Week 3: Wired and Wireless LANs Flashcards

1
Q

What does LAN architecture encompass?

A. The design and structure of networks within a limited area
B. The design of global networks
C. The structure of internet connections
D. The layout of personal devices

A

A. The design and structure of networks within a limited area

Explanation: LAN architecture encompasses the design and structure of networks within a limited area, defining how devices are interconnected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does network topology refer to?

A. The speed of data transmission
B. The physical and logical arrangement of nodes and connections in a network
C. The type of network protocols used
D. The security measures in place

A

B. The physical and logical arrangement of nodes and connections in a network

Explanation: Network topology refers to the physical and logical arrangement of nodes and connections in a computer network, which governs how data flows between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is physical topology?

A. The software configuration of a network
B. The layout of cabling, the location of nodes, and the interconnection between nodes and cabling
C. The logical flow of data
D. The security architecture of a network

A

B. The layout of cabling, the location of nodes, and the interconnection between nodes and cabling

Explanation: Physical topology refers to the layout of cabling, the location of the nodes, and the interconnection between the nodes and the cabling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a point-to-point topology?

A. A dedicated path between two nodes or devices
B. A shared path among multiple devices
C. A circular path connecting all devices
D. A hierarchical path with a central node

A

A. A dedicated path between two nodes or devices

Explanation: Point-to-point topology has a dedicated path between two nodes or devices, making it the simplest topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does data travel in a bus topology?

A. In a circular path
B. In both directions along a single central cable
C. Directly between nodes without a central cable
D. Through a central hub

A

B. In both directions along a single central cable

Explanation: In a bus topology, each node is connected to a single central cable (the bus), and data travels in both directions along this cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the central node in a star topology called?

A. Bus
B. Ring
C. Hub, router, or switch
D. Mesh

A

C. Hub, router, or switch

Explanation: In a star topology, each node is connected to a single central node called a hub, router, or switch, which acts as a signal repeater.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ow does data travel in a ring topology?

A. Directly between nodes without a central cable
B. In a closed loop, passing through each intermediate node
C. Through a central hub
D. In a hierarchical path with a central node

A

B. In a closed loop, passing through each intermediate node

Explanation: In a ring topology, data travels in a closed loop, passing through each intermediate node until it reaches its destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the root node in a tree topology?

A. A central hub
B. The main node to which all other nodes are connected, forming a hierarchy
C. A node at the end of the network
D. A node that connects to multiple networks

A

B. The main node to which all other nodes are connected, forming a hierarchy

Explanation: In a tree topology, there is a root node to which all other nodes are connected, forming a hierarchical structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How are nodes connected in a mesh topology?

A. Through a central hub
B. In a closed loop
C. Through point-to-point connections with each other
D. In a hierarchical path with a central node

A

C. Through point-to-point connections with each other

Explanation: In a mesh topology, nodes are connected through point-to-point connections with each other, creating multiple paths for data to travel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a hybrid topology?

A. A single type of topology
B. A mixture of one or more topologies, such as bus, mesh, star, and tree
C. A topology with no central node
D. A topology with only wireless connections

A

B. A mixture of one or more topologies, such as bus, mesh, star, and tree

Explanation: A hybrid topology is a mixture of one or more topologies, combining elements of bus, mesh, star, and tree topologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of a server in a network?

A. To access shared network resources
B. To provide shared resources to network users
C. To function as both client and server
D. To connect to the internet

A

B. To provide shared resources to network users

Explanation: A server is a computer that provides shared resources, such as files, printers, and applications, to network users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the speed of 100Base-TX Ethernet?

A. 10 Mbps
B. 100 Mbps
C. 1 Gbps
D. 10 Gbps

A

B. 100 Mbps

Explanation: 100Base-TX Ethernet, also known as Fast Ethernet, operates at a speed of 100 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of cabling does 1000Base-T Ethernet use?

A. Fiber-optic cable
B. Category 5 UTP wiring
C. Coaxial cable
D. Category 3 UTP wiring

A

B. Category 5 UTP wiring

Explanation: 1000Base-T Ethernet, also known as Gigabit Ethernet, uses Category 5 UTP wiring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is unauthorized access in the context of network security?

