Homework 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Homework#1.

Name: ……………………………………….
Ebtehaj Alharbi
section: 50371
…… ID number: …….
442200617

• Which two network security solutions can be used to


mitigate DoS attacks?

1- Intrusion protection systems.


2- Antispoofing technologies.

• An attacker is using a laptop as a rogue access point to


capture all network traffic from a targeted user. Which
type of attack is this?

Man in the middle

• What are the three major components of a worm


attack?

1- Enabling vulnerability.
2- Propagation mechanism.
3- Payload.

• What are the three components of information security


ensured by cryptography?

1- Confidentiality.
2- Integrity.
3- Availability.
• What are the three core components of the Cisco
Secure Data Center solution?

1- Secure segmentation.
2- Threat defense.
3- Visibility.

• What is a ping sweep?

A network scanning technique that indicates the live hosts in a range of IP addresses.

• A disgruntled employee is using Wireshark to discover


administrative Telnet usernames and passwords. What
type of network attack does this describe?

Reconnaissance

• What a ransomware?

Is amalware that employs encryption to hold a victim's information at ransom.

• What biometrics means?

Biometrics are biological measurements or physical characteristics,


that can be used to identify individuals.

• What is fuzzing?

is a program which injects automatically semi-random data into a program and detect bugs.
• What are Script Kiddies?

Is a term that computer hackers coined to refer to immature,


but often just as dangerous, exploiters of internet security weaknesses.

• What is the difference between a virus and a worm?


1- Worm:
A worm can spread swiftly through a device, and can replicate itself and spread over
a network of computers.

2- Virus:
virus takes less time to spread across the system and attached itself to a file
and can modify or erase data.

• What is the difference between TACACS and RADIUS?


1- RADIUS :
is mainly a network access protocol for user authentication.

2- TACACS:
is predominantly used for administrating network devices like routers and switches.

• What is the difference between authentication and


authorization?
1- Authentication :
verifies the identity of a user or service.

2- Authorization :
determines their access rights..

• what is the idea of DDOS?

distributed denial-of-service (DDoS) attack:


is a malicious attempt to disrupt normal traffic to a web property.

You might also like