Module 2 Flashcards
Q: What is a LAN?
A: A LAN (Local Area Network) is a network of devices, such as computers, laptops, and servers, that are connected together in a limited geographical area, such as a home, office, or building.
Q: What is the purpose of a LAN?
A: The purpose of a LAN is to allow devices to share resources and communicate with one another, allowing for the sharing of files, printers, and internet access.
Q: What type of technology is used to connect devices in a LAN?
A: LANs typically use wired or wireless technology to connect devices.
Q: What are some examples of resources that can be shared on a LAN?
A: Examples of resources that can be shared on a LAN include files, printers, and internet access.
Q: What is the geographical area of a LAN?
A: A LAN is a network of devices that are connected together in a limited geographical area, such as a home, office, or building.
Q: What are Network Interface Cards (NICs)?
A: Network Interface Cards (NICs) are hardware components that allow devices to connect to the LAN and communicate with other devices on the network.
Q: What is the main function of a hub in a LAN?
A: A hub is a basic networking device that connects multiple devices together and broadcasts data to all connected devices in a LAN.
Q: How does a switch differ from a hub in a LAN?
A: A switch is a more advanced device that directs data to specific devices based on their addresses, whereas a hub broadcast data to all connected devices.
Q: What is the main function of a router in a LAN?
A: A router is used to connect the LAN to other networks, such as the internet.
Q: What are some examples of servers that can be used in a LAN?
A: Examples of servers that can be used in a LAN include file servers, print servers, and web servers.
Q: What are some examples of clients that can be used in a LAN?
A: Examples of clients that can be used in a LAN include desktop computers, laptops, and mobile devices.
Q: What type of software is used in a LAN?
A: LANs rely on software such as operating systems, device drivers, and network management tools to control and monitor the network.
Q: What is a perimeter network?
A: A perimeter network, also known as a DMZ (Demilitarized Zone), is a separate network segment that sits between the internal network and the external network (such as the internet), created to provide an extra layer of security.
Q: What is the main function of a firewall in a perimeter network?
A: The main function of a firewall in a perimeter network is to act as the boundary between the internal network and the perimeter network, blocking all incoming traffic to the internal network and only allowing traffic to the perimeter network.
Q: What are some examples of servers and services that should be placed in the perimeter network?
A: Examples of servers and services that should be placed in the perimeter network include web servers, email servers, and other public-facing services that need to be accessible from the internet.
Q: What is the purpose of access controls in a perimeter network?
A: The purpose of access controls in a perimeter network is to ensure that only authorized traffic is allowed to enter the perimeter network, and that traffic is logged and monitored for security breaches.
Q: What are some steps that should be taken to test and monitor a perimeter network?
A: To test and monitor a perimeter network, steps that should be taken include: testing the network to ensure that it is functioning properly, and monitoring the network for any security breaches or other issues.
Q: What is back-to-back configuration?
A: Back-to-back configuration refers to a type of network topology in which two routers are connected directly to each other, with no other devices or networks in between, typically used in situations where two separate networks need to be connected together.
Q: What is the main advantage of back-to-back configuration?
A: The main advantage of back-to-back configuration is that it is simple to set up and does not require any additional hardware or software.
Q: What is the main disadvantage of back-to-back configuration?
A: The main disadvantage of back-to-back configuration is that it can be less secure than other topologies, as there is no firewall or other security device to protect the networks from unauthorized access.
Q: In what kind of scenarios back-to-back configuration is used?
A: Back-to-back configuration is typically used in situations where two separate networks need to be connected together, such as when connecting a branch office to a main office, or connecting two different service providers.
Q: Is back-to-back configuration a long-term solution?
A: Back-to-back configuration is not a good idea to use as a long-term solution due to its lack of security, and a more robust security solution such as VPN is more commonly used.
Q: What is three-part configuration?
A: Three-part configuration refers to a type of network topology in which there are three main components: the internal network, the perimeter network and a firewall that separates the two, typically used as a security measure to protect internal networks from external threats.
