Computer Networks

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What distinguishes a Local Area Network (LAN) from a Wide Area Network (WAN)?

  • LANs are typically slower and have lower bandwidth than WANs.
  • LANs cover a smaller geographical area than WANs. (correct)
  • LANs use wireless connections; WANs use wired connections.
  • LANs are managed by Internet Service Providers; WANs are not.

Routers primarily operate within a single network domain, managing local data transmission.

False (B)

Which network device is principally responsible for connecting wireless devices to a network?

  • Switch
  • Access Point (correct)
  • Firewall
  • Router

The primary role of a ______ is to translate domain names into IP addresses, facilitating access to internet resources.

<p>DNS server</p> Signup and view all the answers

Which protocol is most commonly adopted to ensure secure communication across computer networks?

<p>SSL/TLS (B)</p> Signup and view all the answers

Twisted pair cables improve electromagnetic compatibility by using only one conductor for a circuit.

<p>False (B)</p> Signup and view all the answers

Name the communication medium that uses light signals to transmit data through strands of glass or plastic.

<p>Fiber</p> Signup and view all the answers

Which of the following is a primary characteristic of a Man-in-the-Middle (MITM) attack?

<p>Intercepting and possibly altering communication between two parties. (B)</p> Signup and view all the answers

Match the following network attacks with their descriptions:

<p>Eavesdropping = Secretly listening to private communications. Session Hijacking = Taking control of a user's session to impersonate them. ARP Poisoning = Manipulating ARP tables to redirect traffic. SSL Stripping = Downgrading secure HTTPS connections to insecure HTTP.</p> Signup and view all the answers

What is the main purpose of Layer 2 security measures in network communications?

<p>To protect the data link layer from attacks. (A)</p> Signup and view all the answers

ARP Spoofing involves exploiting vulnerabilities in encryption protocols to intercept secure communications.

<p>False (B)</p> Signup and view all the answers

In a CAM table overflow attack, a hacker floods a network switch with numerous fake ______ addresses, disrupting normal functionality.

<p>MAC</p> Signup and view all the answers

Which of the following is a primary technique employed in MAC Spoofing attacks?

<p>Altering the Media Access Control (MAC) address of a device. (C)</p> Signup and view all the answers

What is the purpose of cloning in the context of MAC spoofing attacks?

<p>To maskuerade as a legitimate device.</p> Signup and view all the answers

What describes the main goal of a DHCP Spoofing attack?

<p>To assign rogue IP addresses to network clients. (A)</p> Signup and view all the answers

DNS Spoofing, also known as DNS Poisoning, involves modifying the DNS records on a legitimate server to redirect traffic to malicious sites.

<p>True (A)</p> Signup and view all the answers

Wi-Fi networks are particularly vulnerable due to their use of ______ waves for data transmission, which makes them susceptible to unauthorized access.

<p>radio</p> Signup and view all the answers

What is the primary function of security protocols in protecting Wi-Fi networks?

<p>To utilize encryption to secure data transmission. (D)</p> Signup and view all the answers

Which Wi-Fi security protocol was considered the standard method of providing wireless network security until 2004?

<p>WEP</p> Signup and view all the answers

How does WPA (Wi-Fi Protected Access) improve security compared to WEP?

<p>By using Temporal Key Integrity Protocol (TKIP). (D)</p> Signup and view all the answers

WPA3 offers weaker security compared to its predecessors by utilizing simplified encryption methods.

<p>False (B)</p> Signup and view all the answers

Certificate-based authentication uses ______ certificates to verify the identity of users or devices on a network.

<p>digital</p> Signup and view all the answers

.1X is a network access control standard that utilizes which type of server to authenticate users, often in enterprise environments?

<p>RADIUS (A)</p> Signup and view all the answers

What is the primary function of encryption as a network security measure?

<p>To protect data confidentiality.</p> Signup and view all the answers

What is the role of Intrusion Prevention Systems (IPS) in network security?

