Section 1.0 - Networking Concepts - 23% Flashcards
What does Layer 1 (Physical) of the OSI model handle?
A. It defines how data is encoded, transmitted, and received over physical media.
B. It ensures reliable data delivery between devices.
C. It manages logical addressing and routing of data.
D. It manages encryption and decryption of data.
A. It defines how data is encoded, transmitted, and received over physical media.
Which of the following is the main function of Layer 2 (Data Link) in the OSI model?
A. It establishes, maintains, and terminates sessions between applications.
B. It routes packets between different networks using IP addresses.
C. It handles error detection and correction and manages physical addressing.
D. It encrypts data for secure communication.
C. It handles error detection and correction and manages physical addressing.
What is the primary responsibility of Layer 3 (Network) in the OSI model?
A. It ensures reliable data transfer through segmentation and reassembly.
B. It assigns IP addresses to devices and handles packet routing between
networks.
C. It manages data compression and encryption.
D. It provides end-to-end communication between processes.
B. It assigns IP addresses to devices and handles packet routing between networks.
What is the main role of Layer 4 (Transport) in the OSI model?
A. It maintains the communication sessions between devices.
B. It handles the logical addressing and routing of data packets.
C. It provides reliable data delivery and manages flow control.
D. It ensures data is encrypted before being transmitted.
C. It provides reliable data delivery and manages flow control.
Which of the following is the primary function of Layer 5 (Session) in the OSI model?
A. It manages the physical transmission of data between devices.
B. It maintains and controls the communication sessions between applications.
C. It encrypts and compresses data for transmission.
D. It handles the routing and forwarding of packets between networks.
B. It maintains and controls the communication sessions between applications.
What is the main purpose of Layer 6 (Presentation) in the OSI model?
A. It ensures the integrity of the transmitted data.
B. It maintains session management between communicating devices.
C. It assigns IP addresses and manages routing tables.
D. It provides encryption, compression, and translation of data formats.
D. It provides encryption, compression, and translation of data formats.
Which layer of the OSI model is responsible for providing network services to end-user applications?
A. Layer 1 (Physical)
B. Layer 4 (Transport)
C. Layer 7 (Application)
D. Layer 5 (Session)
C. Layer 7 (Application)
What is the primary function of a router in a network?
A. To forward data packets between devices within the same network.
B. To assign IP addresses to devices on the network.
C. To route data packets between different networks based on IP addresses.
D. To monitor network traffic for performance issues.
C. To route data packets between different networks based on IP addresses.
What is the main function of a switch in a network?
A. To route data packets between networks based on IP addresses.
B. To store and manage files in a centralized location.
C. To forward data packets within the same network based on MAC addresses.
D. To secure network traffic by encrypting data.
C. To forward data packets within the same network based on MAC addresses.
What is the primary role of a firewall in network security?
A. To provide a secure gateway for routing data across different networks.
B. To prevent unauthorized access and monitor incoming and outgoing traffic based on security policies.
C. To detect and respond to network threats.
D. To handle encryption and decryption of data packets.
B. To prevent unauthorized access and monitor incoming and outgoing traffic based on security policies.
What is the primary function of an Intrusion Detection System (IDS)?
A. To block malicious network traffic.
B. To prevent unauthorized access to network resources.
C. To assign IP addresses to devices on the network.
D. To detect and alert potential security threats in real-time.
D. To detect and alert on potential security threats in real-time.
What is the main difference between an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS)?
A. An IDS only detects threats, while an IPS detects and blocks threats in real-time.
B. An IDS is used for network management, while an IPS is used for encryption.
C. An IDS requires manual configuration, while an IPS is automated.
D. An IDS manages IP address assignments, while an IPS handles data traffic routing.
A. An IDS only detects threats, while an IPS detects and blocks threats in real-time.
What is the purpose of a load balancer in a network?
A. To monitor and secure the network’s data traffic.
B. To distribute incoming network traffic across multiple servers to ensure optimal resource usage.
C. To assign IP addresses to devices on the network.
D. To provide a centralized location for storing network data.
B. To distribute incoming network traffic across multiple servers to ensure optimal resource usage.
What is the role of a proxy in network security?
A. To allow devices to connect directly to the internet.
B. To act as an intermediary between clients and servers, often to filter content and provide anonymity.
C. To route data packets between different networks based on IP addresses.
D. To store network data in a centralized location.
B. To act as an intermediary between clients and servers, often to filter content and provide anonymity.
What does Network-attached Storage (NAS) provide in a network?
A. A system for providing high-speed internet access to multiple users.
B. A service for managing IP address assignments.
C. A solution for encrypting and securing network communications.
D. A centralized storage system that allows data access and file sharing over the network.
D. A centralized storage system that allows data access and file sharing over the network.
What is the primary function of a Storage Area Network (SAN)?
A. To connect computers and devices within a local area network for file sharing.
B. To provide centralized, high-speed storage access over a network.
C. To secure network traffic by encrypting data.
D. To manage IP address assignments within a network.
B. To provide centralized, high-speed storage access over a network.
What is the purpose of wireless technology in networking?
A. To provide a secure method for data transmission.
B. To allow devices to communicate over the air without physical connections.
C. To manage routing between different subnets
B. To allow devices to communicate over the air without physical connections.
What does an Access Point (AP) do in a wireless network?
A. It connects wired devices to the wireless network.
B. It routes data between multiple subnets in a network.
C. It connects devices to the internet through a broadband connection.
D. It provides security by monitoring unauthorized wireless devices.
A. It connects wired devices to the wireless network.
What is the purpose of applications in a network?
A. To manage network routing and IP address allocation.
B. To provide specific functionalities for end-users or devices within a network.
C. To secure data transmission over the network.
D. To monitor and optimize network traffic.
B. To provide specific functionalities for end-users or devices within a network.
What is the role of a controller in a wireless network?
A. It encrypts the data transmitted between wireless devices.
B. It assigns IP addresses to devices on the wireless network.
C. It acts as a central point of management for multiple access points and devices.
D. It monitors and secures wireless communication channels.
C. It acts as a central point of management for multiple access points and devices.
What is the role of a Content Delivery Network (CDN)?
A. To distribute content like images and videos to users based on geographic location.
B. To secure content by encrypting data during transmission.
C. To provide centralized storage for content in the cloud.
D. To assign IP addresses dynamically to devices requesting content.
A. To distribute content like images and videos to users based on geographic location.
What is the primary function of a Virtual Private Network (VPN)?
A. To create a local area network between devices.
B. To assign a unique IP addresses to devices within a specific subnet.
C. To enable secure connections between remote users and a private network.
D. To monitor and manage internet traffic.
C. To enable secure connections between remote users and a private network.
What does Quality of Service (QoS) ensure in a network?
A. It encrypts network data to improve security.
B. It assigns IP addresses to devices in a network.
C. It routes network traffic efficiently based on device type.
D. It prioritizes network traffic to ensure high-quality service for critical applications like voice and video.
D. It prioritizes network traffic to ensure high-quality service for critical applications like voice and video.
What does Time to Live (TTL) represent in networking?
A. The maximum number of hops or routers a packet can traverse before being discarded.
B. The time it takes for data to travel from one device to another.
C. The amount of time a device waits before sending a response.
D. The lifespan of an IP address assignment in a network.
A. The maximum number of hops or routers a packet can traverse before being discarded.