Lecture 2 HW Flashcards

1
Q

Which of the following is a key characteristic of a DDoS (Distributed Denial of Service) attack?

A

It aims to overload a network or service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which network protocol sends data as soon as there is enough data to be transmitted?

A

UDP (User Datagram Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary function of encapsulation in network protocols?

A

It adds control information, header information, for adding address to packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which network device is responsible for determining the best path for data packets to travel through a complex network?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which layer of the OSI model provides Internet-wide communication and operates on a best-efforts basis?

A

Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of ARP (Address Resolution Protocol) in computer networks?

A

To convert IP addresses to MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does ARP poisoning work?

A

By sending malicious ARP replies to update ARP caches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary security risk associated with Telnet?

A

It sends login credentials in plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which command is used to view the ARP table in Linux?

A

arp -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which security protocol is commonly used for securing email communication?

A

SMTP (Simple Mail Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which layer of the OSI model is responsible for managing MAC addresses?

A

Data Link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary objective of ARP cache poisoning?

A

To redirect network traffic to the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can network administrators mitigate ARP cache poisoning?

A

By using static ARP entries, and intrusion detection systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the Telnet protocol provide?

A

Remote login capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which network protocol is known for its lack of encryption and should not be used for
sensitive data transmission?

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which tool is commonly used for capturing and analyzing network packets?

A

Wireshark

10
Q

What is the primary function of an intrusion detection system (IDS) in network security?

A

To detect and respond to suspicious network activity

11
Q

What is the primary function of an ARP cache?

A

To map IP addresses to MAC addresses

11
Q

What is the primary advantage of using SSH over Telnet for remote administration?

A

SSH encrypts data for secure communication.

12
Q

What happens when ARP cache poisoning occurs?

A

Legitimate MAC-IP mappings are altered.