Podcast
Questions and Answers
What distinguishes a Local Area Network (LAN) from a Wide Area Network (WAN)?
What distinguishes a Local Area Network (LAN) from a Wide Area Network (WAN)?
- LANs are typically slower and have lower bandwidth than WANs.
- LANs cover a smaller geographical area than WANs. (correct)
- LANs use wireless connections; WANs use wired connections.
- LANs are managed by Internet Service Providers; WANs are not.
Routers primarily operate within a single network domain, managing local data transmission.
Routers primarily operate within a single network domain, managing local data transmission.
False (B)
Which network device is principally responsible for connecting wireless devices to a network?
Which network device is principally responsible for connecting wireless devices to a network?
- Switch
- Access Point (correct)
- Firewall
- Router
The primary role of a ______ is to translate domain names into IP addresses, facilitating access to internet resources.
The primary role of a ______ is to translate domain names into IP addresses, facilitating access to internet resources.
Which protocol is most commonly adopted to ensure secure communication across computer networks?
Which protocol is most commonly adopted to ensure secure communication across computer networks?
Twisted pair cables improve electromagnetic compatibility by using only one conductor for a circuit.
Twisted pair cables improve electromagnetic compatibility by using only one conductor for a circuit.
Name the communication medium that uses light signals to transmit data through strands of glass or plastic.
Name the communication medium that uses light signals to transmit data through strands of glass or plastic.
Which of the following is a primary characteristic of a Man-in-the-Middle (MITM) attack?
Which of the following is a primary characteristic of a Man-in-the-Middle (MITM) attack?
Match the following network attacks with their descriptions:
Match the following network attacks with their descriptions:
What is the main purpose of Layer 2 security measures in network communications?
What is the main purpose of Layer 2 security measures in network communications?
ARP Spoofing involves exploiting vulnerabilities in encryption protocols to intercept secure communications.
ARP Spoofing involves exploiting vulnerabilities in encryption protocols to intercept secure communications.
In a CAM table overflow attack, a hacker floods a network switch with numerous fake ______ addresses, disrupting normal functionality.
In a CAM table overflow attack, a hacker floods a network switch with numerous fake ______ addresses, disrupting normal functionality.
Which of the following is a primary technique employed in MAC Spoofing attacks?
Which of the following is a primary technique employed in MAC Spoofing attacks?
What is the purpose of cloning in the context of MAC spoofing attacks?
What is the purpose of cloning in the context of MAC spoofing attacks?
What describes the main goal of a DHCP Spoofing attack?
What describes the main goal of a DHCP Spoofing attack?
DNS Spoofing, also known as DNS Poisoning, involves modifying the DNS records on a legitimate server to redirect traffic to malicious sites.
DNS Spoofing, also known as DNS Poisoning, involves modifying the DNS records on a legitimate server to redirect traffic to malicious sites.
Wi-Fi networks are particularly vulnerable due to their use of ______ waves for data transmission, which makes them susceptible to unauthorized access.
Wi-Fi networks are particularly vulnerable due to their use of ______ waves for data transmission, which makes them susceptible to unauthorized access.
What is the primary function of security protocols in protecting Wi-Fi networks?
What is the primary function of security protocols in protecting Wi-Fi networks?
Which Wi-Fi security protocol was considered the standard method of providing wireless network security until 2004?
Which Wi-Fi security protocol was considered the standard method of providing wireless network security until 2004?
How does WPA (Wi-Fi Protected Access) improve security compared to WEP?
How does WPA (Wi-Fi Protected Access) improve security compared to WEP?
WPA3 offers weaker security compared to its predecessors by utilizing simplified encryption methods.
WPA3 offers weaker security compared to its predecessors by utilizing simplified encryption methods.
Certificate-based authentication uses ______ certificates to verify the identity of users or devices on a network.
Certificate-based authentication uses ______ certificates to verify the identity of users or devices on a network.
.1X is a network access control standard that utilizes which type of server to authenticate users, often in enterprise environments?
.1X is a network access control standard that utilizes which type of server to authenticate users, often in enterprise environments?
What is the primary function of encryption as a network security measure?
What is the primary function of encryption as a network security measure?
What is the role of Intrusion Prevention Systems (IPS) in network security?
What is the role of Intrusion Prevention Systems (IPS) in network security?
Match the network devices or protocols with their descriptions:
Match the network devices or protocols with their descriptions:
Segmenting a network increases the attack surface and makes it easier for attackers to move laterally through the network.
Segmenting a network increases the attack surface and makes it easier for attackers to move laterally through the network.
A ______ is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
A ______ is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
What type of network is commonly used in enterprise networks and home networks to provide improved network security through Advanced Encryption Standard (AES)?
What type of network is commonly used in enterprise networks and home networks to provide improved network security through Advanced Encryption Standard (AES)?
Which of the following measures can help safeguard data while at rest or in motion and assure data privacy?
Which of the following measures can help safeguard data while at rest or in motion and assure data privacy?
Flashcards
What are computer networks?
What are computer networks?
A collection of interconnected devices that communicate with each other to share resources and information.
What is LAN?
What is LAN?
Local Area Network; connects devices in a limited area.
What is WLAN?
What is WLAN?
Wireless Local Area Network; uses wireless communication within a limited area.
What is WAN?
What is WAN?
Signup and view all the flashcards
What do Routers do?
What do Routers do?
Signup and view all the flashcards
What do Switches do?
What do Switches do?
Signup and view all the flashcards
What are Access Points?
What are Access Points?
Signup and view all the flashcards
What do Servers do?
