leerstof klas Flashcards

(185 cards)

1
Q

What type of network does LAN stand for?

A

Local Area Network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the definition of WAN?

A

Wide Area Network, covering large geographic areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the typical speeds for LANs?

A

1 Gbps to 100 Gbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What technology is commonly used for WANs?

A

MPLS, VPN, Leased Line, SD-WAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary difference in ownership between LAN and WAN?

A

LAN is usually owned by the organization, while WAN is often a leased service from ISPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fill in the blank: UTP stands for _______.

A

Unshielded Twisted Pair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the maximum distance for UTP cables?

A

100 meters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of network topology uses a central hub?

A

Star topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a key advantage of the mesh topology?

A

Full redundancy, as every node connects to every other node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an example of a personal area network (PAN) technology?

A

Bluetooth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two main classifications of IPv4 addresses?

A

Public and private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: Private IPv4 addresses can be accessed directly from the internet.

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What protocol is used for dynamic IP address assignment?

A

Dynamic Host Configuration Protocol (DHCP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the range of a private IPv4 address for small networks?

A

192.168.0.0 - 192.168.255.255.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the primary use of fiber optic cables?

A

Long-distance and high-speed connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the maximum speed of a single-mode fiber optic cable?

A

100 Gbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the two types of fiber optic cables?

A
  • Single-Mode Fiber (SMF) * Multi-Mode Fiber (MMF)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the risk associated with bus topology?

A

Collision risk and difficult troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the maximum distance for coaxial cable?

A

500 meters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the primary disadvantage of the star topology?

A

Single point of failure (hub).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of network covers a city or metropolitan region?

A

Metropolitan Area Network (MAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a primary usage of STP cables?

A

Used in factories or areas with high electromagnetic interference (EMI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the coverage range of a PAN?

A

1 to 10 meters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What technology is used in WANs for connecting data centers?

