Week 3: Wired and Wireless LANs Flashcards
What does LAN architecture encompass?
A. The design and structure of networks within a limited area
B. The design of global networks
C. The structure of internet connections
D. The layout of personal devices
A. The design and structure of networks within a limited area
Explanation: LAN architecture encompasses the design and structure of networks within a limited area, defining how devices are interconnected.
What does network topology refer to?
A. The speed of data transmission
B. The physical and logical arrangement of nodes and connections in a network
C. The type of network protocols used
D. The security measures in place
B. The physical and logical arrangement of nodes and connections in a network
Explanation: Network topology refers to the physical and logical arrangement of nodes and connections in a computer network, which governs how data flows between devices.
What is physical topology?
A. The software configuration of a network
B. The layout of cabling, the location of nodes, and the interconnection between nodes and cabling
C. The logical flow of data
D. The security architecture of a network
B. The layout of cabling, the location of nodes, and the interconnection between nodes and cabling
Explanation: Physical topology refers to the layout of cabling, the location of the nodes, and the interconnection between the nodes and the cabling.
What is a point-to-point topology?
A. A dedicated path between two nodes or devices
B. A shared path among multiple devices
C. A circular path connecting all devices
D. A hierarchical path with a central node
A. A dedicated path between two nodes or devices
Explanation: Point-to-point topology has a dedicated path between two nodes or devices, making it the simplest topology.
How does data travel in a bus topology?
A. In a circular path
B. In both directions along a single central cable
C. Directly between nodes without a central cable
D. Through a central hub
B. In both directions along a single central cable
Explanation: In a bus topology, each node is connected to a single central cable (the bus), and data travels in both directions along this cable.
What is the central node in a star topology called?
A. Bus
B. Ring
C. Hub, router, or switch
D. Mesh
C. Hub, router, or switch
Explanation: In a star topology, each node is connected to a single central node called a hub, router, or switch, which acts as a signal repeater.
ow does data travel in a ring topology?
A. Directly between nodes without a central cable
B. In a closed loop, passing through each intermediate node
C. Through a central hub
D. In a hierarchical path with a central node
B. In a closed loop, passing through each intermediate node
Explanation: In a ring topology, data travels in a closed loop, passing through each intermediate node until it reaches its destination.
What is the root node in a tree topology?
A. A central hub
B. The main node to which all other nodes are connected, forming a hierarchy
C. A node at the end of the network
D. A node that connects to multiple networks
B. The main node to which all other nodes are connected, forming a hierarchy
Explanation: In a tree topology, there is a root node to which all other nodes are connected, forming a hierarchical structure.
How are nodes connected in a mesh topology?
A. Through a central hub
B. In a closed loop
C. Through point-to-point connections with each other
D. In a hierarchical path with a central node
C. Through point-to-point connections with each other
Explanation: In a mesh topology, nodes are connected through point-to-point connections with each other, creating multiple paths for data to travel.
What is a hybrid topology?
A. A single type of topology
B. A mixture of one or more topologies, such as bus, mesh, star, and tree
C. A topology with no central node
D. A topology with only wireless connections
B. A mixture of one or more topologies, such as bus, mesh, star, and tree
Explanation: A hybrid topology is a mixture of one or more topologies, combining elements of bus, mesh, star, and tree topologies.
What is the role of a server in a network?
A. To access shared network resources
B. To provide shared resources to network users
C. To function as both client and server
D. To connect to the internet
B. To provide shared resources to network users
Explanation: A server is a computer that provides shared resources, such as files, printers, and applications, to network users.
What is the speed of 100Base-TX Ethernet?
A. 10 Mbps
B. 100 Mbps
C. 1 Gbps
D. 10 Gbps
B. 100 Mbps
Explanation: 100Base-TX Ethernet, also known as Fast Ethernet, operates at a speed of 100 Mbps.
What type of cabling does 1000Base-T Ethernet use?
