Network Threats Classification
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of threat is described when an air conditioning unit fails, causing routers and switches to malfunction?

  • electrical
  • environmental (correct)
  • maintenance
  • configuration
  • What type of attack is intended to prevent authorized users from accessing network resources?

  • trust exploitation
  • access attacks
  • reconnaissance attacks
  • DoS attacks (correct)
  • What protocol is used to implement the transmission of voice packets over an IP network?

  • DHCP
  • QoS
  • NAT
  • VoIP (correct)
  • What type of threat is represented when an unauthorized user accesses a file server and copies important documents?

    <p>information theft (D)</p> Signup and view all the answers

    What type of threat is caused by physical damage to servers, routers, switches, cabling, and workstations?

    <p>hardware (D)</p> Signup and view all the answers

    What type of attack involves unauthorized manipulation of data and access to systems or user privileges?

    <p>access attacks (C)</p> Signup and view all the answers

    What type of threat is caused by voltage spikes, insufficient supply voltage, or unconditioned power?

    <p>electrical (C)</p> Signup and view all the answers

    What protocol is used by a client to communicate securely with a web server?

    <p>HTTPS (C)</p> Signup and view all the answers

    Which protocol is used to access web content hosted by a web server securely?

    <p>HTTPS (B)</p> Signup and view all the answers

    Which two tasks are functions of the presentation layer?

    <p>compression, encryption (A)</p> Signup and view all the answers

    Which device should be used to enable a host to communicate with another host on a different network?

    <p>Router (D)</p> Signup and view all the answers

    What feature allows different communication streams to occur at the same time, without having a single data stream using all available bandwidth?

    <p>multiplexing (D)</p> Signup and view all the answers

    What information is used by TCP to reassemble and reorder received segments?

    <p>sequence numbers (D)</p> Signup and view all the answers

    What is the dotted decimal format of the binary address 11101100 00010001 00001100 00001010?

    <p>236.17.12.10 (D)</p> Signup and view all the answers

    What is the primary function of an IPS?

    <p>Detecting and blocking of attacks in real time (B)</p> Signup and view all the answers

    Why does HTTP use TCP as its transport layer protocol?

    <p>because HTTP requires reliable delivery (A)</p> Signup and view all the answers

    How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?

    <p>1024 (C)</p> Signup and view all the answers

    Which of the following protocols is used for sending and receiving emails?

    <p>SMTP (D)</p> Signup and view all the answers

    Which of the following is a characteristic of TCP?

    <p>Provides tracking of transmitted data segments (C)</p> Signup and view all the answers

    What protocol should a technician use to securely access network devices?

    <p>SSH (B)</p> Signup and view all the answers

    What is the network address for the Sales department in the given VLSM?

    <p>190.192.0.0/20 (B)</p> Signup and view all the answers

    Which field in the IPv4 header prevents a packet from traversing a network endlessly?

    <p>Time-to-Live (D)</p> Signup and view all the answers

    What is the primary purpose of the TCP 3-way handshake?

    <p>To guarantee session establishment (D)</p> Signup and view all the answers

    How many hosts are available in the WAN 1 network?

    <p>128 (C)</p> Signup and view all the answers

    What is the broadcast address for the Executive department?

    <p>190.192.38.143 (A)</p> Signup and view all the answers

    Which of the following is a characteristic of UDP?

    <p>Headers use very little overhead and cause minimal delay (C)</p> Signup and view all the answers

    What is the prefix for the Marketing department's network?

    <p>/21 (C)</p> Signup and view all the answers

    What happens when the TTL field in the IPv4 header decrements to zero?

    <p>The router discards the packet and sends an ICMP Time Exceeded message (D)</p> Signup and view all the answers

    Which of the following is used to determine the priority of each packet?

    <p>Differentiated Services (B)</p> Signup and view all the answers

    What is the first usable host in the Accounting department's network?

    <p>190.192.24.1 (A)</p> Signup and view all the answers

    What is the main difference between TCP and UDP?

    <p>TCP is connection-oriented, while UDP is connectionless (A)</p> Signup and view all the answers

    What is the purpose of VLSM?

    <p>To optimize IP address allocation (A)</p> Signup and view all the answers

    What are two benefits of creating subnets?

