leerstof klas Flashcards
What type of network does LAN stand for?
Local Area Network.
What is the definition of WAN?
Wide Area Network, covering large geographic areas.
What are the typical speeds for LANs?
1 Gbps to 100 Gbps.
What technology is commonly used for WANs?
MPLS, VPN, Leased Line, SD-WAN.
What is the primary difference in ownership between LAN and WAN?
LAN is usually owned by the organization, while WAN is often a leased service from ISPs.
Fill in the blank: UTP stands for _______.
Unshielded Twisted Pair.
What is the maximum distance for UTP cables?
100 meters.
What type of network topology uses a central hub?
Star topology.
What is a key advantage of the mesh topology?
Full redundancy, as every node connects to every other node.
What is an example of a personal area network (PAN) technology?
Bluetooth.
What are the two main classifications of IPv4 addresses?
Public and private.
True or False: Private IPv4 addresses can be accessed directly from the internet.
False.
What protocol is used for dynamic IP address assignment?
Dynamic Host Configuration Protocol (DHCP).
What is the range of a private IPv4 address for small networks?
192.168.0.0 - 192.168.255.255.
What is the primary use of fiber optic cables?
Long-distance and high-speed connections.
What is the maximum speed of a single-mode fiber optic cable?
100 Gbps.
What are the two types of fiber optic cables?
- Single-Mode Fiber (SMF) * Multi-Mode Fiber (MMF)
What is the risk associated with bus topology?
Collision risk and difficult troubleshooting.
What is the maximum distance for coaxial cable?
500 meters.
What is the primary disadvantage of the star topology?
Single point of failure (hub).
What type of network covers a city or metropolitan region?
Metropolitan Area Network (MAN).
What is a primary usage of STP cables?
Used in factories or areas with high electromagnetic interference (EMI).
What is the coverage range of a PAN?
1 to 10 meters.
What technology is used in WANs for connecting data centers?
MPLS.
Fill in the blank: The maximum speed for Wi-Fi is _______.
9.6 Gbps.
What is the definition of a loop prevention method in networking?
Spanning Tree Protocol (STP).
What is a disadvantage of the hybrid topology?
Complex setup and costly.
What type of devices are typically connected in a LAN?
Computers, printers, servers, routers, switches.
What is the range of private IPv4 addresses?
168.0.0 - 192.168.255.255
What are private networks typically used for?
Home, Office
What is the definition of public IPv4 addresses?
Anything outside the private range
What is required for private IPs to communicate online?
NAT (Network Address Translation)
What does DHCP stand for?
Dynamic Host Configuration Protocol
What is the purpose of DHCP?
Automatically assigns IP addresses and other network configuration parameters
What are the benefits of using DHCP?
- Simplifies network management
- Reduces configuration errors
- Automates IP address allocation
What is a key function of a DHCP server?
Assigns IP addresses to clients
True or False: Multiple DHCP servers can work in failover mode.
True
What is the function of the Root DNS Server?
Directs the resolver to the Top-Level Domain (TLD) server
What is the role of the TLD DNS Server?
Responds with information about the authoritative DNS server for a domain
What does the Authoritative DNS Server contain?
The actual IP address of a domain
What is the purpose of a DNS resolver?
Translates domain names into IP addresses
Fill in the blank: The __________ is like the phonebook of the internet.
Domain Name System (DNS)
What is the primary DNS address for Google?
8.8.8.8
What is a subnet?
A segmented piece of a larger network
In regular subnets, what is the first IP address used for?
Network address
In regular subnets, what is the last IP address used for?
Broadcast address
What CIDR notation allows for point-to-point links?
/31
What is the block size for a /24 subnet?
256
What is the maximum number of hosts in a /16 subnet?
65,534
What does CIDR stand for?
Classless Inter-Domain Routing
What is the CIDR notation for a Class A network?
/8
True or False: Class D addresses are used for multicast.
True
What is the range of Class E addresses?
