Network Review Flashcards

1
Q

Differentiate the LAN and WAN

A

LAN (Local Area Network) and WAN (Wide Area Network) are two types of computer networks that differ in terms of geographical coverage and scale. Here’s a comparison between the two:

Geographical Coverage:

LAN: A LAN covers a small geographical area such as a home, office building, or campus. It is typically confined to a single building or a group of nearby buildings.

WAN: A WAN covers a large geographical area, often spanning cities, countries, or even continents. It connects multiple LANs and remote locations over long distances.
Size and Scale:

LAN: LANs are smaller in scale and designed to serve a limited number of users within a specific area. They provide high-speed and low-latency connections.

WAN: WANs are larger in scale and can accommodate a significantly larger number of users and devices spread across extensive distances. They often operate at lower speeds and may have higher latency due to the long-distance connections.

Ownership and Control:

LAN: LANs are privately owned and controlled by a single organization or entity. The organization has full control over the network infrastructure, security measures, and configurations.

WAN: WANs are typically composed of multiple interconnected networks, and their ownership and control may be distributed among different organizations or service providers. Collaboration and agreements between organizations are necessary to establish and maintain a WAN.

Transmission Media:

LAN: LANs commonly utilize wired technologies like Ethernet cables (e.g., Cat5e, Cat6) or wireless technologies like Wi-Fi within a confined area.
WAN: WANs employ a variety of transmission media, including dedicated leased lines, optical fibers, satellite links, and public internet connections, to connect geographically dispersed locations.

Speed and Performance:

LAN: LANs offer high data transfer speeds, typically ranging from 10 Mbps to 10 Gbps, allowing for fast communication and file sharing between devices within the network.

WAN: WANs often have lower data transfer speeds compared to LANs, and their performance can vary depending on factors like distance, network congestion, and the quality of the underlying infrastructure.

Cost:

LAN: Setting up and maintaining a LAN is generally less expensive compared to establishing a WAN since LANs cover a smaller area and require fewer networking resources.

WAN: Building and operating a WAN involves higher costs due to the need for additional networking equipment, long-distance connections, and potentially paying for leased lines or WAN service providers.

In summary, LANs are smaller, localized networks serving a limited area, while WANs cover larger areas, connect multiple LANs, and span long distances. LANs provide faster and more controlled connectivity, while WANs offer broader reach but may have slower speeds and higher costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the network topologies?

A

Bus, Star, Ring, Mesh, Tree, Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

On this network topology, all devices are connected to a single communication medium, typically a coaxial cable or a backbone cable.
Each device is linked to the cable through a connector, and the data transmitted by any device is received by all other devices.

A

Bus Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

On this network topology, all devices are connected to a central hub or switch. Each device has a dedicated connection to the central hub, enabling point-to-point communication between devices.

A

Star Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What network topology is this: devices are connected in a circular manner, forming a closed loop. Each device is connected to its neighboring devices, and data travels in one direction around the ring.

A

Ring Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

On this Network Topology, every device is connected to every other device in the network, creating multiple redundant paths.

A

Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This Network Topology is a combination of bus and star topologies. It consists of multiple star topologies connected to a central bus backbone.
It divides the network into multiple levels or layers, with each layer having its own central hub or switch.

A

Tree Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This Network Topology combines two or more different network topologies to meet specific requirements. For example, a network may incorporate a combination of star, ring, and mesh topologies to achieve redundancy, scalability, and efficient data transmission.

A

Hybrid Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is a reliable and connection-oriented protocol that operates at the transport layer of the TCP/IP protocol suite.

A

TCP (Transmission Control Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Its primary role is to provide reliable, ordered, and error-checked delivery of data packets between devices.

A

TCP (Transmission Control Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It establishes and maintains a connection between two devices, handles data segmentation, flow control, and retransmission of lost packets.

A

TCP (Transmission Control Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is a network layer protocol on TCP/IP model that enables the identification and addressing of devices on a network.

A

internet protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Its role is to facilitate the routing of data packets across different networks, using unique IP addresses assigned to each device.

A

internet protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It provides a best-effort delivery service, meaning it does not guarantee packet delivery or provide error-checking and retransmission.

A

internet protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is an application-layer protocol used for communication between web browsers and web servers.

A

Hypertext Transfer Protocol (HTTP):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Its role is to facilitate the retrieval and delivery of web resources, such as HTML documents, images, and other media.

A

Hypertext Transfer Protocol (HTTP):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It defines how clients send requests to servers and how servers respond with the requested resources.

A

Hypertext Transfer Protocol (HTTP):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It is an application-layer protocol used for sending and receiving email messages between mail servers.

A

Simple Mail Transfer Protocol (SMTP):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Its role is to handle the transmission, delivery, and routing of email messages over the Internet.

A

Simple Mail Transfer Protocol (SMTP):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

It defines the rules for establishing a reliable connection between mail servers and the format for composing and transmitting email messages.

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

It is an application-layer protocol used for translating human-readable domain names (e.g., www.example.com) into IP addresses.

A

Domain Name System (DNS):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Its role is to provide a distributed and hierarchical naming system that allows devices to locate and communicate with resources on the internet.

A

Domain Name System (DNS):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

translates domain names into IP addresses through a network of _____ servers and supports various record types, including A, CNAME, MX, and more.

A

Domain Name System (DNS):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

is a network management protocol used for dynamically assigning IP addresses and configuring network parameters to devices on a network.

A

Dynamic Host Configuration Protocol (DHCP):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Its role is to automate the process of IP address assignment, subnet mask configuration, gateway configuration, and other network settings.

A

Dynamic Host Configuration Protocol (DHCP):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

_______ servers manage a pool of available IP addresses and lease them to devices on the network, ensuring efficient address allocation.

A

Dynamic Host Configuration Protocol (DHCP):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the layers of OSI Model?

A

Physical, Data Link, Network, Transport, Session, Presentation and Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

This layer on OSI Model is the transmission of raw unstructured bits over a communication channel. It defines the electrical, mechanical, and procedural aspects of physical connections, such as cables, connectors, and signaling.

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

This model is a conceptual framework that standardizes the functions of a communication system into seven distinct layers. Each layer has a specific role and interacts with the layers above and below it

A

The OSI (Open Systems Interconnection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

This layer on OSI provides error-free, reliable transmission of data frames between two directly connected nodes over a physical medium. It handles framing, error detection, and correction, flow control, and manages access to the physical medium.

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

This OSI Layer is responsible for logical addressing, routing, and forwarding of packets across different networks. It determines the best path for data packets to reach their destination and handles the fragmentation and reassembly of packets if necessary.

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

This layer on the OSI ensures reliable end-to-end data delivery between hosts and provides mechanisms for error recovery, flow control, and segmentation/reassembly of data.
It establishes connections, manages data transmission, and ensures the integrity and sequencing of data.

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

This layer establishes, manages, and terminates communication sessions between applications running on different devices. It provides services for session establishment, synchronization, checkpointing, and recovery in case of failures.

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

It is responsible for data representation, encryption, compression, and protocol conversion. It ensures that data from the application layer of one system can be understood by the application layer of another system.

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

It provides services directly to end-users or applications. It enables user interactions with network services, such as file transfer, email, web browsing, and other network-based applications.

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are the layers of TCP/IP Model?

A

Network Interface/Access, Internet, Transport, and Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

It is a conceptual framework that is widely used for the implementation of network protocols and communication in the Internet. It consists of four layers, which are sometimes mapped to the seven layers of the OSI model.

A

The TCP/IP (Transmission Control Protocol/Internet Protocol) model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

It is equivalent to the combination of the Physical Layer and Data Link Layer in the OSI model. It handles the physical transmission of data packets over the network media and provides protocols for accessing the physical network.

A

Network Interface Layer (or Network Access Layer):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

This layer on the TCP/IP is responsible for addressing, routing, and packet forwarding between different networks.

A

Internet Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

It is a layer that provides reliable end-to-end data delivery and error-checking mechanisms between applications running on different hosts.
The two main protocols in this layer are TCP and UDP.

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

combines the Session Layer, Presentation Layer, and Application Layer in the OSI model.
It directly interacts with end-user applications and provides various services for network-based applications.

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which is more commonly used TCP/IP Model or OSI layer model?

A

It’s worth noting that the TCP/IP model is more commonly used in practical network implementations, especially in the context of the Internet. However, both the TCP/IP and OSI models serve as useful reference frameworks for understanding network communication protocols and their functionalities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

It is a widely used protocol for identifying and addressing devices on a network.

A

IPv4 (Internet Protocol version 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

are 32-bit numbers expressed in dotted-decimal notation, consisting of four octets (8 bits each) separated by periods.

A

IPv4 (Internet Protocol version 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Each octet on this can range from 0 to 255, representing a decimal value in the range of 00000000 to 11111111 in binary.

A

IPv4 (Internet Protocol version 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

It represents the decimal value of each octet. For example, 192.168.0.1 is a valid IPv4 address.

A

“xxx” on xxx.xxx.xxx.xxx, (On IP)

For example 192.168.0.1 (The 192 is the first octet, the second is 168, then third is 0 and fourth is 1. Those are the decimal representation. But the general value of octet is represented by 8 binary digits or bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

IPv4 addresses are divided into two parts which are?