A

MPLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Fill in the blank: The maximum speed for Wi-Fi is _______.
9.6 Gbps.
26
What is the definition of a loop prevention method in networking?
Spanning Tree Protocol (STP).
27
What is a disadvantage of the hybrid topology?
Complex setup and costly.
28
What type of devices are typically connected in a LAN?
Computers, printers, servers, routers, switches.
29
What is the range of private IPv4 addresses?
168.0.0 - 192.168.255.255
30
What are private networks typically used for?
Home, Office
31
What is the definition of public IPv4 addresses?
Anything outside the private range
32
What is required for private IPs to communicate online?
NAT (Network Address Translation)
33
What does DHCP stand for?
Dynamic Host Configuration Protocol
34
What is the purpose of DHCP?
Automatically assigns IP addresses and other network configuration parameters
35
What are the benefits of using DHCP?
* Simplifies network management * Reduces configuration errors * Automates IP address allocation
36
What is a key function of a DHCP server?
Assigns IP addresses to clients
37
True or False: Multiple DHCP servers can work in failover mode.
True
38
What is the function of the Root DNS Server?
Directs the resolver to the Top-Level Domain (TLD) server
39
What is the role of the TLD DNS Server?
Responds with information about the authoritative DNS server for a domain
40
What does the Authoritative DNS Server contain?
The actual IP address of a domain
41
What is the purpose of a DNS resolver?
Translates domain names into IP addresses
42
Fill in the blank: The __________ is like the phonebook of the internet.
Domain Name System (DNS)
43
What is the primary DNS address for Google?
8.8.8.8
44
What is a subnet?
A segmented piece of a larger network
45
In regular subnets, what is the first IP address used for?
Network address
46
In regular subnets, what is the last IP address used for?
Broadcast address
47
What CIDR notation allows for point-to-point links?
/31
48
What is the block size for a /24 subnet?
256
49
What is the maximum number of hosts in a /16 subnet?
65,534
50
What does CIDR stand for?
Classless Inter-Domain Routing
51
What is the CIDR notation for a Class A network?
/8
52
True or False: Class D addresses are used for multicast.
True
53
What is the range of Class E addresses?
240.x.x.x - 255.x.x.x
54
Why won't you see a /7 CIDR block in local subnets?
Too large for practical use in local networks
55
What is the purpose of DHCP relay (IP Helper)?
To centralize DHCP in larger networks
56
What does a DHCP server do in failover mode?
One server takes over if the other fails
57
Fill in the blank: The first IP in a subnet is called the _______.
network address
58
What happens if a DNS resolver does not have a cached IP address?
It queries the Root DNS Server
59
What is the maximum number of hosts in a /30 subnet?
2
60
What does CIDR stand for?
Classless Inter-Domain Routing ## Footnote CIDR is used to allocate IP addresses more efficiently.
61
What is Class D IP range?
224.x.x.x - 239.x.x.x ## Footnote Class D is used for multicast applications like IP-TV and video streaming.
62
What is the function of the OSI Model?
Explains how data travels from one device to another across a network ## Footnote The OSI model serves as a framework for understanding network processes.
63
How many layers are in the OSI Model?
Seven ## Footnote Each layer has a specific role in network communication.
64
What is the starting IP range for Class A?
1.0.0.0 - 126.0.0.0 ## Footnote Class A is used for large networks.
65
What is the typical use of Class B IP addresses?
Medium networks ## Footnote Class B IP range is 128.0.0.0 - 191.255.0.0.
66
Fill in the blank: The OSI model offers a _______ list of processes on a network.
chronological ## Footnote This helps in troubleshooting network issues.
67
What is the function of the Application layer in the OSI Model?
Allows users to interact with network applications ## Footnote Examples include HTTP, FTP, and DNS.
68
What layer of the OSI Model is responsible for data formatting and encryption?
Presentation layer ## Footnote This layer converts data for applications and compresses or encrypts it.
69
What is the main function of the Transport layer?
Ensures complete, error-free data delivery ## Footnote Protocols include TCP and UDP.
70
MAC addresses operate at which OSI layer?
Layer 2 (Data Link Layer) ## Footnote MAC addresses are used for local network communication.
71
What is the format of an IPv4 address?
32-bit ## Footnote Example: 192.168.1.10.
72
True or False: MAC addresses can change dynamically.
False ## Footnote MAC addresses are burned into network interfaces.
73
What does a Router do in the OSI Model?
Uses IP addresses to route packets ## Footnote Routers operate at Layer 3 (Network).
74
What is the primary difference between a Layer 2 switch and a Layer 3 switch?
Layer 2 switch uses MAC addresses, Layer 3 switch uses IP addresses ## Footnote Layer 3 switches can also perform routing.
75
What is the function of the Firewall in the OSI Model?
Filters traffic based on IPs and ports ## Footnote Firewalls operate at Layers 3 and 4.
76
What type of protocol is TCP?
Connection-oriented ## Footnote TCP requires a handshake to establish a connection.
