Networking Basics Quiz - Week 5

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which protocol uses port 80?

  • FTP
  • HTTP (correct)
  • HTTPS
  • SMTP

A MAC address is a unique hardware identifier crucial for LAN communication.

True (A)

What is the purpose of ARP?

To translate IP addresses into MAC addresses.

____ is a process that checks a host's ports to see which are open.

<p>Port scanning</p> Signup and view all the answers

What is a common risk associated with port scanning?

<p>Identifying specific software vulnerabilities (A)</p> Signup and view all the answers

Match the following components with their definitions:

<p>NIC = Converts data into electrical signals Router = Directs data between networks Hub = Connects multiple devices in a network Switch = Directs data specifically to intended devices</p> Signup and view all the answers

War driving refers to a legitimate method of accessing a wireless network.

<p>False (B)</p> Signup and view all the answers

What is a recommended measure to secure a router?

<p>Enable strong passwords and MAC address filtering.</p> Signup and view all the answers

Which type of denial of service attack sends excessive requests to overwhelm a server's ability to handle them?

<p>Service Request Flood (C)</p> Signup and view all the answers

A replay attack involves capturing communication and sending it again to gain unauthorized access.

<p>True (A)</p> Signup and view all the answers

What is the primary purpose of encryption in a VPN?

<p>To prevent unauthorized data access (D)</p> Signup and view all the answers

What are the three main types of VPNs mentioned?

<p>Trusted VPN, Secure VPN, and another type not specified.</p> Signup and view all the answers

An attacker can monitor and log network traffic using a ______.

<p>packet sniffer</p> Signup and view all the answers

Digital certificates are used to verify the identity of clients connecting to a server.

<p>False (B)</p> Signup and view all the answers

What is the role of a Certificate Authority (CA)?

<p>To verify server identities and issue digital certificates.</p> Signup and view all the answers

Match the denial of service attack with its description.

<p>Service Request Flood = Overloads server with too many requests Bandwidth Flood = Sends requests exceeding bandwidth capacity SYN Flood = Exploits TCP/IP handshake with open connections Replay Attack = Captures communication and replays it later</p> Signup and view all the answers

What is a characteristic of a secure VPN?

<p>Relies on encryption protocols (D)</p> Signup and view all the answers

The main process in TLS involves a __________ between the client and server.

<p>handshake</p> Signup and view all the answers

In a hub-based network, packet sniffing is more difficult compared to a switch-based network.

<p>False (B)</p> Signup and view all the answers

Which of the following encryption standards is commonly used in VPNs?

<p>AES (Advanced Encryption Standard) (B)</p> Signup and view all the answers

What could be the result of an overloaded switch in a network?

<p>It can allow packet sniffing.</p> Signup and view all the answers

Match the TLS version with its key properties:

<p>TLS 1.2 = Weaker cipher suites TLS 1.3 = Forward Secrecy and Improved Security SSL = Older secure connection protocol</p> Signup and view all the answers

TLS 1.3 includes support for weaker protocols from previous versions.

<p>False (B)</p> Signup and view all the answers

What is the significance of Forward Secrecy in TLS 1.3?

<p>It ensures that even if a key is compromised, previous communications remain secure.</p> Signup and view all the answers

Flashcards

Network Port

A virtual address for communication on a network, associated with a specific protocol.

Port Scanning

Checking network ports to identify open ones and services running on them.

HTTP

Protocol used for transferring web pages and data on the internet.

MAC Address

Unique hardware identifier of a device, critical for local network communication.

Signup and view all the flashcards

IP Address

Unique identifier for devices on the internet that can change.

Signup and view all the flashcards

Port Scanning Vulnerability

Open ports on a host expose it to malicious activities.

Signup and view all the flashcards

War Driving

Unauthorized access to a wireless network due to lack of security.

Signup and view all the flashcards

Router Vulnerability

Vulnerabilities in routers can lead to unauthorized access and security issues.

Signup and view all the flashcards

Denial of Service (DoS)

An attack that prevents legitimate users from accessing a service or resource.

Signup and view all the flashcards

Service Request Flood

A DoS attack that overloads the server with too many requests.

Signup and view all the flashcards

Bandwidth Flood DoS

A DoS attack that overwhelms the server's network bandwidth.

Signup and view all the flashcards

SYN Flood

A DoS attack that exploits the TCP handshake to open many connections without completing them.

Signup and view all the flashcards

Packet Sniffing

A passive attack where an attacker monitors and logs network traffic.

Signup and view all the flashcards

ARP Spoofing

A spoofing attack targeting Address Resolution Protocol, redirecting traffic.

Signup and view all the flashcards

DNS Spoofing

A spoofing attack targeting DNS to redirect traffic by modifying the resolution process.

Signup and view all the flashcards

Replay Attack

An attack that captures and replays communication to gain unauthorized access.

Signup and view all the flashcards

Hybrid VPN

A VPN that combines multiple secure VPN connections.

