30 Questions
Which network layer protocol is connectionless and good for video/audio?
UDP
Which routing protocol is suitable for a larger network in terms of cost?
OSPF
What does encapsulation involve for each packet?
Header & Payload
What is the purpose of using NET to map between public and private IP addresses?
Address translation
Which part of an IP address determines its class?
1st octet
What does the IP address 192.168.1.10 indicate based on its class?
Class B address
What is the purpose of ARP (Address Resolution Protocol)?
To map between IP and MAC addresses
What does the Blackhole attack involve?
Pretending to be the shortest path but dropping received packages
How is TCP SYN Flood attack carried out?
Keeping connections half open and flooding the host with re-sent SYN packets
What is the purpose of Flow Control in networking?
Measuring network traffic to control congestion
What is the common security issue associated with FTP, Telnet, and FTP?
Transmission of passwords in clear text without protection
What is the TCP Starvation attack?
Asking the server to send the last packet without closing the connection
How does the MiM & DoS attack tactic work?
Quickly exhausting the victim's session limit by closing TCP sessions on the attacker's side
What are the common vulnerabilities that FTP faces?
Transmission of passwords in clear text without protection
What technique is suggested to reduce fake browsers?
Using SSL for secure communication
What is the main concern regarding the transmission of passwords in clear text?
Easy sniffing of passwords and session hijacking by attackers
Which network layer protocol is connectionless and good for video/audio?
UDP
What is the main concern regarding the transmission of passwords in clear text?
Security vulnerability
What does encapsulation involve for each packet?
Header and payload
How does IP address 192.168.1.10 indicate based on its class?
Class C
What technique is suggested to reduce fake browsers?
Multiplexing
What is the main purpose of ARP (Address Resolution Protocol)?
To find the MAC address corresponding to an IP address
What is the Blackhole attack in networking?
A router pretending to be the shortest path and dropping or misusing data packets
What is the purpose of TCP SYN Flood attack?
To keep connections half open and resend SYN to flood the host
What is the common vulnerability associated with FTP, Telnet, and FTP?
Messages can be read and modified during transmission
What does the TCP Starvation attack involve?
Asking the server to send the last package without closing the connection
What does Flow Control in networking aim to achieve?
Controlling congestion and traffic by measuring network traffic
What technique is suggested to reduce fake browsers in networking?
Not opening sources that are not trusted
What is the common aspect between FTP, Telnet, and FTP in terms of security vulnerability?
The issue here is transmission of passwords in clear which will enable attackers to easily sniff password & hijack sessions.
What are common features between FTP, Telnet, and FTP?
Username + password are sent in clear text without any protection
Test your knowledge of TCP and UDP networking protocols, including their reliability, handshaking, and use cases. Also explore the protocols at the network layer.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free