This broad course will take participants on an elaborate adventure through the wilds of network protocols and delve into the complex inner workings of the way network communication can open gateways into whole continents of digital realities. This course will, in turn, try to explore carefully the different variations of network protocols such that participants would develop a broad understanding of the way they operate and their security implications. Commonly adopted security measures would, particularly with firewalls, be gone through. Theoretical case studies and examples from real-life scenarios will fill the discussion. Thus, theoretical concepts, which participants would get, would be acquired with the real-world practices and realities that would be necessary when it comes to establishing very great security infrastructures in various kinds of network environments. A course of study that draws up about understanding network protocols, vulnerabilities, and securing factors indispensable for reinforcing digital infrastructure.
Learning Objectives:
Recognize different network protocols.
Describe the protocol(s) used to transmit and access data over wireless networks.
Firewalls, defining purpose and functions.
Identify common network security measures and protocols.
TEST YOUR KNOWLEDGE: RECOGNIZE DIFFERENT NETWORK PROTOCOLS
1. Fill in the blank: Network protocols are rules used by two or more devices on a network to describe the _____ and structure of data.
optimum speed
order of delivery (CORRECT)
access level
maximum size
Network protocols are sets of rules that govern how two or more devices on a network communicate, such as the order in which messages are sent and their structure.
2. Which network protocol provides a secure method of communication between clients and web servers?
HTTPS (CORRECT)
ARP
DNS
TCP
It ensures secure communication between client and web server through the use of Digital certificates. Most commonly, it works on TCP port 443; however, with certain configurations, it can also run on port 80. Hypertext Transfer Protocol Secure (HTTPS) is a defined methodology.
3. To keep information safe from malicious actors, what security protocol can be used?
Address resolution protocol (ARP)
Transmission control protocol (TCP)
Secure sockets layer and transport layer security (SSL/TLS) (CORRECT)
Domain name system (DNS)
These protocols can also be used to secure HTTP transactions to form HTTPS, which protects information from malicious actors. HTTPS transmits data securely over the internet between clients and web servers.
4. IEEE 802.11, also known as Wi-Fi, is a set of standards that define communication for wireless LANs.
True (CORRECT)
False
Instead of calling it Wireless Internet Direct, it is calling Wi-Fi such that it extends another term i.e. IEEE 802.11 as said in one voice. As it can be used for an Operating System, it can be considered to be standardized because client devices can operate according to any given version of IEEE 802.11 specification and still be able to access resources.
5. Which protocol allows two or more devices to form a connection and stream data?
Hypertext Transfer Protocol Secure (HTTPS)
Transmission Control Protocol (TCP) (CORRECT)
Domain Name System (DNS) Address Resolution Protocol (ARP)
TCP: Theory Transmission Control Protocol constitutes the formation of a rigid connection between the two devices, allowing them to stream data over the internet.
6. What is IEEE 802.11 commonly known as?
Hypertext Transfer Protocol Secure (HTTPS)
Network protocols
Wi-Fi (CORRECT)
Domain Name System (DNS)
Well known as Wi-Fi, IEEE 802.11 entails a set of standards that define the protocols for communication regarding wireless Local Area Networks (LANs).
TEST YOUR KNOWLEDGE: SYSTEM IDENTIFICATION
1. What monitors and filters traffic coming in and out of a network?
Domain name system (DNS)
Firewall (CORRECT)
Uncontrolled zone
Forward proxy server
A firewall surveils and filters traffic that enters and exits a network, permitting or prohibiting traffic according to rule-defined safe settings.
2. Stateless is a class of firewall that keeps track of information passing through it and proactively filters out threats.
True
False (CORRECT)
A stateful firewall essentially monitors and tracks the state of active connections, filtering traffic based on both pre-defined rules and that communication context. On the other hand, a stateless firewall operates only on pre-defined rules, without tracking the state of data packets or their contextual connection.
3. Fill in the blank: Encapsulation can be performed by a _____ to help protect information by wrapping sensitive data in other data packets.
proxy server
security zone
firewall
VPN service (CORRECT)
It is a process done by the VPN services whereby wrapped sensitive information is encapsulated within additional data packets. VPNs modify the public IP address of the user and hide the virtual location of the user. This guarantees that data is kept private when it is transferred over a public network.
4. Which security zone is used to ensure highly confidential information and is only accessible to employees with certain privileges?
Management zone
Restricted zone (CORRECT)
Demilitarized zone (DMZ)
Uncontrolled zone
Limited access to the secured zone is restricted to very confidential information available only to some privileged persons. Generally, there will be a firewall for additional protection from all unauthorized persons.
5. Fill in the blank: A security analyst uses a _____ to regulate and restrict access to an internal server from the internet. This tool works by accepting traffic from external parties, approving it, and forwarding it to internal servers.
controlled zone
port filter
forward proxy server
reverse proxy server (CORRECT)
The usage of reverse proxy servers is common for security analysts to restrict access to an internal server by limiting invasion from the outside world. Incoming traffic from an external source into a reverse proxy first verifies it before the approved traffic can be forwarded to internal servers.
6. Which class of firewall operates based on predefined rules and does not keep track of information from data packets?
Cloud-based
Stateless (CORRECT)
NGFW
Stateful
Stateless firewalls work under the condition of predefined rules and do not keep up with the state or context of data packets. Every packet is independently evaluated, without regard to the earlier packets or connections.
7. Fill in the blank: ____ is a process performed by a VPN service that protects data in transit by wrapping sensitive data in other data packets.
NGFW
Address Resolution Protocol (ARP)
HTTPS
Encapsulation (CORRECT)
VPN service encases data in data packets to offer security against data during transmission. This makes unauthorized access and interception of data possible with great difficulty as it makes it nearly impossible to reach or understand the data.
