h Flashcards

(46 cards)

1
Q

What is a network?

A

A network is a collection of computers, servers, mainframes, network devices, and other hardware interconnected by communication channels that allow sharing of data and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Networks can only be wired.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: A _____ is a device that forwards data packets between computer networks.

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does LAN stand for?

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which layer of the OSI model is responsible for data encryption?

A

Presentation layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What protocol is used for secure communication over a computer network?

A

SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Multiple Choice: Which of the following is NOT a type of network topology? A) Star B) Ring C) Square D) Mesh

A

C) Square

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary function of a switch in a network?

A

To connect devices within a LAN and filter traffic based on MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: The Internet is a global network of interconnected networks.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank: The _____ protocol is used to send email messages.

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does IP stand for in networking contexts?

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of a firewall?

A

To monitor and control incoming and outgoing network traffic based on predetermined security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multiple Choice: Which of the following is a private IP address? A) 192.168.1.1 B) 8.8.8.8 C) 172.16.0.1 D) Both A and C

A

D) Both A and C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the primary difference between TCP and UDP?

A

TCP is connection-oriented and ensures reliable delivery, while UDP is connectionless and does not guarantee delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False: IPv6 uses a 128-bit address scheme.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: The _____ layer of the OSI model is responsible for end-to-end communication.

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does DNS stand for?

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the role of a modem in a network?

A

To modulate and demodulate signals for data transmission over telephone lines or cable systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Multiple Choice: Which of the following is NOT a routing protocol? A) RIP B) OSPF C) HTTP D) BGP

20
Q

What is bandwidth?

A

The maximum rate of data transfer across a network path.

21
Q

True or False: A VPN encrypts your internet connection.

22
Q

Fill in the blank: In networking, _____ refers to the process of dividing a network into smaller, manageable sections.

23
Q

What does NAT stand for?

A

Network Address Translation

24
Q

What is a network protocol?

A

A set of rules governing the exchange of data between devices on a network.

25
Multiple Choice: Which layer of the OSI model does the HTTP protocol operate on? A) Application B) Transport C) Network D) Data Link
A) Application
26
What is a MAC address?
A unique identifier assigned to network interfaces for communications at the data link layer.
27
True or False: A hub operates at the network layer of the OSI model.
False
28
Fill in the blank: The _____ is the part of the network that connects user devices to the internet.
gateway
29
What is the purpose of DHCP?
To dynamically assign IP addresses to devices on a network.
30
Multiple Choice: Which of the following is a common security protocol for wireless networks? A) WEP B) WPA C) WPA2 D) All of the above
D) All of the above
31
What is a topology in networking?
The arrangement of different elements (links, nodes, etc.) in a computer network.
32
True or False: A client-server model requires a central server to handle requests from clients.
True
33
Fill in the blank: The _____ is a protocol used to retrieve web pages.
HTTP
34
What does QoS stand for?
Quality of Service
35
What is the function of an access point in a wireless network?
To allow wireless devices to connect to a wired network.
36
Multiple Choice: Which of the following is a characteristic of a peer-to-peer network? A) Centralized control B) Resource sharing C) High scalability D) All of the above
B) Resource sharing
37
What is the significance of the OSI model?
It provides a framework for understanding and implementing networking protocols in seven layers.
38
True or False: The application layer is the lowest layer of the OSI model.
False
39
Fill in the blank: In networking, _____ refers to the process of converting data into a format suitable for transmission.
encoding
40
What is the primary purpose of a VPN?
To provide a secure connection over a less secure network, such as the Internet.
41
Multiple Choice: Which protocol is used for file transfer? A) FTP B) SMTP C) SNMP D) ICMP
A) FTP
42
What is a subnet mask?
A 32-bit number that divides an IP address into network and host portions.
43
True or False: IPv4 addresses are 64 bits long.
False
44
Fill in the blank: The _____ is a device that connects and routes traffic between different networks.
router
45
What does the term 'latency' refer to in networking?
The time delay experienced in a system, often measured as the time it takes for a data packet to travel from source to destination.
46
Multiple Choice: Which of the following is a type of network security attack? A) Phishing B) DDoS C) Man-in-the-Middle D) All of the above
D) All of the above