A

Network portion and Host portion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

The division between the two parts of IPv4 is determined by what?

A

by the subnet mask associated with the address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

It identifies how many bits are allocated to the network portion and the remaining bits for the host portion.

A

The subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Why network classes were introduced?

A

To allocate IP addresses based on the size of the network. The network classes were denoted as A, B, and C:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

One byte is equivalent to?

A

eight bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

This class addresses have their first bit set to 0, indicating that the network portion occupies the most significant bit.

A

Class A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

The range of this class addresses is from 1.0.0.0 to 126.0.0.0.

A

Class A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

On this class, the first octet represents the network portion, while the last three octets represent the host portion.

A

Class A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

This class can support a large number of hosts per network.

A

Class A Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

This class have their first two bits set to 10, indicating that the first two octets represent the network portion

A

Class B Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

The range of this class addresses is from 128.0.0.0 to 191.255.0.0.

A

Class B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

On this class, the first two octets represent the network portion, while the last two octets represent the host portion.

A

Class B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

This class can support a moderate number of hosts per network.

A

Class B addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

This class have their first three bits set to 110, indicating that the first three octets represent the network portion.

A

Class C addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

The range of this class addresses is from 192.0.0.0 to 223.255.255.0.

A

Class C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

On this Class, the first three octets represent the network portion, while the last octet represents the host portion.

A

Class C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

This class addresses can support a small number of hosts per network.

A

Class C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

These addresses reserved for multicast and experimental purposes, respectively.

A

Class D and Class E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

The concept of network classes has been largely replaced by?

A

subnetting techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

It is represented in the same format as an IP address, using dotted-decimal notation (e.g., 255.255.255.0).

A

Subnet Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

It is a 32-bit value used to divide an IP address into the network portion and the host portion.

A

Subnet Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

It consists of consecutive 1s in the leftmost bits, followed by consecutive 0s in the rightmost bits.

A

Subnet Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

On this, the 1s indicate the network portion, while the 0s represent the host portion of the IP address.

A

Subnet Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

How to do the subnet calculations?

A

Determine the number of subnets and hosts required and calculating the subnet mask and network addresses. You need to decide on the number of subnets needed and the number of hosts required per subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

The formula for calculating the number of hosts per subnet is?

A

2^h-2, where h is the number of host bits (subtracting 2 accounts for the network and broadcast addresses).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

CIDR Stands for?

A

(Classless Inter-Domain Routing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

It is a compact representation of IP addresses and their associated subnet masks.

A

CIDR notation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

It replaces the traditional subnet mask with a forward slash (“/”) followed by the number of network bits in the subnet mask.

A

CIDR notation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

allows for a more flexible and efficient allocation of IP addresses, as it does not rely on the predefined network classes (A, B, C) but can accommodate networks of any size.

A

CIDR notation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

is commonly used in networking to optimize IP address allocation, improve network security, and facilitate efficient routing.

A

Subnetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

It enables the creation of smaller, manageable subnets within a larger network, providing better control and organization of IP address assignments.

A

Subnetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

is assigned to a device by the Internet Service Provider (ISP) and is globally unique on the internet.

A

Public IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

It serves as the address that allows devices to communicate with other devices over the internet.

A

Public IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Are routable on the internet and can be accessed from anywhere in the world.

A

Public IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Organizations typically obtain this addresses from their ISPs to connect their network to the internet and host public-facing services.

A

Public IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

This address is used on home or office network, to identify devices within that network.

A

Private IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

are not globally unique and cannot be routed over the internet directly.

A

Private IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

They are reserved and defined by specific address ranges specified by the Internet Assigned Numbers Authority (IANA).

A

Private IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

What is the private IP address range of Class A on IPv4 ?

A

Class A: 10.0.0.0 to 10.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What is the private IP address range of Class B on IPv4 ?

A

Class B: 172.16.0.0 to 172.31.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What is the private IP address range of Class C on IPv4 ?

A

Class C: 192.168.0.0 to 192.168.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

What is the private IP address on IPv6 ?

A

IPv6: fc00::/7 (Unique Local Addresses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

is a technique used to map multiple private IP addresses to a single public IP address.

A

Network Address Translation (NAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

allows devices within a private network to communicate with the internet using a shared public IP address.

A

NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

When a device from the private network initiates an outbound connection, __________ translates the private IP address to the public IP address.

A

NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

maintains a translation table to track the correspondence between private IP addresses and their corresponding public IP addresses and ports.

A

NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

provides a level of security by hiding the internal IP addresses from external networks, acting as a firewall to some extent.

A

NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

The use of private IP addresses and NAT enables organizations and households what?

A

create their own private networks and share a limited number of public IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

It also allows for easier management and scalability within private networks without requiring unique public IP addresses for each device.

A

The use of private IP addresses and NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

refer to situations where devices or networks are unable to establish a connection or communicate with each other.

A

Connectivity issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What are the common causes of connectivity issues?

A

Faulty cables or connectors, misconfigured network settings, firewall or antivirus software blocking the connection, or network equipment failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

What are the troubleshooting steps for Connectivity issues?

A
  • Check physical connections: Ensure cables are properly plugged in and not damaged.
  • Verify IP configuration: Ensure devices have correct IP addresses, subnet masks, and gateway settings.
  • Check network settings: Ensure devices are on the same network and have proper DNS settings.
  • Restart devices and networking equipment: Power cycling devices and equipment often resolves connectivity issues.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

refers to situations where network speeds are significantly lower than expected, causing delays in data transfer and application responsiveness.

A

Slow network performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

What are the common cause of slow network performance?

A

Network congestion, bandwidth limitations, outdated hardware, misconfigured network settings, or malware/viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

What are the troubleshooting steps on slow network performance?

A
  • Check bandwidth usage: Identify if any specific device or application is consuming excessive bandwidth.
  • Update network equipment: Ensure routers, switches, and network cards have the latest firmware/drivers.
  • Perform speed tests: Use online tools to measure network speeds and compare against expected values.
  • Optimize network settings: Adjust Quality of Service (QoS) settings, prioritize critical applications, or limit bandwidth for non-essential tasks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

occur when multiple devices on a network are assigned the same IP address, leading to communication problems and network disruptions.

A

IP Conflicts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

What are the common causes of IP Conflicts?

A

Common causes include manually assigning duplicate IP addresses, DHCP server configuration issues, or rogue devices conflicting with DHCP-assigned addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

What are the troubleshooting steps on IP Conflicts?

A
  • Check IP addresses: Verify that no devices have conflicting IP addresses within the same network.
  • Release and renew IP addresses: Use the “ipconfig” command (Windows) or “ifconfig” command (Linux) to release and renew IP addresses.
  • Restart DHCP server: Power cycle the DHCP server or verify its configuration settings.
  • Use static IP addressing: Manually assign unique IP addresses to devices to avoid conflicts.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

is a basic network troubleshooting tool used to test connectivity between two devices.

A

Ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

It sends a small packet of data (ICMP Echo Request) to a target IP address and waits for an ICMP Echo Reply.

A

Ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

How to use Ping tool

A

To use ping, open the command prompt (Windows) or terminal (Linux/Mac) and type “ping <IP>".</IP>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

This tool will display round-trip time (RTT) information and indicate whether the target device is reachable.

A

Ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

If the Ping fails, what are the possible other issues?

A

If the ping fails, it could indicate a connectivity issue, such as a misconfigured network, firewall blocking ICMP, or a device being offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

is used to trace the route that packets take from your device to a target device or IP address.

A

Tracert (Windows) / traceroute (Linux/Mac)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

It helps identify network hops, latency, and potential points of failure along the path.

A

Tracert (Windows) / traceroute (Linux/Mac)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

How to use Tracert (Windows) / traceroute (Linux/Mac)?

A

To use tracert (traceroute), open the command prompt or terminal and type “tracert <IP>" (Windows) or "traceroute <IP>" (Linux/Mac).</IP></IP>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

This tool will display a list of intermediate routers and their IP addresses, along with round-trip times (RTTs) for each hop.

A

By analyzing the tracert (traceroute) output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

you can identify any network issues, such as high latency or packet loss at specific hops by analyzing what?

A

By analyzing the tracert (traceroute) output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

is used to view and manage IP configuration details of your network interfaces.

A

ipconfig (Windows) / ifconfig (Linux/Mac)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

It provides information about IP addresses, subnet masks, default gateways, DNS servers, and more.

A

ipconfig (Windows) / ifconfig (Linux/Mac)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

This tool will display the IP configuration details for all network interfaces on your device.

A

ipconfig (Windows) / ifconfig (Linux/Mac)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

How to use ipconfig (Windows) / ifconfig (Linux/Mac)?

A

To use ipconfig (ifconfig), open the command prompt or terminal and type “ipconfig” (Windows) or “ifconfig” (Linux/Mac).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

By examining this, you can verify if the correct IP address, subnet mask, and gateway are assigned to your device.