8. Which of the following areas are in the controlled zone? Select all that apply.
Uncontrolled zone
Restricted zone (CORRECT)
Internal network (CORRECT)
Demilitarized zone (DMZ) (CORRECT)
The limit is controlled and contains the defined zones demilitarized (DMZ), internal network, and restricted ones. A separate zone is established for external public services that can be accessed from the worldwide internet while demoted from the internal network to enhance safety levels, the DMZ.
9. Fill in the blank: A(n) _____ regulates and restricts the internet’s access to an internal server.
reverse proxy server (CORRECT)
email proxy server
forward proxy server
virtual private network (VPN)
Incoming requests are filtered by a reverse proxy server which accepts them from outside, forwards them to the internal server such that it does not have any direct visibility into the outside world for any access to it from an internet resource.
MODULE 2 CHALLENGE
1. What internet communication protocol allows two devices to form a connection and stream data?
Address Resolution Protocol (ARP) (CORRECT) Hypertext Transfer Protocol Secure (HTTPS)
Correct
8. Fill in the blank: The _______ maintains Wi-Fi standards.
IEEE 802.11 (CORRECT)
Transmission control protocol (TCP)
Domain name system (DNS)
WiFi protected access (WPA)
Correct
9. A firewall administrator installs a firewall function to either block or allow certain port numbers to limit unwanted communication. What function does this scenario describe?
Location masking
Using cloud-based firewalls
Organizing data packets
Port filtering (CORRECT)
Correct
10. A security professional sets up a security measure to allow employees to work from home securely while having access to internal network resources. What does this scenario describe?
Cloud service provider (CSP)
Virtual private network (VPN) (CORRECT)
Address resolution protocol (ARP)
Firewall
Correct
11. Which of the following does encapsulation protect?
cryptographic keys
data in transit (CORRECT)
proxy servers
public IP addresses
Correct
12. What is the function of the demilitarized zone (DMZ)?
Organize data by forwarding it to other servers
Isolate servers exposed to the internet from the rest of a network (CORRECT)
Encrypt data as it travels across the internet
Protect highly confidential information accessible only to employees with certain privileges
Correct
13. Fill in the blank: A _____ fulfills the requests of its clients by forwarding them to other servers
firewall
virtual private network (VPN)
proxy server (CORRECT)
router
Correct
14. How do forward proxy servers secure internal networks? Select two answers.
They receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet. (CORRECT)
Both forward and reverse proxy servers add a layer of protection from the internet.
They are useful for protecting internal web servers that contain confidential data.
They hide a user’s IP address and approve all outgoing requests. (CORRECT)
Correct
15. What network protocol translates the domain name of a website’s server into an IP address?
Transmission control protocol (TCP)
Hypertext transfer protocol secure (HTTPS)
File transfer protocol (FTP)
Domain name system (DNS) (CORRECT)
Correct
16. Which of the following statements accurately describe wireless protocols? Select three answers.
Wi-Fi protocols provide significantly lower security levels than wired connections.
WPA is a wireless security protocol pertaining to connecting to the internet. (CORRECT)
The Institute of Electrical and Electronics Engineers maintains Wi-Fi standards. (CORRECT)
The set of standards IEEE 802.11 is also referred to as Wi-Fi. (CORRECT)
Correct
17. Fill in the blank: A ____ firewall operates based on predefined rules. It is not used to keep track of information from data packets.
stateful
stateless (CORRECT)
next-generation firewall (NGFW)
cloud-based
Correct
18. How do VPNs preserve confidentiality?
Monitor traffic to and from a network
Use temporary memory to store data requested by external servers
Encrypt data in transit (CORRECT)
Translate internet domain names to IP addresses
Correct
19. What does a VPN service use to transfer encrypted data between a device and the VPN server?
packet sniffing
network segmentation
encapsulation (CORRECT)
transmission control
Correct
20. What network zone includes public facing services such as web servers, proxy servers, and DNS servers?
Uncontrolled zone
Demilitarized zone (CORRECT)
Virtual private network
Restricted zone
Correct
21. A security analyst implements a proxy server to secure internal networks. What are some of the proxy server’s primary functions? Select three answers.
Use public IP addresses that are different from the rest on the private network (CORRECT)
Temporarily stores data that is frequently requested by external servers (CORRECT)
Divide the network into segments to maintain privacy within corporate groups
Determine whether requests to connect to a website are allowed (CORRECT)
Correct
22. Which firewall offers the most security features?
Documented firewall
Stateless firewall
Next generation firewall (NGFW) (CORRECT)
Stateful firewall
Correct
23. What network is part of the uncontrolled zone?
Internal networks
Subnets
Internet (CORRECT)
Web servers
Correct
24. Which type of firewall analyzes network traffic for suspicious characteristics and behavior and stops
Next-generation firewall (NGFW)
Cloud-based
Stateful (CORRECT)
Stateless
Correct
25. What network zone contains the internet and other services that are outside of an organization’s control?
Uncontrolled (CORRECT)
Controlled
Demilitarized
Restricted
Correct
26. What network zone acts as a network perimeter to the internal network by isolating servers that are exposed to the internet?
Virtual private network
Uncontrolled zone
Restricted zone
Demilitarized zone (CORRECT)
Correct
27. Fill in the blank: A ____ accepts traffic from external parties, approves it, then forwards it to internal servers.
next generation firewall (NGFW)
forward proxy server
virtual private network (VPN)
reverse proxy server (CORRECT)
Correct
28. Which of the following types of firewalls can perform deep packet inspection and intrusion detection?