Network Threats Classification

DazzlingStanza avatar
DazzlingStanza
·
·
Download

Start Quiz

Study Flashcards

40 Questions

What type of threat is described when an air conditioning unit fails, causing routers and switches to malfunction?

environmental

What type of attack is intended to prevent authorized users from accessing network resources?

DoS attacks

What protocol is used to implement the transmission of voice packets over an IP network?

VoIP

What type of threat is represented when an unauthorized user accesses a file server and copies important documents?

information theft

What type of threat is caused by physical damage to servers, routers, switches, cabling, and workstations?

hardware

What type of attack involves unauthorized manipulation of data and access to systems or user privileges?

access attacks

What type of threat is caused by voltage spikes, insufficient supply voltage, or unconditioned power?

electrical

What protocol is used by a client to communicate securely with a web server?

HTTPS

Which protocol is used to access web content hosted by a web server securely?

HTTPS

Which two tasks are functions of the presentation layer?

compression, encryption

Which device should be used to enable a host to communicate with another host on a different network?

Router

What feature allows different communication streams to occur at the same time, without having a single data stream using all available bandwidth?

multiplexing

What information is used by TCP to reassemble and reorder received segments?

sequence numbers

What is the dotted decimal format of the binary address 11101100 00010001 00001100 00001010?

236.17.12.10

What is the primary function of an IPS?

Detecting and blocking of attacks in real time

Why does HTTP use TCP as its transport layer protocol?

because HTTP requires reliable delivery

How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?

1024

Which of the following protocols is used for sending and receiving emails?

SMTP

Which of the following is a characteristic of TCP?

Provides tracking of transmitted data segments

What protocol should a technician use to securely access network devices?

SSH

What is the network address for the Sales department in the given VLSM?

190.192.0.0/20

Which field in the IPv4 header prevents a packet from traversing a network endlessly?

Time-to-Live

What is the primary purpose of the TCP 3-way handshake?

To guarantee session establishment

How many hosts are available in the WAN 1 network?

128

What is the broadcast address for the Executive department?

190.192.38.143

Which of the following is a characteristic of UDP?

Headers use very little overhead and cause minimal delay

What is the prefix for the Marketing department's network?

/21

What happens when the TTL field in the IPv4 header decrements to zero?

The router discards the packet and sends an ICMP Time Exceeded message

Which of the following is used to determine the priority of each packet?

Differentiated Services

What is the first usable host in the Accounting department's network?

190.192.24.1

What is the main difference between TCP and UDP?

TCP is connection-oriented, while UDP is connectionless

What is the purpose of VLSM?

To optimize IP address allocation

What are two benefits of creating subnets?

easier to implement security policies and reduction in number of switches needed

What is the purpose of ANDing a destination IP address with a subnet mask?

to identify the network address of the destination network

What is the primary function of antispyware?

to protect end devices from becoming infected with malicious software

What is the primary function of adware?

to collect information about the user

What type of IP address is 192.168.1.15/29?

unicast address

What is the broadcast address of a network?

the last address of any given network

What is identity theft?

the unauthorized use of personal information

What is a benefit of subnetting a network?

improves network performance

Study Notes

Network Threats

  • The situation where an air conditioning unit fails, causing some routers and switches in a wiring closet to malfunction, describes an environmental threat.
  • There are four classes of threats:
  • Hardware threats: physical damage to servers, routers, switches, cabling plant, and workstations.
  • Environmental threats: temperature extremes, humidity extremes, or other environmental factors.
  • Electrical threats: voltage spikes, insufficient supply voltage, unconditioned power, or total power loss.
  • Maintenance threats: poor handling of key electrical components, lack of critical spare parts, poor cabling, or poor labeling.

Network Attacks

  • DoS (Denial of Service) attacks are intended to prevent legitimate users and devices from accessing network resources.
  • Access attacks and trust exploitation involve unauthorized manipulation of data and access to systems or user privileges.
  • Reconnaissance attacks involve the unauthorized discovery and mapping of the network and network systems.

Network Protocols

  • VoIP (Voice over Internet Protocol) defines the protocols and technologies that implement the transmission of voice packets over an IP network.
  • HTTPS (Hypertext Transfer Protocol Secure) is a secure form of HTTP used to access web content hosted by a web server.
  • TCP (Transmission Control Protocol) uses sequence numbers to reassemble received segments into the correct order.
  • UDP (User Datagram Protocol) does not track transmitted data segments, and destination devices will not acknowledge received data.

Network Devices

  • A router is used to enable a host to communicate with another host on a different network.
  • Switches are used to forward data packets between devices on the same network.
  • Hubs are used to connect devices on a network, but they are not as efficient as switches.

Network Addressing

  • Subnet masks are used to determine the network address and host address portions of an IP address.
  • The /22 prefix provides 22 bits for the network portion and leaves 10 bits for the host portion.
  • IPv4 header fields include:
  • Time-to-Live (TTL): used to prevent a packet from traversing a network endlessly.
  • Sequence Number: used to track transmitted data segments.
  • Acknowledgment Number: used to acknowledge received data.

Network Security

  • Intrusion Prevention System (IPS): provides real-time detection and blocking of attacks.
  • Antispyware: protects end devices from becoming infected with malicious software.
  • Adware: software installed on a user device that collects information about the user.
  • Identity theft: the use of stolen credentials to access private data.

Network Management

  • VLSM (Variable Length Subnet Masking): used to subnet a network address space.
  • Accounting: keeps track of the actions of the user.
  • SSH (Secure Shell): a protocol used to securely access network devices.
  • FTP (File Transfer Protocol): a protocol used to transfer files over a network.
  • HTTP (Hypertext Transfer Protocol): a protocol used to access web content.
  • Telnet: a protocol used to remotely access a network device.

Identify the type of threat that occurs when a malfunctioning air conditioning unit affects routers and switches in a wiring closet. Learn about the different classes of threats in a network.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Network Security Quiz
10 questions

Network Security Quiz

AstoundingKindness avatar
AstoundingKindness
Security Policies and Threats
10 questions

Security Policies and Threats

GraciousTrigonometry avatar
GraciousTrigonometry
IT Security Threats and Vulnerabilities
16 questions
Use Quizgecko on...
Browser
Browser