Network Threats Classification

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of threat is described when an air conditioning unit fails, causing routers and switches to malfunction?

  • electrical
  • environmental (correct)
  • maintenance
  • configuration

What type of attack is intended to prevent authorized users from accessing network resources?

  • trust exploitation
  • access attacks
  • reconnaissance attacks
  • DoS attacks (correct)

What protocol is used to implement the transmission of voice packets over an IP network?

  • DHCP
  • QoS
  • NAT
  • VoIP (correct)

What type of threat is represented when an unauthorized user accesses a file server and copies important documents?

<p>information theft (D)</p> Signup and view all the answers

What type of threat is caused by physical damage to servers, routers, switches, cabling, and workstations?

<p>hardware (D)</p> Signup and view all the answers

What type of attack involves unauthorized manipulation of data and access to systems or user privileges?

<p>access attacks (C)</p> Signup and view all the answers

What type of threat is caused by voltage spikes, insufficient supply voltage, or unconditioned power?

<p>electrical (C)</p> Signup and view all the answers

What protocol is used by a client to communicate securely with a web server?

<p>HTTPS (C)</p> Signup and view all the answers

Which protocol is used to access web content hosted by a web server securely?

<p>HTTPS (B)</p> Signup and view all the answers

Which two tasks are functions of the presentation layer?

<p>compression, encryption (A)</p> Signup and view all the answers

Which device should be used to enable a host to communicate with another host on a different network?

<p>Router (D)</p> Signup and view all the answers

What feature allows different communication streams to occur at the same time, without having a single data stream using all available bandwidth?

<p>multiplexing (D)</p> Signup and view all the answers

What information is used by TCP to reassemble and reorder received segments?

<p>sequence numbers (D)</p> Signup and view all the answers

What is the dotted decimal format of the binary address 11101100 00010001 00001100 00001010?

<p>236.17.12.10 (D)</p> Signup and view all the answers

What is the primary function of an IPS?

<p>Detecting and blocking of attacks in real time (B)</p> Signup and view all the answers

Why does HTTP use TCP as its transport layer protocol?

<p>because HTTP requires reliable delivery (A)</p> Signup and view all the answers

How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?

<p>1024 (C)</p> Signup and view all the answers

Which of the following protocols is used for sending and receiving emails?

<p>SMTP (D)</p> Signup and view all the answers

Which of the following is a characteristic of TCP?

<p>Provides tracking of transmitted data segments (C)</p> Signup and view all the answers

What protocol should a technician use to securely access network devices?

<p>SSH (B)</p> Signup and view all the answers

What is the network address for the Sales department in the given VLSM?

<p>190.192.0.0/20 (B)</p> Signup and view all the answers

Which field in the IPv4 header prevents a packet from traversing a network endlessly?

<p>Time-to-Live (D)</p> Signup and view all the answers

What is the primary purpose of the TCP 3-way handshake?

<p>To guarantee session establishment (D)</p> Signup and view all the answers

How many hosts are available in the WAN 1 network?

<p>128 (C)</p> Signup and view all the answers

What is the broadcast address for the Executive department?

<p>190.192.38.143 (A)</p> Signup and view all the answers

Which of the following is a characteristic of UDP?

<p>Headers use very little overhead and cause minimal delay (C)</p> Signup and view all the answers

What is the prefix for the Marketing department's network?

<p>/21 (C)</p> Signup and view all the answers

What happens when the TTL field in the IPv4 header decrements to zero?

<p>The router discards the packet and sends an ICMP Time Exceeded message (D)</p> Signup and view all the answers

Which of the following is used to determine the priority of each packet?

<p>Differentiated Services (B)</p> Signup and view all the answers

What is the first usable host in the Accounting department's network?

<p>190.192.24.1 (A)</p> Signup and view all the answers

What is the main difference between TCP and UDP?

<p>TCP is connection-oriented, while UDP is connectionless (A)</p> Signup and view all the answers

What is the purpose of VLSM?

