This thorough orientation course introduces contenders to the dynamicity of network security, being the most relevant aspect in dealing with an ever-changing dynamic landscape of security threats and vulnerability. Covering the complicated folds of contemporary network architecture, it clearly outlines all the varied mechanisms by which networks secure and protect themselves. The attendees will get practical knowledge on safety, real-time examples, and cases in providing insight into the safety of a digital infrastructure. This course ensures that every learner understands the theoretical underpinnings required and can implement effective security measures in networks. This resource is highly recommended and certainly one of the most equipped resources for anyone wanting to understand network security in a very globalized way with respect to today’s cybersecurity environment.
Learning objectives
Define various types of networks.
Describe the physical components that create a network.
Understand the TCP/IP model for a structured framework in network communication.
Discuss the transmission and reception processes of network data.
Discuss the principles of modern architecture and design in networks.
TEST YOUR KNOWLEDGE: INTRODUCTION TO NETWORKS
1. To connect an entire city, the most effective network type would be a local area network (LAN).
True
False (CORRECT)
To link an entire city, a WAN or Wide Area Network would be the best suitable type of network. Whereas a Local Area Network (LAN) serves a small area, usually in a building or campus, WAN on the other hand covers a great geographical area, hence it becomes a good solution in connecting several places even across a city.
2. A security professional wants to ensure information is being broadcast to every computer on their organization’s network. What device should they investigate?
Hub (CORRECT)
Router
Modem
Internet
A hub is what they would use. This is a network device that broadcasts data to those devices connected to it. It functions the way a radio tower works; that is, to send signals to all receivers within range. Unlike switches and more advanced devices, a hub doesn’t direct the traffic to specific devices but sends it to every device on the network. This can result in network traffic and inefficiency.
3. What are some benefits of switches? Select all that apply.
They can improve network performance. (CORRECT)
They control the flow of traffic. (CORRECT)
They automatically install device-protection software.
They only pass data to the intended destination. (CORRECT)
Swapping benefits as follows: They cope and control the traffic flow ”within” the network and eventually improve network performance through congestion reduction. Switches are unlike hubs because they do not transmit data to all devices; switches pass data directly to the intended destination device. Selective data transmission, therefore, reduces unnecessary traffic within the circuit and improves security communication.
4. Fill in the blank: The practice of using servers, applications, and network services that are hosted on the internet is called _____ computing.
cloud (CORRECT)
website
uploadable
connected
Outsourcing the use of servers, applications, and network services via the Internet is known as cloud computing. This access enables users and organizations to manage resources, including storage, processing power, and software applications over the Internet instead of physically maintaining the required offices in their respect. Cloud computing offers flexibility, scalability, and affordability for businesses and for individual users alike.
5. Fill in the blank: A _____ is a group of connected devices.
media access control (MAC) address
hub
network (CORRECT)
router
A net is a group of connected pieces to convey with one another. These devices include computers, servers, printers, and anything else connected to the network. They can communicate via physical cables, like Ethernet, or over wireless networks, like Wi-Fi. Networks share the data, resources, and services that allow devices to exchange and share information efficiently.
6. Fill in the blank: A ____ is a network device that broadcasts information to every device on the network.
modem
switch
hub
router (CORRECT)
It is a networking device that sends signal or data towards all devices connected in a network. This acts by accepting the signal/data from one device and pumping it out to all other devices on the network, irrespective of the recipient device. This is one of the causes of the inefficiency of the network, along with, of course, the security risks involved because all devices have received the data, whether they were intended to receive them or not.
7. Fill in the blank: A _____ is a collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet.
local area network (LAN)
cloud network (CORRECT)
virtualization tool
modem
A cloud network is a collection of servers or computers which is utilized to store resources and data in different datacenters remotely and accessible on the internet.
TEST YOUR KNOWLEDGE: NETWORK COMMUNICATION
1. What type of information is contained within the header of an IP packet?
The message that needs to be transmitted to the receiving device
An explanation of how the port number will be processed by the receiving device
A string of data indicating that the data transmission is complete
The sender’s IP address, the size of the packet, and the protocol to use (CORRECT)
The IP address of the sender together with the packet length, and the protocol which is to be used.
2. What characteristics do the TCP/IP and OSI models share? Select all that apply.
Both models define standards for networking and divide the network communication process into different layers. (CORRECT)
Both models have 7 layers.
