Network Defense Questions&Answers
Network Defense Questions&Answers
1) Mesh Topology
2) Star Topology
3) Bus Topology
4) Ring Topology
5) Tree Topology
1) Virus/Worm
2) Password attack
3) Information sniffing
4) Domain Name Servers (DNS) attack
5) Simple Network Management Protocol (SNMP) attack
6) File Transfer Protocol (FTP) bounce attack
7) Operating system and application weaknesses
8) Distributed Denial of Service (DDoS)
9) Man-in-the-Middle (MitM)
10) Cross-Site Scripting (XSS)
11) Cross-Site Request Forgery (CSRF)
12) SQL Injection
1) SYN attack
2) SSL Man-in-the-Middle attacks
3) Local Area Network Denial (LAND) attack
4) TCP Connection Hijacking
5) Port Scan Attack
6) Session Hijacking
7) UDP Flood Attack
8) Sequence Number Prediction
Common network level threats include information gathering, packet sniffing, spoofing and DoS.
1) IP spoofing
2) Routing attacks
3) (Internet Control Message Protocol) ICMP attacks
4) PING flood (ICMP flood)
5) Ping of death attack
6) Packet sniffing
Q5. List the Data Link Layer attacks.
1) Flooding attack
2) VLAN hopping attack
3) Media Access Control (MAC) attacks/address spoofing
4) Address Resolution Protocol (ARP) attacks
5) Dynamic Host Configuration Protocol (DHCP) starvation attacks
1) Active attack: An attempt to alter system resources or affect their operation. Modify or
disrupt system resources. Examples: Masquerade, Replay, DoS.
2) Passive attack: An attempt to learn or make use of information from the system that does
not affect system resources. Intercept information without modification. Examples:
Message release, Traffic analysis.
1) SYN (Synchronization): Used as first step in establishing 3-way handshake. Only first
packet from sender & receiver should have this set.
2) ACK (Acknowledgement): Used to acknowledge successful receipt of a packet.
3) Push: Instructs receiver to give packets priority usually means processing packets as they
are received instead of queueing them. Used when there should be no interruptions.
4) FIN (Finish): Set to indicate there is no more data to be sent from the sender & closes
connection.
5) RST (Reset): Set on a rejection packet returned to sender when receiver was not expecting
the packet sent. Any connection will also be reset.
6) URG (Urgent): Marks segment as urgent and it will be processed immediately, skipping
any queued segments. Pointer used to indicate how much data in segment is urgent.
7) ECN-E (Explicit Congestion Notification-Echo): Set during handshake & denotes whether a
TCP peer is ECN capable. ECN allows E2E notification of congestion & used to prevent
packet drop.
8) CWR (Congestion Window Reduced): Set to indicate to receiver that it has reacted &
reduced the window size.
Q13. There are many techniques that can be used to help keep a network safe. List any five
techniques to keep your network safe.
➢ Use strong, unique passwords and enable multi-factor authentication.
➢ Regularly update and patch all software, including operating systems and applications.
➢ Implement a robust firewall and intrusion detection/prevention system.
➢ Educate employees about phishing and other cyber threats.
➢ Regularly backup data and ensure it can be restored quickly in case of a cyber incident.
Type 2
Q1. What are the main characteristics of networks.
1) Quality of Service (QoS): refers to the ability to set priorities and manage data traffic and
reduce data loss, delay, etc.
2) Reliability/fault tolerance: Capacity of the network to offer the same services even during a
failure. Single failures (node or link) are usually considered since they account for the vast
majority of failures.
3) Scalability: the capability of a system, network, or process to handle a growing amount of
work, or its potential to be enlarged to accommodate that growth.
4) Security: protection of the access to files and directories in a computer network against
hacking, misuse and unauthorized changes to the system.
5) Sharing resources: allows resources to be shared over a network, be they files, documents,
folders, media, etc. These are made accessible to other users/computers over a network.
Q2. What are the types of computer networks based on area of coverage.
1) LAN – Local Area Network
➢ Small area network (such as one site or building) with central administration.
➢ Connects devices that are in a single, limited area
2) WAN – Wide Area Network
➢ Large area network shared among many users.
➢ Most WANs are made from several LANs connected together.
➢ The Internet is the largest WAN, spanning the Earth.
➢ WANs use technology like ATM, Frame Relay and X.25 for connectivity over the
longer distances.
3) WLAN – Wireless Local Area Network
➢ Small area wireless network connecting through an access point.
➢ This gives users mobility to move around.
4) MAN – Metropolitan Area Network
➢ Smaller than WAN and larger than LAN. Spans an entire city or campus
➢ MANs are extremely efficient and provide fast communication via high-speed
carriers, such as fibre optic cables.
5) SAN – Storage Area Network
➢ Provides high performing, highly available and highly scalable storage environment
for your mission-critical data.
➢ SANs are typically composed of hosts, switches, storage elements, and storage
devices that are interconnected using a variety of technologies, topologies, and
protocols.