A

By examining the IP configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

is a command-line tool used to query DNS (Domain Name System) servers and resolve domain names to IP addresses.

A

nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

It helps troubleshoot DNS-related issues, such as incorrect DNS settings or DNS resolution problems.

A

nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

How to use nslookup?

A

To use nslookup, open the command prompt or terminal and type “nslookup <domain>".</domain>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

This tool will display the corresponding IP address(es) associated with the domain name or vice versa.

A

nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

By using this, you can verify if DNS resolution is working correctly and identify any DNS-related issues.

A

nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Why we need to understand the network troubleshooting tools?

A

These network troubleshooting tools provide valuable information for diagnosing and resolving network problems. They help identify connectivity issues, latency, misconfigurations, and DNS-related problems. By using these tools and analyzing their output, you can gain insights into network behavior and take appropriate steps to resolve the issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Give me the 1st importance of analyzing network logs and error messages to identify the root cause of issues.

A

Troubleshooting and Diagnosing:

Network logs and error messages provide valuable information about network events, errors, and anomalies.
They offer insights into the sequence of events leading up to a problem, which helps in identifying the source of the issue.
By examining log entries and error messages, network administrators can gain a better understanding of the problem and its potential causes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Give me the 2nd importance of analyzing network logs and error messages to identify the root cause of issues.

A

Identifying Patterns and Trends:

Network logs capture a wide range of information, including device status, network traffic, errors, and performance metrics.
Analyzing logs over time allows for the identification of patterns and trends in network behavior.
By detecting recurring issues or irregularities, network administrators can pinpoint underlying problems or potential sources of network disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Give me the 3rd importance of analyzing network logs and error messages to identify the root cause of issues.

A

Incident Response and Resolution:

When a network issue occurs, logs and error messages play a crucial role in incident response.
They provide a detailed timeline of events leading up to the problem, enabling faster identification of the root cause.
Examining error messages can guide administrators in taking appropriate actions to resolve the issue effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Give me the 4th importance of analyzing network logs and error messages to identify the root cause of issues.

A

Performance Optimization:

Network logs and error messages can shed light on performance bottlenecks, network congestion, or resource limitations.
By analyzing performance-related logs, administrators can identify areas for optimization and fine-tuning.
This analysis helps improve network efficiency, minimize downtime, and enhance overall network performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Give me the 5th importance of analyzing network logs and error messages to identify the root cause of issues.

A

Security Analysis:

Logs can serve as valuable resources for security analysis and threat detection.
They capture information about network traffic, access attempts, authentication failures, and system vulnerabilities.
Analyzing logs can help identify potential security breaches, unauthorized access attempts, or anomalous behavior indicative of a cyberattack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

In general, why network logs are important?

A

In summary, network logs and error messages provide critical information for troubleshooting, diagnosing, and resolving network issues. They enable network administrators to identify patterns, detect anomalies, respond to incidents, optimize performance, and enhance network security. Analyzing these logs is an essential practice for maintaining a healthy and reliable network infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

What Network Topology has this Advantage and Disadvantages:

Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.

Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.

A

Bus Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

What Network Topology has these Advantage and Disadvantages:

Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.

Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.

A

Bus Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

What Network Topology has these Advantage and Disadvantages:

Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.

Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.

A

Star Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

What Network Topology has these Advantage and Disadvantages:

Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.

Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.

A

Bus Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.

Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.

A

Ring Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.

Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.

A

Star Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

What are the two types of Mesh Topology?

A

Full-Mesh and Partial Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

On this type of Mesh Topology, each device has a direct link to every other device

A

Full-Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.

A

Partial Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.

Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.

A

Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.

Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.

A

Tree Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

What Network Topology has these Advantage and Disadvantages:

Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.

Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.

A

Bus Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.

Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.

A

Star Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.

Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.

A

Ring Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

On this type of Mesh Topology, each device has a direct link to every other device

A

Full-Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

What are the two types of Mesh Topology?

A

Full-Mesh and Partial Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.

A

Partial Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.

Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.

A

Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.

Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.

A

Tree Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

What Network Topology has these Advantage and Disadvantages:

Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.

Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.

A

Bus Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.

Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.

A

Star Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.

Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.

A

Ring Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

What are the two types of Mesh Topology?

A

Full-Mesh and Partial Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

On this type of Mesh Topology, each device has a direct link to every other device

A

Full-Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.

A

Partial Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.

Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.

A

Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.

Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.

A

Tree Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Allows for customization and flexibility to meet specific network needs.

Disadvantages: Can be complex to design and implement, and may require additional resources and expertise.

A

Hybrid Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

What Network Topology has these Advantage and Disadvantages:

Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.

Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.

A

Bus Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.

Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.

A

Ring Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.

Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.

A

Star Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

What are the two types of Mesh Topology?

A

Full-Mesh and Partial Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

On this type of Mesh Topology, each device has a direct link to every other device

A

Full-Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.

A

Partial Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.

Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.

A

Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.

Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.

A

Tree Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Allows for customization and flexibility to meet specific network needs.

Disadvantages: Can be complex to design and implement, and may require additional resources and expertise.

A

Hybrid Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

What part of OSI layer will these be?

Examples: Ethernet cables, fiber optics, voltage levels, modulation techniques.

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

What part of OSI layer will these be?

Examples: Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11), Point-to-Point Protocol (PPP).

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

What Network Topology has these Advantage and Disadvantages:

Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.

Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.

A

Bus Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.

Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.

A

Star Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.

Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.

A

Ring Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

What are the two types of Mesh Topology?

A

Full-Mesh and Partial Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

On this type of Mesh Topology, each device has a direct link to every other device

A

Full-Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.

A

Partial Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.

Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.

A

Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Allows for customization and flexibility to meet specific network needs.

Disadvantages: Can be complex to design and implement, and may require additional resources and expertise.

A

Hybrid Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

What part of OSI layer will these be?

Examples: Ethernet cables, fiber optics, voltage levels, modulation techniques.

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

What part of OSI layer will these be?

Examples: Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11), Point-to-Point Protocol (PPP).

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.

Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.

A

Tree Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

What Network Topology has these Advantage and Disadvantages:

Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.

Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.

A

Bus Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.

Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.

A

Ring Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

This principle on information security focuses on keeping sensitive information protected and accessible only to authorized individuals or entities. Measures such as access controls, encryption, and secure communication channels are employed.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

What are the two types of Mesh Topology?

A

Full-Mesh and Partial Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.

Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.

A

Star Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

On this type of Mesh Topology, each device has a direct link to every other device

A

Full-Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Allows for customization and flexibility to meet specific network needs.

Disadvantages: Can be complex to design and implement, and may require additional resources and expertise.

A

Hybrid Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.

Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.

A

Mesh Topology

176
Q

On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.

A

Partial Mesh Topology

176
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.

Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.

A

Tree Topology

177
Q

What part of OSI layer will these be?

Examples: Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11), Point-to-Point Protocol (PPP).

A

Data Link Layer

177
Q

What part of OSI layer will these be?

Examples: Ethernet cables, fiber optics, voltage levels, modulation techniques.

A

Physical Layer

178
Q

What part of OSI layer will these be?

Examples: Encryption/Decryption, Compression, ASCII, JPEG, MPEG.

A

Presentation Layer

178
Q

What part of OSI layer will these be?

Examples: Transmission Control Protocol (TCP), User Datagram Protocol (UDP).

A

Transport Layer

178
Q

What part of OSI layer will these be?

Examples: Internet Protocol (IP), Internet Control Message Protocol (ICMP), Routing protocols (e.g., OSPF, BGP).

A

Network Layer

178
Q

What part of OSI layer will these be?

Examples: HTTP, FTP, SMTP, DNS, Telnet.

A

Application Layer

178
Q

What part of OSI layer will these be?

Examples: Remote Procedure Call (RPC), Session Control Protocol (SCP).

A

Session Layer

179
Q

What Network Topology has these Advantage and Disadvantages:

Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.

Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.

A

Bus Topology

180
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.

Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.

A

Star Topology

181
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.

Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.

A

Ring Topology

182
Q

What are the two types of Mesh Topology?

A

Full-Mesh and Partial Mesh

183
Q

On this type of Mesh Topology, each device has a direct link to every other device

A

Full-Mesh Topology

184
Q

On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.

A

Partial Mesh Topology

185
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.

Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.

A

Mesh Topology

186
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.

Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.

A

Tree Topology

187
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Allows for customization and flexibility to meet specific network needs.

Disadvantages: Can be complex to design and implement, and may require additional resources and expertise.

A

Hybrid Topology

188
Q

What part of OSI layer will these be?

Examples: Ethernet cables, fiber optics, voltage levels, modulation techniques.

A

Physical Layer

189
Q

What part of OSI layer will these be?

Examples: Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11), Point-to-Point Protocol (PPP).

A

Data Link Layer

190
Q

What part of OSI layer will these be?

Examples: Transmission Control Protocol (TCP), User Datagram Protocol (UDP).

A

Transport Layer

191
Q

What part of OSI layer will these be?

Examples: Remote Procedure Call (RPC), Session Control Protocol (SCP).

A

Session Layer

192
Q

What part of OSI layer will these be?

Examples: Encryption/Decryption, Compression, ASCII, JPEG, MPEG.

A

Presentation Layer

193
Q

What part of OSI layer will these be?

Examples: HTTP, FTP, SMTP, DNS, Telnet.

