Module 2 Flashcards
Q: What is a LAN?
A: A LAN (Local Area Network) is a network of devices, such as computers, laptops, and servers, that are connected together in a limited geographical area, such as a home, office, or building.
Q: What is the purpose of a LAN?
A: The purpose of a LAN is to allow devices to share resources and communicate with one another, allowing for the sharing of files, printers, and internet access.
Q: What type of technology is used to connect devices in a LAN?
A: LANs typically use wired or wireless technology to connect devices.
Q: What are some examples of resources that can be shared on a LAN?
A: Examples of resources that can be shared on a LAN include files, printers, and internet access.
Q: What is the geographical area of a LAN?
A: A LAN is a network of devices that are connected together in a limited geographical area, such as a home, office, or building.
Q: What are Network Interface Cards (NICs)?
A: Network Interface Cards (NICs) are hardware components that allow devices to connect to the LAN and communicate with other devices on the network.
Q: What is the main function of a hub in a LAN?
A: A hub is a basic networking device that connects multiple devices together and broadcasts data to all connected devices in a LAN.
Q: How does a switch differ from a hub in a LAN?
A: A switch is a more advanced device that directs data to specific devices based on their addresses, whereas a hub broadcast data to all connected devices.
Q: What is the main function of a router in a LAN?
A: A router is used to connect the LAN to other networks, such as the internet.
Q: What are some examples of servers that can be used in a LAN?
A: Examples of servers that can be used in a LAN include file servers, print servers, and web servers.
Q: What are some examples of clients that can be used in a LAN?
A: Examples of clients that can be used in a LAN include desktop computers, laptops, and mobile devices.
Q: What type of software is used in a LAN?
A: LANs rely on software such as operating systems, device drivers, and network management tools to control and monitor the network.
Q: What is a perimeter network?
A: A perimeter network, also known as a DMZ (Demilitarized Zone), is a separate network segment that sits between the internal network and the external network (such as the internet), created to provide an extra layer of security.
Q: What is the main function of a firewall in a perimeter network?
A: The main function of a firewall in a perimeter network is to act as the boundary between the internal network and the perimeter network, blocking all incoming traffic to the internal network and only allowing traffic to the perimeter network.
Q: What are some examples of servers and services that should be placed in the perimeter network?
A: Examples of servers and services that should be placed in the perimeter network include web servers, email servers, and other public-facing services that need to be accessible from the internet.
Q: What is the purpose of access controls in a perimeter network?
A: The purpose of access controls in a perimeter network is to ensure that only authorized traffic is allowed to enter the perimeter network, and that traffic is logged and monitored for security breaches.
Q: What are some steps that should be taken to test and monitor a perimeter network?
A: To test and monitor a perimeter network, steps that should be taken include: testing the network to ensure that it is functioning properly, and monitoring the network for any security breaches or other issues.
Q: What is back-to-back configuration?
A: Back-to-back configuration refers to a type of network topology in which two routers are connected directly to each other, with no other devices or networks in between, typically used in situations where two separate networks need to be connected together.
Q: What is the main advantage of back-to-back configuration?
A: The main advantage of back-to-back configuration is that it is simple to set up and does not require any additional hardware or software.
Q: What is the main disadvantage of back-to-back configuration?
A: The main disadvantage of back-to-back configuration is that it can be less secure than other topologies, as there is no firewall or other security device to protect the networks from unauthorized access.
Q: In what kind of scenarios back-to-back configuration is used?
A: Back-to-back configuration is typically used in situations where two separate networks need to be connected together, such as when connecting a branch office to a main office, or connecting two different service providers.
Q: Is back-to-back configuration a long-term solution?
A: Back-to-back configuration is not a good idea to use as a long-term solution due to its lack of security, and a more robust security solution such as VPN is more commonly used.
Q: What is three-part configuration?
A: Three-part configuration refers to a type of network topology in which there are three main components: the internal network, the perimeter network and a firewall that separates the two, typically used as a security measure to protect internal networks from external threats.
Q: What is the main function of the internal network in a three-part configuration?
A: In a three-part configuration, the internal network is where sensitive data and internal resources are located.