Course 3 – CONNECT AND PROTECT: NETWORKS AND NETWORK SECURITY

Module 1: Network Architecture

GOOGLE CYBERSECURITY PROFESSIONAL CERTIFICATE

Coursera Study Guide

INTRODUCTION – Network Architecture

In this comprehensive overview, participants will be seamlessly introduced to the dynamic field of network security, gaining a foundational understanding of its relevance in the face of evolving security threats and vulnerabilities. The course delves into the intricacies of network architecture, unraveling the complexities that define modern network structures. As participants progress, they will explore the diverse mechanisms employed to fortify and secure networks, equipping them with practical insights into safeguarding digital infrastructures. By delving into real-world examples and case studies, this module ensures that learners not only comprehend the theoretical underpinnings but also acquire tangible skills essential for implementing robust network security measures. This comprehensive exploration serves as an indispensable resource for those seeking a holistic understanding of network security and its vital role in contemporary cybersecurity landscapes.

Learning Objectives

  • Define types of networks
  • Describe physical components of a network
  • Understand how the TCP/IP model provides a framework for network communication
  • Explain how data is sent and received over a network
  • Explain network architecture

TEST YOUR KNOWLEDGE: INTRODUCTION TO NETWORKS

1. To connect an entire city, the most effective network type would be a local area network (LAN).

  • True
  • False (CORRECT)

To connect an entire city, the proper network type would be a WAN. A LAN is a network that spans a small area; a wide area network (WAN) spans a large geographical area.

2. A security professional wants to ensure information is being broadcast to every computer on their organization’s network. What device should they investigate?

  • Hub (CORRECT)
  • Router
  • Modem
  • Internet

They would use a hub. A hub is a network device that broadcasts information like a radio tower.

3. What are some benefits of switches? Select all that apply.

  • They can improve network performance. (CORRECT)
  • They control the flow of traffic. (CORRECT)
  • They automatically install device-protection software.
  • They only pass data to the intended destination. (CORRECT)

Some benefits of switches include the following: They control the flow of traffic, they can improve network performance, and they pass data to the intended destination.

4. Fill in the blank: The practice of using servers, applications, and network services that are hosted on the internet is called _____ computing.

  • cloud (CORRECT)
  • website
  • uploadable
  • connected

The practice of using servers, applications, and network services that are hosted on the internet is called cloud computing.

5. Fill in the blank: A _____ is a group of connected devices.

  • media access control (MAC) address
  • hub
  • network (CORRECT)
  • router

A network is a group of connected devices. The devices on a network can communicate with each other over network cables or wireless connections.

6. Fill in the blank: A ____ is a network device that broadcasts information to every device on the network.

  • modem
  • switch
  • hub
  • router (CORRECT)

A hub is a network device that broadcasts information to every device on the network.

7. Fill in the blank: A _____ is a collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet.

  • local area network (LAN)
  • cloud network (CORRECT)
  • virtualization tool
  • modem

A cloud network is a collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet.

TEST YOUR KNOWLEDGE: NETWORK COMMUNICATION

1. What type of information is contained within the header of an IP packet?

  • The message that needs to be transmitted to the receiving device 
  • An explanation of how the port number will be processed by the receiving device
  • A string of data indicating that the data transmission is complete
  • The sender’s IP address, the size of the packet, and the protocol to use (CORRECT)

The sender’s IP address, the size of the packet, and the protocol to use.

2. What characteristics do the TCP/IP and OSI models share? Select all that apply.

  • Both models define standards for networking and divide the network communication process into different layers. (CORRECT)
  • Both models have 7 layers.
  • Both models illustrate network processes and protocols for data transmission between two or more systems. (CORRECT)
  • Both models include an application and a transport layer.  (CORRECT)

Both the TCP/IP and OSI models define standards for networking and divide the network communication process into different layers.

Both the TCP/IP and OSI models illustrate network processes and protocols for data transmission between two or more systems.

Both the TCP/IP and OSI models include an application and a transport layer.

3. What is the Transmission Control Protocol (TCP)?

  • A software application that organizes data
  • A unique address that every device on a network is assigned
  • Guidelines for proper network operations
  • An internet communication convention (CORRECT)

The TCP is an internet communication convention, or protocol. It allows two devices to form a connection and stream data.

4. Fill in the blank: A _____ is a software-based location that organizes the sending and receiving of data between devices on a network.