A

Application Layer

194
Q

What part of OSI layer will these be?

Examples: Internet Protocol (IP), Internet Control Message Protocol (ICMP), Routing protocols (e.g., OSPF, BGP).

A

Network Layer

195
Q

On IPv4, which is host portion and network portion?

A

In an IPv4 address, the network portion and the host portion together make up the address structure used for routing and identifying devices on a network.

The division between the network portion and the host portion is determined by the subnet mask associated with the IP address. The subnet mask defines the number of network bits and host bits in the address.

Typically, the subnet mask consists of a series of binary 1s followed by binary 0s. The network portion of the IP address is represented by the bits that correspond to the 1s in the subnet mask, while the host portion corresponds to the bits that correspond to the 0s.

For example, let’s consider an IP address 192.168.0.1 with a subnet mask of 255.255.255.0. In this case, the first three octets (192.168.0) represent the network portion, and the last octet (1) represents the host portion.

The network portion identifies the specific network that the device belongs to, while the host portion identifies the specific device within that network.

It’s worth noting that the division between the network and host portions can vary depending on the subnet mask used. The subnet mask can be adjusted to create smaller or larger network segments by varying the number of network bits and host bits.

196
Q

What Network Topology has these Advantage and Disadvantages:

Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.

Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.

A

Bus Topology

197
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.

Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.

A

Star Topology

198
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.

Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.

A

Ring Topology

199
Q

What are the two types of Mesh Topology?

A

Full-Mesh and Partial Mesh

200
Q

On this type of Mesh Topology, each device has a direct link to every other device

A

Full-Mesh Topology

201
Q

On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.

A

Partial Mesh Topology

202
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.

Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.

A

Mesh Topology

203
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.

Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.

A

Tree Topology

204
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Allows for customization and flexibility to meet specific network needs.

Disadvantages: Can be complex to design and implement, and may require additional resources and expertise.

A

Hybrid Topology

205
Q

What part of OSI layer will these be?

Examples: Ethernet cables, fiber optics, voltage levels, modulation techniques.

A

Physical Layer

206
Q

What part of OSI layer will these be?

Examples: Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11), Point-to-Point Protocol (PPP).

A

Data Link Layer

207
Q

What part of OSI layer will these be?

Examples: Internet Protocol (IP), Internet Control Message Protocol (ICMP), Routing protocols (e.g., OSPF, BGP).

A

Network Layer

208
Q

What part of OSI layer will these be?

Examples: Transmission Control Protocol (TCP), User Datagram Protocol (UDP).

A

Transport Layer

209
Q

What part of OSI layer will these be?

Examples: Remote Procedure Call (RPC), Session Control Protocol (SCP).

A

Session Layer

210
Q

What part of OSI layer will these be?

Examples: Encryption/Decryption, Compression, ASCII, JPEG, MPEG.

A

Presentation Layer

211
Q

What part of OSI layer will these be?

Examples: HTTP, FTP, SMTP, DNS, Telnet.

A

Application Layer

212
Q

What layer will these be on TCP/IP Model:

Examples: Internet Protocol (IPv4 and IPv6), Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP).

A

Internet Layer

213
Q

What layer will these be on TCP/IP Model:

Examples: Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Domain Name System (DNS), Telnet.

A

Transport Layer

214
Q

The protocols and services in TCP/IP Model layer enable functions such as file transfer, email, web browsing, remote login, and domain name resolution.

A

Application Layer

215
Q

On IPv4, which is host portion and network portion?

A

In an IPv4 address, the network portion and the host portion together make up the address structure used for routing and identifying devices on a network.

The division between the network portion and the host portion is determined by the subnet mask associated with the IP address. The subnet mask defines the number of network bits and host bits in the address.

Typically, the subnet mask consists of a series of binary 1s followed by binary 0s. The network portion of the IP address is represented by the bits that correspond to the 1s in the subnet mask, while the host portion corresponds to the bits that correspond to the 0s.

For example, let’s consider an IP address 192.168.0.1 with a subnet mask of 255.255.255.0. In this case, the first three octets (192.168.0) represent the network portion, and the last octet (1) represents the host portion.

The network portion identifies the specific network that the device belongs to, while the host portion identifies the specific device within that network.

It’s worth noting that the division between the network and host portions can vary depending on the subnet mask used. The subnet mask can be adjusted to create smaller or larger network segments by varying the number of network bits and host bits.

216
Q

What Network Topology has these Advantage and Disadvantages:

Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.

Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.

A

Bus Topology

217
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.

Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.

A

Star Topology

217
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.

Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.

A

Ring Topology

217
Q

What are the two types of Mesh Topology?

A

Full-Mesh and Partial Mesh

217
Q

On this type of Mesh Topology, each device has a direct link to every other device

A

Full-Mesh Topology

218
Q

On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.

A

Partial Mesh Topology

219
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.

Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.

A

Mesh Topology

219
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.

Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.

A

Tree Topology

219
Q

What part of OSI layer will these be?

Examples: Ethernet cables, fiber optics, voltage levels, modulation techniques.

A

Physical Layer

219
Q

What part of OSI layer will these be?

Examples: Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11), Point-to-Point Protocol (PPP).

A

Data Link Layer

219
Q

What part of OSI layer will these be?

Examples: Internet Protocol (IP), Internet Control Message Protocol (ICMP), Routing protocols (e.g., OSPF, BGP).

A

Network Layer

219
Q

What part of OSI layer will these be?

Examples: Transmission Control Protocol (TCP), User Datagram Protocol (UDP).

A

Transport Layer

220
Q

What part of OSI layer will these be?

Examples: Remote Procedure Call (RPC), Session Control Protocol (SCP).

A

Session Layer

220
Q

What part of OSI layer will these be?

Examples: Encryption/Decryption, Compression, ASCII, JPEG, MPEG.

A

Presentation Layer

221
Q

What part of OSI layer will these be?

Examples: HTTP, FTP, SMTP, DNS, Telnet.

A

Application Layer

222
Q

What layer will these be on TCP/IP Model:

Examples: Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Domain Name System (DNS), Telnet.

A

Transport Layer

223
Q

The protocols and services in TCP/IP Model layer enable functions such as file transfer, email, web browsing, remote login, and domain name resolution.

A

Application Layer

223
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Allows for customization and flexibility to meet specific network needs.

Disadvantages: Can be complex to design and implement, and may require additional resources and expertise.

A

Hybrid Topology

223
Q

What layer will these be on TCP/IP Model:

Examples: Internet Protocol (IPv4 and IPv6), Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP).

A

Internet Layer

224
Q

On IPv4, which is host portion and network portion?

A

In an IPv4 address, the network portion and the host portion together make up the address structure used for routing and identifying devices on a network.

The division between the network portion and the host portion is determined by the subnet mask associated with the IP address. The subnet mask defines the number of network bits and host bits in the address.

Typically, the subnet mask consists of a series of binary 1s followed by binary 0s. The network portion of the IP address is represented by the bits that correspond to the 1s in the subnet mask, while the host portion corresponds to the bits that correspond to the 0s.

For example, let’s consider an IP address 192.168.0.1 with a subnet mask of 255.255.255.0. In this case, the first three octets (192.168.0) represent the network portion, and the last octet (1) represents the host portion.

The network portion identifies the specific network that the device belongs to, while the host portion identifies the specific device within that network.

It’s worth noting that the division between the network and host portions can vary depending on the subnet mask used. The subnet mask can be adjusted to create smaller or larger network segments by varying the number of network bits and host bits.

225
Q

What Network Topology has these Advantage and Disadvantages:

Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.

Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.

A

Bus Topology

225
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.

Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.

A

Star Topology

225
Q

On this type of Mesh Topology, each device has a direct link to every other device

A

Full-Mesh Topology

225
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.

Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.

A

Ring Topology

225
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.

Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.

A

Mesh Topology

225
Q

On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.

A

Partial Mesh Topology

225
Q

What part of OSI layer will these be?

Examples: Ethernet cables, fiber optics, voltage levels, modulation techniques.

A

Physical Layer

225
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.

Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.

A

Tree Topology

225
Q

What are the two types of Mesh Topology?

A

Full-Mesh and Partial Mesh

226
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Allows for customization and flexibility to meet specific network needs.

Disadvantages: Can be complex to design and implement, and may require additional resources and expertise.

A

Hybrid Topology

226
Q

What part of OSI layer will these be?

Examples: Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11), Point-to-Point Protocol (PPP).

A

Data Link Layer

227
Q

What part of OSI layer will these be?

Examples: Internet Protocol (IP), Internet Control Message Protocol (ICMP), Routing protocols (e.g., OSPF, BGP).

A

Network Layer

227
Q

What layer will these be on TCP/IP Model:

Examples: Internet Protocol (IPv4 and IPv6), Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP).

A

Internet Layer

227
Q

What part of OSI layer will these be?

Examples: HTTP, FTP, SMTP, DNS, Telnet.

A

Application Layer

228
Q

What layer will these be on TCP/IP Model:

Examples: Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Domain Name System (DNS), Telnet.

A

Transport Layer

228
Q

What part of OSI layer will these be?

