Mid - Term - Amrita Vishwa Vidyapeetham (Answer Key)
Mid - Term - Amrita Vishwa Vidyapeetham (Answer Key)
Mid - Term - Amrita Vishwa Vidyapeetham (Answer Key)
First Semester
Answer Key
- A DoS attack aims to make a network service unavailable to users by overwhelming it with traffic or
requests, causing legitimate users to be unable to access the service.
Social Engineering:
- Social engineering exploits human psychology rather than technical vulnerabilities. Attackers
manipulate individuals into divulging confidential information, such as passwords or bank details,
often through phishing emails or phone calls.
- Covers a larger geographic area than a local area network (LAN) but smaller than a wide area
network (WAN). Typically spans a city or a campus, connecting multiple LANs.
- Covers broad geographic areas, often connecting multiple MANs or LANs over long distances. The
Internet is the largest example of a WAN.
Cyberstalking:
- Involves repeated, targeted harassment using electronic means. The goal is to intimidate or control
the victim, often leading to severe emotional distress.
Cyberbullying:
- Involves aggressive behavior intended to harm or intimidate individuals, typically among peers. It
can include spreading rumors, sending threatening messages, or sharing embarrassing content.
Confidentiality:
- Refers to the accuracy and reliability of data. It ensures that information is not altered or tampered
with during storage or transmission.
Router:
- A device that connects different networks and directs data packets between them based on their IP
addresses. Routers can connect LANs to WANs and manage traffic between different networks.
Switch:
- A device that connects devices within the same network (LAN) and uses MAC addresses to forward
data only to the intended recipient. Switches operate at the Data Link layer of the OSI model.
2. Explain the role of hash functions in ensuring data integrity. How is it different from encryption? (3
Marks)
- Hash functions take input data and produce a fixed-size string of characters, which is unique to that
specific input. If the input data changes, the hash will change as well, allowing users to verify data
integrity.
- Hashing** is a one-way function that generates a unique hash value for data, ensuring integrity but
not confidentiality. Encryption, on the other hand, transforms data into a secure format that can only
be read or decrypted by authorized parties, ensuring confidentiality.
3. Discuss the role of ransomware in cyber attacks. How does it work, and what steps can users take
to protect themselves from ransomware? (3 Marks)
Role of Ransomware:
- Ransomware is a type of malware that encrypts a user’s files, rendering them inaccessible until a
ransom is paid to the attacker. It can cause significant data loss and financial damage.
How it Works:
3. Ransom Note: The attacker demands payment, usually in cryptocurrency, to provide a decryption
key.
Protection Steps:
- NAT is a process used in routers to translate private IP addresses within a local network to a public
IP address for external communication.
Working:
1. Outgoing Traffic: When a device sends data to the internet, NAT changes the source IP address
from the private IP of the device to the public IP of the router.
2. Incoming Traffic: When a response is received, NAT translates the public IP back to the private IP of
the device that initiated the request.
3. Port Mapping: NAT keeps track of active connections through port numbers, ensuring that the
correct data is sent to the right device.
5. Explain how Message Authentication Code (MAC) ensures both integrity and authenticity. (3
Marks)
- A MAC is a short piece of information used to authenticate a message and ensure its integrity.
How it Works:
- It uses a secret key along with the message data to produce a hash value. This hash value is sent
along with the message.
- Upon receipt, the recipient uses the same secret key and the message to generate their own MAC.
If the computed MAC matches the received MAC, the message is deemed authentic and unaltered.
Benefits:
- Ensures integrity by verifying that the message has not been altered.
- Ensures authenticity by confirming that the message was sent by a legitimate source possessing the
secret key.
6. What is the difference between viruses and worms? Explain how each poses a threat to users’
privacy and security. (3 Marks)
Difference:
- Virus: A virus attaches itself to a host file and requires user action (like opening a file) to propagate.
It can corrupt or delete data and spread to other files and systems.
- Worm: A worm is a standalone malware that can replicate itself and spread independently across
networks without user intervention.
- Viruses: Can corrupt files, steal personal information, and disrupt system operations, compromising
user privacy.
- Worms: Can consume bandwidth, create backdoors for other malware, and spread across networks
quickly, leading to significant data breaches and loss of privacy.
- Supports a large number of hosts (over 16 million) and is typically used in large organizations
- Supports 256 hosts and is commonly used in small networks, such as home and small business
networks.
8. Explain the role of a router in a network. How does it differ from other network devices like
switches and hubs? (4 Marks)
Role of a Router:
- A router connects multiple networks and directs data packets between them based on their IP
addresses. It determines the best path for data transmission, facilitating communication between
devices on different networks (e.g., between a home network and the internet).
Differences:
- Switch: Operates at the Data Link layer, connecting devices within the same network and using MAC
addresses to forward data to the correct device.
- Hub: A basic networking device that connects multiple Ethernet devices, making them act as a
single network segment. It broadcasts data to all ports, leading to potential data collisions.
9. What are the key components of a URL? Break down a sample URL and explain each part. (4
Marks)
Key Components of a URL:
1. Protocol: Indicates the method used to access the resource (e.g., HTTP, HTTPS).
3. Port (optional): Specifies a port number to connect to (e.g., :80 for HTTP).
- Protocol: `https`
- Port: `443`
- Path: `/path/to/resource`
10. Explain the function and purpose of DHCP in a network. Outline the four key steps involved in the
DHCP process. (4 Marks)
- DHCP automatically assigns IP addresses and other network configuration parameters to devices on
a network, allowing them to communicate efficiently without manual configuration.
1. DHCP Discover: The client broadcasts a request to find available DHCP servers.
2. DHCP Offer: DHCP servers respond with an offer, including an IP address and other configuration
information.
3. DHCP Request: The client selects one offer and broadcasts a request to accept it.
4. DHCP Acknowledgment: The DHCP server acknowledges the request, confirming the IP address
allocation and providing any additional configuration details.
- Function: Deals with the physical connection between devices. It defines the electrical, mechanical,
and procedural standards for the transmission of raw data bits over a physical medium (e.g., cables,
switches).
(b) Data Link Layer
- Function: Provides node-to-node data transfer, error detection and correction, and defines
protocols for data frame synchronization. It includes protocols like Ethernet.
- Function: Responsible for routing data packets between devices across different networks. It
handles logical addressing (IP addresses) and packet forwarding, including routing protocols like IP.
- Function: Ensures reliable data transfer between devices. It manages error detection, recovery, flow
control, and segmentation of data into smaller packets. Protocols include TCP (reliable) and UDP
(unreliable).
- Function: Provides network services directly to applications. It facilitates user interfaces and
manages user interactions with software, enabling functions like file transfers, email, and web
browsing. Protocols include HTTP, FTP, and SMTP.