Lecture 2 HW Flashcards
Which of the following is a key characteristic of a DDoS (Distributed Denial of Service) attack?
It aims to overload a network or service.
Which network protocol sends data as soon as there is enough data to be transmitted?
UDP (User Datagram Protocol)
What is the primary function of encapsulation in network protocols?
It adds control information, header information, for adding address to packets.
Which network device is responsible for determining the best path for data packets to travel through a complex network?
Router
Which layer of the OSI model provides Internet-wide communication and operates on a best-efforts basis?
Network layer
What is the purpose of ARP (Address Resolution Protocol) in computer networks?
To convert IP addresses to MAC addresses
How does ARP poisoning work?
By sending malicious ARP replies to update ARP caches
What is the primary security risk associated with Telnet?
It sends login credentials in plaintext.
Which command is used to view the ARP table in Linux?
arp -a
Which security protocol is commonly used for securing email communication?
SMTP (Simple Mail Transfer Protocol)
Which layer of the OSI model is responsible for managing MAC addresses?
Data Link layer
What is the primary objective of ARP cache poisoning?
To redirect network traffic to the attacker
How can network administrators mitigate ARP cache poisoning?
By using static ARP entries, and intrusion detection systems
What does the Telnet protocol provide?
Remote login capabilities
Which network protocol is known for its lack of encryption and should not be used for
sensitive data transmission?
Telnet