Anki_Network_Questions Flashcards

(16 cards)

1
Q

What is the OSI model and how does it compare to the TCP/IP model?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the differences between TCP and UDP? Give examples.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the differences between private and public IP addresses? Provide examples.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does the DHCP service help manage IP address distribution in a large network?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the function of a router and how does it differ from a switch?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a VLAN and how does it work in a network?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the benefits of using VLANs for different departments in an organization?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the differences between LAN and WAN?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Ping and how does it work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Traceroute and how does it work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the key differences between IPv4 and IPv6? Why is IPv6 necessary for the future?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of DNS and how does it work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the differences between TCP and UDP? Give examples.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the TCP 3-way handshake? Explain using a diagram.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is CIAAN in network security and why is it important?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are three common network security threats, and how can network security principles mitigate them?