Both models illustrate network processes and protocols for data transmission between two or more systems. (CORRECT)
Both models include an application and a transport layer. (CORRECT)
Network communications are segmented into independent layers by both the TCP/IP and the OSI models, which standardize networking.
The transmission of data between two or more systems has been depicted in both TCP/IP and OSI models as network processes and protocols.
There are application and transport layers in both the TCP/IP and OSI models.
3. What is the Transmission Control Protocol (TCP)?
A software application that organizes data
A unique address that every device on a network is assigned
Guidelines for proper network operations
An internet communication convention (CORRECT)
It refers to an element of the internet that allows two mechanisms to connect and negate one another for data transfer.
4. Fill in the blank: A _____ is a software-based location that organizes the sending and receiving of data between devices on a network.
channel
segment
packet
port (CORRECT)
A port is basically the software reserves allocated for the sending and receiving of data between devices on a network.
5. Which layer of the TCP/IP model has protocols that organize file transfers and email services?
Application layer (CORRECT)
Internet layer
Network access layer
Transport layer
The fourth layer of the TCP/IP model – application layer – carries protocols that manage how data packets relish the sweetness of interfacing devices in their transferred rooms filled up with files or email services. The third layer in the TCP/IP model is the transport layer, including different protocols that control the movement of traffic on the network.
6. What is a data packet?
A piece of software that performs network operations.
A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet.
A basic unit of information that travels from one device to another within a network. (CORRECT)
The practice of capturing and inspecting network traffic across a network.
Data packet is a major unit of information that is sent from one device to another device over the network.
7. What is the second layer of the TCP/IP model?
Network access layer
Internet layer (CORRECT)
Application layer
Transport layer
The internet layer is the second layer in the architecture of the TCP/IP model. It attaches an address to a data packet to indicate the location of the sender and receiver. It determines how the networks are connected.
TEST YOUR KNOWLEDGE: LOCAL AND WIDE NETWORK COMMUNICATION
1. Fill in the blank: An Internet Protocol (IP) address is a unique string of characters that identifies the _____ of a device on the internet.
size
location (CORRECT)
operating system
speed
An IP address is a string of numbers that give a unique identification for that place of identification of any device in the internet.
2. Which of the following are examples of data visualizations? Select all that apply.
25, 443, 20
00-B1-D0-63-C2-26
2001:0db8:85a3:0000:0000:8a2e:0370:7336
172.16.254.1 (CORRECT)
An IPv4 Address like this might be: 172.16.254.1. It is structured into an octet of four blocks containing values ranging from 0 to 255 and are separated by decimal points, in the following way: Each block can have a minimum of 1 digit and a maximum of 3 digits, as per the rules of the IPv4 addressing scheme.
3. What type of address is assigned by an internet service provider and connected to a geographic location?
Public IP address (CORRECT)
Private IP address
MAC address
WAN address
Internet Service Provider refers to public IP Address which is shared by different devices on same local area network. This is tied up with the specific geographical location, and this is also shared with all devices in the same LAN via the network address translation (NAT) or forwarding proxy for external communication.
4. Fill in the blank: A switch uses a MAC _____ to direct data packets to the correct device.
address table (CORRECT)
geographic location
home network
public address
In a network, a switch forwards data packets to the right device using its MAC address table.
5. Which of the following is an example of an IPv4 address?
4B:50:24:D5:70:F9
192.168.1.23 (CORRECT)
All of the above
2001:0D3B:AC20:BE02:0000:0000:0000:0000
The following is an example of IPv4 address: 192.168.1.23. IPv4 addresses are represented by four 1-to-3 digit numbers divided by decimal points.
MODULE 1 CHALLENGE
1. What is the term for a group of connected devices?
Cloud
Protocol
Network (CORRECT)
Hub
Correct
2. A _____ broadcasts information to every device on the network.
router
modem
switch
hub (CORRECT)
Correct
3. Which of the following statements accurately describe switches? Select all that apply.
When a switch receives a data packet, it reads the MAC address of the destination device and maps it to a port. (CORRECT)
Switches are less secure than hubs.
Some benefits to switches are effective control of traffic flow and improved network performance. (CORRECT)
A switch is a device that makes connections between specific devices on a network by sending and receiving data between them. (CORRECT)
Correct
4. What are some of the benefits cloud service providers (CSPs) offer security professionals? Select all that apply.
CSPs provide business analytics to monitor web traffic and sales. (CORRECT)
CSP servers, applications, and network services are hosted on local physical devices.
