8.1 Introduction to Networking Flashcards

1
Q

What is a computer network?

A

A computer network consists of multiple devices connected together to share resources and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ___________ model is a network computing model that defines how resources and services are shared across a network.

A

The client-server model is a network computing model that defines how resources and services are shared across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Client-Server Model

This two-way conversation between the client and server is known as the ___________ method of device communication.

A

This two-way conversation between the client and server is known as the request and response method of device communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the mian risks and thrests included in newtork security?

A
  • Unauthorized access to networks
  • Denial of service (DoS) attacks
  • Eavesdropping
  • Datamodifcation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____________ is a private

computer network that connects devices in smaller physical areas.

A

A local area network (LAN)—a private

computer network that connects devices in smaller physical areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

LANs offer the following advantages:

A

Netwroks speed & performanc - Since the devices are physically near each other, connections are significanly faster and perform better.

Netwrok secuirty - With security devices, a business can control what data comes in and out of their local network as well as who has access to resources.

Versatility - New network devices can be easily added or removed inside a LAN due to the proximity of the devices within the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

As technology advanced, computer networks expanded and small networks in diffrent locations were able to connect, creating ___________.

A

As technology advanced, computer networks expanded and small networks in diffrent locations were able to connect, creating Wide Area Networks (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a network topology?

A

Machines on a network are connected in a specific design in order to properly serve the required performance, data flow, and security factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the pros of Ring topology?

A

Pros:

Reduced chances of data collision as each node release a data packet after receiving the token.

Cable faults are easily located, making
troubleshooting easier

Ring networks are moderately easy to
install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are all the network topologies? (8)

A
  1. Ring
  2. Linear
  3. Star
  4. Bus
  5. Tree
  6. Fully Connected
  7. Mesh
  8. Hybrid
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cons of Ring topology

A

In Unidirectional Ring, a data packet must pass through all the nodes.

A single break in the cable can disrupt the
entire network.

Expansion to the network can cause
network disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the most common network topology?

A

Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain Star Topology

A

All computers/devices connect to a central
device called hub or switch.

• Each device requires a single cable
• point-to-point connection between the
device and hub.
• Most widely implemented
• Hub is the single point of failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the pros of star topology?

A

Easily expanded without disruption

Cable failure affects only a single
user

Easy to troubleshoot and isolate problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the cons of star topology?

A

Requires more cable

A central connecting device allows
for a single point of failure

More difficult to implement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain Mesh Topology

A

Each computer connects to every other.

• High level of redundancy.
• Rarely used.
– Wiring is very complicated
– Cabling cost is high
– Troubleshooting a failed cable is tricky
– A variation hybrid mesh – create point to point connection between specific network devices, often seen in WAN implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Explain Hybrid Topology

A

Hybrid topology is an integration of two or more different topologies to form a resultant topology which has many advantages (as well as disadvantages) of all the constituent basic topologies rather than having characteristics of one specific topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Explain Fully Connected Topology

A

A fully connected network, complete topology, or full mesh topology is a network topology in which there is a direct link between all pairs of nodes. In a fully connected network with n nodes, there are n(n-1)/2 direct links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Netwrok Devices: Router

A

A router is a networking device that forwards (routes) resources to other networks. A router can connect two different LANs, two different WANs, a LAN to a WAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Network Devices: Switch

A

A switch is a networking device that forwards resources within a network. In other words, switches connect devices within a LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Network Devices: Hub

A

A hub serves the exact same purpose as a switch, except it is not an intelligent device. Therefore, hubs cannot be
programmed. Instead, they will direct a copy of the exact same resource to all computers connected to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

True or False?

Hubs are less secure than switches since they direct resources to all computers, even those that do not need them. Hubs are outdated and no longer commonly used.

A

True

23
Q

True or False?

Switches are typically used in large businesses with many computers.
Switches typically feed into routers.
Switches are intelligent devices, meaning they can be programmed to direct resources to certain computers.

A

True

24
Q

Network Devices: Bridge

A

Bridges are switches that only have two connections: one in and one out.

25
Q

True or False

Bridges are often used to tie two WANs together.

A

Flase

Bridges are often used to tie two LANs together.

