Introduction to Computer Networks Session 1
42 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following describes virtualization?

  • It requires physical separation of resources.
  • It allows multiple operating systems to run simultaneously in isolation. (correct)
  • It runs only one operating system at a time.
  • It can only run identical operating systems.

What is a key benefit of cloud computing?

  • It limits accessibility to on-premises users.
  • It provides economies of scale and cost benefits. (correct)
  • It requires significant up-front hardware investment.
  • It reduces reliance on virtualization.

Which service model in cloud computing allows customers to provision and manage computing resources without control of the underlying infrastructure?

  • Storage as a Service (StaaS)
  • Infrastructure as a Service (IaaS) (correct)
  • Software as a Service (SaaS)
  • Platform as a Service (PaaS)

What distinguishes Dual Boot from virtualization?

<p>Virtualization runs multiple operating systems simultaneously on the same hardware. (C)</p> Signup and view all the answers

Which of the following is NOT a characteristic of the Domain Name System (DNS)?

<p>It is primarily used for email server management. (D)</p> Signup and view all the answers

What is a fundamental function of a computer network?

<p>To share resources among connected devices (A)</p> Signup and view all the answers

Which of the following accurately describes a MAC address?

<p>A unique physical address assigned to a network interface card (A)</p> Signup and view all the answers

What role does a repeater play in a network?

<p>It regenerates weak signals within the same network (C)</p> Signup and view all the answers

Which layer of the TCP/IP protocol suite is responsible for data transfer between network devices?

<p>Transport Layer (C)</p> Signup and view all the answers

What function do protocols serve in a computer network?

<p>They govern the rules for message flow across the network (B)</p> Signup and view all the answers

Which device allows Wi-Fi devices to connect to a wired network?

<p>Access Point (C)</p> Signup and view all the answers

What is the difference between an internal NIC and an external NIC?

<p>An internal NIC is integrated directly into the motherboard, while an external NIC connects via USB or wirelessly. (B)</p> Signup and view all the answers

What distinguishes the TCP/IP protocol from proprietary protocols?

<p>It is not tied to one vendor and supports cross-platform capabilities. (D)</p> Signup and view all the answers

What is the primary function of the Internet Protocol (IP) layer in the TCP/IP suite?

<p>To provide connectivity and path selection between hosts. (C)</p> Signup and view all the answers

Which of the following describes a physical address in the context of networking?

<p>A 48-bit hexadecimal address used for identifying devices. (D)</p> Signup and view all the answers

How are physical addresses categorized?

<p>Unicast, Multicast, and Broadcast. (D)</p> Signup and view all the answers

What does the datalink layer in the TCP/IP suite primarily deal with?

<p>Error notification and hop-to-hop addressing. (D)</p> Signup and view all the answers

What is a key difference between IPv4 and IPv6?

<p>IPv4 uniquely identifies devices with a 32-bit address, while IPv6 uses a 128-bit address. (C)</p> Signup and view all the answers

What command can be used to check your physical address on a device?

<p>Ipconfig /all (A)</p> Signup and view all the answers

What does confidentiality in security aim to achieve?

<p>Preventing unauthorized individuals from accessing information (A)</p> Signup and view all the answers

Which layer is responsible for determining the electrical transmission medium in the TCP/IP architecture?

<p>Network Access Layer (B)</p> Signup and view all the answers

What is the role of routable protocols in the TCP/IP suite?

<p>They allow transmission over independent networks. (D)</p> Signup and view all the answers

Which component is included in the definition of risk?

<p>Weaknesses in infrastructure (C)</p> Signup and view all the answers

An example of an active attack is:

<p>Injecting malicious code into a web application (B)</p> Signup and view all the answers

Which of the following is a characteristic of passive attacks?

<p>They typically do not manipulate data (B)</p> Signup and view all the answers

What is the main goal of social engineering in a security context?

<p>To influence individuals to disclose confidential information (D)</p> Signup and view all the answers

Which statement about risks in security is true?

<p>It is impossible to totally eliminate risk (D)</p> Signup and view all the answers

What does the integrity of data ensure?

<p>The consistency of data and detection of modifications (B)</p> Signup and view all the answers

A phishing attack typically involves which of the following?

<p>Using a fake webpage to collect user credentials (D)</p> Signup and view all the answers

What is indicated by the term 'availability' in security goals?

<p>Legitimate users can freely access needed information (D)</p> Signup and view all the answers

Which factor contributes to the complexity of maintaining security?

<p>Increasing sophistication of attack methods and new vulnerabilities (A)</p> Signup and view all the answers

What is a hijack attack primarily characterized by?

<p>A hacker taking over a session and disconnecting the original participant. (C)</p> Signup and view all the answers

Which of the following best defines a password attack?