77
What does UDP stand for?
User Datagram Protocol ## Footnote UDP is a connectionless protocol.
78
Fill in the blank: TCP is _______ while UDP is unreliable.
reliable ## Footnote TCP ensures all data is received correctly.
79
What is the typical usage of UDP?
Applications needing speed like VoIP and gaming ## Footnote UDP skips error checking for faster communication.
80
What is the function of port 80?
HTTP (Web Browsing - Insecure) ## Footnote Commonly used by web servers.
81
What type of applications typically use TCP?
Applications needing accuracy ## Footnote Examples include web browsers and email clients.
82
What is the primary purpose of DHCP?
Assigns IP addresses dynamically ## Footnote DHCP operates on ports 67 and 68.
83
Fill in the blank: A Hub operates at OSI Layer _______.
1 (Physical) ## Footnote Hubs simply repeat signals.
84
What is the function of the Session layer?
Manages communication sessions ## Footnote Examples include RPC and SSH.
85
What is the typical use of port 443?
HTTPS (Secure Web Browsing) ## Footnote Used for secure communication over the web.
86
What is the function of the Data Link layer?
Handles switching, MAC addresses, and error detection ## Footnote Examples include Ethernet and ARP.
87
What does the Physical layer deal with?
Cables, signals, and network interfaces ## Footnote Examples include Ethernet cables and Wi-Fi.
88
What does UDP stand for?
User Datagram Protocol ## Footnote UDP is used for fast communication but does not guarantee data integrity.
89
What does TCP stand for?
Transmission Control Protocol ## Footnote TCP is used for reliable communication, ensuring data integrity.
90
What is the primary focus of UDP?
Speed ## Footnote UDP prioritizes low latency for applications like streaming and gaming.
91
What is the primary focus of TCP?
Reliability ## Footnote TCP ensures that data is received accurately and in order.
92
What is the purpose of the TCP Three-Way Handshake?
Establish a reliable connection ## Footnote It involves SYN, SYN-ACK, and ACK messages for connection setup.
93
What are the three steps of the TCP Three-Way Handshake?
* SYN * SYN-ACK * ACK ## Footnote These steps ensure a connection is established between client and server.
94
What is the function of TCP's flow control?
Adjust speed for efficiency ## Footnote It uses mechanisms like window size and sliding window protocol.
95
What is the purpose of error control in TCP?
Ensure accurate delivery ## Footnote It utilizes checksums and retransmissions to confirm data integrity.
96
What is the four-way handshake used for in TCP?
Connection termination ## Footnote It involves FIN and ACK messages to properly close a connection.
97
When should TCP be used?
When reliability is critical ## Footnote Examples include web browsing, email, and file transfers.
98
When should UDP be used?
When speed is more important than reliability ## Footnote Examples include streaming, gaming, and VoIP calls.
99
What are the four layers of the TCP/IP model?
* Application * Transport * Internet * Network Access ## Footnote Each layer has specific functions and protocols.
100
What protocols are included in the Application layer of the TCP/IP model?
* HTTP * HTTPS * FTP * SMTP * DNS * DHCP * SNMP * POP3 * IMAP ## Footnote This layer provides services for applications and users.
101
What is the main function of the Transport layer in TCP/IP?
Manages end-to-end communication and reliability ## Footnote Protocols include TCP and UDP.
102
What is the equivalent OSI layer for the TCP/IP Transport layer?
Layer 4 ## Footnote This layer handles reliable and unreliable data transmission.
103
What is the purpose of the Internet layer in TCP/IP?
Routes packets across networks ## Footnote Protocols include IP, ICMP, ARP, and others.
104
What protocols are found in the Network Access layer of the TCP/IP model?
* Ethernet * Wi-Fi * PPP * Frame Relay * ATM ## Footnote This layer handles physical data transmission.
105
What is the OSI model used for?
Learning networking concepts and troubleshooting ## Footnote It provides a framework for understanding network functions.
106
What are the seven layers of the OSI model?
* Application * Presentation * Session * Transport * Network * Data Link * Physical ## Footnote Each layer serves a specific function in network communication.
107
What is the first step in how the internet works?
Device connects to network ## Footnote This involves connecting via Wi-Fi, Ethernet, or cellular data.
108
What happens when you type a domain name into a browser?
A DNS resolution occurs ## Footnote The device queries a DNS server to find the corresponding IP address.
109
What is the role of routers in the internet?
Forward packets across multiple networks ## Footnote Routers ensure data reaches its destination server.
110
What is involved in designing a LAN?
* Determine network requirements * Select topology * Plan IP addressing * Choose network hardware * Implement security measures * Ensure redundancy * Deploy monitoring ## Footnote These steps help create an efficient and secure network.
111
What are some key factors in LAN design?
* Topology * Scalability * Performance * Security * Reliability & Redundancy * Addressing & Subnetting * Network Devices * Cable Infrastructure ## Footnote Each factor plays a crucial role in the effectiveness of the network.
