Reference no: EM133468405
QUESTIONS:
1- Network attacks occur in two different ways: Intercepting communication on the network or causing the core systems of the network to be affected. These two types of attacks are known as Interception or Poisoning. Mention what it is and explain how the "Man-in-the-Middle" (MITM) attack and the "DNS Poisoning" attack work.
2- Indicate what it is and what the "Denial of Service" attack (Denial of Service (DoS)) consists of.
3- Name and explain the four types of attacks in the "Hijacking" category.
4- Indicate what a Firewall is and what is its importance in a network.
5- Indicate what it is and what is the use of Virtual Private Network (VPN) technology.
6- Indicate what they are, what is their use and the difference between POP3 and IMAP email systems.
7- Routers use a security mechanism called Access Control Lists (ACLs). What is the ACL and how does it work in general terms?
8- What 5 elements must be verified when analyzing the data contained in a Firewall?
9- What 9 network devices (Network Devices) can offer valuable information about the behavior of the network and the events that occur in it? What kind of information do they provide?
10- Mention and explain the 4 areas to which an attack on a wireless network can be directed.