Section 1.0 - Networking Concepts - 23% Flashcards

1
Q

What does Layer 1 (Physical) of the OSI model handle?

A. It defines how data is encoded, transmitted, and received over physical media.

B. It ensures reliable data delivery between devices.

C. It manages logical addressing and routing of data.

D. It manages encryption and decryption of data.

A

A. It defines how data is encoded, transmitted, and received over physical media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is the main function of Layer 2 (Data Link) in the OSI model?

A. It establishes, maintains, and terminates sessions between applications.

B. It routes packets between different networks using IP addresses.

C. It handles error detection and correction and manages physical addressing.

D. It encrypts data for secure communication.

A

C. It handles error detection and correction and manages physical addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary responsibility of Layer 3 (Network) in the OSI model?

A. It ensures reliable data transfer through segmentation and reassembly.

B. It assigns IP addresses to devices and handles packet routing between
networks.
C. It manages data compression and encryption.

D. It provides end-to-end communication between processes.

A

B. It assigns IP addresses to devices and handles packet routing between networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the main role of Layer 4 (Transport) in the OSI model?

A. It maintains the communication sessions between devices.

B. It handles the logical addressing and routing of data packets.

C. It provides reliable data delivery and manages flow control.

D. It ensures data is encrypted before being transmitted.

A

C. It provides reliable data delivery and manages flow control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is the primary function of Layer 5 (Session) in the OSI model?

A. It manages the physical transmission of data between devices.

B. It maintains and controls the communication sessions between applications.

C. It encrypts and compresses data for transmission.

D. It handles the routing and forwarding of packets between networks.

A

B. It maintains and controls the communication sessions between applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the main purpose of Layer 6 (Presentation) in the OSI model?

A. It ensures the integrity of the transmitted data.

B. It maintains session management between communicating devices.

C. It assigns IP addresses and manages routing tables.

D. It provides encryption, compression, and translation of data formats.

A

D. It provides encryption, compression, and translation of data formats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which layer of the OSI model is responsible for providing network services to end-user applications?

A. Layer 1 (Physical)

B. Layer 4 (Transport)

C. Layer 7 (Application)

D. Layer 5 (Session)

A

C. Layer 7 (Application)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary function of a router in a network?

A. To forward data packets between devices within the same network.

B. To assign IP addresses to devices on the network.

C. To route data packets between different networks based on IP addresses.

D. To monitor network traffic for performance issues.

A

C. To route data packets between different networks based on IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the main function of a switch in a network?

A. To route data packets between networks based on IP addresses.

B. To store and manage files in a centralized location.

C. To forward data packets within the same network based on MAC addresses.

D. To secure network traffic by encrypting data.

A

C. To forward data packets within the same network based on MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the primary role of a firewall in network security?

A. To provide a secure gateway for routing data across different networks.

B. To prevent unauthorized access and monitor incoming and outgoing traffic based on security policies.

C. To detect and respond to network threats.

D. To handle encryption and decryption of data packets.

A

B. To prevent unauthorized access and monitor incoming and outgoing traffic based on security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary function of an Intrusion Detection System (IDS)?

A. To block malicious network traffic.

B. To prevent unauthorized access to network resources.

C. To assign IP addresses to devices on the network.

D. To detect and alert potential security threats in real-time.

A

D. To detect and alert on potential security threats in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the main difference between an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS)?

A. An IDS only detects threats, while an IPS detects and blocks threats in real-time.

B. An IDS is used for network management, while an IPS is used for encryption.

C. An IDS requires manual configuration, while an IPS is automated.

D. An IDS manages IP address assignments, while an IPS handles data traffic routing.

A

A. An IDS only detects threats, while an IPS detects and blocks threats in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of a load balancer in a network?

A. To monitor and secure the network’s data traffic.

B. To distribute incoming network traffic across multiple servers to ensure optimal resource usage.

C. To assign IP addresses to devices on the network.

D. To provide a centralized location for storing network data.

A

B. To distribute incoming network traffic across multiple servers to ensure optimal resource usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of a proxy in network security?

A. To allow devices to connect directly to the internet.

B. To act as an intermediary between clients and servers, often to filter content and provide anonymity.

C. To route data packets between different networks based on IP addresses.

D. To store network data in a centralized location.

A

B. To act as an intermediary between clients and servers, often to filter content and provide anonymity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does Network-attached Storage (NAS) provide in a network?

A. A system for providing high-speed internet access to multiple users.

B. A service for managing IP address assignments.

C. A solution for encrypting and securing network communications.

D. A centralized storage system that allows data access and file sharing over the network.

A

D. A centralized storage system that allows data access and file sharing over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary function of a Storage Area Network (SAN)?

