Network Foundations-Week 1 Flashcards

1
Q

What is one advantage of the TCP/IP model over the OSI model?

A

Provides a standardized reference model for network communication, allows for interoperability among different vendors’ networking equipment and protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following best describes the Transport layer in the OSI model?

A

Manages end-to-end communication between applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the DHCP protocol used for in computer networking?

A

DHCP (Dynamic Host Configuration Protocol) is used to automatically assign IP addresses to devices on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a network topology?

A

A network topology describes the structure of a network and represents all the connections between all components in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Logical port for HTTP

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Logical port for HTTPS

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Logical port for SSH

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Logical port for SMB

A

445

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the advantages of wireless networks?

A

Easy mobility, reduced cabling costs, and flexibility in device placement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the differences between straight-through and crossover Ethernet cable configurations?

A

A straight-through Ethernet cable is used to connect devices of different types, such as a computer to a switch or a router to a modem, while a crossover Ethernet cable is used to connect devices of the same type, such as a computer to a computer or a switch to a switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the risks and vulnerabilities of wireless network security?

A

Unauthorized access, data interception, and network intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three main logical port groups?

A

Well-known ports, Registered ports, and Dynamic/Private ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are logical ports?

A

Virtual ports that are created by network devices to establish a connection between two physical devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In a 3-tier architecture, the core layer handles routing and switching functions, while the distribution layer handles access control and security functions, and the access layer handles end device connectivity. In a collapsed architecture, all these functions are combined into a single layer. TRUE OR FALSE?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which intermediary device enables devices located in different networks to communicate with each other?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TRUE OR FALSE?

The TCP protocol is an unreliable transport protocol that does not guarantee delivery of data, does not perform flow control or error checking, is suitable for applications that prioritize speed and efficiency such as real-time streaming and online gaming. On the other hand, the UDP protocol is a reliable transport protocol that guarantees delivery of data, establishes a connection-oriented communication, performs flow control and error checking, and is suitable for applications that require accurate data delivery such as web browsing and file transfer.

A

FALSE

17
Q

What is a broadcast domain in networking?

A

A broadcast domain is a network area where broadcast messages are forwarded to all connected devices.

18
Q

Which network spans across a large geographic area and is managed by multiple service providers?

A

WAN

19
Q

TRUE OR FALSE? Each layer of the OSI model plays a crucial role in the network communication process and is important for enabling communication between devices.

A

TRUE

20
Q

Which devices are most commonly used in layer 1 (the physical layer)?

A

Hubs and Repeaters

21
Q

TRUE OR FALSE? The layered approach of the OSI model facilitates understanding and troubleshooting of network communication issues by allowing identification of the devices used at each layer, which aids in diagnosing problems and implementing solutions.

A

TRUE

22
Q

What is the operation or function of layer 3 (the network layer)?

A

Responsible for the organization of data into packets with an IP source and destination for routing.

23
Q

Which protocol is used to transfer text-based data, such as web pages, over the internet in a secure manner?

A

HTTPS

24
Q

What is the difference between half duplex and full duplex communication in networking?

A

Half duplex communication restricts data transmission to one direction at a time, while full duplex communication allows data to be transmitted in both directions simultaneously.

25
Q
A
26
Q

Which protocol is used to transfer text-based data, such as web pages, over the internet in a secure manner?

A

HTTPS