Q: What is the main function of the internal network in a three-part configuration?
A: In a three-part configuration, the internal network is where sensitive data and internal resources are located.
Q: What is the main function of the perimeter network in a three-part configuration?
A: In a three-part configuration, the perimeter network is the DMZ, which contains servers and services that are available to external users, such as web servers and email servers.
Q: What is the main function of the firewall in a three-part configuration?
A: In a three-part configuration, the firewall is placed between the internal and perimeter networks to control the flow of traffic between them, and to protect the internal network from unauthorized access.
Q: What are the advantages of three-part configuration?
A: The main advantage of three-part configuration is that it provides a high level of security for the internal network, by separating the internal resources from the external network.
Q: What are the disadvantages of three-part configuration?
A: The main disadvantage of three-part configuration is that it can be complex to set up and maintain, and requires careful planning and ongoing monitoring to ensure that it remains secure.
Q: What is a wired LAN?
A: A wired LAN is a network of devices that are connected together using wired connections, such as Ethernet cables, that transmit data between devices using a variety of technologies, such as copper cables, fiber-optic cables, and coaxial cables.
Q: What are the advantages of using a wired LAN?
A: Advantages of using a wired LAN include high-speed data transfer, typically faster than wireless LANs, and more reliable and secure than wireless LANs.
Q: What is the most common topology used in wired LANs?
A: The most common topology used in wired LANs is the star topology, which connects devices to a central hub or switch, allowing for easy expansion and troubleshooting.
Q: What is the most common technology used for wired LANs?
A: Ethernet is the most common technology used for wired LANs, and it supports a variety of speeds, such as 10 Mbps, 100 Mbps, and 1 Gbps.
Q: What are some security measures that can be used in wired LANs?
A: Security measures that can be used in wired LANs include VLANs, Access Control Lists and Firewalls to prevent unauthorized access and protect the network from external threats.
Q: What are the disadvantages of wired LANs?
A: Disadvantages of wired LANs include that they can be more difficult and expensive to install, especially if running new cables is required.
Q: What is a wireless LAN?
A: A wireless LAN is a network of devices that are connected together using wireless connections, such as Wi-Fi, that use radio waves to transmit data between devices, allowing for greater flexibility and mobility compared to wired LANs.
Q: What are the advantages of using a wireless LAN?
A: Advantages of using a wireless LAN include easy and quick installation, as there are no cables to run, and can be easily expanded by adding additional access points.
Q: What is the most common topology used in wireless LANs?
A: The most common topology used in wireless LANs is the infrastructure topology, which connects devices to a central access point, allowing for easy expansion and troubleshooting.
Q: What is the most common technology used for wireless LANs?
A: Wi-Fi is the most common technology used for wireless LANs, and it supports a variety of standards, such as 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac.
Q: What are some security measures that can be used in wireless LANs?
A: Security measures that can be used in wireless LANs include encryption, authentication, and access control to prevent unauthorized access and protect the network from external threats.
Q: What are the disadvantages of wireless LANs?
A: Disadvantages of wireless LANs include that they are generally considered less stable and less secure than wired LANs and can be affected by interference from other electronic devices and physical obstacles, such as walls, that can reduce the range and speed of the wireless signal.
Q: What are the advantages of wired LANs?
A: Advantages of wired LANs include high-speed data transfer, reliability, and security.
Q: In what situations are wired LANs better suited?
A: Wired LANs are better suited for environments where high-speed data transfer and low latency are required, such as in data centers and server rooms, and in environments where security is a major concern, such as in financial institutions and government agencies.
Q: What are the advantages of wireless LANs?
A: Advantages of wireless LANs include flexibility, convenience, and mobility.
Q: In what situations are wireless LANs better suited?
A: Wireless LANs are better suited for environments where devices need to be mobile and easily connected and disconnected, such as in conference rooms and classrooms, and in environments where it is not practical or possible to run cables, such as in historic buildings or outdoor environments.