A. Fiber-optic cable
B. Category 5 UTP wiring
C. Coaxial cable
D. Category 3 UTP wiring
B. Category 5 UTP wiring
Explanation: 1000Base-T Ethernet, also known as Gigabit Ethernet, uses Category 5 UTP wiring.
What is unauthorized access in the context of network security?
A. Accessing shared resources with permission
B. Gaining access to networks, systems, applications, data, or devices without permission
C. Installing security software
D. Monitoring network traffic
B. Gaining access to networks, systems, applications, data, or devices without permission
Explanation: Unauthorized access occurs when individuals gain access to an organization’s networks, systems, applications, data, or devices without permission.
What is malware?
A. A type of network protocol
B. A program or code created with the intent to harm a computer, network, or server
C. A security measure
D. A type of encryption
B. A program or code created with the intent to harm a computer, network, or server
Explanation: Malware is a term used to describe any program or code that is created with the intent to do harm to a computer, network, or server.
What is an insider threat?
A. A threat from external hackers
B. A risk posed by individuals within the organization
C. A type of malware
D. A network protocol vulnerability
B. A risk posed by individuals within the organization
Explanation: Insider threats present a complex and dynamic risk affecting the public and private domains of all critical infrastructure sectors, posed by individuals within the organization.
What can poor security hygiene lead to?
A. Improved network performance
B. Security incidents, data compromise, and data loss
C. Faster data transmission
D. Enhanced encryption
B. Security incidents, data compromise, and data loss
Explanation: Poor security hygiene can lead to security incidents, data compromise, and data loss, making it crucial to maintain good security practices.
What is a challenge of lack of network monitoring?
A. Lack of uniformity in networks and scalability issues
B. Increased network speed
C. Enhanced security
D. Simplified network management
A. Lack of uniformity in networks and scalability issues
Explanation: Lack of network monitoring can lead to challenges such as lack of uniformity in networks and scalability issues, making it difficult to detect and respond to security threats.
What is the maximum length for a 100Base-FX Ethernet cable?
A. 100 meters
B. 412 meters
C. 25 meters
D. 1000 meters
B. 412 meters
Explanation: 100Base-FX Ethernet, a version of Fast Ethernet, uses multi-mode optical fiber and can have a maximum length of up to 412 meters.
What type of cabling does 1000Base-SX Ethernet use?
A. Copper twisted-pair cabling
B. Multimode fiber-optic cable
C. Single-mode fiber
D. Coaxial cable
B. Multimode fiber-optic cable
Explanation: 1000Base-SX Ethernet uses multimode fiber-optic cable for 1 Gigabit Ethernet connections.
What is the speed of 10GBase-T Ethernet?
A. 1 Gbps
B. 100 Mbps
C. 10 Gbps
D. 1000 Mbps
C. 10 Gbps
Explanation: 10GBase-T Ethernet provides 10 Gbps connections over category 5e, 6, and 7 UTP cables.
What is MAC filtering used for in wireless LANs?
A. Encrypting data
B. Controlling access to the network based on device MAC addresses
C. Monitoring network traffic
D. Detecting malware
B. Controlling access to the network based on device MAC addresses
Explanation: MAC filtering is used to control access to the network by allowing or denying devices based on their MAC addresses.
What is WPA2?
A. A type of malware
B. A network topology
C. A wireless security protocol
D. A type of Ethernet cable
C. A wireless security protocol
Explanation: WPA2 (Wi-Fi Protected Access II) is a wireless security protocol used to secure wireless LANs by encrypting data transmitted over the network.
What is the main purpose of network monitoring?
A. Increasing network speed
B. Detecting and responding to security threats
C. Simplifying network management
D. Enhancing encryption
B. Detecting and responding to security threats
Explanation: Network monitoring is essential for detecting and responding to security threats, ensuring the network remains secure and operational.
What is a common consequence of poor security hygiene?
A. Improved network performance
B. Security incidents and data compromise
C. Faster data transmission
D. Enhanced encryption
B. Security incidents and data compromise
Explanation: Poor security hygiene can lead to security incidents and data compromise, making it crucial to maintain good security practices.