<p>To actively block or prevent detected threats in real-time. (D)</p> Signup and view all the answers

Match the network devices or protocols with their descriptions:

<p>Routers = Forward traffic between multiple networks Switches = Connect devices within a network domain and data transmission TCP/IP = Governs data transmission over the internet DHCP = Automatically assigns IP addresses</p> Signup and view all the answers

Segmenting a network increases the attack surface and makes it easier for attackers to move laterally through the network.

<p>False (B)</p> Signup and view all the answers

A ______ is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

<p>firewall</p> Signup and view all the answers

What type of network is commonly used in enterprise networks and home networks to provide improved network security through Advanced Encryption Standard (AES)?

<p>WPA2</p> Signup and view all the answers

Which of the following measures can help safeguard data while at rest or in motion and assure data privacy?

<p>Encryption (D)</p> Signup and view all the answers

Flashcards

What are computer networks?

A collection of interconnected devices that communicate with each other to share resources and information.

What is LAN?

Local Area Network; connects devices in a limited area.

What is WLAN?

Wireless Local Area Network; uses wireless communication within a limited area.

What is WAN?

Wide Area Network; covers a broad area, like the internet.

Signup and view all the flashcards

What do Routers do?

Forwards traffic between multiple networks; directs data efficiently.

Signup and view all the flashcards

What do Switches do?

Connects devices within a network domain and manages data transmission.

Signup and view all the flashcards

What are Access Points?

Broadcasts network signals to connect wireless devices to the network facilitating WiFi.

Signup and view all the flashcards

What do Servers do?

Run applications and services; respond to clients' requests.

Signup and view all the flashcards

What do Firewalls do?

Monitors and filters traffic between trusted and untrusted networks.

Signup and view all the flashcards

What is TCP/IP?

Governs data transmission over the internet; ensures reliable communication.

Signup and view all the flashcards

What is SSL/TLS?

Cryptographic protocols that ensure secure communication over computer networks.

Signup and view all the flashcards

What does DNS do?

Translates domain names to IP addresses and vice versa.

Signup and view all the flashcards

What is SSH?

Used to provide for secure remote access to network devices.

Signup and view all the flashcards

What is Twisted Pair Cable?

Two conductors twisted to improve electromagnetic compatibility.

Signup and view all the flashcards

What is fiber optic cable?

Transmits data as light signals through thin strands of glass or plastic.

Signup and view all the flashcards

What is Wi-Fi?

Enables wireless networking for local devices; operates on different frequency bands.

Signup and view all the flashcards

What is Man-in-the-Middle (MITM)?

An attacker intercepts communication between two parties.

Signup and view all the flashcards

What is Eavesdropping (in network security)?

Listening secretly to private communications without consent.

Signup and view all the flashcards

What is Session Hijacking?

Exploiting a valid computer session to gain unauthorized access.

Signup and view all the flashcards

What is SSL Stripping?

Downgrading a secure HTTPS connection to unencrypted HTTP.

Signup and view all the flashcards

What is ARP Poisoning?

Manipulating ARP tables to redirect traffic on a network.

Signup and view all the flashcards

What is Denial-of-Service (DoS)?

Overwhelming a network to disrupt services.

Signup and view all the flashcards

What is Distributed Denial-of-Service (DDoS)?

A DoS attack from multiple sources.

Signup and view all the flashcards

What is DNS Spoofing?

Injecting false DNS records to redirect traffic to a malicious site.

Signup and view all the flashcards

What is Layer 2 Security?

Protects the data link layer of network communications.

Signup and view all the flashcards

What is CAM Table Overflow?

A hacker connects to switch ports mimicking MAC addresses.

Signup and view all the flashcards

What is MAC Spoofing?

Altering a device's MAC address to impersonate another.

Signup and view all the flashcards

What is DHCP Spoofing?

When a hacker places a rogue DHCP server on network.

Signup and view all the flashcards

What is WEP?

Old standard for WiFi; has basic encryption, now considered unsecured.

Signup and view all the flashcards

What is WPA?