<p>An effort to guess or crack stored passwords in a database. (A)</p> Signup and view all the answers

What distinguishes a Trojan horse from other types of malware?

<p>It appears attractive but has hidden malicious functions. (D)</p> Signup and view all the answers

What is a common characteristic of worms in the context of malware?

<p>They do not infect host systems but replicate themselves. (B)</p> Signup and view all the answers

What is the primary function of ransomware?

<p>To encrypt files and demand payment for decryption. (B)</p> Signup and view all the answers

Which of these statements about backdoors is true?

<p>They offer unauthorized access to programs without detection. (C)</p> Signup and view all the answers

How does a zombie program operate in a network?

<p>It takes control of another computer to launch attacks. (D)</p> Signup and view all the answers

What methodology does a dictionary attack utilize?

<p>It uses a predefined list of potential passwords. (B)</p> Signup and view all the answers

What is the main risk associated with permanently connected systems in relation to malware?

<p>They are often exploited by worms due to lack of security. (B)</p> Signup and view all the answers

Which attack involves a threat from within an organization?

<p>Insider attack (A)</p> Signup and view all the answers

Signup and view all the answers

Flashcards

Decentralized System

A distributed system where responsibilities are split among machines, allowing them to act as both clients and servers.

Virtualization

A technology that allows multiple operating systems to run simultaneously on the same machine, each isolated from the other.

Cloud Computing

A pool of resources accessible on demand, providing automated provisioning and scalability.

Software as a Service (SaaS)

A service model where users access and use software applications over the internet, without managing the underlying infrastructure.

Signup and view all the flashcards

Platform as a Service (PaaS)

A service model that allows users to deploy their own applications on a provider's cloud infrastructure, without managing the underlying hardware.

Signup and view all the flashcards

What is a computer network?

A collection of interconnected computers and devices that share resources like files, software, printers, and internet access.

Signup and view all the flashcards

What is network medium?

A physical or wireless connection that allows devices on a network to communicate with each other. Examples include Ethernet cables, Wi-Fi signals, and satellite links.

Signup and view all the flashcards

What is a NIC card?

A network hardware component that allows a device to connect to a network. It has a unique physical address "MAC address" burned on it.

Signup and view all the flashcards

What is a MAC address?

A unique physical address assigned to each network interface card (NIC) that identifies it on a network.

Signup and view all the flashcards

What is an IP address?

A logical address that identifies a device on an IP network. It allows devices to communicate over the internet.

Signup and view all the flashcards

What is a hub?

A type of network device that connects multiple devices on a network and allows them to communicate with each other.

Signup and view all the flashcards

What is a repeater?

A network device that amplifies and retransmits network signals to help them travel further distances or to overcome signal loss.

Signup and view all the flashcards

Protocol

A set of communication rules that allows devices to connect and exchange data across networks

Signup and view all the flashcards

TCP/IP

The standard protocol for the internet, used by most modern operating systems, allowing communication between devices on different platforms

Signup and view all the flashcards

Internet/Network Protocol Layer (IP)

The layer in the TCP/IP model responsible for connecting different networks and finding the best route for data

Signup and view all the flashcards

IP Address

A unique address assigned to each device on a network, allowing them to be identified and located

Signup and view all the flashcards

MAC Address

The physical address permanently burned onto a network card, uniquely identifying the device

Signup and view all the flashcards

Unicast MAC Address

A type of MAC address that identifies a single device, enabling one-to-one communication

Signup and view all the flashcards

Multicast MAC Address

A type of MAC address that identifies a group of devices, allowing communication with multiple devices simultaneously

Signup and view all the flashcards

Broadcast MAC Address

A type of MAC address that broadcasts a message to all devices on a network

Signup and view all the flashcards

Datalink Layer

The layer in the TCP/IP model responsible for providing a logical interface between the network and the end user device, handling error detection and control

Signup and view all the flashcards

Confidentiality (Security Goal)

Ensuring that information is only accessible to authorized individuals.

Signup and view all the flashcards

Integrity (Security Goal)

Guaranteeing that data remains accurate and unchanged, making it possible to detect any modifications.

Signup and view all the flashcards

Availability (Security Goal)

Ensuring legitimate users can access information and resources without interruption.

Signup and view all the flashcards

Risk (Security Concept)

The likelihood of a threat exploiting a vulnerability.

Signup and view all the flashcards

Vulnerability (Security Concept)

A weakness in a system that a threat can exploit.

Signup and view all the flashcards

Threat (Security Concept)

A person, thing, event, or idea that poses a danger to an asset's confidentiality, integrity, availability, or legitimate use.

Signup and view all the flashcards

Attack (Security Concept)

Any attempt to destroy, expose, alter, disable, steal, or gain unauthorized access to an asset.

Signup and view all the flashcards

Passive Attack (Security Concept)

Attackers gather information without actively sending traffic, making detection difficult.

