.
Network Security Practice Sheet
Introduction
Network security is the practice of protecting data and resources that travel over a network. It involves the use of technologies, processes, and controls to protect networks, systems, and data from unauthorized access, malicious attacks, and other cyber threats.
Basic Questions
What is the purpose of network security?
What are the three main components of network security?
What are the two main types of network security?
What is the difference between a firewall and an antivirus?
What is the best way to protect a network from malicious attacks?
Intermediate Questions
What is a Denial of Service (DoS) attack?
What is a Distributed Denial of Service (DDoS) attack?
What is the difference between a virus and a worm?
What is a Man-in-the-Middle (MITM) attack?
What is a buffer overflow attack?
Advanced Questions
What is a zero-day attack?
What is a password attack?
What is a phishing attack?
What is a cross-site scripting (XSS) attack?
What is a SQL injection attack?
Practice Problems
You are a network administrator for a small business. Your company's network has been experiencing slowdowns and outages. You suspect that someone is attempting to launch a DoS attack against your network. What steps can you take to protect your network from this type of attack?
You are a network administrator for a large company. You have noticed that your network has been experiencing a large number of failed login attempts. You suspect that someone is attempting to launch a password attack against your network. What steps can you take to protect your network from this type of attack?
You are a network administrator for a large company. You have noticed that your network has been experiencing a large number of malicious emails. You suspect that someone is attempting to launch a phishing attack against your network. What steps can you take to protect your network from this type of attack?
You are a network administrator for a small business. Your company's network has been experiencing slowdowns and outages. You suspect that someone is attempting to launch a DDoS attack against your network. What steps can you take to protect your network from this type of attack?
You are a network administrator for a large company. You have noticed that your network has been experiencing a large number of malicious web requests. You suspect that someone is attempting to launch a cross-site scripting attack against your network. What steps can you take to protect your network from this type of attack?