Advanced Network Security Flashcards

To understand network security

1
Q

What is the name of the Internet precursor and the first packet-switched network?

A

ARPANet or (Advanced Research Project Agency Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the term “Best effort Communications” refer to?

A

This makes reference to the internet that made use of packet switching as each packet was handled on the bases of best effort.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain the difference between packet switching and circuit switching.

A

packet-swtched network enable a proper use of network resources and can cater for multiple connections. circuit switching depends a two points to maintain the network connection. any new connection would need to wait.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the full meaning of ARPANet?

A

Advanced Research Project Agency Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a Network Topology ?

A

a network’s structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define are host nodes

A

Host Nodes are sources and destinations of messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Communication nodes

A

routers through which messages flow through.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Physical Connections

A

Define the channels through which messages travel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List the three Network Topologies you know.

A

LAN, WAN,ASs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the full meaning of LAN and what is it ?

A

Local Area Network. This is a network composed of a group of computers in relatively close proximity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the full meaning of WAN and what is it ?

A

Wide Area network. This network is composed of many machines and smaller networks spread out over greater distances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the full meaning of ASs ?

A

these are controlled by a single organisation entity (business or university) which determines how packets will be routed among the nodes in the AS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the meaning of an ISP ?

A

Internet Service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How many tiers of ISPs in the Internet structure

A

up to tier 3 or local ISP, tier 2 ISP , tier 3 ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Network protocol?

A

A protocol defines the rules of communication between computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The are two classifications of protocols, list them

A

Connectionless and Connection-oriented protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Explain Connectionless protocols

A

sends data out as soon as there is enough data to be transmitted. (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Explain connection-oriented protocols

A

reliable connection stream between two nodes. consists of setup, transmission, and tear down phases.
creates virtual circuit switched network (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does a packet consist of

A

Control information for addressing the packet: header and footer
Data: payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the Network Model and describe it?

A

The Network Model is a stack of layers.
1. The Higher layers use the services of the lower layer via encapsulation.
2. A layer can be implemented with either Software or hardware.
3. The bottommost layer must be hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How many Layers does a network device implement?

A

a network device can implement several layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the protocol number for HTTP?

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the protocol number for UDP?

A

17

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what is the protocol number for ICMP?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the protocol number for TCP?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the protocol number for IGMP?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the protocol number for SSH?

A

22

28
Q

What is the protocol number for SMTP?

A

25

29
Q

What is the protocol number for DNS?

A

53

30
Q

What is the protocol number for DHCP?

A

67

31
Q

Explain the Internet Packet Encapsulation

A

Data Link Frame -> IP packets -> TCP or UDP packets -> App Packet

32
Q

List a few Network attacks you know.

A

DOS, DDOS, Eavesdropping, repudiation, Masquerading

33
Q

List some tools related to monitoring and initiating attacks

A

SCAPY, NMAP, WIRESHARK, DOCKER, KALI LINUX, TCPDUMP.

34
Q

List examples of protocols in each layer of the TCP/IP model.

A

Application layer -

35
Q

What is a network interface device used for?

A

A network interface device is used to connect a computer to a network.

36
Q

What are other names for a network interface device?

A

ethernet card, wifi adapter

37
Q

Most Local Area Networks (including Ethernet and Wifi) _____________________________.

A

Broadcast frames.

38
Q

Explain the difference between regular mode and promiscuous mode of network interfaces.

A

In regular mode, each network interface receives the frame intended for it. in promiscuous mode, traffic sniffing can be accomplished by configuring the network interface to read all frames.

39
Q

What is Ethernet?

A

Ethernet refers to both the physical medium (cable) and the link layer protocol.

40
Q

What are Frames?

A

Frames are transmitted on an Ethernet cable and received by other machines on the same logical connection on the same local area network.

41
Q

Another name for “Logical connection”.

A

Network Segment.

42
Q

What is a Hub?

A

Hubs logically connect multiple devices, allowing them to act as a single network segment. Hubs forward all frames to all devices attached.

43
Q

What is a Switch?

A

A switch forwards the frame along the cable it knows is connected to the destination.

44
Q

When does a switch act like a hub?

A

when a MAC flooding attack is in progress causing a DOS to which the switch defaults to fail open mode.

45
Q

Most network interfaces come with a pre-defined Mac address. True or False.

A

True

46
Q

What is the Full meaning of MAC address

A

Media Access Controll address.

47
Q

What is A MAC ADDRESS?

A

A MAC Address is a 12-hex digit or 48-bit number that can be used to identify a computer in a network. They can be reset by the network interface driver.

48
Q

What is ARP?

A

ARP stands for Address Resolution protocol. it connects the network layer with the data link layer.
It does this by broadcasting requests and caching responses for future use.

49
Q

What is ARP Spoofing and how explain the types? of attack that can occur from it.

A

ARP Spoofing is an arp attack that preys on the vulnerability of the stateless ARP protocol. it receives ARP responses even it there is no ARP Request. The ARP protocol is susceptible to unknown ARP announcement broadcasts. Attacks that can occur include Traffic Sniffing - passive attacks and Modifying traffic information - Active attacks (MITM). Other attacks include the MAc address flooding which can in turn result in the Denial of Services.

50
Q

What is DHCP?

A

Dynamic Host Configuration Protocol is a protocol used the automatically assign IP addresses to network devices.

51
Q

What are the ARP Spoofing Countermeasures?

A

Using static ARP entries, Dynamic Host Configuration Protocol, and Identifying Cloned Mac addresses.

52
Q

What is packet sniffing?

A

Packet sniffers read information that traverses a network. packet sniffer intercept packets.

53
Q

What is a port?

A

a port is not a physical connection but a logical connection that programs and services use to exchange information.

54
Q

What is the range of network ports?

A

0 - 65535

55
Q

What is packet sniffing?

A

Packet sniffing is usually a passive attack. reading and sniffing information for possible future attacks (active)

56
Q

What are the ways to stop packet sniffers?

A

Packet encryption- encrypting packets securely.

57
Q

Define the several ranges of ports and explain them

A
58
Q

What is Wireshark?

A

Wireshark is a packet sniffing and protocol analyzer

59
Q

What does an IP packet header include

A
60
Q

What does DHCP mean and what is it ?

A

Dynamic Host Configuration Protocol is used to automatically assign IP addresses.

61
Q

How can a host Ip address be configured

A

Statically or Dynamically.

62
Q

What is a DHCP Client?

A

A DHCP Client is a client that interacts with a DHCP server to get the IP address information.

63
Q

What are the forms of a DHCP Server?

A

A DHCP server can be a router, home access point or firewall.

64
Q

Explain the DHCP 4-way handshake

A

Discovery, Offer, Request, Acknowledge

65
Q

IP Vulnerabilities

A

Unencrypted transmission, No source authentication, No integrity Checking.

66
Q
A