Examples: Encryption/Decryption, Compression, ASCII, JPEG, MPEG.

A

Presentation Layer

228
Q

What part of OSI layer will these be?

Examples: Remote Procedure Call (RPC), Session Control Protocol (SCP).

A

Session Layer

229
Q

The protocols and services in TCP/IP Model layer enable functions such as file transfer, email, web browsing, remote login, and domain name resolution.

A

Application Layer

229
Q

On IPv4, which is host portion and network portion?

A

In an IPv4 address, the network portion and the host portion together make up the address structure used for routing and identifying devices on a network.

The division between the network portion and the host portion is determined by the subnet mask associated with the IP address. The subnet mask defines the number of network bits and host bits in the address.

Typically, the subnet mask consists of a series of binary 1s followed by binary 0s. The network portion of the IP address is represented by the bits that correspond to the 1s in the subnet mask, while the host portion corresponds to the bits that correspond to the 0s.

For example, let’s consider an IP address 192.168.0.1 with a subnet mask of 255.255.255.0. In this case, the first three octets (192.168.0) represent the network portion, and the last octet (1) represents the host portion.

The network portion identifies the specific network that the device belongs to, while the host portion identifies the specific device within that network.

It’s worth noting that the division between the network and host portions can vary depending on the subnet mask used. The subnet mask can be adjusted to create smaller or larger network segments by varying the number of network bits and host bits.

229
Q

What part of OSI layer will these be?

Examples: Transmission Control Protocol (TCP), User Datagram Protocol (UDP).

A

Transport Layer

229
Q

This principle on information security emphasizes the accuracy and trustworthiness of information. It involves protecting data from unauthorized modification, ensuring data remains intact and uncorrupted, and maintaining data consistency throughout its lifecycle.

A

Integrity

230
Q

What Network Topology has these Advantage and Disadvantages:

Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.

Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.

A

Bus Topology

231
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.

Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.

A

Star Topology

232
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.

Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.

A

Ring Topology

233
Q

What are the two types of Mesh Topology?

A

Full-Mesh and Partial Mesh

234
Q

On this type of Mesh Topology, each device has a direct link to every other device

A

Full-Mesh Topology

235
Q

On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.

A

Partial Mesh Topology

236
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.

Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.

A

Mesh Topology

237
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.

Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.

A

Tree Topology

238
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Allows for customization and flexibility to meet specific network needs.

Disadvantages: Can be complex to design and implement, and may require additional resources and expertise.

A

Hybrid Topology

239
Q

What part of OSI layer will these be?

Examples: Ethernet cables, fiber optics, voltage levels, modulation techniques.

A

Physical Layer

240
Q

What part of OSI layer will these be?

Examples: Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11), Point-to-Point Protocol (PPP).

A

Data Link Layer

241
Q

What part of OSI layer will these be?

Examples: Internet Protocol (IP), Internet Control Message Protocol (ICMP), Routing protocols (e.g., OSPF, BGP).

A

Network Layer

242
Q

What part of OSI layer will these be?

Examples: Transmission Control Protocol (TCP), User Datagram Protocol (UDP).

A

Transport Layer

243
Q

What part of OSI layer will these be?

Examples: Remote Procedure Call (RPC), Session Control Protocol (SCP).

A

Session Layer

244
Q

What part of OSI layer will these be?

Examples: Encryption/Decryption, Compression, ASCII, JPEG, MPEG.

A

Presentation Layer

245
Q

What part of OSI layer will these be?

Examples: HTTP, FTP, SMTP, DNS, Telnet.

A

Application Layer

246
Q

What layer will these be on TCP/IP Model:

Examples: Internet Protocol (IPv4 and IPv6), Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP).

A

Internet Layer

247
Q

What layer will these be on TCP/IP Model:

Examples: Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Domain Name System (DNS), Telnet.

A

Transport Layer

248
Q

The protocols and services in TCP/IP Model layer enable functions such as file transfer, email, web browsing, remote login, and domain name resolution.

A

Application Layer

249
Q

On IPv4, which is host portion and network portion?

A

In an IPv4 address, the network portion and the host portion together make up the address structure used for routing and identifying devices on a network.

The division between the network portion and the host portion is determined by the subnet mask associated with the IP address. The subnet mask defines the number of network bits and host bits in the address.

Typically, the subnet mask consists of a series of binary 1s followed by binary 0s. The network portion of the IP address is represented by the bits that correspond to the 1s in the subnet mask, while the host portion corresponds to the bits that correspond to the 0s.

For example, let’s consider an IP address 192.168.0.1 with a subnet mask of 255.255.255.0. In this case, the first three octets (192.168.0) represent the network portion, and the last octet (1) represents the host portion.

The network portion identifies the specific network that the device belongs to, while the host portion identifies the specific device within that network.

It’s worth noting that the division between the network and host portions can vary depending on the subnet mask used. The subnet mask can be adjusted to create smaller or larger network segments by varying the number of network bits and host bits.

250
Q

On this principles on information security, information should be readily available to authorized users whenever it is needed. Its role is to ensures that information and system resources are accessible, reliable, and usable when required. Measures such as redundancy, backup systems, and disaster recovery plans are used.

A

Availability

251
Q

On this information security principle, it verifies the identity of users, systems, or entities attempting to access information or resources. It involves using credentials, such as usernames and passwords or biometrics to ensure that only authorized individuals can access the information.

A

Authentication

252
Q

On this information security principle, once a user or entity is authenticated, this will come into play. It determines the level of access or permissions granted to the right users based on their roles, responsibilities, and need-to-know basis. Access controls and permissions are established to enforce this.

A

Authorization

253
Q

On this information security principle, this holds individuals or entities responsible for their actions or activities within a system. It involves tracking and recording user activities, maintaining audit logs, and implementing mechanisms for traceability, ensuring that actions can be attributed to specific individuals.

A

Accountability

254
Q

What Network Topology has these Advantage and Disadvantages:

Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.

Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.

A

Bus Topology

255
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.

Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.

A

Star Topology

256
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.

Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.

A

Ring Topology

257
Q

What are the two types of Mesh Topology?

A

Full-Mesh and Partial Mesh

258
Q

On this type of Mesh Topology, each device has a direct link to every other device

A

Full-Mesh Topology

259
Q

On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.

A

Partial Mesh Topology

259
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.

Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.

A

Mesh Topology

260
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.

Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.

A

Tree Topology

261
Q

What part of OSI layer will these be?

Examples: Ethernet cables, fiber optics, voltage levels, modulation techniques.

A

Physical Layer

262
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Allows for customization and flexibility to meet specific network needs.

Disadvantages: Can be complex to design and implement, and may require additional resources and expertise.

A

Hybrid Topology

263
Q

What part of OSI layer will these be?

Examples: Internet Protocol (IP), Internet Control Message Protocol (ICMP), Routing protocols (e.g., OSPF, BGP).

A

Network Layer

263
Q

What part of OSI layer will these be?

Examples: Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11), Point-to-Point Protocol (PPP).

A

Data Link Layer

264
Q

What part of OSI layer will these be?

Examples: Transmission Control Protocol (TCP), User Datagram Protocol (UDP).

A

Transport Layer

265
Q

What part of OSI layer will these be?

Examples: Remote Procedure Call (RPC), Session Control Protocol (SCP).

A

Session Layer

265
Q

What layer will these be on TCP/IP Model:

Examples: Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Domain Name System (DNS), Telnet.

A

Transport Layer

265
Q

What part of OSI layer will these be?

Examples: HTTP, FTP, SMTP, DNS, Telnet.

A

Application Layer

265
Q

What layer will these be on TCP/IP Model:

Examples: Internet Protocol (IPv4 and IPv6), Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP).

A

Internet Layer

265
Q

What part of OSI layer will these be?

Examples: Encryption/Decryption, Compression, ASCII, JPEG, MPEG.

A

Presentation Layer

266
Q

The protocols and services in TCP/IP Model layer enable functions such as file transfer, email, web browsing, remote login, and domain name resolution.

A

Application Layer

267
Q

On IPv4, which is host portion and network portion?

A

In an IPv4 address, the network portion and the host portion together make up the address structure used for routing and identifying devices on a network.

The division between the network portion and the host portion is determined by the subnet mask associated with the IP address. The subnet mask defines the number of network bits and host bits in the address.

Typically, the subnet mask consists of a series of binary 1s followed by binary 0s. The network portion of the IP address is represented by the bits that correspond to the 1s in the subnet mask, while the host portion corresponds to the bits that correspond to the 0s.

For example, let’s consider an IP address 192.168.0.1 with a subnet mask of 255.255.255.0. In this case, the first three octets (192.168.0) represent the network portion, and the last octet (1) represents the host portion.

The network portion identifies the specific network that the device belongs to, while the host portion identifies the specific device within that network.

It’s worth noting that the division between the network and host portions can vary depending on the subnet mask used. The subnet mask can be adjusted to create smaller or larger network segments by varying the number of network bits and host bits.

268
Q

On this information security principle, information security principles also encompass risk management. This involves identifying, assessing, and mitigating risks to information assets through risk analysis, vulnerability assessments, and the implementation of appropriate safeguards and controls.