Signup and view all the flashcards

Active Attack (Security Concept)

Attacks where attackers actively send traffic, making them easier to detect.

Signup and view all the flashcards

Social Engineering (Security Concept)

The act of influencing people's behavior to gain access to information or systems.

Signup and view all the flashcards

Hijack Attack

A hacker takes control of a communication session between two people, disconnecting the original recipient. The victim is unaware and may unknowingly send sensitive information to the hacker.

Signup and view all the flashcards

Insider Attack

An attack originating from someone within the organization, such as a disgruntled employee, who exploits their access to compromise the network.

Signup and view all the flashcards

Password Attack

This involves attempts to guess passwords stored in a system's database or password-protected files, using various methods.

Signup and view all the flashcards

Dictionary Attack

A specific type of password attack that uses a list of common or likely passwords to try and gain access.

Signup and view all the flashcards

Brute-force Attack

A method for password cracking that tries every possible combination of characters until it finds the correct one.

Signup and view all the flashcards

Hybrid Attack

A password attack technique that combines elements of dictionary attacks and brute-force attacks, using word lists and character combinations.

Signup and view all the flashcards

Backdoor

A hidden entry point into a program, often left by developers unintentionally, that allows unauthorized access without detection by normal security measures.

Signup and view all the flashcards

Trojan Horse

A program disguised as legitimate software, but designed to perform malicious actions behind the scenes, often used to spread viruses, install backdoors, or access sensitive data.

Signup and view all the flashcards

Worm

Malware that replicates itself and spreads through a network, exploiting vulnerabilities or user permissions,often used for launching DDoS attacks.

Signup and view all the flashcards

Ransomware

A type of malware that encrypts a victim's data and demands a ransom to unlock it, often using cryptocurrency payments like Bitcoin.

Signup and view all the flashcards

Study Notes

Introduction to Computer Networks & Cyber Security

  • Course is offered by the Information Technology Institute (ITI)
  • Course is taught by Mohamed AboSehly
  • Course Agenda includes:
    • Session 1: Network Essentials
    • Session 2: Cyber Security Essentials
    • Session 3: Distributed Systems

Session 1 (Network Essentials)

