Network Threats Classification
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of threat is described when an air conditioning unit fails, causing routers and switches to malfunction?

  • electrical
  • environmental (correct)
  • maintenance
  • configuration
  • What type of attack is intended to prevent authorized users from accessing network resources?

  • trust exploitation
  • access attacks
  • reconnaissance attacks
  • DoS attacks (correct)
  • What protocol is used to implement the transmission of voice packets over an IP network?

  • DHCP
  • QoS
  • NAT
  • VoIP (correct)
  • What type of threat is represented when an unauthorized user accesses a file server and copies important documents?

    <p>information theft</p> Signup and view all the answers

    What type of threat is caused by physical damage to servers, routers, switches, cabling, and workstations?

    <p>hardware</p> Signup and view all the answers

    What type of attack involves unauthorized manipulation of data and access to systems or user privileges?

    <p>access attacks</p> Signup and view all the answers

    What type of threat is caused by voltage spikes, insufficient supply voltage, or unconditioned power?

    <p>electrical</p> Signup and view all the answers

    What protocol is used by a client to communicate securely with a web server?

    <p>HTTPS</p> Signup and view all the answers

    Which protocol is used to access web content hosted by a web server securely?

    <p>HTTPS</p> Signup and view all the answers

    Which two tasks are functions of the presentation layer?

    <p>compression, encryption</p> Signup and view all the answers

    Which device should be used to enable a host to communicate with another host on a different network?

    <p>Router</p> Signup and view all the answers

    What feature allows different communication streams to occur at the same time, without having a single data stream using all available bandwidth?

    <p>multiplexing</p> Signup and view all the answers

    What information is used by TCP to reassemble and reorder received segments?

    <p>sequence numbers</p> Signup and view all the answers

    What is the dotted decimal format of the binary address 11101100 00010001 00001100 00001010?

    <p>236.17.12.10</p> Signup and view all the answers

    What is the primary function of an IPS?

    <p>Detecting and blocking of attacks in real time</p> Signup and view all the answers

    Why does HTTP use TCP as its transport layer protocol?

    <p>because HTTP requires reliable delivery</p> Signup and view all the answers

    How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?

    <p>1024</p> Signup and view all the answers

    Which of the following protocols is used for sending and receiving emails?

    <p>SMTP</p> Signup and view all the answers

    Which of the following is a characteristic of TCP?

    <p>Provides tracking of transmitted data segments</p> Signup and view all the answers

    What protocol should a technician use to securely access network devices?

    <p>SSH</p> Signup and view all the answers

    What is the network address for the Sales department in the given VLSM?

    <p>190.192.0.0/20</p> Signup and view all the answers

    Which field in the IPv4 header prevents a packet from traversing a network endlessly?

    <p>Time-to-Live</p> Signup and view all the answers

    What is the primary purpose of the TCP 3-way handshake?

    <p>To guarantee session establishment</p> Signup and view all the answers

    How many hosts are available in the WAN 1 network?

    <p>128</p> Signup and view all the answers

    What is the broadcast address for the Executive department?

    <p>190.192.38.143</p> Signup and view all the answers

    Which of the following is a characteristic of UDP?

    <p>Headers use very little overhead and cause minimal delay</p> Signup and view all the answers

    What is the prefix for the Marketing department's network?

    <p>/21</p> Signup and view all the answers

    What happens when the TTL field in the IPv4 header decrements to zero?

    <p>The router discards the packet and sends an ICMP Time Exceeded message</p> Signup and view all the answers

    Which of the following is used to determine the priority of each packet?

    <p>Differentiated Services</p> Signup and view all the answers

    What is the first usable host in the Accounting department's network?

    <p>190.192.24.1</p> Signup and view all the answers

    What is the main difference between TCP and UDP?

    <p>TCP is connection-oriented, while UDP is connectionless</p> Signup and view all the answers

    What is the purpose of VLSM?

    <p>To optimize IP address allocation</p> Signup and view all the answers

    What are two benefits of creating subnets?

    <p>easier to implement security policies and reduction in number of switches needed</p> Signup and view all the answers

    What is the purpose of ANDing a destination IP address with a subnet mask?

