Module 1: Network Architecture

Spread the love

INTRODUCTION – Network Architecture

This thorough orientation course introduces contenders to the dynamicity of network security, being the most relevant aspect in dealing with an ever-changing dynamic landscape of security threats and vulnerability. Covering the complicated folds of contemporary network architecture, it clearly outlines all the varied mechanisms by which networks secure and protect themselves. The attendees will get practical knowledge on safety, real-time examples, and cases in providing insight into the safety of a digital infrastructure. This course ensures that every learner understands the theoretical underpinnings required and can implement effective security measures in networks. This resource is highly recommended and certainly one of the most equipped resources for anyone wanting to understand network security in a very globalized way with respect to today’s cybersecurity environment.

Learning objectives

  • Define various types of networks.
  • Describe the physical components that create a network.
  • Understand the TCP/IP model for a structured framework in network communication.
  • Discuss the transmission and reception processes of network data.
  • Discuss the principles of modern architecture and design in networks.

TEST YOUR KNOWLEDGE: INTRODUCTION TO NETWORKS

1. To connect an entire city, the most effective network type would be a local area network (LAN).

  • True
  • False (CORRECT)

To link an entire city, a WAN or Wide Area Network would be the best suitable type of network. Whereas a Local Area Network (LAN) serves a small area, usually in a building or campus, WAN on the other hand covers a great geographical area, hence it becomes a good solution in connecting several places even across a city.

2. A security professional wants to ensure information is being broadcast to every computer on their organization’s network. What device should they investigate?

  • Hub (CORRECT)
  • Router
  • Modem
  • Internet

A hub is what they would use. This is a network device that broadcasts data to those devices connected to it. It functions the way a radio tower works; that is, to send signals to all receivers within range. Unlike switches and more advanced devices, a hub doesn’t direct the traffic to specific devices but sends it to every device on the network. This can result in network traffic and inefficiency.

3. What are some benefits of switches? Select all that apply.

  • They can improve network performance. (CORRECT)
  • They control the flow of traffic. (CORRECT)
  • They automatically install device-protection software.
  • They only pass data to the intended destination. (CORRECT)

Swapping benefits as follows: They cope and control the traffic flow ”within” the network and eventually improve network performance through congestion reduction. Switches are unlike hubs because they do not transmit data to all devices; switches pass data directly to the intended destination device. Selective data transmission, therefore, reduces unnecessary traffic within the circuit and improves security communication.

4. Fill in the blank: The practice of using servers, applications, and network services that are hosted on the internet is called _____ computing.

  • cloud (CORRECT)
  • website
  • uploadable
  • connected

Outsourcing the use of servers, applications, and network services via the Internet is known as cloud computing. This access enables users and organizations to manage resources, including storage, processing power, and software applications over the Internet instead of physically maintaining the required offices in their respect. Cloud computing offers flexibility, scalability, and affordability for businesses and for individual users alike.

5. Fill in the blank: A _____ is a group of connected devices.

  • media access control (MAC) address
  • hub
  • network (CORRECT)
  • router

A net is a group of connected pieces to convey with one another. These devices include computers, servers, printers, and anything else connected to the network. They can communicate via physical cables, like Ethernet, or over wireless networks, like Wi-Fi. Networks share the data, resources, and services that allow devices to exchange and share information efficiently.

6. Fill in the blank: A ____ is a network device that broadcasts information to every device on the network.

  • modem
  • switch
  • hub
  • router (CORRECT)

It is a networking device that sends signal or data towards all devices connected in a network. This acts by accepting the signal/data from one device and pumping it out to all other devices on the network, irrespective of the recipient device. This is one of the causes of the inefficiency of the network, along with, of course, the security risks involved because all devices have received the data, whether they were intended to receive them or not.

7. Fill in the blank: A _____ is a collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet.

  • local area network (LAN)
  • cloud network (CORRECT)
  • virtualization tool
  • modem

A cloud network is a collection of servers or computers which is utilized to store resources and data in different datacenters remotely and accessible on the internet.

TEST YOUR KNOWLEDGE: NETWORK COMMUNICATION

1. What type of information is contained within the header of an IP packet?

  • The message that needs to be transmitted to the receiving device 
  • An explanation of how the port number will be processed by the receiving device
  • A string of data indicating that the data transmission is complete
  • The sender’s IP address, the size of the packet, and the protocol to use (CORRECT)

The IP address of the sender together with the packet length, and the protocol which is to be used.

2. What characteristics do the TCP/IP and OSI models share? Select all that apply.

  • Both models define standards for networking and divide the network communication process into different layers. (CORRECT)
  • Both models have 7 layers.
  • Both models illustrate network processes and protocols for data transmission between two or more systems. (CORRECT)
  • Both models include an application and a transport layer.  (CORRECT)

Network communications are segmented into independent layers by both the TCP/IP and the OSI models, which standardize networking.