A. To connect computers and devices within a local area network for file sharing.

B. To provide centralized, high-speed storage access over a network.

C. To secure network traffic by encrypting data.

D. To manage IP address assignments within a network.

A

B. To provide centralized, high-speed storage access over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of wireless technology in networking?

A. To provide a secure method for data transmission.

B. To allow devices to communicate over the air without physical connections.

C. To manage routing between different subnets

A

B. To allow devices to communicate over the air without physical connections.

18
Q

What does an Access Point (AP) do in a wireless network?

A. It connects wired devices to the wireless network.

B. It routes data between multiple subnets in a network.

C. It connects devices to the internet through a broadband connection.

D. It provides security by monitoring unauthorized wireless devices.

A

A. It connects wired devices to the wireless network.

19
Q

What is the purpose of applications in a network?

A. To manage network routing and IP address allocation.

B. To provide specific functionalities for end-users or devices within a network.

C. To secure data transmission over the network.

D. To monitor and optimize network traffic.

A

B. To provide specific functionalities for end-users or devices within a network.

19
Q

What is the role of a controller in a wireless network?

A. It encrypts the data transmitted between wireless devices.

B. It assigns IP addresses to devices on the wireless network.

C. It acts as a central point of management for multiple access points and devices.

D. It monitors and secures wireless communication channels.

A

C. It acts as a central point of management for multiple access points and devices.

20
Q

What is the role of a Content Delivery Network (CDN)?

A. To distribute content like images and videos to users based on geographic location.

B. To secure content by encrypting data during transmission.

C. To provide centralized storage for content in the cloud.

D. To assign IP addresses dynamically to devices requesting content.

A

A. To distribute content like images and videos to users based on geographic location.

21
Q

What is the primary function of a Virtual Private Network (VPN)?

A. To create a local area network between devices.

B. To assign a unique IP addresses to devices within a specific subnet.

C. To enable secure connections between remote users and a private network.

D. To monitor and manage internet traffic.

A

C. To enable secure connections between remote users and a private network.

22
Q

What does Quality of Service (QoS) ensure in a network?

A. It encrypts network data to improve security.

B. It assigns IP addresses to devices in a network.

C. It routes network traffic efficiently based on device type.

D. It prioritizes network traffic to ensure high-quality service for critical applications like voice and video.

A

D. It prioritizes network traffic to ensure high-quality service for critical applications like voice and video.

23
Q

What does Time to Live (TTL) represent in networking?

A. The maximum number of hops or routers a packet can traverse before being discarded.

B. The time it takes for data to travel from one device to another.

C. The amount of time a device waits before sending a response.

D. The lifespan of an IP address assignment in a network.

A

A. The maximum number of hops or routers a packet can traverse before being discarded.

24
Q

What does Network Functions Virtualization (NFV) provide in a network environment?

A. It provides a physical network infrastructure for all virtualized devices.

B. It assigns IP addresses to devices in a cloud-based network.

C. It virtualizes network infrastructure services, such as firewalls and routers, to reduce hardware dependencies.

D. It ensures data encryption during network traffic.

A

C. It virtualizes network infrastructure services, such as firewalls and routers, to reduce hardware dependencies.

25
Q

What is a Virtual Private Cloud (VPC)?

A. A private network hosted within a public cloud infrastructure, allowing for secure and isolated network resources.

B. A dedicated physical server managed entirely by the user within a data center.

C. A cloud service that manages IP address assignments for virtual machines.

D. A networking protocol used to securely transmit data over the internet.

A

A. A private network hosted within a public cloud infrastructure, allowing for secure and isolated network resources.

26
Q

What is the role of network security groups in cloud environments?

A. To configure the virtual private network settings for isolated communication.

B. To provide storage for data that needs to be accessed by multiple users.

C. To manage the IP addressing and routing for virtual networks.

D. To define rules that allow or deny network traffic to virtual machines based on security policies.

A

D. To define rules that allow or deny network traffic to virtual machines based on security policies.

27
Q

What is the function of a network security list in cloud environments?

A. To define a list of IP addresses allowed or denied access to cloud resources.

B. To configure access control policies for virtual machines.

C. To store network configuration settings for security groups.

D. To manage traffic routing between different subnets in the cloud.

A

A. To define a list of IP addresses allowed or denied access to cloud resources.

28
Q

What does a cloud gateway do in a cloud environment?

A. It manages the storage and access control for cloud applications.

B. It monitors network traffic to prevent security breaches.

C. It connects a private network to a public cloud, allowing secure communication between them.

D. It assigns IP addresses to devices within a cloud network.

A

C. It connects a private network to a public cloud, allowing secure communication between them.

29
Q

What is the role of an internet gateway in a cloud network?