240.x.x.x - 255.x.x.x
Why won’t you see a /7 CIDR block in local subnets?
Too large for practical use in local networks
What is the purpose of DHCP relay (IP Helper)?
To centralize DHCP in larger networks
What does a DHCP server do in failover mode?
One server takes over if the other fails
Fill in the blank: The first IP in a subnet is called the _______.
network address
What happens if a DNS resolver does not have a cached IP address?
It queries the Root DNS Server
What is the maximum number of hosts in a /30 subnet?
2
What does CIDR stand for?
Classless Inter-Domain Routing
CIDR is used to allocate IP addresses more efficiently.
What is Class D IP range?
224.x.x.x - 239.x.x.x
Class D is used for multicast applications like IP-TV and video streaming.
What is the function of the OSI Model?
Explains how data travels from one device to another across a network
The OSI model serves as a framework for understanding network processes.
How many layers are in the OSI Model?
Seven
Each layer has a specific role in network communication.
What is the starting IP range for Class A?
1.0.0.0 - 126.0.0.0
Class A is used for large networks.
What is the typical use of Class B IP addresses?
Medium networks
Class B IP range is 128.0.0.0 - 191.255.0.0.
Fill in the blank: The OSI model offers a _______ list of processes on a network.
chronological
This helps in troubleshooting network issues.
What is the function of the Application layer in the OSI Model?
Allows users to interact with network applications
Examples include HTTP, FTP, and DNS.
What layer of the OSI Model is responsible for data formatting and encryption?
Presentation layer
This layer converts data for applications and compresses or encrypts it.
What is the main function of the Transport layer?
Ensures complete, error-free data delivery
Protocols include TCP and UDP.
MAC addresses operate at which OSI layer?
Layer 2 (Data Link Layer)
MAC addresses are used for local network communication.
What is the format of an IPv4 address?
32-bit
Example: 192.168.1.10.
True or False: MAC addresses can change dynamically.
False
MAC addresses are burned into network interfaces.
What does a Router do in the OSI Model?
Uses IP addresses to route packets
Routers operate at Layer 3 (Network).
What is the primary difference between a Layer 2 switch and a Layer 3 switch?
Layer 2 switch uses MAC addresses, Layer 3 switch uses IP addresses
Layer 3 switches can also perform routing.
What is the function of the Firewall in the OSI Model?
Filters traffic based on IPs and ports
Firewalls operate at Layers 3 and 4.
What type of protocol is TCP?
Connection-oriented
TCP requires a handshake to establish a connection.
What does UDP stand for?
User Datagram Protocol
UDP is a connectionless protocol.
Fill in the blank: TCP is _______ while UDP is unreliable.
reliable
TCP ensures all data is received correctly.
What is the typical usage of UDP?
Applications needing speed like VoIP and gaming
UDP skips error checking for faster communication.
What is the function of port 80?
HTTP (Web Browsing - Insecure)
Commonly used by web servers.
What type of applications typically use TCP?
Applications needing accuracy
Examples include web browsers and email clients.
What is the primary purpose of DHCP?
Assigns IP addresses dynamically
DHCP operates on ports 67 and 68.
Fill in the blank: A Hub operates at OSI Layer _______.
1 (Physical)
Hubs simply repeat signals.
What is the function of the Session layer?
Manages communication sessions
Examples include RPC and SSH.
What is the typical use of port 443?
HTTPS (Secure Web Browsing)
Used for secure communication over the web.
What is the function of the Data Link layer?
Handles switching, MAC addresses, and error detection
Examples include Ethernet and ARP.
What does the Physical layer deal with?
Cables, signals, and network interfaces
Examples include Ethernet cables and Wi-Fi.
What does UDP stand for?
User Datagram Protocol
UDP is used for fast communication but does not guarantee data integrity.
What does TCP stand for?
Transmission Control Protocol
TCP is used for reliable communication, ensuring data integrity.
What is the primary focus of UDP?
Speed
UDP prioritizes low latency for applications like streaming and gaming.