CSPs can save an organization money by offering processing power that is only paid for as needed. (CORRECT)
CSPs offer online services and web applications that can be accessed from any location. (CORRECT)
Correct
5. What is the purpose of the footer of a data packet?
To contain the source IP address
To show the MAC address of the destination device
To signal to the receiving device that the packet is finished (CORRECT)
To identify the message to be transmitted to the receiving device
Correct
6. What are the three main categories of services that CSPs provide? Select all that apply.
Software as a service (SaaS) (CORRECT)
Infrastructure as a service (IaaS) (CORRECT)
Platform as a service (PaaS) (CORRECT) Desktop as a service (DaaS)
Correct
7. Which port is used for secure internet communication?
25
20
443 (CORRECT)
40
Correct
8. Which layer in the TCP/IP model is used to inspect the flow of traffic across a network?
Layer 1, network access
Layer 2, internet
Layer 3, transport (CORRECT)
Layer 4, application
Correct
9. A security analyst runs a command to discover a local IP address. The analyst receives the following result: 169.254.255.249. What type of address is this?
IPv6
IPv4 (CORRECT)
Ethernet
MAC
Correct
10. Which of the following addresses is an accurate IPv6 address?
a634:b123:cd34:3f56:0023:2345:7890:0000:ffff
fda2::7361:135b::38f5:c8bd:1b3e:2578
fda2:7360:1e5b:e8f5:a69f:c8bd:1b3e:2578 (CORRECT)
a360::abf7:h234:0011:g126:1130::ffj2
Correct
11. Which network device connects multiple networks together?
A switch
A hub
A modem
A router (CORRECT)
Correct
12. What are two benefits of cloud computing and software defined networks (SDNs)? Select two answers.
Increased attack surface
Decreased cost (CORRECT)
Decreased reliability
Increased scalability (CORRECT)
Correct
13. Fill in the blank: A computer sends information to the router and the router then transfers information through a ____ to the internet.
modem (CORRECT)
LAN
switch
hub
Correct
14. What port number is used for large file transfers?
443
25
20 (CORRECT)
37
Correct
15. Fill in the blank: fe80::ab12:cd34:ef56:0023:2345 is an example of an accurate ___ address.
IPv4
Ethernet
MAC
IPv6 (CORRECT)
Correct
16. Fill in the blank: A ___ is a device that makes connections between specific devices on a local network by sending and receiving data between them.
switch (CORRECT)
hub
modem
router
Correct
17. A security professional is investigating the benefits and drawbacks of using a cloud service provider (CSP). What are some reasons why the security professional might choose to use a CSP in their work? Select all that apply.
A CSP provides business analytics to monitor web traffic and sales. (CORRECT)
CSP services do not require any additional cloud security measures
CSP remote servers allow web applications to be accessed from any location. (CORRECT)
A CSP offers processing power that is only paid for as needed. (CORRECT)
Correct
18. Which one of the following port numbers is used for email traffic?
443
25 (CORRECT)
23
20
Correct
19. Fill in the blank: The ___ layer is used to determine how data packets will interact with receiving devices, including file transfers and email services.
Layer 1, network access
Layer 2, internet
Layer 3, transport
Layer 4, application (CORRECT)
Correct
20. Fill in the blank: 127.0.0.1 is an example of an ___ address.
IPv6
MAC
Ethernet
IPv4 (CORRECT)
Correct
21. What is the purpose of the protocol number of a data packet?
To identify the message to be transmitted to the receiving device
To tell the receiving device what to do with the information in the packet (CORRECT)
To contain the IP and MAC addresses
To signal to the receiving device that the packet is finished
Correct
22. A security analyst runs a command to discover a local IP address. The analyst receives the following result: fd45:3efd:3201:ff22:0000:0000:12ff:0000. What type of address is this?
IPv6 (CORRECT)
MAC
IPv4
Ethernet
Correct
23. Fill in the blank: A ___ is a network that spans a large geographic area, like a city, state, or country.
Cloud
Modem
LAN
WAN (CORRECT)
Correct
24. A security analyst uses the TCP/IP model to visualize how data is organized and transmitted across their company’s network. The analyst inspects the transmission of data packets, such as the switches that direct data to its destination. Which layer are they investigating?