What do Servers do?
Signup and view all the flashcards
What do Firewalls do?
What do Firewalls do?
Signup and view all the flashcards
What is TCP/IP?
What is TCP/IP?
Signup and view all the flashcards
What is SSL/TLS?
What is SSL/TLS?
Signup and view all the flashcards
What does DNS do?
What does DNS do?
Signup and view all the flashcards
What is SSH?
What is SSH?
Signup and view all the flashcards
What is Twisted Pair Cable?
What is Twisted Pair Cable?
Signup and view all the flashcards
What is fiber optic cable?
What is fiber optic cable?
Signup and view all the flashcards
What is Wi-Fi?
What is Wi-Fi?
Signup and view all the flashcards
What is Man-in-the-Middle (MITM)?
What is Man-in-the-Middle (MITM)?
Signup and view all the flashcards
What is Eavesdropping (in network security)?
What is Eavesdropping (in network security)?
Signup and view all the flashcards
What is Session Hijacking?
What is Session Hijacking?
Signup and view all the flashcards
What is SSL Stripping?
What is SSL Stripping?
Signup and view all the flashcards
What is ARP Poisoning?
What is ARP Poisoning?
Signup and view all the flashcards
What is Denial-of-Service (DoS)?
What is Denial-of-Service (DoS)?
Signup and view all the flashcards
What is Distributed Denial-of-Service (DDoS)?
What is Distributed Denial-of-Service (DDoS)?
Signup and view all the flashcards
What is DNS Spoofing?
What is DNS Spoofing?
Signup and view all the flashcards
What is Layer 2 Security?
What is Layer 2 Security?
Signup and view all the flashcards
What is CAM Table Overflow?
What is CAM Table Overflow?
Signup and view all the flashcards
What is MAC Spoofing?
What is MAC Spoofing?
Signup and view all the flashcards
What is DHCP Spoofing?
What is DHCP Spoofing?
Signup and view all the flashcards
What is WEP?
What is WEP?
Signup and view all the flashcards
What is WPA?
What is WPA?
Signup and view all the flashcards
Study Notes
Computer Networks
- A network involves interconnected devices communicating to share resources and information
- LAN is a local area network
- WLAN is a wireless local area network
- WAN is a wide area network
Network Devices
- Routers forward traffic between multiple networks
- Switches connect devices within a network domain and manage data transmission
- Access Points broadcast network signals to connect wireless devices
- Servers run applications and services and respond to client requests
- Firewalls monitor and filter traffic between local and external networks
Network Protocols
- TCP/IP governs data transmission over the internet
- SSL/TLS are cryptographic protocols that ensure secure communication over computer networks
- DNS translates DNS names to IP addresses and vice versa
- SSH is used for secure remote access to network devices
Communication Media
- Twisted Pair Cable includes two conductors twisted to improve electromagnetic compatibility.
- Fiber transmits data as light signals through thin strands of glass or plastic
- Wireless (Wi-Fi) enables networking for local devices, operating on frequency bands like 2.4 GHz and 5 GHz
Threats to Networks
- Man-in-the-Middle (MITM) Attacks include eavesdropping, session hijacking, SSL stripping, and ARP poisoning
- Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks exist
- DNS Spoofing & Poisoning compromises network security
Layer 2 Security
- Layer 2 processes raw data transmission from the physical layer and transmits it to the network layer
- Layer 2 security protects the data link layer in network communications
ARP Spoofing
- Attackers use tools like Arpspoof or Driftnet to send forged ARP responses
CAM Table Overflow
- A hacker connects to switch ports and uses a program to mimic thousands of MAC addresses
MAC Spoofing
- Media Access Control (MAC) Spoofing involves an attacker altering the MAC address of their device to mimic another on the network
- One technique involves replicating a legitimate device’s MAC address for masquerading purposes
- The other technique involves randomizing a MAC address and using it to impersonate a network device
DHCP Spoofing
- An attack where a hacker places a rogue DHCP server on a network
- The fastest DHCP server will receive the first request when a client accesses the network and requests an address
- The rogue server responds and assigns an address, gaining control over the device's gateway
DNS Spoofing & Poisoning
- DNS Poisoning is a type of DNS Spoofing
Wi-Fi Security
- Wi-Fi is prone to interception and unauthorized access due to its use of radio waves for data transmission
- Security protocols and encryption are common methods to protect Wi-Fi networks
Wi-Fi Security Protocols
- These protocols provide encryption and authentication for Wi-Fi networks
- Wired Equivalent Privacy (WEP) was the standard wireless network security method until 2004 using basic 64-/128-bit encryption, now considered insecure
- WPA (Wi-Fi Protected Access) uses 128-/256-bit encryption and Temporal Key Integrity Protocol (TKIP)
- WPA2 is an improved version of WPA, offering advanced network security through AES, commonly used in enterprise and home networks
- WPA3 is more secure, supports 192-/256-/384-bit encryption options, and supports Wi-Fi 6 networks
Wi-Fi Authentication Methods
- Password-based authentication: An encrypted password is sent to the router for verification against stored credentials
- Certificate-based authentication: Uses digital certificates for higher security to identify and authenticate users or devices
- 802.1X: Uses a RADIUS server to authenticate users, is a standard for network access control, and is often used in enterprise environments
Network Security Measures
- Encryption secures data
- Virtual Private Networks (VPNs) create secure connections
- Firewalls monitor and control network traffic
- Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) identify and prevent malicious activity
- Rate limiting controls traffic flow
- Network segmentation divides a network into smaller networks
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.