What is the primary focus of TCP?
Reliability
TCP ensures that data is received accurately and in order.
What is the purpose of the TCP Three-Way Handshake?
Establish a reliable connection
It involves SYN, SYN-ACK, and ACK messages for connection setup.
What are the three steps of the TCP Three-Way Handshake?
- SYN
- SYN-ACK
- ACK
These steps ensure a connection is established between client and server.
What is the function of TCP’s flow control?
Adjust speed for efficiency
It uses mechanisms like window size and sliding window protocol.
What is the purpose of error control in TCP?
Ensure accurate delivery
It utilizes checksums and retransmissions to confirm data integrity.
What is the four-way handshake used for in TCP?
Connection termination
It involves FIN and ACK messages to properly close a connection.
When should TCP be used?
When reliability is critical
Examples include web browsing, email, and file transfers.
When should UDP be used?
When speed is more important than reliability
Examples include streaming, gaming, and VoIP calls.
What are the four layers of the TCP/IP model?
- Application
- Transport
- Internet
- Network Access
Each layer has specific functions and protocols.
What protocols are included in the Application layer of the TCP/IP model?
- HTTP
- HTTPS
- FTP
- SMTP
- DNS
- DHCP
- SNMP
- POP3
- IMAP
This layer provides services for applications and users.
What is the main function of the Transport layer in TCP/IP?
Manages end-to-end communication and reliability
Protocols include TCP and UDP.
What is the equivalent OSI layer for the TCP/IP Transport layer?
Layer 4
This layer handles reliable and unreliable data transmission.
What is the purpose of the Internet layer in TCP/IP?
Routes packets across networks
Protocols include IP, ICMP, ARP, and others.
What protocols are found in the Network Access layer of the TCP/IP model?
- Ethernet
- Wi-Fi
- PPP
- Frame Relay
- ATM
This layer handles physical data transmission.
What is the OSI model used for?
Learning networking concepts and troubleshooting
It provides a framework for understanding network functions.
What are the seven layers of the OSI model?
- Application
- Presentation
- Session
- Transport
- Network
- Data Link
- Physical
Each layer serves a specific function in network communication.
What is the first step in how the internet works?
Device connects to network
This involves connecting via Wi-Fi, Ethernet, or cellular data.
What happens when you type a domain name into a browser?
A DNS resolution occurs
The device queries a DNS server to find the corresponding IP address.
What is the role of routers in the internet?
Forward packets across multiple networks
Routers ensure data reaches its destination server.
What is involved in designing a LAN?
- Determine network requirements
- Select topology
- Plan IP addressing
- Choose network hardware
- Implement security measures
- Ensure redundancy
- Deploy monitoring
These steps help create an efficient and secure network.
What are some key factors in LAN design?
- Topology
- Scalability
- Performance
- Security
- Reliability & Redundancy
- Addressing & Subnetting
- Network Devices
- Cable Infrastructure
Each factor plays a crucial role in the effectiveness of the network.
What is the purpose of Quality of Service (QoS)?
Traffic prioritization
QoS ensures critical applications receive higher priority for performance.
What is Cisco Packet Tracer used for?
Simulates network topology and behavior
It is beneficial for network learning and CCNA students.
What is Wireshark primarily used for?
Analyzes network traffic and packets
It is a key tool for network troubleshooting and security.
What is SDN?
Software-Defined Networking (SDN) is a network architecture that separates the control plane from the data plane, enabling centralized network management, automation, and programmability.
How does SDN differ from traditional networking?
In traditional networking, each switch/router makes its own decisions about packet forwarding. In SDN, a centralized controller decides how traffic should be handled across the entire network.
What is the control plane in SDN?
The control plane is centralized in SDN, managed by the SDN Controller, which oversees traffic management.
What is SD-WAN?
Software-Defined Wide Area Network (SD-WAN) is a virtualized WAN architecture that enables businesses to securely connect branch offices, data centers, and cloud applications using software-based intelligent routing.