A

Risk Management

269
Q

ensures that a sender cannot deny their actions or transactions. It involves using techniques such as digital signatures, timestamps, and audit trails to provide evidence of the integrity and origin of transactions, making them legally binding and irrefutable.

A
270
Q

This refers to malicious software that is designed to disrupt, damage, or gain unauthorized access to computer systems or networks. Examples include viruses, worms, Trojans, ransomware, spyware, and adware.

A

Malware

271
Q

This involves manipulating individuals to gain unauthorized access to systems or sensitive information. Attackers exploit human psychology and trust to deceive people into revealing confidential information or performing actions that compromise security.

A

Social Engineering

272
Q

What type of security attack is this: It targets vulnerabilities in network infrastructure or protocols to gain unauthorized access, disrupt network services, or intercept sensitive information. Examples include Distributed Denial of Service (DDoS) attacks, Man-in-the-Middle (MitM) attacks, and packet sniffing.

A

Network Attacks

273
Q

This can come from individuals within an organization who have authorized access to systems or data. They may misuse their privileges, intentionally or unintentionally, to steal sensitive information, cause damage, or compromise security.

A

Inside Threats

274
Q

What Network Topology has these Advantage and Disadvantages:

Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.

Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.

A

Bus Topology

275
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.

Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.

A

Star Topology

276
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.

Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.

A

Ring Topology

277
Q

What are the two types of Mesh Topology?

A

Full-Mesh and Partial Mesh

278
Q

On this type of Mesh Topology, each device has a direct link to every other device

A

Full-Mesh Topology

279
Q

On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.

A

Partial Mesh Topology

280
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.

Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.

A

Mesh Topology

281
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.

Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.

A

Tree Topology

282
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Allows for customization and flexibility to meet specific network needs.

Disadvantages: Can be complex to design and implement, and may require additional resources and expertise.

A

Hybrid Topology

283
Q

What part of OSI layer will these be?

Examples: Ethernet cables, fiber optics, voltage levels, modulation techniques.

A

Physical Layer

284
Q

What part of OSI layer will these be?

Examples: Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11), Point-to-Point Protocol (PPP).

A

Data Link Layer

284
Q

What part of OSI layer will these be?

Examples: Internet Protocol (IP), Internet Control Message Protocol (ICMP), Routing protocols (e.g., OSPF, BGP).

A

Network Layer

285
Q

What part of OSI layer will these be?

Examples: Transmission Control Protocol (TCP), User Datagram Protocol (UDP).

A

Transport Layer

286
Q

What part of OSI layer will these be?

Examples: Remote Procedure Call (RPC), Session Control Protocol (SCP).

A

Session Layer

286
Q

What part of OSI layer will these be?

Examples: Encryption/Decryption, Compression, ASCII, JPEG, MPEG.

A

Presentation Layer

287
Q

What part of OSI layer will these be?

Examples: HTTP, FTP, SMTP, DNS, Telnet.

A

Application Layer

288
Q

What layer will these be on TCP/IP Model:

Examples: Internet Protocol (IPv4 and IPv6), Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP).

A

Internet Layer

289
Q

What layer will these be on TCP/IP Model:

Examples: Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Domain Name System (DNS), Telnet.

A

Transport Layer

289
Q

The protocols and services in TCP/IP Model layer enable functions such as file transfer, email, web browsing, remote login, and domain name resolution.

A

Application Layer

290
Q

What layer will these be on TCP/IP Model:

Examples: Ethernet, Wi-Fi (IEEE 802.11), PPP, MAC (Media Access Control) addresses.

A
290
Q

On IPv4, which is host portion and network portion?

A

In an IPv4 address, the network portion and the host portion together make up the address structure used for routing and identifying devices on a network.

The division between the network portion and the host portion is determined by the subnet mask associated with the IP address. The subnet mask defines the number of network bits and host bits in the address.

Typically, the subnet mask consists of a series of binary 1s followed by binary 0s. The network portion of the IP address is represented by the bits that correspond to the 1s in the subnet mask, while the host portion corresponds to the bits that correspond to the 0s.

For example, let’s consider an IP address 192.168.0.1 with a subnet mask of 255.255.255.0. In this case, the first three octets (192.168.0) represent the network portion, and the last octet (1) represents the host portion.

The network portion identifies the specific network that the device belongs to, while the host portion identifies the specific device within that network.

It’s worth noting that the division between the network and host portions can vary depending on the subnet mask used. The subnet mask can be adjusted to create smaller or larger network segments by varying the number of network bits and host bits.

291
Q

On this information security principle, it ensures that a sender cannot deny their actions or transactions. It involves using techniques such as digital signatures, timestamps, and audit trails to provide evidence of the integrity and origin of transactions, making them legally binding and irrefutable.

A

Non-repudiation

292
Q

This is involve gaining unauthorized access to systems or information by physically breaching premises, stealing devices, tampering with hardware components, or exploiting physical security vulnerabilities.

A

Physical attacks

293
Q

This threat attacks target vulnerabilities in web applications to gain unauthorized access, manipulate data, or disrupt services. Examples include SQL injection, Cross-Site Scripting (XSS), and Cross-Site Request Forgery (CSRF).

A

Web-application attacks

294
Q

What Network Topology has these Advantage and Disadvantages:

Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.

Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.

A

Bus Topology

295
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.

Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.

A

Star Topology

296
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.

Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.

A

Ring Topology

297
Q

What are the two types of Mesh Topology?

A

Full-Mesh and Partial Mesh

298
Q

On this type of Mesh Topology, each device has a direct link to every other device

A

Full-Mesh Topology

299
Q

On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.

A

Partial Mesh Topology

300
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.

Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.

A

Mesh Topology

301
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.

Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.

A

Tree Topology

302
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Allows for customization and flexibility to meet specific network needs.

Disadvantages: Can be complex to design and implement, and may require additional resources and expertise.

A

Hybrid Topology

303
Q

What part of OSI layer will these be?

Examples: Ethernet cables, fiber optics, voltage levels, modulation techniques.

A

Physical Layer

304
Q

What part of OSI layer will these be?

Examples: Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11), Point-to-Point Protocol (PPP).

A

Data Link Layer

305
Q

What part of OSI layer will these be?

Examples: Internet Protocol (IP), Internet Control Message Protocol (ICMP), Routing protocols (e.g., OSPF, BGP).

A

Network Layer

306
Q

What part of OSI layer will these be?

Examples: Transmission Control Protocol (TCP), User Datagram Protocol (UDP).

A

Transport Layer

307
Q

What part of OSI layer will these be?

Examples: Remote Procedure Call (RPC), Session Control Protocol (SCP).

A

Session Layer

308
Q

What part of OSI layer will these be?

Examples: Encryption/Decryption, Compression, ASCII, JPEG, MPEG.

A

Presentation Layer

309
Q

What part of OSI layer will these be?

Examples: HTTP, FTP, SMTP, DNS, Telnet.

A

Application Layer

310
Q

What layer will these be on TCP/IP Model:

Examples: Internet Protocol (IPv4 and IPv6), Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP).

A

Internet Layer

311
Q

What layer will these be on TCP/IP Model:

Examples: Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Domain Name System (DNS), Telnet.

A

Transport Layer

312
Q

The protocols and services in TCP/IP Model layer enable functions such as file transfer, email, web browsing, remote login, and domain name resolution.

A

Application Layer

313
Q

On IPv4, which is host portion and network portion?

A

In an IPv4 address, the network portion and the host portion together make up the address structure used for routing and identifying devices on a network.

The division between the network portion and the host portion is determined by the subnet mask associated with the IP address. The subnet mask defines the number of network bits and host bits in the address.

Typically, the subnet mask consists of a series of binary 1s followed by binary 0s. The network portion of the IP address is represented by the bits that correspond to the 1s in the subnet mask, while the host portion corresponds to the bits that correspond to the 0s.

For example, let’s consider an IP address 192.168.0.1 with a subnet mask of 255.255.255.0. In this case, the first three octets (192.168.0) represent the network portion, and the last octet (1) represents the host portion.

The network portion identifies the specific network that the device belongs to, while the host portion identifies the specific device within that network.

It’s worth noting that the division between the network and host portions can vary depending on the subnet mask used. The subnet mask can be adjusted to create smaller or larger network segments by varying the number of network bits and host bits.

314
Q

On this information security principle, it ensures that a sender cannot deny their actions or transactions. It involves using techniques such as digital signatures, timestamps, and audit trails to provide evidence of the integrity and origin of transactions, making them legally binding and irrefutable.

A

Non-repudiation

315
Q

This threat focus on compromising passwords to gain unauthorized access to systems or accounts. Attackers may use techniques like brute-force attacks, dictionary attacks, or password spraying to crack weak or stolen passwords.

A

Password attacks

316
Q

This threat involve unauthorized access, disclosure, or theft of sensitive information. Attackers may exploit vulnerabilities to gain access to databases or steal data through social engineering, malware, or other means.

A

Data Breaches

317
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.

Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.

A

Star Topology

318
Q

What Network Topology has these Advantage and Disadvantages:

Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.

Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.