<p>To optimize IP address allocation (A)</p> Signup and view all the answers

What are two benefits of creating subnets?

<p>easier to implement security policies and reduction in number of switches needed (A), improvement of network performance and easier to implement security policies (B)</p> Signup and view all the answers

What is the purpose of ANDing a destination IP address with a subnet mask?

<p>to identify the network address of the destination network (D)</p> Signup and view all the answers

What is the primary function of antispyware?

<p>to protect end devices from becoming infected with malicious software (B)</p> Signup and view all the answers

What is the primary function of adware?

<p>to collect information about the user (A)</p> Signup and view all the answers

What type of IP address is 192.168.1.15/29?

<p>unicast address (A)</p> Signup and view all the answers

What is the broadcast address of a network?

<p>the last address of any given network (D)</p> Signup and view all the answers

What is identity theft?

<p>the unauthorized use of personal information (D)</p> Signup and view all the answers

What is a benefit of subnetting a network?

<p>improves network performance (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Network Threats

  • The situation where an air conditioning unit fails, causing some routers and switches in a wiring closet to malfunction, describes an environmental threat.
  • There are four classes of threats:
  • Hardware threats: physical damage to servers, routers, switches, cabling plant, and workstations.
  • Environmental threats: temperature extremes, humidity extremes, or other environmental factors.
  • Electrical threats: voltage spikes, insufficient supply voltage, unconditioned power, or total power loss.
  • Maintenance threats: poor handling of key electrical components, lack of critical spare parts, poor cabling, or poor labeling.

Network Attacks

  • DoS (Denial of Service) attacks are intended to prevent legitimate users and devices from accessing network resources.
  • Access attacks and trust exploitation involve unauthorized manipulation of data and access to systems or user privileges.
  • Reconnaissance attacks involve the unauthorized discovery and mapping of the network and network systems.

Network Protocols

  • VoIP (Voice over Internet Protocol) defines the protocols and technologies that implement the transmission of voice packets over an IP network.
  • HTTPS (Hypertext Transfer Protocol Secure) is a secure form of HTTP used to access web content hosted by a web server.
  • TCP (Transmission Control Protocol) uses sequence numbers to reassemble received segments into the correct order.
  • UDP (User Datagram Protocol) does not track transmitted data segments, and destination devices will not acknowledge received data.

Network Devices

  • A router is used to enable a host to communicate with another host on a different network.
  • Switches are used to forward data packets between devices on the same network.
  • Hubs are used to connect devices on a network, but they are not as efficient as switches.

Network Addressing

  • Subnet masks are used to determine the network address and host address portions of an IP address.
  • The /22 prefix provides 22 bits for the network portion and leaves 10 bits for the host portion.
  • IPv4 header fields include:
  • Time-to-Live (TTL): used to prevent a packet from traversing a network endlessly.
  • Sequence Number: used to track transmitted data segments.
  • Acknowledgment Number: used to acknowledge received data.

Network Security

  • Intrusion Prevention System (IPS): provides real-time detection and blocking of attacks.
  • Antispyware: protects end devices from becoming infected with malicious software.
  • Adware: software installed on a user device that collects information about the user.
  • Identity theft: the use of stolen credentials to access private data.

Network Management

  • VLSM (Variable Length Subnet Masking): used to subnet a network address space.
  • Accounting: keeps track of the actions of the user.
  • SSH (Secure Shell): a protocol used to securely access network devices.
  • FTP (File Transfer Protocol): a protocol used to transfer files over a network.
  • HTTP (Hypertext Transfer Protocol): a protocol used to access web content.
  • Telnet: a protocol used to remotely access a network device.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

DCN - with sagot.pdf

More Like This

Security Policies and Threats
10 questions

Security Policies and Threats

GraciousTrigonometry avatar
GraciousTrigonometry
IT Security Threats and Vulnerabilities
16 questions
Cyber Security: Network Threats
36 questions
System Security Threats and Controls
22 questions
Use Quizgecko on...
Browser
Browser