A. Accessing shared resources with permission
B. Gaining access to networks, systems, applications, data, or devices without permission
C. Installing security software
D. Monitoring network traffic

A

B. Gaining access to networks, systems, applications, data, or devices without permission

Explanation: Unauthorized access occurs when individuals gain access to an organization’s networks, systems, applications, data, or devices without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is malware?

A. A type of network protocol
B. A program or code created with the intent to harm a computer, network, or server
C. A security measure
D. A type of encryption

A

B. A program or code created with the intent to harm a computer, network, or server

Explanation: Malware is a term used to describe any program or code that is created with the intent to do harm to a computer, network, or server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an insider threat?

A. A threat from external hackers
B. A risk posed by individuals within the organization
C. A type of malware
D. A network protocol vulnerability

A

B. A risk posed by individuals within the organization

Explanation: Insider threats present a complex and dynamic risk affecting the public and private domains of all critical infrastructure sectors, posed by individuals within the organization.

17
Q

What can poor security hygiene lead to?

A. Improved network performance
B. Security incidents, data compromise, and data loss
C. Faster data transmission
D. Enhanced encryption

A

B. Security incidents, data compromise, and data loss

Explanation: Poor security hygiene can lead to security incidents, data compromise, and data loss, making it crucial to maintain good security practices.

18
Q

What is a challenge of lack of network monitoring?

A. Lack of uniformity in networks and scalability issues
B. Increased network speed
C. Enhanced security
D. Simplified network management

A

A. Lack of uniformity in networks and scalability issues

Explanation: Lack of network monitoring can lead to challenges such as lack of uniformity in networks and scalability issues, making it difficult to detect and respond to security threats.

19
Q

What is the maximum length for a 100Base-FX Ethernet cable?

A. 100 meters
B. 412 meters
C. 25 meters
D. 1000 meters

A

B. 412 meters

Explanation: 100Base-FX Ethernet, a version of Fast Ethernet, uses multi-mode optical fiber and can have a maximum length of up to 412 meters.

20
Q

What type of cabling does 1000Base-SX Ethernet use?

A. Copper twisted-pair cabling
B. Multimode fiber-optic cable
C. Single-mode fiber
D. Coaxial cable

A

B. Multimode fiber-optic cable

Explanation: 1000Base-SX Ethernet uses multimode fiber-optic cable for 1 Gigabit Ethernet connections.

21
Q

What is the speed of 10GBase-T Ethernet?

A. 1 Gbps
B. 100 Mbps
C. 10 Gbps
D. 1000 Mbps

A

C. 10 Gbps

Explanation: 10GBase-T Ethernet provides 10 Gbps connections over category 5e, 6, and 7 UTP cables.

22
Q

What is MAC filtering used for in wireless LANs?

A. Encrypting data
B. Controlling access to the network based on device MAC addresses
C. Monitoring network traffic
D. Detecting malware

A

B. Controlling access to the network based on device MAC addresses

Explanation: MAC filtering is used to control access to the network by allowing or denying devices based on their MAC addresses.

23
Q

What is WPA2?

A. A type of malware
B. A network topology
C. A wireless security protocol
D. A type of Ethernet cable

A

C. A wireless security protocol

Explanation: WPA2 (Wi-Fi Protected Access II) is a wireless security protocol used to secure wireless LANs by encrypting data transmitted over the network.

24
Q

What is the main purpose of network monitoring?

A. Increasing network speed
B. Detecting and responding to security threats
C. Simplifying network management
D. Enhancing encryption

A

B. Detecting and responding to security threats

Explanation: Network monitoring is essential for detecting and responding to security threats, ensuring the network remains secure and operational.

25
Q

What is a common consequence of poor security hygiene?

A. Improved network performance
B. Security incidents and data compromise
C. Faster data transmission
D. Enhanced encryption

A

B. Security incidents and data compromise

Explanation: Poor security hygiene can lead to security incidents and data compromise, making it crucial to maintain good security practices.