Computer Network Topology Quiz

DauntlessAstronomy avatar
DauntlessAstronomy
·
·
Download

Start Quiz

Study Flashcards

30 Questions

What type of attack can lead to a denial of service by overwhelming a specific resource?

Brute force

Which threat is designed to collect user information for advertising and marketing purposes?

Adware

What is the primary purpose of tracking cookies?

To record information about an Internet user for personalization

Which type of program gathers personal information from a computer without the user's permission?

Adware

What could be a consequence of spyware on a computer?

Creating more vulnerabilities for other threats

How is adware different from spyware?

Adware is used for collecting personal information

Which protocol governs the way a web server and client interact?

Hypertext Transfer Protocol (HTTP)

Which protocol is responsible for managing the individual conversations between web servers and clients?

Transmission Control Protocol (TCP)

What role does Internet Protocol (IP) play in the communication process?

Assigning logical addressing

Which model was developed by the International Organization for Standardization (ISO) in 1984?

OSI Model

Which protocol does not specify the interaction of any specific protocols?

Open Systems Interconnect Model

What function does TCP perform on HTTP messages before sending them to the destination host?

Segmentation

What is the term used to refer to a person or organization that sends spam?

Spammer

How do spammers sometimes gain control of home computers to send spam?

By planting viruses or worms

What type of software has been used more recently by spammers to send spam?

Instant messaging software

Which of the following should be a part of a security policy?

Identification and authentication policies

What is the purpose of a security policy?

To define rules users must follow to secure the network

Why is it important for all users of a network to support and follow a security policy?

For the security policy to be effective

What is Social Engineering in the context of computer and network security?

A collection of techniques to deceive internal users

How can an intruder gain access to a network, whether internal or external?

Exploiting human behavior

What is one example of an unintentional internal threat mentioned in the text?

A trustworthy employee unknowingly bringing a security threat into the network

What is a common method used by intruders to exploit human weaknesses?

Phishing attacks

How does an internal threat caused by a trustworthy employee usually occur?

By unknowingly introducing a virus or security threat

What does Social Engineering aim to achieve in the context of computer and network security?

Deceiving internal users into specific actions

Which type of network topology involves a direct connection between computers?

P2P Topology

What is a notable advantage of Bus Topology over other topologies?

Cost-effective cabling

In which topology does each user set their own permissions?

Ring Topology

Why is Point-to-Point Topology faster and highly reliable?

Direct connection between computers

What is a significant drawback of the Point-to-Point Topology?

Limited to small areas

Why is Bus Topology commonly used in building small networks?

Cost of cabling is very less

Study Notes

Internal Attacks

  • Not all internal attacks are intentional, some can come from trustworthy employees who unknowingly bring security threats into the internal network.

Social Engineering

  • Social engineering is a term that refers to the ability of something or someone to influence the behavior of a group of people.
  • In the context of computer and network security, social engineering refers to a collection of techniques used to deceive internal users into performing specific actions or revealing confidential information.

Computer Network Threat/Vulnerabilities

  • One of the easiest ways for an intruder to gain access, whether internal or external, is by exploiting human behavior.
  • A person or organization responsible for sending spam is called a spammer.
  • Spammers often make use of unsecured email servers to forward email.

Computer Network Security Policy and Best Practice

  • A security policy is a formal statement of the rules that users must adhere to when accessing technology and information assets.
  • A security policy should be the central point for how a network is secured, monitored, tested, and improved upon.
  • Some things to include in a security policy are: identification and authentication policies, password policies, acceptable use policies, remote access policies, and incident handling procedures.

TCP/IP Model

  • The TCP/IP model is used for exchanging information between a web server and a web client.
  • The protocols involved in the TCP/IP model are: application, transport, internetwork, and network access protocols.
  • HTTP governs the way that a web server and a web client interact.
  • TCP is the transport protocol that manages the individual conversations between web servers and web clients.
  • IP is responsible for taking the formatted segments from TCP, assigning logical addressing, and encapsulating them into packets for routing to the destination host.

OSI Layer Model and Protocols

  • The OSI model was developed by the International Organization for Standardization (ISO) in 1984.
  • The OSI model does not specify the interaction of any specific protocols.
  • Examples of network devices are: routers, bridges/switches, repeater/hubs.
  • Examples of networking media are: cables (coaxial, copper twisted pair, fiber optics cable), or wireless technologies (radio wave, satellite).

Computer Network Topology

  • Computer network topology refers to the way in which computers (nodes) are geometrically arranged and connected in a network.
  • Types of computer network topologies include: P2P, Bus, Ring, Star, Tree, Mesh, and Hybrid.

Point-to-Point Network Topology

  • Advantages: faster and highly reliable, no need for a network operating system, no need for an expensive server, no need for dedicated network technicians.
  • Disadvantages: only suitable for small areas, no central backup of files and folders, no security besides permissions.

Bus Topology

  • Advantages: low cost, widely used for building small networks, easy to install.

Methods of Attack

  • Brute force attacks can cause a denial of service due to excessive traffic to a specific resource or by locking out user accounts.
  • Some attacks are designed to collect information about users, which can be used for advertising, marketing, and research purposes.
  • Examples of these types of attacks include: Spyware, Tracking Cookies, Adware, and Pop-ups.

Spyware

  • Spyware is any program that gathers personal information from a computer without permission or knowledge.
  • Spyware can slow down a computer and make changes to internal settings, creating more vulnerabilities for other threats.

Tracking Cookies

  • Cookies are a form of spyware, but are not always bad.
  • Cookies are used to record information about an Internet user when they visit websites.

Adware

  • Adware is a form of spyware used to collect information about a user based on websites they visit.

Test your knowledge on different types of computer network topologies including P2P, Bus, Ring, and Star. Learn about how computers are arranged and connected in a network.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Master Computer Network Topologies
3 questions
Star Topology in Computer Networks
12 questions
Questions 1-16
0 questions

Questions 1-16

SensibleHonor avatar
SensibleHonor
Use Quizgecko on...
Browser
Browser