A

Bus Topology

318
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.

Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.

A

Ring Topology

319
Q

What are the two types of Mesh Topology?

A

Full-Mesh and Partial Mesh

320
Q

On this type of Mesh Topology, each device has a direct link to every other device

A

Full-Mesh Topology

321
Q

On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.

A

Partial Mesh Topology

322
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.

Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.

A

Mesh Topology

323
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.

Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.

A

Tree Topology

324
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Allows for customization and flexibility to meet specific network needs.

Disadvantages: Can be complex to design and implement, and may require additional resources and expertise.

A

Hybrid Topology

324
Q

What part of OSI layer will these be?

Examples: Ethernet cables, fiber optics, voltage levels, modulation techniques.

A

Physical Layer

325
Q

What part of OSI layer will these be?

Examples: Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11), Point-to-Point Protocol (PPP).

A

Data Link Layer

326
Q

What part of OSI layer will these be?

Examples: Internet Protocol (IP), Internet Control Message Protocol (ICMP), Routing protocols (e.g., OSPF, BGP).

A

Network Layer

327
Q

What part of OSI layer will these be?

Examples: Transmission Control Protocol (TCP), User Datagram Protocol (UDP).

A

Transport Layer

328
Q

What part of OSI layer will these be?

Examples: Remote Procedure Call (RPC), Session Control Protocol (SCP).

A

Session Layer

329
Q

What part of OSI layer will these be?

Examples: Encryption/Decryption, Compression, ASCII, JPEG, MPEG.

A

Presentation Layer

330
Q

What part of OSI layer will these be?

Examples: HTTP, FTP, SMTP, DNS, Telnet.

A

Application Layer

331
Q

What layer will these be on TCP/IP Model:

Examples: Internet Protocol (IPv4 and IPv6), Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP).

A

Internet Layer

332
Q

What layer will these be on TCP/IP Model:

Examples: Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Domain Name System (DNS), Telnet.

A

Transport Layer

333
Q

The protocols and services in TCP/IP Model layer enable functions such as file transfer, email, web browsing, remote login, and domain name resolution.

A

Application Layer

334
Q

On IPv4, which is host portion and network portion?

A

In an IPv4 address, the network portion and the host portion together make up the address structure used for routing and identifying devices on a network.

The division between the network portion and the host portion is determined by the subnet mask associated with the IP address. The subnet mask defines the number of network bits and host bits in the address.

Typically, the subnet mask consists of a series of binary 1s followed by binary 0s. The network portion of the IP address is represented by the bits that correspond to the 1s in the subnet mask, while the host portion corresponds to the bits that correspond to the 0s.

For example, let’s consider an IP address 192.168.0.1 with a subnet mask of 255.255.255.0. In this case, the first three octets (192.168.0) represent the network portion, and the last octet (1) represents the host portion.

The network portion identifies the specific network that the device belongs to, while the host portion identifies the specific device within that network.

It’s worth noting that the division between the network and host portions can vary depending on the subnet mask used. The subnet mask can be adjusted to create smaller or larger network segments by varying the number of network bits and host bits.

335
Q

On this information security principle, it ensures that a sender cannot deny their actions or transactions. It involves using techniques such as digital signatures, timestamps, and audit trails to provide evidence of the integrity and origin of transactions, making them legally binding and irrefutable.

A

Non-repudiation

336
Q

This threat is about attacks aim to disrupt or overload systems, networks, or services, making them unavailable to legitimate users. Attackers flood the target with excessive requests or exploit vulnerabilities to exhaust resources and cause service disruptions.

A

Denial of Service (DoS) Attacks

337
Q

This attacks use deceptive emails, messages, or websites to trick individuals into revealing sensitive information such as login credentials, credit card numbers, or personal details. Phishing attacks often impersonate trusted entities, such as banks or service providers, to gain victims’ trust.

A

Phishing Attacks

338
Q
  • Filtering incoming and outgoing traffic based on specific criteria.
  • Allowing or blocking traffic based on source IP addresses, destination IP addresses, port numbers, protocols, or application-level information.
A

Inbound/Outbound Filtering - Rule

339
Q
  • Configuring the firewall with a “default deny” rule.
  • All incoming and outgoing traffic is blocked by default unless explicitly allowed by firewall rules.
  • Helps ensure that only authorized traffic is permitted.
A

Default Deny - Configuration

340
Q
  • Sets of rules that define which traffic is allowed or denied based on specific conditions.
  • Controlling traffic at the network or application layer.
  • Allowing or blocking specific IP addresses, port numbers, protocols, or traffic patterns.
A

Access Control Lists (ACLs) - Rule

341
Q
  • Filtering traffic based on specific port numbers associated with different network services.
  • Allowing or blocking incoming or outgoing traffic on specific ports.
  • For example, allowing HTTP traffic (port 80) for web browsing or blocking SMTP traffic (port 25) for email.
A

Port-based Filtering - Rule

342
Q
  • Configuring the firewall with stateful inspection capabilities.
  • Maintaining information about the state of network connections.
  • Differentiating between legitimate responses to outgoing requests and potentially malicious incoming traffic.
  • Helps prevent unauthorized access attempts and session hijacking.
A

Stateful Inspection - Configuration

343
Q
  • Integrating the firewall with Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS).
  • Enhancing security by detecting and blocking potential threats.
  • IDS/IPS systems monitor network traffic for suspicious or malicious activity, and the firewall can work together with these systems to take appropriate actions.
A

IDS/IPS Integration - Configuration

344
Q
  • Configuring the firewall to perform deep packet inspection and analyze application-level protocols and data.
  • Detecting and preventing specific application-based attacks or unauthorized activities.
  • Helps protect against vulnerabilities in web applications or other software.
A

Application-level Filtering - Rule

345
Q
  • Configuring rules that allow or block specific traffic based on predefined time periods.
  • Enforcing access restrictions during certain hours or implementing scheduled maintenance windows.
  • Provides control over when certain types of traffic are allowed or denied.
A

Time-based Rules - Rule

346
Q
  • Configuring the firewall to log and audit network traffic, rule matches, and events.
  • Recording details such as source/destination IP addresses, port numbers, timestamps, and actions taken by the firewall.
  • Valuable for monitoring, troubleshooting, and analyzing security incidents.
A

Logging and Auditing - Configuration

347
Q
  • Configuring rules to allow or restrict Virtual Private Network (VPN) traffic.
  • Allowing secure remote access to private networks.
  • Controlling VPN traffic based on user credentials, source IP addresses, or other criteria.
A

VPN Access - Rule

348
Q

VPNs use these protocols to encapsulate and encrypt data traffic within a secure tunnel. This ensures that data remains protected and private while traversing untrusted networks, such as the internet.

A

Tunneling protocols

349
Q

VPNs employ this algorithms to secure data transmitted over the network. Common encryption protocols used in VPNs include AES (Advanced Encryption Standard) and SSL/TLS (Secure Sockets Layer/Transport Layer Security).

A

Encryption algorithms

350
Q

VPNs required this to ensure that only authorized users can access the network. This typically involves the use of usernames, passwords, digital certificates, or other authentication mechanisms.

A

Authentication

351
Q

VPNs use various of this to establish and manage secure connections. Examples include IPsec (Internet Protocol Security), SSL/TLS, PPTP (Point-to-Point Tunneling Protocol), L2TP (Layer 2 Tunneling Protocol), and OpenVPN.

A

VPN Protocols

352
Q

A ____________________ acts as the gateway for VPN connections. It authenticates and processes VPN connections from clients and handles the encryption/decryption of data traffic.

A

VPN Server/Concentrator

353
Q

This is a software installed on a user’s device to establish a secure connection to a VPN server. It handles the encryption/decryption of data and provides a virtual network interface for accessing resources on the VPN.

A

VPN Client

354
Q

A VPN _________ is a secure, encrypted pathway established between the VPN client and server. It ensures the confidentiality and integrity of data transmitted over the network.

A

VPN Tunnel

355
Q

______ tunneling is a VPN feature that allows users to direct only specific network traffic through the VPN tunnel while allowing other traffic to access the internet directly. This can optimize performance and conserve bandwidth.

A

Split Tunneling

356
Q

What Network Topology has these Advantage and Disadvantages:

Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.

Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.

A

Bus Topology

357
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.

Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.

A

Star Topology

358
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.

Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.

A

Ring Topology

359
Q

What are the two types of Mesh Topology?

A

Full-Mesh and Partial Mesh

360
Q

On this type of Mesh Topology, each device has a direct link to every other device

A

Full-Mesh Topology

361
Q

On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.

A

Partial Mesh Topology

362
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.

Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.

A

Mesh Topology

363
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.

Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.

A

Tree Topology

364
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Allows for customization and flexibility to meet specific network needs.

Disadvantages: Can be complex to design and implement, and may require additional resources and expertise.

A

Hybrid Topology

364
Q

What part of OSI layer will these be?

Examples: Ethernet cables, fiber optics, voltage levels, modulation techniques.

A

Physical Layer

365
Q

What part of OSI layer will these be?

Examples: Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11), Point-to-Point Protocol (PPP).