  • Session Outlines: Includes definitions of computer networks, basic terminologies, TCP/IP protocol suite, network access layer (physical & data link layer), internet layer, transport layer, and application layer.
  • Computer Networks: Defined as a collection of interconnected computers and devices (peripherals) used for sharing resources
  • Resources (Examples): File sharing, device sharing, software sharing with multi-user licenses, voice and video calls, shared internet access.
  • Network Elements: Hardware components include: Computers, Printers, Phones, Routers and Switches. Media components include: Wired, Wireless, and Satellites. Software components include messages (information transferred over the network) and protocols (governing how messages flow, examples include http, https, FTP, RDP).
  • Network Interface Card (NIC): A hardware component that enables a device to connect to a network. Internal (directly into motherboard), External (wireless or USB-based).
  • MAC Address: Unique physical address burned into the NIC card for each device.
  • IP Address: Logical address identifying each device on an IP network layer.
  • Protocols: Communication rules that network entities agree on, examples include HTTP, HTTPS, FTP, RDP.
  • Network Basic Terminologies (Devices):
    • Hub: Allows nodes to communicate, but slows down networks.
    • Repeater: Regenerates signals on the same network.
    • Access Point (AP): Allows Wi-Fi devices to connect to a wired network.
    • Switch: Allows different devices to communicate on the same network without slowing each other.
    • Router: Enables communication between different networks.
  • LAN vs WAN:
    • LAN (Local Area Network): A network in a small geographical area like a school or office (100-1000 meters). Allows users to share files and services. High speed. Under administrative control.
    • WAN (Wide Area Network): A network covering a large geographical area like a country. Can contain multiple smaller networks (like LANs). Very low speed. Under ISP administrative control. Internet is a WAN example.
  • The Internet: A global mesh of interconnected networks. No single entity owns the Internet; many organizations (ISPs, companies, governments) own pieces of the infrastructure.
  • Internet Governing Bodies:
    • ISOC (Internet Society): Maintains the Internet infrastructure.
    • IETF (Internet Engineering Task Force): Develops Internet protocols.
    • ICANN (Internet Corporation for Assigned Names and Numbers): Responsible for domain names and IP addresses.
  • Peer-to-Peer vs Client/Server Networks:
    • Peer-to-Peer: No dedicated resources, all nodes are equal. Easy to work with.
    • Client/Server: Some nodes (servers) are dedicated to services for other nodes (clients). Servers are typically more powerful. Examples of services include mail, web, file, and print servers.
  • TCP/IP Protocol (Suite):
    • Why are protocols needed? Necessary for efficient communication, enabling data flow between devices and controlling message quantities.
    • OSI Reference Model: Defined by ISO in 1983 for universal network concepts; the OSI reference model breaks this approach into layers.
    • Layers and Protocols: (in order from top to bottom layers) Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data link Layer, Physical Layer. Corresponding TCP/IP layer equivalents are listed.
  • Internet Protocol (IP): Uniquely identifies devices on an IP network, sometimes called the Logical Address. Every host must have a unique address on the same network. Explained in detail with examples.
    • IPv4 vs IPv6: IPv4 uses 32 bits and is represented in dotted decimal notation. IPv6 is 128 bits.
  • Public vs Private IP Addresses: Tables and definitions demonstrating the differences of public versus private IP addresses (with their ranges).
  • How to Assign IP addresses: Manually, Automatically (via DHCP), APIPA (Automatic Private IP Addressing).
    • Command-line tools: ipconfig, ipconfig /all, ipconfig /release, ipconfig /renew, arp -a
    • Ping commands: ping IP, ping URL, ping IP -1 -n -t
  • Internet Protocol (IPv6): Explained in detail with examples.
  • Internet of Things (IoT): Aims to connect every device to the existing internet infrastructure. "Things" that sense data and send it to the internet, such as coffee makers, AC, washing machines, etc.
  • Practical Applications: Smart Homes, Smart Cities, Energy, Environment monitoring, Healthcare, Mnagement.
  • Transport Layer (TCP/IP protocol):
    • TCP vs UDP: TCP is reliable and connection-oriented, UDP is unreliable and connectionless.
    • Protocols for different purposes are included. (SMTP, FTP, TFTP, DNS, SNMP, BOOTP)
  • Transport Layer Addressing (Port Numbers):
    • Well-known ports: Permanent numbers (0-1023). Controlled by ICANN.
    • Registered ports: (1024-49151). Can be registered by ICANN.
    • Dynamic ports: (49152-65535). Not controlled.
  • Application Layer: (Examples)
    • Communication between processes/applications.
    • Internet Services (DNS, HTTP, FTP, Telnet, SMTP/IMAP)
  • URL: Universal Resource Locator. Explaining the structure: Protocol (HTTP, HTTPS, or FTP) - Host - Port - Path. Including examples.
  • DNS: Domain Name Servers translate domain names into IP addresses. Steps involved are explained.
    • TLD's: Top Level Domains (example: .com, .edu, .gov).
  • FTP: File Transfer Protocol. Details about how it works.
  • Telnet/SSH or RDP: Remote access protocols to other computers. Telnet is not secure and SSH is secure.
  • Mail Server and Clients: Explaining the roles of SMTP (Mail Servers), POP3/IMAP (Mail Clients).
  • Session 1 Practices: How to obtain network information.

Session 2 (Cyber Security Essentials)

  • Information Security Goals: Confidentiality, Integrity, and Availability.
  • Risks & Threats: Defined. Examples include vulnerabilities, attackers, methods, and malware.
  • Threats & Vulnerabilities
  • Methods (Examples): Passive & Active attacks, Dictionary, Brute-force, and Hybrid attacks.
  • Types of Attacks: Phishing, Hijacking, Insider attacks.
  • Types of Malware: Backdoor/Trapdoor, Viruses, Trojan Horse.
  • Ransomware
  • DoS and DDoS attacks. Descriptions of how they work.
  • Security Defenses: Firewalls (Static/Dynamic), Intrusion Detection/Prevention systems (NIDS/NIPS), VPN, and Proxy.
  • Encryption: The process of encoding information
  • Session 2 Practices: Including how to use local firewalls.

Session 3 (Distributed Systems)

  • Distributed Systems Overview: Definition, Basic Terminologies.
  • Why build a distributed system? Solutions to issues relating to performance, maximizing resources, minimizing failures, dependency mitigation and scaling.
  • Types of Distributed Systems: Client-Server, Three-tier, Multi-tier, and Peer-to-Peer
  • Distributed Systems Architecture: Explaining each
  • Examples of distributed systems
  • Cloud Computing:
    • Value: Economies of scale, elasticity to meet needs, ease of access.
    • Service models: SaaS, PaaS, and IaaS
    • Deployment models: Public, Community, Private, and Hybrid.
  • Virtualization Benefits of using it: Consolidation, Redundancy, Legacy hardware, Migration and Centralized management.
  • Session 3 Practices: Use specific software tools to demonstrate concepts.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

This quiz focuses on the essentials of computer networks, covering fundamental definitions, terminologies, and the TCP/IP protocol suite. It also includes details about network layers, hardware components, and resource sharing among interconnected devices. Test your knowledge on the basics of networking to prepare for further studies in cybersecurity and distributed systems.

More Like This

Use Quizgecko on...
Browser
Browser