    <p>to identify the network address of the destination network</p> Signup and view all the answers

    What is the primary function of antispyware?

    <p>to protect end devices from becoming infected with malicious software</p> Signup and view all the answers

    What is the primary function of adware?

    <p>to collect information about the user</p> Signup and view all the answers

    What type of IP address is 192.168.1.15/29?

    <p>unicast address</p> Signup and view all the answers

    What is the broadcast address of a network?

    <p>the last address of any given network</p> Signup and view all the answers

    What is identity theft?

    <p>the unauthorized use of personal information</p> Signup and view all the answers

    What is a benefit of subnetting a network?

    <p>improves network performance</p> Signup and view all the answers

    Study Notes

    Network Threats

    • The situation where an air conditioning unit fails, causing some routers and switches in a wiring closet to malfunction, describes an environmental threat.
    • There are four classes of threats:
    • Hardware threats: physical damage to servers, routers, switches, cabling plant, and workstations.
    • Environmental threats: temperature extremes, humidity extremes, or other environmental factors.
    • Electrical threats: voltage spikes, insufficient supply voltage, unconditioned power, or total power loss.
    • Maintenance threats: poor handling of key electrical components, lack of critical spare parts, poor cabling, or poor labeling.

    Network Attacks

    • DoS (Denial of Service) attacks are intended to prevent legitimate users and devices from accessing network resources.
    • Access attacks and trust exploitation involve unauthorized manipulation of data and access to systems or user privileges.
    • Reconnaissance attacks involve the unauthorized discovery and mapping of the network and network systems.

    Network Protocols

    • VoIP (Voice over Internet Protocol) defines the protocols and technologies that implement the transmission of voice packets over an IP network.
    • HTTPS (Hypertext Transfer Protocol Secure) is a secure form of HTTP used to access web content hosted by a web server.
    • TCP (Transmission Control Protocol) uses sequence numbers to reassemble received segments into the correct order.
    • UDP (User Datagram Protocol) does not track transmitted data segments, and destination devices will not acknowledge received data.

    Network Devices

    • A router is used to enable a host to communicate with another host on a different network.
    • Switches are used to forward data packets between devices on the same network.
    • Hubs are used to connect devices on a network, but they are not as efficient as switches.

    Network Addressing

    • Subnet masks are used to determine the network address and host address portions of an IP address.
    • The /22 prefix provides 22 bits for the network portion and leaves 10 bits for the host portion.
    • IPv4 header fields include:
    • Time-to-Live (TTL): used to prevent a packet from traversing a network endlessly.
    • Sequence Number: used to track transmitted data segments.
    • Acknowledgment Number: used to acknowledge received data.

    Network Security

    • Intrusion Prevention System (IPS): provides real-time detection and blocking of attacks.
    • Antispyware: protects end devices from becoming infected with malicious software.
    • Adware: software installed on a user device that collects information about the user.
    • Identity theft: the use of stolen credentials to access private data.

    Network Management

    • VLSM (Variable Length Subnet Masking): used to subnet a network address space.
    • Accounting: keeps track of the actions of the user.
    • SSH (Secure Shell): a protocol used to securely access network devices.
    • FTP (File Transfer Protocol): a protocol used to transfer files over a network.
    • HTTP (Hypertext Transfer Protocol): a protocol used to access web content.
    • Telnet: a protocol used to remotely access a network device.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    DCN - with sagot.pdf

    Description

    Identify the type of threat that occurs when a malfunctioning air conditioning unit affects routers and switches in a wiring closet. Learn about the different classes of threats in a network.

    More Like This

    Network Security Quiz
    10 questions

    Network Security Quiz

    AstoundingKindness avatar
    AstoundingKindness
    Security Policies and Threats
    10 questions

    Security Policies and Threats

    GraciousTrigonometry avatar
    GraciousTrigonometry
    IT Security Threats and Vulnerabilities
    16 questions
    Cyber Security: Network Threats
    36 questions
    Use Quizgecko on...
    Browser
    Browser