0
0
Cybersecurityknowledge~5 mins

Common network protocols and vulnerabilities in Cybersecurity - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is the purpose of the HTTP protocol?
HTTP (HyperText Transfer Protocol) is used to transfer web pages from servers to browsers, allowing users to view websites.
Click to reveal answer
beginner
What does the TCP protocol do in networking?
TCP (Transmission Control Protocol) ensures reliable, ordered, and error-checked delivery of data between devices on a network.
Click to reveal answer
intermediate
What is a common vulnerability of the FTP protocol?
FTP (File Transfer Protocol) often transmits data, including passwords, in plain text, making it vulnerable to interception and eavesdropping.
Click to reveal answer
beginner
What is a Denial of Service (DoS) attack?
A DoS attack floods a network or service with excessive traffic to make it unavailable to legitimate users.
Click to reveal answer
intermediate
Why is using outdated protocols like Telnet considered risky?
Telnet sends data, including passwords, without encryption, making it easy for attackers to intercept sensitive information.
Click to reveal answer
Which protocol is commonly used to securely browse websites?
ASMTP
BFTP
CTelnet
DHTTPS
What vulnerability does FTP commonly have?
AData sent in plain text
BAutomatic encryption
CLimited file size
DSlow transfer speed
Which attack aims to make a network service unavailable by overwhelming it?
APhishing
BDenial of Service (DoS)
CMan-in-the-middle
DSQL Injection
Which protocol is NOT secure because it sends data unencrypted?
ASSH
BHTTPS
CTelnet
DSFTP
What does TCP ensure in data transmission?
AData is sent without errors and in order
BData is compressed
CData is encrypted
DData is broadcast to all devices
Explain the difference between HTTP and HTTPS and why HTTPS is important.
Think about how websites keep your information safe.
You got /4 concepts.
    Describe common vulnerabilities in network protocols and how attackers exploit them.
    Consider what happens when data is not protected.
    You got /4 concepts.