Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Network Protocols for Security Professionals

You're reading from   Network Protocols for Security Professionals Probe and identify network-based vulnerabilities and safeguard against network protocol breaches

Arrow left icon
Product type Paperback
Published in Oct 2022
Publisher Packt
ISBN-13 9781789953480
Length 580 pages
Edition 1st Edition
Languages
Arrow right icon
Authors (2):
Arrow left icon
Deepanshu Khanna Deepanshu Khanna
Author Profile Icon Deepanshu Khanna
Deepanshu Khanna
Yoram Orzach Yoram Orzach
Author Profile Icon Yoram Orzach
Yoram Orzach
Arrow right icon
View More author details
Toc

Table of Contents (23) Chapters Close

Preface 1. Part 1: Protecting the Network – Technologies, Protocols, Vulnerabilities, and Tools
2. Chapter 1: Data Centers and the Enterprise Network Architecture and its Components FREE CHAPTER 3. Chapter 2: Network Protocol Structures and Operations 4. Chapter 3: Security Protocols and Their Implementation 5. Chapter 4: Using Network Security Tools, Scripts, and Code 6. Chapter 5: Finding Protocol Vulnerabilities 7. Part 2: Network, Network Devices, and Traffic Analysis-Based Attacks
8. Chapter 6: Finding Network-Based Attacks 9. Chapter 7: Detecting Device-Based Attacks 10. Chapter 8: Network Traffic Analysis and Eavesdropping 11. Chapter 9: Using Behavior Analysis and Anomaly Detection 12. Part 3: Network Protocols – How to Attack and How to Protect
13. Chapter 10: Discovering LAN, IP, and TCP/UDP-Based Attacks 14. Chapter 11: Implementing Wireless Network Security 15. Chapter 12: Attacking Routing Protocols 16. Chapter 13: DNS Security 17. Chapter 14: Securing Web and Email Services 18. Chapter 15: Enterprise Applications Security – Databases and Filesystems 19. Chapter 16: IP Telephony and Collaboration Services Security 20. Assessments 21. Index 22. Other Books You May Enjoy

Questions

Answer the following questions to test your knowledge of this chapter:

  1. What is the core network?
    1. The network that connects the servers to the internet
    2. The center of the network that connects the data center(s) and the user networks
    3. A general term for an enterprise network
    4. The network between the users and the internet
  2. In Figure 1.5, on the left, we can see a typical network topology. In this network, assuming they are on the same IP subnet, when PC1 pings PC5, the packets are forwarded through which of the following?
    1. Access switch ACC1, distribution switch DIST1, core switches CORE1 and CORE2, data center switches DC1 and DC2, distribution switch DIST2, and access switch ACC4.
    2. Access switch ACC1, distribution switch DIST1, core switches CORE1 and CORE2, distribution switch DIST2, and access switch ACC4.
    3. Answers (a) and (b) can both be correct, depending on the routing configuration.
    4. Answers (a) and (b) can both be correct, depending on the HSRP configuration.
  3. In the same figure (Figure 1.5) on the left, PC1 pings PC4. The packets will go through which of the following?
    1. ACC1, DIST1, CORE1, DIST2, and ACC3
    2. ACC1, DIST1, CORE2, DIST2, and ACC3
    3. ACC1, DIST1, CORE1, CORE2, DIST2, and ACC3
    4. ACC1, DIST1, CORE1, DC1, DC2, CORE2, DIST2, and ACC3
  4. Assuming PC1 is in VLAN50 and PC2 is in VLAN60, pings are sent from PC1 to PC2. Routing will be performed on which of the following?
    1. The left network is on CORE1 and the right network is on DC1.
    2. The left network is on CORE1 or CORE2, and the right network is on DC1 or DC2, depending on the routing protocol configuration.
    3. The left network is on CORE1 and the right network is on DC2.
    4. The left network is on CORE1 or CORE2, and the right network is on DC1 or DC2, depending on HSRP configuration.
  5. In Figure 1.8, on the left, the packets from PC4 that are sent to the servers will be forwarded through which of the following?
    1. ACC3, DIST2, CORE2, and DC2
    2. ACC3, DIST2, CORE2, FW2, DC2, and FW1
    3. ACC3, DIST2, CORE2, FW2, and DC2
    4. Any of the above, depending on the routing configuration.
  6. Which of the following is a characteristic of attacks that target the data plane?
    1. Changing routing tables to divert packets in the attacker's direction
    2. Flooding the network to stop users from using it
    3. Taking control of the device's console to change its configuration
    4. All the above
  7. Which of the following is a characteristic of attacks that target the control plane?
    1. Changing routing tables to divert packets toward the attacker's direction
    2. Flooding the network to stop users from using it
    3. Taking control of the device's console to change its configuration
    4. All the above
  8. What are DDoS attacks?
    1. Attacks that prevent access to the network
    2. Attacks that prevent access from network servers
    3. Attacks that prevent access from network services
    4. All of the above
You have been reading a chapter from
Network Protocols for Security Professionals
Published in: Oct 2022
Publisher: Packt
ISBN-13: 9781789953480
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image