112
What is the purpose of Quality of Service (QoS)?
Traffic prioritization ## Footnote QoS ensures critical applications receive higher priority for performance.
113
What is Cisco Packet Tracer used for?
Simulates network topology and behavior ## Footnote It is beneficial for network learning and CCNA students.
114
What is Wireshark primarily used for?
Analyzes network traffic and packets ## Footnote It is a key tool for network troubleshooting and security.
115
What is SDN?
Software-Defined Networking (SDN) is a network architecture that separates the control plane from the data plane, enabling centralized network management, automation, and programmability.
116
How does SDN differ from traditional networking?
In traditional networking, each switch/router makes its own decisions about packet forwarding. In SDN, a centralized controller decides how traffic should be handled across the entire network.
117
What is the control plane in SDN?
The control plane is centralized in SDN, managed by the SDN Controller, which oversees traffic management.
118
What is SD-WAN?
Software-Defined Wide Area Network (SD-WAN) is a virtualized WAN architecture that enables businesses to securely connect branch offices, data centers, and cloud applications using software-based intelligent routing.
119
What are the main features of SD-WAN?
SD-WAN features include traffic optimization, centralized control, built-in security, application awareness, and cloud integration.
120
Fill in the blank: SD-WAN uses _______ to dynamically select the best path for network traffic.
[multiple internet links]
121
What is the primary purpose of a firewall?
The primary purpose of a firewall is to protect against cyber threats by monitoring and controlling incoming and outgoing traffic based on security rules.
122
How does SD-WAN manage traffic?
SD-WAN manages traffic through intelligent path selection, prioritizing business-critical applications, and optimizing WAN connectivity.
123
What are the connectivity options for SD-WAN?
SD-WAN supports MPLS, broadband, LTE, 5G, and satellite connectivity.
124
True or False: Traditional WANs require backhauling for cloud integration.
True
125
What is the main difference between SD-WAN and traditional WAN?
SD-WAN is software-defined and uses dynamic routing, while traditional WAN is hardware-based with fixed routing.
126
What is the role of application awareness in SD-WAN?
Application awareness in SD-WAN allows prioritization of business-critical applications like VoIP and video conferencing over less important traffic.
127
List three key features of SDN.
* Centralized control * Programmable network management * Dynamic routing
128
What security features are typically included in SD-WAN?
* Built-in encryption * Firewall integration * Zero Trust architecture
129
Fill in the blank: The primary function of a router is to _______.
[route data between networks]
130
What is the main function of a WAF?
A Web Application Firewall (WAF) protects web applications from attacks like SQL injection, XSS, and DDoS.
131
How does SD-WAN provide redundancy?
SD-WAN offers advanced failover with multi-link auto-switching for WAN resilience.
132
What are example technologies used in SDN?
* OpenFlow * VMware NSX * Cisco ACI * Juniper Contrail
133
What is the difference in deployment area between SDN and SD-WAN?
SDN is used in data centers, cloud networks, and enterprise LANs, while SD-WAN is used in multi-branch office networks and hybrid cloud environments.
134
True or False: SD-WAN optimizes WAN traffic based on network conditions.
True
135
What is a key advantage of SD-WAN over traditional WAN?
SD-WAN has lower costs as it uses broadband and LTE instead of expensive MPLS circuits.
136
What does SD-WAN use to monitor real-time network conditions?
SD-WAN uses intelligent routing to monitor real-time network conditions.
137
What is the primary focus of SDN?
SDN primarily manages network traffic within data centers, cloud environments, and enterprise LANs.
138
What is the security capability of a typical firewall?
Firewalls include IPS/IDS, VPN, malware protection, and threat intelligence.
139
List the key features of Cisco SD-WAN.
* Cloud-managed * Deep security integration * Scalable
140
Fill in the blank: SD-WAN prioritizes _______ applications over less important traffic.
[business-critical]
141
What type of traffic management does SD-WAN provide?
SD-WAN provides intelligent path selection, QoS, and load balancing.
142
How does SD-WAN handle encryption?
SD-WAN supports secure tunnels using IPSec, ZTNA, and SASE models.
143
What is the best use case for SD-WAN?
SD-WAN is ideal for WAN optimization, cloud application performance, and secure remote branch connectivity.
144
What is web application security?
Provides full application-layer security (Layer 7 protection) for web applications.
145
What is basic failover in the context of VPNs and firewalls?
Basic failover for VPNs and firewalls.
146
What does advanced failover involve?
Multi-link auto-switching for WAN resilience.
147
What is the role of CDN and DDoS protection in web application security?
Ensures web application availability through CDN and DDoS protection.
148
