Podcast
Questions and Answers
What type of threat is described when an air conditioning unit fails, causing routers and switches to malfunction?
What type of threat is described when an air conditioning unit fails, causing routers and switches to malfunction?
What type of attack is intended to prevent authorized users from accessing network resources?
What type of attack is intended to prevent authorized users from accessing network resources?
What protocol is used to implement the transmission of voice packets over an IP network?
What protocol is used to implement the transmission of voice packets over an IP network?
What type of threat is represented when an unauthorized user accesses a file server and copies important documents?
What type of threat is represented when an unauthorized user accesses a file server and copies important documents?
Signup and view all the answers
What type of threat is caused by physical damage to servers, routers, switches, cabling, and workstations?
What type of threat is caused by physical damage to servers, routers, switches, cabling, and workstations?
Signup and view all the answers
What type of attack involves unauthorized manipulation of data and access to systems or user privileges?
What type of attack involves unauthorized manipulation of data and access to systems or user privileges?
Signup and view all the answers
What type of threat is caused by voltage spikes, insufficient supply voltage, or unconditioned power?
What type of threat is caused by voltage spikes, insufficient supply voltage, or unconditioned power?
Signup and view all the answers
What protocol is used by a client to communicate securely with a web server?
What protocol is used by a client to communicate securely with a web server?
Signup and view all the answers
Which protocol is used to access web content hosted by a web server securely?
Which protocol is used to access web content hosted by a web server securely?
Signup and view all the answers
Which two tasks are functions of the presentation layer?
Which two tasks are functions of the presentation layer?
Signup and view all the answers
Which device should be used to enable a host to communicate with another host on a different network?
Which device should be used to enable a host to communicate with another host on a different network?
Signup and view all the answers
What feature allows different communication streams to occur at the same time, without having a single data stream using all available bandwidth?
What feature allows different communication streams to occur at the same time, without having a single data stream using all available bandwidth?
Signup and view all the answers
What information is used by TCP to reassemble and reorder received segments?
What information is used by TCP to reassemble and reorder received segments?
Signup and view all the answers
What is the dotted decimal format of the binary address 11101100 00010001 00001100 00001010?
What is the dotted decimal format of the binary address 11101100 00010001 00001100 00001010?
Signup and view all the answers
What is the primary function of an IPS?
What is the primary function of an IPS?
Signup and view all the answers
Why does HTTP use TCP as its transport layer protocol?
Why does HTTP use TCP as its transport layer protocol?
Signup and view all the answers
How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?
How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?
Signup and view all the answers
Which of the following protocols is used for sending and receiving emails?
Which of the following protocols is used for sending and receiving emails?
Signup and view all the answers
Which of the following is a characteristic of TCP?
Which of the following is a characteristic of TCP?
Signup and view all the answers
What protocol should a technician use to securely access network devices?
What protocol should a technician use to securely access network devices?
Signup and view all the answers
What is the network address for the Sales department in the given VLSM?
What is the network address for the Sales department in the given VLSM?
Signup and view all the answers
Which field in the IPv4 header prevents a packet from traversing a network endlessly?
Which field in the IPv4 header prevents a packet from traversing a network endlessly?
Signup and view all the answers
What is the primary purpose of the TCP 3-way handshake?
What is the primary purpose of the TCP 3-way handshake?
Signup and view all the answers
How many hosts are available in the WAN 1 network?
How many hosts are available in the WAN 1 network?
Signup and view all the answers
What is the broadcast address for the Executive department?
What is the broadcast address for the Executive department?
Signup and view all the answers
Which of the following is a characteristic of UDP?
Which of the following is a characteristic of UDP?
Signup and view all the answers
What is the prefix for the Marketing department's network?
What is the prefix for the Marketing department's network?
Signup and view all the answers
What happens when the TTL field in the IPv4 header decrements to zero?
What happens when the TTL field in the IPv4 header decrements to zero?
Signup and view all the answers
Which of the following is used to determine the priority of each packet?