Signup and view all the flashcards

Encryption (VPN)

Using codes to protect data from attackers in VPNs.

Signup and view all the flashcards

Transport Mode Encryption

Encrypting data as it's created in a VPN.

Signup and view all the flashcards

Tunnel Mode Encryption

Encrypting data during transmission in a VPN.

Signup and view all the flashcards

Digital Certificate

Proof of a server's identity, verified by a Certificate Authority (CA).

Signup and view all the flashcards

TLS (Transport Layer Security)

Protocol for secure internet connections, like HTTPS.

Signup and view all the flashcards

TLS Handshake

Process for verifying server identity and establishing a secure connection (TLS).

Signup and view all the flashcards

Forward Secrecy

A TLS feature that keeps old communications secure, even if a key is compromised.

Signup and view all the flashcards

Study Notes

Ports

  • Ports are virtual start and end points for network communication.
  • Each port has a unique number.
  • Specific ports are assigned protocols to differentiate traffic types (e.g., HTTP uses port 80).

Key Hardware Components

  • Network Interface Card (NIC): Converts data into electrical signals for communication.
  • Media Access Control (MAC) Address: Unique hardware ID for devices crucial for LAN communication.
  • Hubs and Switches: Connect devices in a network; switches route data only to intended devices using MAC addresses.

Key Internet Components

  • HTTP (Hyper Text Transfer Protocol): Controls data communication over the internet (e.g., retrieving web pages).
  • IP Address: Unique device identifier on the internet; can change.
  • URL (Uniform Resource Locator): Readable way to access an IP address; translated by Domain Name Servers (DNS).
  • ARP (Address Resolution Protocol): Translates IP addresses to MAC addresses for local communication.

Port and Router Vulnerabilities

  • Port Scanning: Checks open ports and listens for data. Attackers can exploit open ports to send malicious data or identify vulnerabilities.
  • Port scanning tools (e.g., Nmap) can be used to identify vulnerabilities or applications.
  • Vanilla scans check all ports sequentially, strobe scans target specific services.
  • Stealth scanning (e.g., fragmented packets) makes probes harder to detect.
  • Router vulnerabilities: War driving (unauthorized wireless network access), lack of password, malicious network activities.

Server Vulnerabilities

  • Denial-of-Service (DoS) Attacks: Can happen unintentionally due to high server traffic (e.g., website crashes, university registration).
  • Service Request Flood: Overloads a server with too many requests, causing it to shut down.
  • Bandwidth Flood: Sends requests exceeding the server's bandwidth capacity, causing denial of service.
  • SYN Flood: Exploits TCP/IP handshake; overwhelms the server with open connections.
  • Security Operation Centers (SOCs): Use tools (firewalls, DMZs, etc.) to monitor and prevent attacks.

Packet Sniffing

  • Passive attack; monitors and logs network traffic.
  • Packet sniffers capture unencrypted data (e.g., passwords, financial information).
  • Hub-based networks make sniffing easier than switch-based networks, although switch-based sniffing is possible with overloaded or promiscuous mode switches.

Spoofing

  • Address Resolution Protocol (ARP) spoofing: ARP maps IP addresses to MAC addresses. Attackers can change the IP-to-MAC mapping to reroute traffic to them; tools such as Ettercap can do this.
  • DNS spoofing: On the internet, an attacker can use DNS protocol spoofing.

Replay Attacks

  • Attackers capture communication (e.g., login credentials), and later replay it to gain unauthorized access.
  • Even encrypted data can be vulnerable in replay attacks.

VPNs

  • Trusted VPN: Older type, relying on private lines.
  • Secure VPN: Most common, using encryption protocols.
  • Hybrid VPN: Combination of trusted and secure VPNs.
  • VPNs encrypt data packets to prevent unauthorized access.

Encryption

  • VPNs encrypt data in transit (transport mode) or as created (tunnel mode).
  • Different VPNs use various encryption standards (e.g., AES).

Digital Certificates

  • Verifies server identities in TLS (Transport Layer Security).
  • Links a server's public key to its identity.
  • Issued by a Certificate Authority (CA).
  • The CA verifies the server's identity and digitally signs the certificate.
  • Servers submit Certificate Signing Requests (CSRs) to the CA.

Transport Layer Security (TLS)

  • Foundation of secure internet connections (e.g., HTTPS).
  • TLS handshake involves:
    • Client sending "Client Hello."
    • Server replying with "Server Hello" and digital certificate.
    • Both agreeing on encryption key.
  • TLS 1.3: Faster and more secure version, uses forward secrecy and stronger cipher suites, removing weaker protocols.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Networking Fundamentals Quiz
10 questions
Networking Fundamentals
9 questions

Networking Fundamentals

ImpeccableGreekArt188 avatar
ImpeccableGreekArt188
Networking Fundamentals Quiz
8 questions
Computer Networking Fundamentals
11 questions

Computer Networking Fundamentals

TimeHonoredFluorite9179 avatar
TimeHonoredFluorite9179
Use Quizgecko on...
Browser
Browser