The transmission of data between two or more systems has been depicted in both TCP/IP and OSI models as network processes and protocols.

There are application and transport layers in both the TCP/IP and OSI models.

3. What is the Transmission Control Protocol (TCP)?

  • A software application that organizes data
  • A unique address that every device on a network is assigned
  • Guidelines for proper network operations
  • An internet communication convention (CORRECT)

It refers to an element of the internet that allows two mechanisms to connect and negate one another for data transfer.

4. Fill in the blank: A _____ is a software-based location that organizes the sending and receiving of data between devices on a network.

  • channel
  • segment
  • packet
  • port (CORRECT)

A port is basically the software reserves allocated for the sending and receiving of data between devices on a network.

5. Which layer of the TCP/IP model has protocols that organize file transfers and email services?

  • Application layer (CORRECT)
  • Internet layer
  • Network access layer
  • Transport layer

The fourth layer of the TCP/IP model – application layer – carries protocols that manage how data packets relish the sweetness of interfacing devices in their transferred rooms filled up with files or email services. The third layer in the TCP/IP model is the transport layer, including different protocols that control the movement of traffic on the network.

6. What is a data packet?

  • A piece of software that performs network operations.
  • A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet.
  • A basic unit of information that travels from one device to another within a network.  (CORRECT)
  • The practice of capturing and inspecting network traffic across a network.

Data packet is a major unit of information that is sent from one device to another device over the network.

7. What is the second layer of the TCP/IP model?

  • Network access layer
  • Internet layer (CORRECT)
  • Application layer
  • Transport layer

The internet layer is the second layer in the architecture of the TCP/IP model. It attaches an address to a data packet to indicate the location of the sender and receiver. It determines how the networks are connected.

TEST YOUR KNOWLEDGE: LOCAL AND WIDE NETWORK COMMUNICATION

1. Fill in the blank: An Internet Protocol (IP) address is a unique string of characters that identifies the _____ of a device on the internet.

  • size
  • location (CORRECT)
  • operating system
  • speed

An IP address is a string of numbers that give a unique identification for that place of identification of any device in the internet.

2. Which of the following are examples of data visualizations? Select all that apply.

  • 25, 443, 20
  • 00-B1-D0-63-C2-26
  • 2001:0db8:85a3:0000:0000:8a2e:0370:7336
  • 172.16.254.1 (CORRECT)

An IPv4 Address like this might be: 172.16.254.1. It is structured into an octet of four blocks containing values ranging from 0 to 255 and are separated by decimal points, in the following way: Each block can have a minimum of 1 digit and a maximum of 3 digits, as per the rules of the IPv4 addressing scheme.

3. What type of address is assigned by an internet service provider and connected to a geographic location?

  • Public IP address (CORRECT)
  • Private IP address
  • MAC address
  • WAN address

Internet Service Provider refers to public IP Address which is shared by different devices on same local area network. This is tied up with the specific geographical location, and this is also shared with all devices in the same LAN via the network address translation (NAT) or forwarding proxy for external communication.

4. Fill in the blank: A switch uses a MAC _____ to direct data packets to the correct device.

  • address table (CORRECT)
  • geographic location
  • home network
  • public address

In a network, a switch forwards data packets to the right device using its MAC address table.

5. Which of the following is an example of an IPv4 address?

  • 4B:50:24:D5:70:F9
  • 192.168.1.23 (CORRECT)
  • All of the above
  • 2001:0D3B:AC20:BE02:0000:0000:0000:0000

The following is an example of IPv4 address: 192.168.1.23. IPv4 addresses are represented by four 1-to-3 digit numbers divided by decimal points.

MODULE 1 CHALLENGE

1. What is the term for a group of connected devices?

  • Cloud
  • Protocol
  • Network (CORRECT)
  • Hub

Correct

2. A _____ broadcasts information to every device on the network.

  • router
  • modem
  • switch
  • hub (CORRECT)

Correct

3. Which of the following statements accurately describe switches? Select all that apply.

  • When a switch receives a data packet, it reads the MAC address of the destination device and maps it to a port. (CORRECT)
  • Switches are less secure than hubs.
  • Some benefits to switches are effective control of traffic flow and improved network performance.                              (CORRECT)
  • A switch is a device that makes connections between specific devices on a network by sending and receiving data between them.  (CORRECT)

Correct

4. What are some of the benefits cloud service providers (CSPs) offer security professionals? Select all that apply.

  • CSPs provide business analytics to monitor web traffic and sales. (CORRECT)
  • CSP servers, applications, and network services are hosted on local physical devices.
  • CSPs can save an organization money by offering processing power that is only paid for as needed. (CORRECT)
  • CSPs offer online services and web applications that can be accessed from any location. (CORRECT)