More secure WiFi protocol using encryption.

Signup and view all the flashcards

Study Notes

Computer Networks

  • A network involves interconnected devices communicating to share resources and information
  • LAN is a local area network
  • WLAN is a wireless local area network
  • WAN is a wide area network

Network Devices

  • Routers forward traffic between multiple networks
  • Switches connect devices within a network domain and manage data transmission
  • Access Points broadcast network signals to connect wireless devices
  • Servers run applications and services and respond to client requests
  • Firewalls monitor and filter traffic between local and external networks

Network Protocols

  • TCP/IP governs data transmission over the internet
  • SSL/TLS are cryptographic protocols that ensure secure communication over computer networks
  • DNS translates DNS names to IP addresses and vice versa
  • SSH is used for secure remote access to network devices

Communication Media

  • Twisted Pair Cable includes two conductors twisted to improve electromagnetic compatibility.
  • Fiber transmits data as light signals through thin strands of glass or plastic
  • Wireless (Wi-Fi) enables networking for local devices, operating on frequency bands like 2.4 GHz and 5 GHz

Threats to Networks

  • Man-in-the-Middle (MITM) Attacks include eavesdropping, session hijacking, SSL stripping, and ARP poisoning
  • Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks exist
  • DNS Spoofing & Poisoning compromises network security

Layer 2 Security

  • Layer 2 processes raw data transmission from the physical layer and transmits it to the network layer
  • Layer 2 security protects the data link layer in network communications

ARP Spoofing

  • Attackers use tools like Arpspoof or Driftnet to send forged ARP responses

CAM Table Overflow

  • A hacker connects to switch ports and uses a program to mimic thousands of MAC addresses

MAC Spoofing

  • Media Access Control (MAC) Spoofing involves an attacker altering the MAC address of their device to mimic another on the network
  • One technique involves replicating a legitimate device’s MAC address for masquerading purposes
  • The other technique involves randomizing a MAC address and using it to impersonate a network device

DHCP Spoofing

  • An attack where a hacker places a rogue DHCP server on a network
  • The fastest DHCP server will receive the first request when a client accesses the network and requests an address
  • The rogue server responds and assigns an address, gaining control over the device's gateway

DNS Spoofing & Poisoning

  • DNS Poisoning is a type of DNS Spoofing

Wi-Fi Security

  • Wi-Fi is prone to interception and unauthorized access due to its use of radio waves for data transmission
  • Security protocols and encryption are common methods to protect Wi-Fi networks

Wi-Fi Security Protocols

  • These protocols provide encryption and authentication for Wi-Fi networks
  • Wired Equivalent Privacy (WEP) was the standard wireless network security method until 2004 using basic 64-/128-bit encryption, now considered insecure
  • WPA (Wi-Fi Protected Access) uses 128-/256-bit encryption and Temporal Key Integrity Protocol (TKIP)
  • WPA2 is an improved version of WPA, offering advanced network security through AES, commonly used in enterprise and home networks
  • WPA3 is more secure, supports 192-/256-/384-bit encryption options, and supports Wi-Fi 6 networks

Wi-Fi Authentication Methods

  • Password-based authentication: An encrypted password is sent to the router for verification against stored credentials
  • Certificate-based authentication: Uses digital certificates for higher security to identify and authenticate users or devices
  • 802.1X: Uses a RADIUS server to authenticate users, is a standard for network access control, and is often used in enterprise environments

Network Security Measures

  • Encryption secures data
  • Virtual Private Networks (VPNs) create secure connections
  • Firewalls monitor and control network traffic
  • Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) identify and prevent malicious activity
  • Rate limiting controls traffic flow
  • Network segmentation divides a network into smaller networks

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Mastering Computer Networks
5 questions
Computer Networks and Protocols
47 questions
Computer Networks Elements
16 questions
Computer Networks Overview
13 questions

Computer Networks Overview

TrustyNobility5906 avatar
TrustyNobility5906
Use Quizgecko on...
Browser
Browser