Which of the following is used to determine the priority of each packet?
Signup and view all the answers
What is the first usable host in the Accounting department's network?
What is the first usable host in the Accounting department's network?
Signup and view all the answers
What is the main difference between TCP and UDP?
What is the main difference between TCP and UDP?
Signup and view all the answers
What is the purpose of VLSM?
What is the purpose of VLSM?
Signup and view all the answers
What are two benefits of creating subnets?
What are two benefits of creating subnets?
Signup and view all the answers
What is the purpose of ANDing a destination IP address with a subnet mask?
What is the purpose of ANDing a destination IP address with a subnet mask?
Signup and view all the answers
What is the primary function of antispyware?
What is the primary function of antispyware?
Signup and view all the answers
What is the primary function of adware?
What is the primary function of adware?
Signup and view all the answers
What type of IP address is 192.168.1.15/29?
What type of IP address is 192.168.1.15/29?
Signup and view all the answers
What is the broadcast address of a network?
What is the broadcast address of a network?
Signup and view all the answers
What is identity theft?
What is identity theft?
Signup and view all the answers
What is a benefit of subnetting a network?
What is a benefit of subnetting a network?
Signup and view all the answers
Study Notes
Network Threats
- The situation where an air conditioning unit fails, causing some routers and switches in a wiring closet to malfunction, describes an environmental threat.
- There are four classes of threats:
- Hardware threats: physical damage to servers, routers, switches, cabling plant, and workstations.
- Environmental threats: temperature extremes, humidity extremes, or other environmental factors.
- Electrical threats: voltage spikes, insufficient supply voltage, unconditioned power, or total power loss.
- Maintenance threats: poor handling of key electrical components, lack of critical spare parts, poor cabling, or poor labeling.
Network Attacks
- DoS (Denial of Service) attacks are intended to prevent legitimate users and devices from accessing network resources.
- Access attacks and trust exploitation involve unauthorized manipulation of data and access to systems or user privileges.
- Reconnaissance attacks involve the unauthorized discovery and mapping of the network and network systems.
Network Protocols
- VoIP (Voice over Internet Protocol) defines the protocols and technologies that implement the transmission of voice packets over an IP network.
- HTTPS (Hypertext Transfer Protocol Secure) is a secure form of HTTP used to access web content hosted by a web server.
- TCP (Transmission Control Protocol) uses sequence numbers to reassemble received segments into the correct order.
- UDP (User Datagram Protocol) does not track transmitted data segments, and destination devices will not acknowledge received data.
Network Devices
- A router is used to enable a host to communicate with another host on a different network.
- Switches are used to forward data packets between devices on the same network.
- Hubs are used to connect devices on a network, but they are not as efficient as switches.
Network Addressing
- Subnet masks are used to determine the network address and host address portions of an IP address.
- The /22 prefix provides 22 bits for the network portion and leaves 10 bits for the host portion.
- IPv4 header fields include:
- Time-to-Live (TTL): used to prevent a packet from traversing a network endlessly.
- Sequence Number: used to track transmitted data segments.
- Acknowledgment Number: used to acknowledge received data.
Network Security
- Intrusion Prevention System (IPS): provides real-time detection and blocking of attacks.
- Antispyware: protects end devices from becoming infected with malicious software.
- Adware: software installed on a user device that collects information about the user.
- Identity theft: the use of stolen credentials to access private data.
Network Management
- VLSM (Variable Length Subnet Masking): used to subnet a network address space.
- Accounting: keeps track of the actions of the user.
- SSH (Secure Shell): a protocol used to securely access network devices.
- FTP (File Transfer Protocol): a protocol used to transfer files over a network.
- HTTP (Hypertext Transfer Protocol): a protocol used to access web content.
- Telnet: a protocol used to remotely access a network device.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Identify the type of threat that occurs when a malfunctioning air conditioning unit affects routers and switches in a wiring closet. Learn about the different classes of threats in a network.