40 Questions
What type of threat is described when an air conditioning unit fails, causing routers and switches to malfunction?
environmental
What type of attack is intended to prevent authorized users from accessing network resources?
DoS attacks
What protocol is used to implement the transmission of voice packets over an IP network?
VoIP
What type of threat is represented when an unauthorized user accesses a file server and copies important documents?
information theft
What type of threat is caused by physical damage to servers, routers, switches, cabling, and workstations?
hardware
What type of attack involves unauthorized manipulation of data and access to systems or user privileges?
access attacks
What type of threat is caused by voltage spikes, insufficient supply voltage, or unconditioned power?
electrical
What protocol is used by a client to communicate securely with a web server?
HTTPS
Which protocol is used to access web content hosted by a web server securely?
HTTPS
Which two tasks are functions of the presentation layer?
compression, encryption
Which device should be used to enable a host to communicate with another host on a different network?
Router
What feature allows different communication streams to occur at the same time, without having a single data stream using all available bandwidth?
multiplexing
What information is used by TCP to reassemble and reorder received segments?
sequence numbers
What is the dotted decimal format of the binary address 11101100 00010001 00001100 00001010?
236.17.12.10
What is the primary function of an IPS?
Detecting and blocking of attacks in real time
Why does HTTP use TCP as its transport layer protocol?
because HTTP requires reliable delivery
How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?
1024
Which of the following protocols is used for sending and receiving emails?
SMTP
Which of the following is a characteristic of TCP?
Provides tracking of transmitted data segments
What protocol should a technician use to securely access network devices?
SSH
What is the network address for the Sales department in the given VLSM?
190.192.0.0/20
Which field in the IPv4 header prevents a packet from traversing a network endlessly?
Time-to-Live
What is the primary purpose of the TCP 3-way handshake?
To guarantee session establishment
How many hosts are available in the WAN 1 network?
128
What is the broadcast address for the Executive department?
190.192.38.143
Which of the following is a characteristic of UDP?
Headers use very little overhead and cause minimal delay
What is the prefix for the Marketing department's network?
/21
What happens when the TTL field in the IPv4 header decrements to zero?
The router discards the packet and sends an ICMP Time Exceeded message
Which of the following is used to determine the priority of each packet?
Differentiated Services
What is the first usable host in the Accounting department's network?
190.192.24.1
What is the main difference between TCP and UDP?
TCP is connection-oriented, while UDP is connectionless
What is the purpose of VLSM?
To optimize IP address allocation
What are two benefits of creating subnets?
easier to implement security policies and reduction in number of switches needed
What is the purpose of ANDing a destination IP address with a subnet mask?
to identify the network address of the destination network
What is the primary function of antispyware?
to protect end devices from becoming infected with malicious software
What is the primary function of adware?
to collect information about the user
What type of IP address is 192.168.1.15/29?
unicast address
What is the broadcast address of a network?
the last address of any given network
What is identity theft?
the unauthorized use of personal information
What is a benefit of subnetting a network?
improves network performance
Study Notes
Network Threats
- The situation where an air conditioning unit fails, causing some routers and switches in a wiring closet to malfunction, describes an environmental threat.
- There are four classes of threats:
- Hardware threats: physical damage to servers, routers, switches, cabling plant, and workstations.
- Environmental threats: temperature extremes, humidity extremes, or other environmental factors.
- Electrical threats: voltage spikes, insufficient supply voltage, unconditioned power, or total power loss.
- Maintenance threats: poor handling of key electrical components, lack of critical spare parts, poor cabling, or poor labeling.
Network Attacks
- DoS (Denial of Service) attacks are intended to prevent legitimate users and devices from accessing network resources.
- Access attacks and trust exploitation involve unauthorized manipulation of data and access to systems or user privileges.
- Reconnaissance attacks involve the unauthorized discovery and mapping of the network and network systems.
Network Protocols
- VoIP (Voice over Internet Protocol) defines the protocols and technologies that implement the transmission of voice packets over an IP network.
- HTTPS (Hypertext Transfer Protocol Secure) is a secure form of HTTP used to access web content hosted by a web server.
- TCP (Transmission Control Protocol) uses sequence numbers to reassemble received segments into the correct order.
- UDP (User Datagram Protocol) does not track transmitted data segments, and destination devices will not acknowledge received data.
Network Devices
- A router is used to enable a host to communicate with another host on a different network.
- Switches are used to forward data packets between devices on the same network.
- Hubs are used to connect devices on a network, but they are not as efficient as switches.
Network Addressing
- Subnet masks are used to determine the network address and host address portions of an IP address.
- The /22 prefix provides 22 bits for the network portion and leaves 10 bits for the host portion.
- IPv4 header fields include:
- Time-to-Live (TTL): used to prevent a packet from traversing a network endlessly.
- Sequence Number: used to track transmitted data segments.
- Acknowledgment Number: used to acknowledge received data.
Network Security
- Intrusion Prevention System (IPS): provides real-time detection and blocking of attacks.
- Antispyware: protects end devices from becoming infected with malicious software.
- Adware: software installed on a user device that collects information about the user.
- Identity theft: the use of stolen credentials to access private data.
Network Management
- VLSM (Variable Length Subnet Masking): used to subnet a network address space.
- Accounting: keeps track of the actions of the user.
- SSH (Secure Shell): a protocol used to securely access network devices.
- FTP (File Transfer Protocol): a protocol used to transfer files over a network.
- HTTP (Hypertext Transfer Protocol): a protocol used to access web content.
- Telnet: a protocol used to remotely access a network device.
Identify the type of threat that occurs when a malfunctioning air conditioning unit affects routers and switches in a wiring closet. Learn about the different classes of threats in a network.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free