A

Data Link Layer

366
Q

What part of OSI layer will these be?

Examples: Internet Protocol (IP), Internet Control Message Protocol (ICMP), Routing protocols (e.g., OSPF, BGP).

A

Network Layer

367
Q

What part of OSI layer will these be?

Examples: Transmission Control Protocol (TCP), User Datagram Protocol (UDP).

A

Transport Layer

368
Q

What part of OSI layer will these be?

Examples: Remote Procedure Call (RPC), Session Control Protocol (SCP).

A

Session Layer

369
Q

What part of OSI layer will these be?

Examples: Encryption/Decryption, Compression, ASCII, JPEG, MPEG.

A

Presentation Layer

370
Q

What part of OSI layer will these be?

Examples: HTTP, FTP, SMTP, DNS, Telnet.

A

Application Layer

371
Q

What layer will these be on TCP/IP Model:

Examples: Internet Protocol (IPv4 and IPv6), Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP).

A

Internet Layer

372
Q

What layer will these be on TCP/IP Model:

Examples: Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Domain Name System (DNS), Telnet.

A

Transport Layer

373
Q

What layer will these be on TCP/IP Model:

Examples: Ethernet, Wi-Fi (IEEE 802.11), PPP, MAC (Media Access Control) addresses.

A
374
Q

The protocols and services in TCP/IP Model layer enable functions such as file transfer, email, web browsing, remote login, and domain name resolution.

A

Application Layer

375
Q

On IPv4, which is host portion and network portion?

A

In an IPv4 address, the network portion and the host portion together make up the address structure used for routing and identifying devices on a network.

The division between the network portion and the host portion is determined by the subnet mask associated with the IP address. The subnet mask defines the number of network bits and host bits in the address.

Typically, the subnet mask consists of a series of binary 1s followed by binary 0s. The network portion of the IP address is represented by the bits that correspond to the 1s in the subnet mask, while the host portion corresponds to the bits that correspond to the 0s.

For example, let’s consider an IP address 192.168.0.1 with a subnet mask of 255.255.255.0. In this case, the first three octets (192.168.0) represent the network portion, and the last octet (1) represents the host portion.

The network portion identifies the specific network that the device belongs to, while the host portion identifies the specific device within that network.

It’s worth noting that the division between the network and host portions can vary depending on the subnet mask used. The subnet mask can be adjusted to create smaller or larger network segments by varying the number of network bits and host bits.

376
Q

On this information security principle, it ensures that a sender cannot deny their actions or transactions. It involves using techniques such as digital signatures, timestamps, and audit trails to provide evidence of the integrity and origin of transactions, making them legally binding and irrefutable.

A

Non-repudiation

377
Q
  • Configuring rules to allow or restrict Virtual Private Network (VPN) traffic.
  • Allowing secure remote access to private networks.
  • Controlling VPN traffic based on user credentials, source IP addresses, or other criteria.
A

VPN Access - Rule

378
Q

A _______________ establishes secure connections between multiple geographically separated networks. It enables secure communication and data exchange between different locations of an organization.

A

Site-to-Site VPN

379
Q

A _________________ allows individual users to securely connect to a private network from a remote location, such as their home or a public Wi-Fi hotspot. It provides secure access to network resources as if the user were directly connected to the private network.

A

Remote Access VPN

380
Q

What Network Topology has these Advantage and Disadvantages:

Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.

Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.

A

Bus Topology

381
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.

Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.

A

Star Topology

382
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.

Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.

A

Ring Topology

383
Q

What are the two types of Mesh Topology?

A

Full-Mesh and Partial Mesh

384
Q

On this type of Mesh Topology, each device has a direct link to every other device

A

Full-Mesh Topology

385
Q

On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.

A

Partial Mesh Topology

386
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.

Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.

A

Mesh Topology

387
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.

Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.

A

Tree Topology

388
Q

What Network Topology has these Advantages and Disadvantages:

Advantages: Allows for customization and flexibility to meet specific network needs.

Disadvantages: Can be complex to design and implement, and may require additional resources and expertise.

A

Hybrid Topology

389
Q

What part of OSI layer will these be?

Examples: Ethernet cables, fiber optics, voltage levels, modulation techniques.

A

Physical Layer

390
Q

What part of OSI layer will these be?

Examples: Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11), Point-to-Point Protocol (PPP).

A

Data Link Layer

391
Q

What part of OSI layer will these be?

Examples: Internet Protocol (IP), Internet Control Message Protocol (ICMP), Routing protocols (e.g., OSPF, BGP).

A

Network Layer

392
Q

What part of OSI layer will these be?

Examples: Transmission Control Protocol (TCP), User Datagram Protocol (UDP).

A

Transport Layer

393
Q

What part of OSI layer will these be?

Examples: Remote Procedure Call (RPC), Session Control Protocol (SCP).

A

Session Layer

394
Q

What part of OSI layer will these be?

Examples: Encryption/Decryption, Compression, ASCII, JPEG, MPEG.

A

Presentation Layer

395
Q

What part of OSI layer will these be?

Examples: HTTP, FTP, SMTP, DNS, Telnet.

A

Application Layer

396
Q

What layer will these be on TCP/IP Model:

Examples: Internet Protocol (IPv4 and IPv6), Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP).

A

Internet Layer

397
Q

What layer will these be on TCP/IP Model:

Examples: Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Domain Name System (DNS), Telnet.

A

Transport Layer

398
Q

What layer will these be on TCP/IP Model:

Examples: Ethernet, Wi-Fi (IEEE 802.11), PPP, MAC (Media Access Control) addresses.

A
399
Q

The protocols and services in TCP/IP Model layer enable functions such as file transfer, email, web browsing, remote login, and domain name resolution.

A

Application Layer

400
Q

On IPv4, which is host portion and network portion?

A

In an IPv4 address, the network portion and the host portion together make up the address structure used for routing and identifying devices on a network.

The division between the network portion and the host portion is determined by the subnet mask associated with the IP address. The subnet mask defines the number of network bits and host bits in the address.

Typically, the subnet mask consists of a series of binary 1s followed by binary 0s. The network portion of the IP address is represented by the bits that correspond to the 1s in the subnet mask, while the host portion corresponds to the bits that correspond to the 0s.

For example, let’s consider an IP address 192.168.0.1 with a subnet mask of 255.255.255.0. In this case, the first three octets (192.168.0) represent the network portion, and the last octet (1) represents the host portion.

The network portion identifies the specific network that the device belongs to, while the host portion identifies the specific device within that network.

It’s worth noting that the division between the network and host portions can vary depending on the subnet mask used. The subnet mask can be adjusted to create smaller or larger network segments by varying the number of network bits and host bits.

401
Q

On this information security principle, it ensures that a sender cannot deny their actions or transactions. It involves using techniques such as digital signatures, timestamps, and audit trails to provide evidence of the integrity and origin of transactions, making them legally binding and irrefutable.

A

Non-repudiation

402
Q
  • Configuring rules to allow or restrict Virtual Private Network (VPN) traffic.
  • Allowing secure remote access to private networks.
  • Controlling VPN traffic based on user credentials, source IP addresses, or other criteria.
A

VPN Access - Rule

403
Q

VPNs use __________________ to encapsulate and encrypt data traffic within a secure tunnel. This ensures that data remains protected and private while traversing untrusted networks, such as the internet.

A

tunneling protocols

404
Q

VPNs employ _______________ to secure data transmitted over the network. Common encryption protocols used in VPNs include AES (Advanced Encryption Standard) and SSL/TLS (Secure Sockets Layer/Transport Layer Security).

A

encryption algorithms

405
Q

VPNs require _____________ to ensure that only authorized users can access the network. This typically involves the use of usernames, passwords, digital certificates, or other authentication mechanisms.

A

authentication

406
Q

VPNs use various __________ to establish and manage secure connections. Common VPN protocols include IPsec (Internet Protocol Security), SSL/TLS, PPTP (Point-to-Point Tunneling Protocol), L2TP (Layer 2 Tunneling Protocol), and OpenVPN.

A

protocols/VPN Protocols

407
Q

A ____________________ acts as the gateway for VPN connections. It authenticates and processes VPN connections from clients and handles the encryption/decryption of data traffic.

A

VPN server or concentrator

408
Q

A _________ is software installed on a user’s device to establish a secure connection to a VPN server. It handles the encryption/decryption of data and provides a virtual network interface for accessing resources on the VPN.

A

VPN client

409
Q

A ___________ is a secure, encrypted pathway established between the VPN client and server. It ensures the confidentiality and integrity of data transmitted over the network.

A

VPN tunnel

410
Q

______________ is a VPN feature that allows users to direct only specific network traffic through the VPN tunnel while allowing other traffic to access the internet directly. This can optimize performance and conserve bandwidth.

A

Split tunneling

411
Q

A ______________ establishes secure connections between multiple geographically separated networks. It enables secure communication and data exchange between different locations of an organization.

A

site-to-site VPN

412
Q

A _______________ allows individual users to securely connect to a private network from a remote location, such as their home or a public Wi-Fi hotspot. It provides secure access to network resources as if the user were directly connected to the private network.

A

remote access VPN