Correct

5. What is the purpose of the footer of a data packet?

  • To contain the source IP address
  • To show the MAC address of the destination device
  • To signal to the receiving device that the packet is finished (CORRECT)
  • To identify the message to be transmitted to the receiving device

Correct

6. What are the three main categories of services that CSPs provide? Select all that apply.

  • Software as a service (SaaS) (CORRECT)
  • Infrastructure as a service (IaaS) (CORRECT)
  • Platform as a service (PaaS) (CORRECT) Desktop as a service (DaaS)

Correct

7. Which port is used for secure internet communication?

  • 25
  • 20
  • 443 (CORRECT)
  • 40

Correct

8. Which layer in the TCP/IP model is used to inspect the flow of traffic across a network?

  • Layer 1, network access
  • Layer 2, internet
  • Layer 3, transport (CORRECT)
  • Layer 4, application

Correct

9. A security analyst runs a command to discover a local IP address. The analyst receives the following result: 169.254.255.249. What type of address is this?

  • IPv6  
  • IPv4 (CORRECT)
  • Ethernet
  • MAC

Correct

10. Which of the following addresses is an accurate IPv6 address?

  • a634:b123:cd34:3f56:0023:2345:7890:0000:ffff
  • fda2::7361:135b::38f5:c8bd:1b3e:2578
  • fda2:7360:1e5b:e8f5:a69f:c8bd:1b3e:2578  (CORRECT)
  • a360::abf7:h234:0011:g126:1130::ffj2

Correct

11. Which network device connects multiple networks together?

  • A switch
  • A hub
  • A modem
  • A router (CORRECT)

Correct

12. What are two benefits of cloud computing and software defined networks (SDNs)? Select two answers.

  • Increased attack surface
  • Decreased cost (CORRECT)
  • Decreased reliability
  • Increased scalability (CORRECT)

Correct

13. Fill in the blank: A computer sends information to the router and the router then transfers information through a ____ to the internet.

  • modem (CORRECT)
  • LAN
  • switch
  • hub

Correct

14. What port number is used for large file transfers?

  • 443
  • 25
  • 20 (CORRECT)
  • 37

Correct

15. Fill in the blank: fe80::ab12:cd34:ef56:0023:2345 is an example of an accurate ___ address.

  • IPv4
  • Ethernet
  • MAC
  • IPv6 (CORRECT)

Correct

16. Fill in the blank: A ___ is a device that makes connections between specific devices on a local network by sending and receiving data between them.

  • switch (CORRECT)
  • hub
  • modem
  • router

Correct

17. A security professional is investigating the benefits and drawbacks of using a cloud service provider (CSP). What are some reasons why the security professional might choose to use a CSP in their work? Select all that apply.

  • A CSP provides business analytics to monitor web traffic and sales. (CORRECT)
  • CSP services do not require any additional cloud security measures
  • CSP remote servers allow web applications to be accessed from any location. (CORRECT)
  • A CSP offers processing power that is only paid for as needed. (CORRECT)

Correct

18. Which one of the following port numbers is used for email traffic?

  • 443
  • 25 (CORRECT)
  • 23
  • 20

Correct

19. Fill in the blank: The ___ layer is used to determine how data packets will interact with receiving devices, including file transfers and email services.

  • Layer 1, network access
  • Layer 2, internet
  • Layer 3, transport
  • Layer 4, application (CORRECT)

Correct

20. Fill in the blank: 127.0.0.1 is an example of an ___ address.

  • IPv6
  • MAC
  • Ethernet
  • IPv4 (CORRECT)

Correct

21. What is the purpose of the protocol number of a data packet?

  • To identify the message to be transmitted to the receiving device
  • To tell the receiving device what to do with the information in the packet (CORRECT)
  • To contain the IP and MAC addresses
  • To signal to the receiving device that the packet is finished           

Correct

22. A security analyst runs a command to discover a local IP address. The analyst receives the following result: fd45:3efd:3201:ff22:0000:0000:12ff:0000. What type of address is this?

  • IPv6 (CORRECT)
  • MAC
  • IPv4
  • Ethernet

Correct

23. Fill in the blank: A ___ is a network that spans a large geographic area, like a city, state, or country.

  • Cloud
  • Modem
  • LAN
  • WAN (CORRECT)

Correct

24. A security analyst uses the TCP/IP model to visualize how data is organized and transmitted across their company’s network. The analyst inspects the transmission of data packets, such as the switches that direct data to its destination. Which layer are they investigating?

  • Layer 1, network access (CORRECT)
  • Layer 2, internet
  • Layer 3, transport
  • Layer 4, application

Correct

Leave a Comment