What are the main features of SD-WAN?
SD-WAN features include traffic optimization, centralized control, built-in security, application awareness, and cloud integration.
Fill in the blank: SD-WAN uses _______ to dynamically select the best path for network traffic.
[multiple internet links]
What is the primary purpose of a firewall?
The primary purpose of a firewall is to protect against cyber threats by monitoring and controlling incoming and outgoing traffic based on security rules.
How does SD-WAN manage traffic?
SD-WAN manages traffic through intelligent path selection, prioritizing business-critical applications, and optimizing WAN connectivity.
What are the connectivity options for SD-WAN?
SD-WAN supports MPLS, broadband, LTE, 5G, and satellite connectivity.
True or False: Traditional WANs require backhauling for cloud integration.
True
What is the main difference between SD-WAN and traditional WAN?
SD-WAN is software-defined and uses dynamic routing, while traditional WAN is hardware-based with fixed routing.
What is the role of application awareness in SD-WAN?
Application awareness in SD-WAN allows prioritization of business-critical applications like VoIP and video conferencing over less important traffic.
List three key features of SDN.
- Centralized control
- Programmable network management
- Dynamic routing
What security features are typically included in SD-WAN?
- Built-in encryption
- Firewall integration
- Zero Trust architecture
Fill in the blank: The primary function of a router is to _______.
[route data between networks]
What is the main function of a WAF?
A Web Application Firewall (WAF) protects web applications from attacks like SQL injection, XSS, and DDoS.
How does SD-WAN provide redundancy?
SD-WAN offers advanced failover with multi-link auto-switching for WAN resilience.
What are example technologies used in SDN?
- OpenFlow
- VMware NSX
- Cisco ACI
- Juniper Contrail
What is the difference in deployment area between SDN and SD-WAN?
SDN is used in data centers, cloud networks, and enterprise LANs, while SD-WAN is used in multi-branch office networks and hybrid cloud environments.
True or False: SD-WAN optimizes WAN traffic based on network conditions.
True
What is a key advantage of SD-WAN over traditional WAN?
SD-WAN has lower costs as it uses broadband and LTE instead of expensive MPLS circuits.
What does SD-WAN use to monitor real-time network conditions?
SD-WAN uses intelligent routing to monitor real-time network conditions.
What is the primary focus of SDN?
SDN primarily manages network traffic within data centers, cloud environments, and enterprise LANs.
What is the security capability of a typical firewall?
Firewalls include IPS/IDS, VPN, malware protection, and threat intelligence.
List the key features of Cisco SD-WAN.
- Cloud-managed
- Deep security integration
- Scalable
Fill in the blank: SD-WAN prioritizes _______ applications over less important traffic.
[business-critical]
What type of traffic management does SD-WAN provide?
SD-WAN provides intelligent path selection, QoS, and load balancing.
How does SD-WAN handle encryption?
SD-WAN supports secure tunnels using IPSec, ZTNA, and SASE models.
What is the best use case for SD-WAN?
SD-WAN is ideal for WAN optimization, cloud application performance, and secure remote branch connectivity.
What is web application security?
Provides full application-layer security (Layer 7 protection) for web applications.
What is basic failover in the context of VPNs and firewalls?
Basic failover for VPNs and firewalls.
What does advanced failover involve?
Multi-link auto-switching for WAN resilience.
What is the role of CDN and DDoS protection in web application security?
Ensures web application availability through CDN and DDoS protection.
How does cloud and SaaS optimization function?
No cloud-specific optimization, but can integrate with cloud security.
What types of applications are optimized for SaaS and cloud apps?
AWS, Azure, Google Cloud.
What does routing entail in web application security?
Basic static and policy-based routing.
What is dynamic routing based on?
AI-driven routing based on network conditions (latency, jitter, packet loss).
Where is web application security typically deployed?
At the network perimeter (on-premise or cloud).
What is the primary focus of web application security solutions?
Protecting web applications from SQL injection, cross-site scripting, and bot attacks.