  • channel
  • segment
  • packet
  • port (CORRECT)

A port is a software-based location that organizes the sending and receiving of data between devices on a network.

5. Which layer of the TCP/IP model has protocols that organize file transfers and email services?

  • Application layer (CORRECT)
  • Internet layer
  • Network access layer
  • Transport layer

The application layer has protocols that organize file transfers and email services. It does this by determining how data packets will interact with receiving devices. The application layer is the fourth layer in the TCP/IP model. The transport layer includes protocols to control the flow of traffic across a network. It is the third layer in the TCP/IP model.

6. What is a data packet?

  • A piece of software that performs network operations.
  • A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet.
  • A basic unit of information that travels from one device to another within a network.  (CORRECT)
  • The practice of capturing and inspecting network traffic across a network.

A data packet is a basic unit of information that travels from one device to another within a network.

7. What is the second layer of the TCP/IP model?

  • Network access layer
  • Internet layer (CORRECT)
  • Application layer
  • Transport layer

The internet layer is the second layer of the TCP/IP model. The internet layer is where IP addresses are attached to data packets to indicate the location of the sender and receiver. The internet layer also focuses on how networks connect to each other.

TEST YOUR KNOWLEDGE: LOCAL AND WIDE NETWORK COMMUNICATION

1. Fill in the blank: An Internet Protocol (IP) address is a unique string of characters that identifies the _____ of a device on the internet.

  • size
  • location (CORRECT)
  • operating system
  • speed

An IP address is a unique string of characters that identifies the location of a device on the internet.

2. Which of the following is an example of an IPv4 address?

  • 25, 443, 20
  • 00-B1-D0-63-C2-26
  • 2001:0db8:85a3:0000:0000:8a2e:0370:7336
  • 172.16.254.1 (CORRECT)

An example of an IPv4 address is 172.16.254.1. IPv4 addresses are written as four, 1-3-digit numbers separated by decimal points. Each one can contain the values 0-255.

3. What type of address is assigned by an internet service provider and connected to a geographic location?

  • Public IP address (CORRECT)
  • Private IP address
  • MAC address
  • WAN address

A public IP address is assigned by an internet service provider and shared by all devices on a local area network. It is connected to geographic location. All communications from devices in the same local area have the same public-facing address due to network address translation or a forwarding proxy.

4. Fill in the blank: A switch uses a MAC _____ to direct data packets to the correct device.

  • address table (CORRECT)
  • geographic location
  • home network
  • public address

A switch uses a MAC address table to direct data packets to the correct device.

5. Which of the following is an example of an IPv4 address?

  • 4B:50:24:D5:70:F9
  • 192.168.1.23 (CORRECT)
  • All of the above
  • 2001:0D3B:AC20:BE02:0000:0000:0000:0000

192.168.1.23 is an example of an IPv4 address. IPv4 addresses have four, 1 to 3 digit numbers separated by decimal points.

MODULE 1 CHALLENGE

1. What is the term for a group of connected devices?

  • Cloud
  • Protocol
  • Network (CORRECT)
  • Hub

Correct

2. A _____ broadcasts information to every device on the network.

  • router
  • modem
  • switch
  • hub (CORRECT)

Correct

3. Which of the following statements accurately describe switches? Select all that apply.

  • When a switch receives a data packet, it reads the MAC address of the destination device and maps it to a port. (CORRECT)
  • Switches are less secure than hubs.
  • Some benefits to switches are effective control of traffic flow and improved network performance.                              (CORRECT)
  • A switch is a device that makes connections between specific devices on a network by sending and receiving data between them.  (CORRECT)

Correct

4. What are some of the benefits cloud service providers (CSPs) offer security professionals? Select all that apply.

  • CSPs provide business analytics to monitor web traffic and sales. (CORRECT)
  • CSP servers, applications, and network services are hosted on local physical devices.
  • CSPs can save an organization money by offering processing power that is only paid for as needed. (CORRECT)
  • CSPs offer online services and web applications that can be accessed from any location. (CORRECT)

Correct

5. What is the purpose of the footer of a data packet?

  • To contain the source IP address
  • To show the MAC address of the destination device
  • To signal to the receiving device that the packet is finished (CORRECT)
  • To identify the message to be transmitted to the receiving device