6) WiMAX – Worldwide Interoperability for Microwave Access
➢ Provides fixed and mobile Internet.
➢ WiMAX supports mobile and fixed wireless applications. A mobile user, in this
context, is someone in transit, such as a commuter on a train.
7) MANET – Mobile Adhoc Network
➢ Self-configuring infrastructure less network of mobile devices connected by wireless
links.
➢ Provides fixed and mobile Internet.
➢ Other types include vehicular ad-hoc network.
8) WSN – Wireless Sensor Network
➢ Consists of spatially distributed autonomous sensors to monitor physical or
environmental conditions.
➢ Wide array of applications ranging from military, scientific, industrial, healthcare,
and domestic.00
Q3. What are the types of cables are used in computer networking.
1) Twisted Pair
➢ Unshielded Twisted Pair (UTP)
➢ Shielded Twisted Pair (STP)
2) Coaxial Cable
➢ Support greater bandwidth and longer cable lengths
➢ Superior insulation protects coaxial cable from electronic interference
3) Fiber Optics
➢ Useful in WAN installations where long distance underground or outdoor cable runs
are required and in office buildings where a high volume of communication traffic is
common.
basic types:
1) Packet Filtering Firewall: Firewall doesn't route packets, but instead compares each packet
received to a set of established criteria -- such as the allowed IP addresses, packet type, port
number, etc.
2) Stateful Inspection Firewall: Stateful inspection firewalls examine each packet and keep
track of whether or not that packet is part of an established TCP session.
3) Proxy Firewall: A proxy firewall is a network security system that protects network
resources by filtering messages at the application layer. A proxy firewall may also be called
an application firewall or gateway firewall.
➢ Authenticating users and/or devices and providing permission for them to access the network
➢ Authorizing users and/or devices for specific services on the network
➢ Accounting for usage of network services
Q6. What are the four types of backups?
The four types of backups are:
1) Full Backup
2) Incremental Backup
3) Differential Backup
4) Mirror Backup
➢ Provides high performing, highly available and highly scalable storage environment for your
mission-critical data.
➢ SANs are typically composed of hosts, switches, storage elements, and storage devices that
are interconnected using a variety of technologies, topologies, and protocols.
Q3. What is the virus?
Virus, which is a computer virus, is a type of malicious code or program written to
alter the way a computer operates and is designed to spread from one computer to another. A virus
operates by inserting or attaching itself to a legitimate program or document that supports macros in
order to execute its code. In the process, a virus has the potential to cause unexpected or damaging
effects, such as harming the system software by corrupting or destroying data.
Types of viruses:
➢ Transient virus – life depends on the life of the host – runs when its infected program runs.
➢ Resident virus – locates itself in memory so that it can be activated as a stand-alone program.
Crypto Ransomware
It encrypts valuable files on a computer so that the user cannot access them. Cyber thieves
that conduct crypto ransomware attacks make money by demanding that victims pay a ransom to get
their files back.
Locker Ransomware
It does not encrypt files. Rather, it locks the victim out of their device, preventing them from
using it. Once they are locked out, cybercriminals carrying out locker ransomware attacks will demand
a ransom to unlock the device.
➢ Detection: Once the infection has occurred, determine that it has occurred and locate the
malware.
➢ Identification: Once detection has been achieved, identify the specific malware that has
infected the system.
➢ Removal: Once the specific malware has been identified, remove all traces of malware virus
from all infected systems so that it cannot spread further.
Q2. How does a firewall work?
A firewall is a focus for security decisions. It can enforce a security policy and log Internet
activity efficiently.
Service Control: Determines what services can be accessed, inbound or outbound. Firewalls may
filter traffic based on IP, port or protocol.
Direction Control: Determines the direction that service requests are allowed to flow.
User Control: Controls service access according to which user is attempting to access it.
Behavior Control: Controls how particular services are used. E.g., connection limits or mail filters.
➢ Pattern matching: scans incoming packets for specific byte sequences (signatures) stored
in a database of known attacks
➢ Stateful matching: scans for attack signatures in the context of a traffic stream rather than
individual packets
➢ Protocol anomaly: looks for deviation from standards
➢ Traffic anomaly: monitors for unusual traffic activities such as flood of packets or new
services appearing on the network
➢ Statistical anomaly: develops baselines of normal traffic activity and throughput, and
alerts on deviations from these baselines
Unlike stateful firewalls or application layer firewalls, which allow or block network
packets from passing to and from a protected network, traffic does not flow through a proxy.
The guard decides what services to perform on the user's behalf in accordance with its
available knowledge, such as whatever it can reliably know of the (outside) user's identity, previous
interactions, and so forth. The degree of control a guard can provide is limited only by what is
computable.
Type 3
Q1. Describe the Network attack by/with diagram.
There are four types of network attacks.
1) Interruption
2) Interception
3) Modification
4) Fabrication
Q2. Describe the OSI model and TCP/IP model by/with diagram?
➢ OSI model is structured into seven layers.
➢ TCP/IP structured into four layers.