Name an example of a web application firewall solution.
AWS WAF, Cloudflare WAF, Akamai Kona Site Defender, Imperva WAF, F5 Advanced WAF.
What is an IDS (Intrusion Detection System)?
Detects malicious activity but does not take action.
What is an IPS (Intrusion Prevention System)?
Detects and blocks malicious activity automatically.
What is the action taken by an IDS?
Detects and logs threats but does not block them.
What is the placement of an IDS?
Passive – behind firewall (monitors traffic).
What is the impact of an IPS on network traffic?
Can introduce latency due to active blocking.
What technology can be classified as an IDS?
Snort IDS, Suricata, OSSEC.
What is Darktrace known for?
An AI-driven cybersecurity platform that uses machine learning to detect, respond to, and prevent cyber threats.
What feature does Darktrace Antigena provide?
Automatically neutralizes threats in real-time before they cause harm.
What does Darktrace use to identify cyber threats?
Machine learning to identify abnormal behaviors.
What is a key feature of Darktrace’s threat detection?
Zero-Day Threat Detection – identifies previously unknown threats without relying on traditional signatures.
How does Darktrace monitor environments?
Monitors on-premises and cloud environments for security anomalies.
What is the response time of Darktrace compared to traditional security?
Real-time, autonomous response.
What is a key difference between AI-based and traditional security in threat detection?
AI-driven identifies new and unknown threats; traditional relies on known signatures.
What does Fortinet FortiGate offer?
Enterprise-grade firewall with integrated SD-WAN and IPS.
What is the main function of FortiEDR?
AI-driven Endpoint Detection and Response for real-time threat prevention.
What does FortiAnalyzer utilize for threat correlation?
Uses AI for security analytics and SIEM.
What is FortiAI?
AI-based threat detection and response platform
FortiAI utilizes deep learning AI for detecting zero-day attacks and malware analysis.
What technology does FortiEDR use for threat prevention?
Behavioral AI for real-time threat prevention and automated response
FortiEDR is an AI-driven Endpoint Detection and Response system.
What is the role of FortiAnalyzer?
AI-driven security analytics and SIEM
It uses AI for threat correlation, forensic analysis, and compliance.
How does FortiSandbox detect malware?
Uses machine learning for advanced threat detection and isolation
FortiSandbox is an AI-powered malware detection and sandboxing solution.
What does FortiSOAR automate?
Incident response
FortiSOAR uses AI-driven automation to streamline the incident response process.
What type of analysis does FortiNDR perform?
AI-driven network traffic analysis and anomaly detection
It detects lateral movement, insider threats, and network anomalies.
What is a key feature of FortiAI compared to Darktrace?
Automated malware isolation and forensic analysis
FortiAI focuses on threat detection with a different response mechanism than Darktrace.
What type of detection does Darktrace utilize?
AI-based anomaly detection
Darktrace employs autonomous response with Antigena AI.
How does FortiAI integrate with network environments?
Works with Fortinet Security Fabric
This provides seamless integration within Fortinet’s ecosystem.
What type of organizations is FortiAI best suited for?
Enterprise networks and Fortinet users
FortiAI is tailored for organizations heavily invested in Fortinet solutions.
What does FortiAnalyzer provide besides security analytics?
SIEM capabilities
FortiAnalyzer’s analytics help in compliance and threat correlation.
Fill in the blank: FortiNDR detects _______.
lateral movement, insider threats, and network anomalies
True or False: Darktrace provides automated reports through Cyber AI Analyst.
True
Darktrace’s Cyber AI Analyst automates reporting for better security insights.
What type of protection does FortiAI offer for cloud and SaaS?
AI-driven SaaS and cloud monitoring
This protection is integrated into Fortinet Cloud Security.
What is the primary difference in network visibility between FortiAI and Darktrace?
FortiAI works with Fortinet Security Fabric while Darktrace works across multi-vendor environments
This highlights FortiAI’s integration focus versus Darktrace’s flexibility.