is Hub,Switch & Router
Hub :- Hub is layer 1 device which broadcast all the data to every port and hence we called it as dumb
device.
Switch:- Switch is layer 2 device which broadcast the data to requested port not to all the ports.
Router:- Router is layer 3 device and route the data from one point to another point.
=====================================================================================
2. what are the ranges of private IP
There are two types of IP
1. Private IP :- It is non routable IP and which is not used to connect to the internet.
2. Public IP :- It is used to connect to the internet.
Class Range
Class A 10.0.0.0 - 10.255.255.255
Class B 172.16.0.0 - 172.31.255.255
Class C 192.168.0.0 - 192.168.255.255
=====================================================================================
3. Commonly used protocols and port numbers
Port Port No Protocol Purpose
File Transfer
FTP 20,21 Protocol The purpose of FTP is to transfer files over the internet.
SSH 22 Secure Shell It carries out the task of remotely connecting to a remote server or host.
Its main function is to establish a connection between a server and a remote
Telnet 23 Telnet computer.
Simple Mail Transfer The primary purpose of this protocol is to make sure that email messages ar
SMTP 25 Protocol communicated over the network securely.
Hyper Text Transfer
HTTP 80 Protocol Lets you to allow the browser to connect to the web pages on the internet.
HTTP Hyper Text Transfer Lets you connect to the internet by establishing a connection between the
S 443 Protocol Secure web pages and the browser.
Inter Message The primary purpose of this port is to retrieve emails from a remote server
IMAP 143 Access Protocol without having the need to download the email.
Remote Desktop
RDP 3389 Protocol It enables you to establish a connection with a remote computer.
Domain Name
DNS 53 System It helps in translating domain names to IP addresses and vice versa
DHCP 67,68 Dynamic Host The basic purpose of DHCP is to assign IP Address related information to the
Configuration
Protocol clients on a network automatically.
Post Office Protocol
POP3 110 Version 3 It allows the email messages to be retrieved from the SMTP servers.
Lightweight
Directory Access It is an application protocol for accessing and maintaining distributed
LDAP 389 Protocol directory information services over an Internet Protocol
System Logging It is primarily used to collect various device logs from several different
Syslog 514 Protocol machines in a central location for monitoring and review.
4. Difference between TCP and UDP
TCP UDP
TCP stands for Transmission Control Protocol UDP stands for User Datagram Protocol
connection oriented protocol Connectionless protocol
Reliable Unreliable
Acknowledgement for packet transmission No Acknowledgement
Failed packets retransmitted No retransmission
Slower Faster
Segment sequencing No sequencing
Ex:- HTTP,HTTPS,FTP & SMTP etc Ex:- VOIP calls, Streaming Videos, online games
5. Explain 3 way handshake
3 way handshake is used in TCP/IP to establish connection between client and server. It is three step
process.
1. Client send SYN data packet to the server.
2. Server responds with an SYN/ACK packet back to the client.
3. Client responds with an ACK for the server’s SYN.
6. What is NAT and PAT
NAT stands for Network Address Translation which is used to convert Private IP address to Public IP
address and Vice versa.
PAT stands for Port Address Translation which is used to conserver Public IP addresses.
7. Explain IP Packet structure
Packet contains 3 sections.
1. IP header: - It contains Source & Destination IP, Source & Destination port, TTL, version, Total
Length etc.
2. TCP header :- It contains Sequence no, Acknowledgement no, TCP flags etc.
3. Payload :- It contains actual data.
8. Explain OSI MODEL
No Layer Function
Application
7 Layer It is responsible for providing services to the user.
Presentation
6 Layer It is responsible for data conversion, encryption, translation & Compression
5 Session Layer It is responsible for establishing the connection and managing the sessions.
It provides reliable message delivery and the messages are transmitted in the order in
4 Transport Layer which they are sent
It is responsible for transmitting the data from one host to other in different networks
3 Network Layer and also packet routing
2 Data Link Layer It is responsible for framing, error control and flow control
1 Physical Layer It is responsible for establishing the physical connection between the devices.
9. Explain TCP/IP model
TCP/IP model function remains as the same with OSI model. But (Physical & Data Link Layer) merged as
Network Interface and (Application, Presentation & Session) merged as Application layer and rest of
them are remains same
Application
Presentation Application
Session
Transport Transport
Network Network
Data Link Network Interface
Physical
10. What is CIA
CIA is known as Confidentiality, Integrity & Availability.
Confidentiality: - The data is being sent over the network should be accessed by authorized individuals.
Integrity: - Data cannot be modified either in flow or at the storage.
Availability:- Data is always available to the legit users.
11. What is AAA
Authentication:- who is allowed to access
Authorization:- what resources are allowed
Accounting:- what is being accessed
12. What is Encryption? Explain the types of Encryption
It is the process of encoding information. Only authorized persons can access the information.
There are 2 types of Encryption:-
1. Symmetric encryption:- Same key used for encryption & Decryption
2. Asymmetric encryption:- Different keys (Private & Public) are used for encryption and
decryption.
13. What is Hashing
It is the process of converting a given key into another value.
14. Difference between Encryption and Hashing
Encryption Hashing
It is the process of encoding information and only authorized It is the process of converting a given
persons can access the information key to another value.
It is used to achieve confidentiality It is used to achieve integrity
Ex:- AES, DES, RC4 etc EX:- MD5, SHA1 & SHA256
15. Explain Defence in Depth
It is an approach to cyber security in which series of security systems are in placed to protect the
information. If one fails another in place to protect the data and information.
16. What is System or OS Hardening
It is the process of securing the Operating system from different kinds of threats.
1. Block unused ports
2. Stop unused services
3. Install patches and Updates.
17. What is VPN
VPN is Virtual Private Network which allows you to securely connect your corporate networks.
TCP/IP model function remains as the same with OSI model. But (Physical & Data Link Layer) merged as
Network Interface and (Application, Presentation & Session) merged as Application layer and rest of
them are remains same there re