A. It allows communication between a virtual private cloud and the internet.

B. It provides a secure tunnel for data transmission within the virtual private cloud.

C. It encrypts internet traffic to ensure secure communication.

D. It assigns private IP addresses to devices within the cloud network.

A

A. It allows communication between a virtual private cloud and the internet.

30
Q

What does a Network Address Translation (NAT) gateway do in a cloud environment?

A. It secures cloud traffic by encrypting data between devices.

B. It allocates IP addresses to devices within a cloud network.

C. It routes traffic between different subnets in the cloud.

D. It allows multiple devices in a private network to share a single public IP address for internet access.

A

D. It allows multiple devices in a private network to share a single public IP address for internet access.

31
Q

What is the purpose of VPN (Virtual Private Network) in cloud connectivity?

A. To route data traffic more efficiently between cloud-based virtual machines.

B. To store network configurations for cloud resources.

C. To create a secure, encrypted connection between a private network and a cloud service over the internet.

D. To monitor and control the bandwidth of cloud resources.

A

C. To create a secure, encrypted connection between a private network and a cloud service over the internet.

32
Q

What does Direct Connect provide in cloud connectivity?

A. A secure, encrypted connection between remote users and cloud resources.

B. A VPN solution to connect cloud services with external networks.

C. A virtualized network infrastructure for managing cloud resources.

D. A dedicated, high-speed, low-latency connection between an on-premises data center and a cloud provider.

A

D. A dedicated, high-speed, low-latency connection between an on-premises data center and a cloud provider.

33
Q

What is the primary characteristic of a PUBLIC cloud deployment model?

A. It is hosted by a third-party provider and shared among multiple customers.

B. It is hosted on private servers and used by a single organization.

C. It combines elements of both private and public clouds.

D. It offers dedicated hardware to a single customer, isolated from other customers.

A

A. It is hosted by a third-party provider and shared among multiple customers.

34
Q

What is the main feature of a PRIVATE cloud deployment model?

A. It is shared among multiple organizations for cost-effectiveness.

B. It is hosted and managed by a third-party service provider.

C. It is dedicated to a single organization and managed internally or by a third-party provider.

D. It is accessible only to a select group of users within a public infrastructure.

A

C. It is dedicated to a single organization and managed internally or by a third-party provider.

35
Q

What is the primary advantage of a hybrid cloud deployment model?

A. It provides dedicated resources to a single organization.

B. It combines private and public cloud features for greater flexibility and scalability.

C. It operates entirely in a public cloud, offering a single shared infrastructure.

D. It offers maximum security by using only on-premises resources.

A

B. It combines private and public cloud features for greater flexibility and scalability.

36
Q

What is the main characteristic of Software as a Service (SaaS)?

A. It provides a platform for developing and running applications without managing hardware.

B. It provides infrastructure for hosting and managing virtual machines and storage.

C. It provides users with tools to build applications with full control over the infrastructure.

D. It offers complete software applications hosted by a third-party provider.

A

D. It offers complete software applications hosted by a third-party provider.

37
Q

What is the main feature of Infrastructure as a Service (IaaS)?

A. It delivers software applications over the internet with no user management of the underlying hardware.

B. It offers virtualized computing resources like servers, storage, and networking over the cloud.

C. It provides a platform for developing, running, and managing applications without dealing with infrastructure.

D. It gives users access to databases and tools for building and deploying applications.

A

B. It offers virtualized computing resources like servers, storage, and networking over the cloud.

38
Q

What is the primary function of Platform as a Service (PaaS)?

A. To provide a fully managed software application to users.

B. To offer a platform for developers to build, run, and deploy applications without managing underlying infrastructure.

C. To deliver virtual machines and storage for running applications and managing data.

D. To host and manage databases for user applications.

A

B. To offer a platform for developers to build, run, and deploy applications without managing underlying infrastructure.

39
Q

What is meant by scalability in cloud computing?

A. The ability to handle increased workload by adding more resources to the system without compromising performance.

B. The ability to restrict the number of users accessing the cloud infrastructure.

C. The ability to ensure data security through encryption and access controls.

D. The ability to limit the number of applications running on the cloud platform.

A

A. The ability to handle increased workload by adding more resources to the system without compromising performance.

40
Q

What is elasticity in cloud computing?

A. The ability to store data securely in a private cloud infrastructure.

B. The ability to maintain data consistency across multiple servers.

C. The ability to automatically scale resources up or down based on demand.

D. The ability to perform secure encryption on data being transmitted between cloud services.

A

C. The ability to automatically scale resources up or down based on demand.