How does cloud and SaaS optimization function?
No cloud-specific optimization, but can integrate with cloud security.
149
What types of applications are optimized for SaaS and cloud apps?
AWS, Azure, Google Cloud.
150
What does routing entail in web application security?
Basic static and policy-based routing.
151
What is dynamic routing based on?
AI-driven routing based on network conditions (latency, jitter, packet loss).
152
Where is web application security typically deployed?
At the network perimeter (on-premise or cloud).
153
What is the primary focus of web application security solutions?
Protecting web applications from SQL injection, cross-site scripting, and bot attacks.
154
Name an example of a web application firewall solution.
AWS WAF, Cloudflare WAF, Akamai Kona Site Defender, Imperva WAF, F5 Advanced WAF.
155
What is an IDS (Intrusion Detection System)?
Detects malicious activity but does not take action.
156
What is an IPS (Intrusion Prevention System)?
Detects and blocks malicious activity automatically.
157
What is the action taken by an IDS?
Detects and logs threats but does not block them.
158
What is the placement of an IDS?
Passive – behind firewall (monitors traffic).
159
What is the impact of an IPS on network traffic?
Can introduce latency due to active blocking.
160
What technology can be classified as an IDS?
Snort IDS, Suricata, OSSEC.
161
What is Darktrace known for?
An AI-driven cybersecurity platform that uses machine learning to detect, respond to, and prevent cyber threats.
162
What feature does Darktrace Antigena provide?
Automatically neutralizes threats in real-time before they cause harm.
163
What does Darktrace use to identify cyber threats?
Machine learning to identify abnormal behaviors.
164
What is a key feature of Darktrace's threat detection?
Zero-Day Threat Detection – identifies previously unknown threats without relying on traditional signatures.
165
How does Darktrace monitor environments?
Monitors on-premises and cloud environments for security anomalies.
166
What is the response time of Darktrace compared to traditional security?
Real-time, autonomous response.
167
What is a key difference between AI-based and traditional security in threat detection?
AI-driven identifies new and unknown threats; traditional relies on known signatures.
168
What does Fortinet FortiGate offer?
Enterprise-grade firewall with integrated SD-WAN and IPS.
169
What is the main function of FortiEDR?
AI-driven Endpoint Detection and Response for real-time threat prevention.
170
What does FortiAnalyzer utilize for threat correlation?
Uses AI for security analytics and SIEM.
171
What is FortiAI?
AI-based threat detection and response platform ## Footnote FortiAI utilizes deep learning AI for detecting zero-day attacks and malware analysis.
172
What technology does FortiEDR use for threat prevention?
Behavioral AI for real-time threat prevention and automated response ## Footnote FortiEDR is an AI-driven Endpoint Detection and Response system.
173
What is the role of FortiAnalyzer?
AI-driven security analytics and SIEM ## Footnote It uses AI for threat correlation, forensic analysis, and compliance.
174
How does FortiSandbox detect malware?
Uses machine learning for advanced threat detection and isolation ## Footnote FortiSandbox is an AI-powered malware detection and sandboxing solution.
175
What does FortiSOAR automate?
Incident response ## Footnote FortiSOAR uses AI-driven automation to streamline the incident response process.
176
What type of analysis does FortiNDR perform?
AI-driven network traffic analysis and anomaly detection ## Footnote It detects lateral movement, insider threats, and network anomalies.
177
What is a key feature of FortiAI compared to Darktrace?
Automated malware isolation and forensic analysis ## Footnote FortiAI focuses on threat detection with a different response mechanism than Darktrace.
178
What type of detection does Darktrace utilize?
AI-based anomaly detection ## Footnote Darktrace employs autonomous response with Antigena AI.
179
How does FortiAI integrate with network environments?
Works with Fortinet Security Fabric ## Footnote This provides seamless integration within Fortinet's ecosystem.
180
What type of organizations is FortiAI best suited for?
Enterprise networks and Fortinet users ## Footnote FortiAI is tailored for organizations heavily invested in Fortinet solutions.
181
What does FortiAnalyzer provide besides security analytics?
SIEM capabilities ## Footnote FortiAnalyzer's analytics help in compliance and threat correlation.
182
Fill in the blank: FortiNDR detects _______.
lateral movement, insider threats, and network anomalies
183
True or False: Darktrace provides automated reports through Cyber AI Analyst.
True ## Footnote Darktrace's Cyber AI Analyst automates reporting for better security insights.
184
What type of protection does FortiAI offer for cloud and SaaS?
AI-driven SaaS and cloud monitoring ## Footnote This protection is integrated into Fortinet Cloud Security.
185
What is the primary difference in network visibility between FortiAI and Darktrace?
FortiAI works with Fortinet Security Fabric while Darktrace works across multi-vendor environments ## Footnote This highlights FortiAI's integration focus versus Darktrace's flexibility.