26
Q

Network Devices: Network Interface Controller (NIC)

A

An NIC is hardware that connects a computer to a computer network.

27
Q

True or False

An NIC is usually a circuit board or chip
installed on a computer.

A

True

28
Q

True or False

Each computer must have an NIC in order to receive or send resources.

A

True

29
Q

True o False

NICs can ONLY be wired.

A

False

NICs can be wired or wireless

30
Q

Network Devices: Modem

A

Modems (modulator-demodulator) converts resource data into a format that the next type of connection can understand.

In simple terms: your computer and your internet service provider speak different languages, and the modem acts as the translator.

31
Q

Network Devices: All-in-One Device

A

All-in-one devices can have modems, WAPs, routers, and more all built into a single device. All-in-one devices are very common household devices.

32
Q

Network Devices: Firewall

A

A firewall is an intelligent network security device that monitors incoming and outgoing traffic based on security rules.

33
Q

True or False

Firewalls are typically placed at the entry point of a LAN. This protects the resources inside.

A

True

34
Q

Network Devices: Load Balancers

A

A load balancer is an intelligent network security device that distributes incoming network traffic across multiple servers.

35
Q

True or False

A load balancer ensures no single server has too much traffic to handle.

A

True

36
Q

Network Devices: Demilirarized Zones (DMZ)

A

A DMZ is a smaller subnetwork within a LAN used to add an additional layer of security to an organization’s LAN, protecting secure data within the internal networks.

37
Q

True or False

A DMZ typically has its own network security devices, such as firewalls, that attempt to detect network attacks
before they access the internal networks.

A

True

38
Q

IPv4 IP addresses are written as _________ separated by decimals.

A

IPv4 IP addresses are written as four octets separated by decimals.

39
Q

What are the two primary versions of IP addresses?

A

IPv4 and IPv6

40
Q

Each IP octet can range from _____ to _____

A

Each IP octet can range from zero to 255

41
Q

IP addresses are categorized as ______ or ______.

A

IP addresses are categorized as public or private.

42
Q

What’s the difference between public and private IP addresses?

A

Public IP addresses are addresses that can be accessed over the internet

Private IP addresses are addresses that are not exposed to the interent.

43
Q

What’s the advatages/disavantages of public IPs

A

Advantages: Public IPs’ resources are
accessible over the internet.

Disadvantages: Not all devices should be accessed over the internet, as this potentially exposes these devices to malicious actors.

44
Q

What’s the advatages of private IPs?

A

Private IP addresses aren’t publicly accessible, and therefore more secure.

Private IPs can be reused, as long as they are in different LANs, since they can’t conflict across different networks.

45
Q

What’s the disavantages of private IPs?

A

Private IPs are not directly accessible over the public internet.

Private IPs are assigned by a network administrator of the LAN they belong to.

46
Q

This process of breaking up an IP address range into smaller, more specific networks of grouped devices is called ________.

A

This process of breaking up an IP address range into smaller, more specific networks of grouped devices is called subnetting.

47
Q

When we subnet, we don’t have to list and assign IP addresses one by one. Instead, we use a fromat known as _____________.

A

When we subnet, we don’t have to list and assign IP addresses one by one. Instead, we use a fromat known as Classles Inter-Domain Routing (CIDR).

48
Q

CIDRs are made up of two sets of numbers: An ___________ and a
range of available ___________.

A

CIDRs are made up of two sets of numbers: An IP address (the prefix) and a range of available IP addresses (the suffix).

49
Q

Besides IP addresses, another important network address utilized within a LAN is the ___________________.

A

Besides IP addresses, another important network address utilized within a LAN is the Media Access Contol Address (MAC address)

50
Q

True or False

MAC addresses are connected to network adapters on a computer and can be changed.

A

False

MAC addresses are connected to network adapters on a computer and can’t be changed.

51
Q

True or False

A MAC address is a string of six sets of alphanumeric characters, separated by colons.

A

True

52
Q

True or False

MAC addresses can also indicate the manufacturer of the network device.

A

True

53
Q

How do you tell if you have a private or public IP address

A

Private IP Addresses have the following ranges:

  1. 0.0.0 - 10.255.255.255
  2. 16.0.0 - 172.31.255.255
  3. 168.0.0 - 192.168.255.255