Correct

6. What are the three main categories of services that CSPs provide? Select all that apply.

  • Software as a service (SaaS) (CORRECT)
  • Infrastructure as a service (IaaS) (CORRECT)
  • Platform as a service (PaaS) (CORRECT) Desktop as a service (DaaS)

Correct

7. Which port is used for secure internet communication?

  • 25
  • 20
  • 443 (CORRECT)
  • 40

Correct

8. Which layer in the TCP/IP model is used to inspect the flow of traffic across a network?

  • Layer 1, network access
  • Layer 2, internet
  • Layer 3, transport (CORRECT)
  • Layer 4, application

Correct

9. A security analyst runs a command to discover a local IP address. The analyst receives the following result: 169.254.255.249. What type of address is this?

  • IPv6  
  • IPv4 (CORRECT)
  • Ethernet
  • MAC

Correct

10. Which of the following addresses is an accurate IPv6 address?

  • a634:b123:cd34:3f56:0023:2345:7890:0000:ffff
  • fda2::7361:135b::38f5:c8bd:1b3e:2578
  • fda2:7360:1e5b:e8f5:a69f:c8bd:1b3e:2578  (CORRECT)
  • a360::abf7:h234:0011:g126:1130::ffj2

Correct

11. Which network device connects multiple networks together?

  • A switch
  • A hub
  • A modem
  • A router (CORRECT)

Correct

12. What are two benefits of cloud computing and software defined networks (SDNs)? Select two answers.

  • Increased attack surface
  • Decreased cost (CORRECT)
  • Decreased reliability
  • Increased scalability (CORRECT)

Correct

13. Fill in the blank: A computer sends information to the router and the router then transfers information through a ____ to the internet.

  • modem (CORRECT)
  • LAN
  • switch
  • hub

Correct

14. What port number is used for large file transfers?

  • 443
  • 25
  • 20 (CORRECT)
  • 37

Correct

15. Fill in the blank: fe80::ab12:cd34:ef56:0023:2345 is an example of an accurate ___ address.

  • IPv4
  • Ethernet
  • MAC
  • IPv6 (CORRECT)

Correct

16. Fill in the blank: A ___ is a device that makes connections between specific devices on a local network by sending and receiving data between them.

  • switch (CORRECT)
  • hub
  • modem
  • router

Correct

17. A security professional is investigating the benefits and drawbacks of using a cloud service provider (CSP). What are some reasons why the security professional might choose to use a CSP in their work? Select all that apply.

  • A CSP provides business analytics to monitor web traffic and sales. (CORRECT)
  • CSP services do not require any additional cloud security measures
  • CSP remote servers allow web applications to be accessed from any location. (CORRECT)
  • A CSP offers processing power that is only paid for as needed. (CORRECT)

Correct

18. Which one of the following port numbers is used for email traffic?

  • 443
  • 25 (CORRECT)
  • 23
  • 20

Correct

19. Fill in the blank: The ___ layer is used to determine how data packets will interact with receiving devices, including file transfers and email services.

  • Layer 1, network access
  • Layer 2, internet
  • Layer 3, transport
  • Layer 4, application (CORRECT)

Correct

20. Fill in the blank: 127.0.0.1 is an example of an ___ address.

  • IPv6
  • MAC
  • Ethernet
  • IPv4 (CORRECT)

Correct

21. What is the purpose of the protocol number of a data packet?

  • To identify the message to be transmitted to the receiving device
  • To tell the receiving device what to do with the information in the packet (CORRECT)
  • To contain the IP and MAC addresses
  • To signal to the receiving device that the packet is finished           

Correct

22. A security analyst runs a command to discover a local IP address. The analyst receives the following result: fd45:3efd:3201:ff22:0000:0000:12ff:0000. What type of address is this?

  • IPv6 (CORRECT)
  • MAC
  • IPv4
  • Ethernet

Correct

23. Fill in the blank: A ___ is a network that spans a large geographic area, like a city, state, or country.

  • Cloud
  • Modem
  • LAN
  • WAN (CORRECT)

Correct

24. A security analyst uses the TCP/IP model to visualize how data is organized and transmitted across their company’s network. The analyst inspects the transmission of data packets, such as the switches that direct data to its destination. Which layer are they investigating?

  • Layer 1, network access (CORRECT)
  • Layer 2, internet
  • Layer 3, transport
  • Layer 4, application

Correct