Network Security Fundamentals

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What does a sniffing attack do?

  • Changes file names
  • Sends error messages
  • Captures network traffic secretly (correct)
  • Blocks user access

What makes a DDoS attack different from a DoS?

  • Uses a fake IP
  • Uses encryption
  • Comes from multiple devices (correct)
  • Only targets websites

What is the goal of a poisoning attack?

  • Break encryption
  • Slow down traffic
  • Block ports
  • Redirect data to a wrong place (correct)

What protocol ensures data is delivered correctly?

<p>TCP (D)</p> Signup and view all the answers

Which step is last in the TCP three-way handshake?

<p>ACK (C)</p> Signup and view all the answers

Why is UDP considered faster than TCP?

<p>It skips delivery checks (A)</p> Signup and view all the answers

Where is UDP commonly used?

<p>Online gaming and streaming (D)</p> Signup and view all the answers

Which address version uses 128 bits?

<p>IPv6 (D)</p> Signup and view all the answers

What does IPv4 use to identify a device?

<p>32-bit address (B)</p> Signup and view all the answers

What does the ARP protocol do?

<p>Maps IP to MAC address (C)</p> Signup and view all the answers

How many bits does an IPv6 address use?

<p>128 bits (B)</p> Signup and view all the answers

What does an A record in DNS do?

<p>Links domain to IPv4 address (C)</p> Signup and view all the answers

Which DNS record type links to an IPv6 address?

<p>AAAA (A)</p> Signup and view all the answers

Which record is used for reverse DNS lookups?

<p>PTR (C)</p> Signup and view all the answers

What protocol does DNS use for zone transfers?

<p>TCP (D)</p> Signup and view all the answers

Which DNS feature helps prevent poisoning attacks?

<p>DNSSEC (C)</p> Signup and view all the answers

What is unicast communication?

<p>One-to-one (A)</p> Signup and view all the answers

How can switches increase network security?

<p>Use port security and MAC filtering (B)</p> Signup and view all the answers

What do routers not forward?

<p>Broadcasts (D)</p> Signup and view all the answers

Which command is used to view or set routing tables?

<p>route (A)</p> Signup and view all the answers

What is the main feature of a stateful firewall?

<p>It checks the state of traffic sessions (A)</p> Signup and view all the answers

What type of firewall protects web applications?

<p>Web Application Firewall (WAF) (B)</p> Signup and view all the answers

What is an intranet?

<p>A network used inside an organization (A)</p> Signup and view all the answers

What is the purpose of an extranet?

<p>To allow limited access to outsiders (A)</p> Signup and view all the answers

What is another term for a screened subnet?

<p>Demilitarized zone (DMZ) (D)</p> Signup and view all the answers

What does NAT do in a network?

<p>Converts private IPs to public ones (B)</p> Signup and view all the answers

Which NAT type uses one public IP for each private IP?

<p>Static NAT (C)</p> Signup and view all the answers

What does physical isolation do?

<p>Keeps networks completely separate (D)</p> Signup and view all the answers

How is logical separation usually achieved?

<p>Using firewalls and routers (D)</p> Signup and view all the answers

What device is used to group or separate computers logically?

<p>Switch (using VLAN) (A)</p> Signup and view all the answers

Flashcards

What is a sniffing attack?

Secretly captures network traffic.

What is a DDoS attack?

A DoS attack that uses multiple devices.

What is the goal of a poisoning attack?

Redirects data to a wrong place.

What does TCP do?

Ensures data is delivered correctly.

Signup and view all the flashcards

What is the final step in TCP handshake?

Finalizes the TCP connection handshake.

Signup and view all the flashcards

Why is UDP faster than TCP?

Because it skips delivery checks.

Signup and view all the flashcards

Where is UDP used?

Online gaming and streaming.

Signup and view all the flashcards

What is IPv6?

Uses 128 bits.

Signup and view all the flashcards

How does IPv4 ID a device?

Uses a 32-bit address.

Signup and view all the flashcards

What does the ARP protocol do?

Maps IP to MAC address.

Signup and view all the flashcards

What is an A record?

A DNS record that links a domain to an IPv4 address.

Signup and view all the flashcards

What is a AAAA record?

A DNS record type that links to an IPv6 address.

Signup and view all the flashcards

What is PTR record?

Used for reverse DNS lookups.

Signup and view all the flashcards

DNS: Zone transfers protocol?

DNS uses TCP for zone transfers.

Signup and view all the flashcards

What DNS feature prevents poisoning?

DNSSEC prevents DNS poisoning attacks.

Signup and view all the flashcards

What is unicast communication?

Communication from one sender to one receiver.

Signup and view all the flashcards

How do switches increase network security?

Use port security and MAC filtering.

Signup and view all the flashcards

Routers don't forward what?

Routers do not forward broadcasts.

Signup and view all the flashcards

What does the 'route' command do?

Views or sets routing tables.

Signup and view all the flashcards

Stateful firewall feature?

Checks the state of traffic sessions.

Signup and view all the flashcards

Study Notes

  • Here are some study notes based on your provided content

Sniffing Attack

  • Captures network traffic secretly

DDoS vs DoS

  • DDoS attacks come from multiple devices, differentiating them from DoS attacks

Poisoning Attack

  • Redirects data to a wrong place

Data Delivery Protocol

  • TCP is the protocol that ensures data is delivered correctly

TCP Three-Way Handshake

  • The last step in the TCP three-way handshake is ACK

UDP vs TCP Speed

  • UDP is considered faster than TCP because it skips delivery checks

Common UDP Use

  • UDP is commonly used for online gaming and streaming

IPv6 Addresses

  • IPv6 address version uses 128 bits

IPv4 Device Identification

  • IPv4 uses a 32-bit address to identify devices

ARP Protocol

  • ARP protocol maps IP to MAC addresses

IPv6 Address Bits

  • An IPv6 address uses 128 bits

DNS A Record

  • An A record in DNS links a domain to an IPv4 address
  • AAAA is the DNS record type that links to an IPv6 address

Reverse DNS Lookup

  • PTR record is used for reverse DNS lookups

DNS Zone Transfers

  • TCP is the protocol DNS uses for zone transfers

DNS Poisoning Prevention

  • DNSSEC is a DNS feature that helps prevent poisoning attacks

Unicast Communication

  • Unicast communication is one-to-one

Switch Network Security

  • Switches increase network security using port security and MAC filtering

Router Forwarding

  • Routers do not forward broadcasts

Routing Table Command

  • The command to view or set routing tables is route

Stateful Firewall

  • A stateful firewall checks the state of traffic sessions

Web Application Firewall

  • A Web Application Firewall (WAF) protects web applications

Intranet Defined

  • An intranet is a network used inside an organization

Extranet Purpose

  • An extranet allows limited access to outsiders

Screened Subnet

  • A screened subnet is also known as a Demilitarized Zone (DMZ)

NAT Function

  • NAT converts private IPs to public ones in a network

NAT Types

  • Static NAT uses one public IP for each private IP

Physical Isolation

  • Physical isolation keeps networks completely separate

Logical Separation

  • Logical separation is usually achieved using firewalls and routers

Logical Grouping Device

  • A switch (using VLAN) is used to group or separate computers logically

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

IPSec Protocols in Network Security
30 questions
Networking Protocols and Concepts Quiz
65 questions
Use Quizgecko on...
Browser
Browser