Answered step by step
Verified Expert Solution
Question
1 Approved Answer
For each of the terms below-write it at the correct place on the table (see examples below). User your book and/or web for resources. 5.
For each of the terms below-write it at the correct place on the table (see examples below). User your book and/or web for resources. 5. Ethernet Cable - The physical cable used in to connect to devices in wired networks. Layer 1. 6. Optical fiber 7. WIFI 8. Radio waves 9. Packet 10. MAC 11. ARP 12. IP address 13. IP spoofing 14. ARP Cache poisoning 15. Router 16. UDP 17. SYN flood 18. Port scanning 19. Port 20. NMAP 21. Ping 22. Ping of Death 23. Firewall - An application used to filter traffic in a network. Can span layers (layers 3, 4, 5). 24. Session hijacking 25. SSL 26. TLS 27. SSH 28. HTTP 29. HTTPS 30. Digital key 31. FTP 32. IDS 33. IPS 34. Trojan horse 35. Physical security 36. Eavesdropping 37. Switch 38. Flooding attacks 39. ARP spoofing 40. WPA2 41. VLAN 42. Encryption 43. IPv4 44. IPv6 45. IPSec 46. VPN 47. Access control list 48. Segments 49. DNS 50. DNS Spoofing 51. Dos 52. ICMP 53. Malware 54. DDoS 55. Zombie 56. Botnet 57. Onion routing TCP/IP Model Components/protocols Vulnerabilities Attacks Physical Ethernet cable For each of the terms below-write it at the correct place on the table (see examples below). User your book and/or web for resources. 5. Ethernet Cable - The physical cable used in to connect to devices in wired networks. Layer 1. 6. Optical fiber 7. WIFI 8. Radio waves 9. Packet 10. MAC 11. ARP 12. IP address 13. IP spoofing 14. ARP Cache poisoning 15. Router 16. UDP 17. SYN flood 18. Port scanning 19. Port 20. NMAP 21. Ping 22. Ping of Death 23. Firewall - An application used to filter traffic in a network. Can span layers (layers 3, 4, 5). 24. Session hijacking 25. SSL 26. TLS 27. SSH 28. HTTP 29. HTTPS 30. Digital key 31. FTP 32. IDS 33. IPS 34. Trojan horse 35. Physical security 36. Eavesdropping 37. Switch 38. Flooding attacks 39. ARP spoofing 40. WPA2 41. VLAN 42. Encryption 43. IPv4 44. IPv6 45. IPSec 46. VPN 47. Access control list 48. Segments 49. DNS 50. DNS Spoofing 51. Dos 52. ICMP 53. Malware 54. DDoS 55. Zombie 56. Botnet 57. Onion routing TCP/IP Model Components/protocols Vulnerabilities Attacks Physical Ethernet cable
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started