    <p>easier to implement security policies and reduction in number of switches needed (A), improvement of network performance and easier to implement security policies (B)</p> Signup and view all the answers

    What is the purpose of ANDing a destination IP address with a subnet mask?

    <p>to identify the network address of the destination network (D)</p> Signup and view all the answers

    What is the primary function of antispyware?

    <p>to protect end devices from becoming infected with malicious software (B)</p> Signup and view all the answers

    What is the primary function of adware?

    <p>to collect information about the user (A)</p> Signup and view all the answers

    What type of IP address is 192.168.1.15/29?

    <p>unicast address (A)</p> Signup and view all the answers

    What is the broadcast address of a network?

    <p>the last address of any given network (D)</p> Signup and view all the answers

    What is identity theft?

    <p>the unauthorized use of personal information (D)</p> Signup and view all the answers

    What is a benefit of subnetting a network?

    <p>improves network performance (C)</p> Signup and view all the answers

    Study Notes

    Network Threats

    • The situation where an air conditioning unit fails, causing some routers and switches in a wiring closet to malfunction, describes an environmental threat.
    • There are four classes of threats:
    • Hardware threats: physical damage to servers, routers, switches, cabling plant, and workstations.
    • Environmental threats: temperature extremes, humidity extremes, or other environmental factors.
    • Electrical threats: voltage spikes, insufficient supply voltage, unconditioned power, or total power loss.
    • Maintenance threats: poor handling of key electrical components, lack of critical spare parts, poor cabling, or poor labeling.

    Network Attacks

    • DoS (Denial of Service) attacks are intended to prevent legitimate users and devices from accessing network resources.
    • Access attacks and trust exploitation involve unauthorized manipulation of data and access to systems or user privileges.
    • Reconnaissance attacks involve the unauthorized discovery and mapping of the network and network systems.

    Network Protocols

    • VoIP (Voice over Internet Protocol) defines the protocols and technologies that implement the transmission of voice packets over an IP network.
    • HTTPS (Hypertext Transfer Protocol Secure) is a secure form of HTTP used to access web content hosted by a web server.
    • TCP (Transmission Control Protocol) uses sequence numbers to reassemble received segments into the correct order.
    • UDP (User Datagram Protocol) does not track transmitted data segments, and destination devices will not acknowledge received data.

    Network Devices

    • A router is used to enable a host to communicate with another host on a different network.
    • Switches are used to forward data packets between devices on the same network.
    • Hubs are used to connect devices on a network, but they are not as efficient as switches.

    Network Addressing

    • Subnet masks are used to determine the network address and host address portions of an IP address.
    • The /22 prefix provides 22 bits for the network portion and leaves 10 bits for the host portion.
    • IPv4 header fields include:
    • Time-to-Live (TTL): used to prevent a packet from traversing a network endlessly.
    • Sequence Number: used to track transmitted data segments.
    • Acknowledgment Number: used to acknowledge received data.

    Network Security

    • Intrusion Prevention System (IPS): provides real-time detection and blocking of attacks.
    • Antispyware: protects end devices from becoming infected with malicious software.
    • Adware: software installed on a user device that collects information about the user.
    • Identity theft: the use of stolen credentials to access private data.

    Network Management

    • VLSM (Variable Length Subnet Masking): used to subnet a network address space.
    • Accounting: keeps track of the actions of the user.
    • SSH (Secure Shell): a protocol used to securely access network devices.
    • FTP (File Transfer Protocol): a protocol used to transfer files over a network.
    • HTTP (Hypertext Transfer Protocol): a protocol used to access web content.
    • Telnet: a protocol used to remotely access a network device.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    DCN - with sagot.pdf

    Description

    Identify the type of threat that occurs when a malfunctioning air conditioning unit affects routers and switches in a wiring closet. Learn about the different classes of threats in a network.

    More Like This

    Network Security Quiz
    10 questions

    Network Security Quiz

    AstoundingKindness avatar
    AstoundingKindness
    IT Security Threats and Vulnerabilities
    16 questions
    Cyber Security: Network Threats
    36 questions
    System Security Threats and Controls
    22 questions
    Use Quizgecko on...
    Browser
    Browser