Computer Network Topology Quiz
30 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of attack can lead to a denial of service by overwhelming a specific resource?

  • Tracking Cookies
  • Adware
  • Spyware
  • Brute force (correct)
  • Which threat is designed to collect user information for advertising and marketing purposes?

  • Tracking Cookies
  • Pop-ups
  • Adware (correct)
  • Spyware
  • What is the primary purpose of tracking cookies?

  • To slow down a computer
  • To lock out user accounts
  • To record information about an Internet user for personalization (correct)
  • To gather personal information without permission
  • Which type of program gathers personal information from a computer without the user's permission?

    <p>Adware</p> Signup and view all the answers

    What could be a consequence of spyware on a computer?

    <p>Creating more vulnerabilities for other threats</p> Signup and view all the answers

    How is adware different from spyware?

    <p>Adware is used for collecting personal information</p> Signup and view all the answers

    Which protocol governs the way a web server and client interact?

    <p>Hypertext Transfer Protocol (HTTP)</p> Signup and view all the answers

    Which protocol is responsible for managing the individual conversations between web servers and clients?

    <p>Transmission Control Protocol (TCP)</p> Signup and view all the answers

    What role does Internet Protocol (IP) play in the communication process?

    <p>Assigning logical addressing</p> Signup and view all the answers

    Which model was developed by the International Organization for Standardization (ISO) in 1984?

    <p>OSI Model</p> Signup and view all the answers

    Which protocol does not specify the interaction of any specific protocols?

    <p>Open Systems Interconnect Model</p> Signup and view all the answers

    What function does TCP perform on HTTP messages before sending them to the destination host?

    <p>Segmentation</p> Signup and view all the answers

    What is the term used to refer to a person or organization that sends spam?

    <p>Spammer</p> Signup and view all the answers

    How do spammers sometimes gain control of home computers to send spam?

    <p>By planting viruses or worms</p> Signup and view all the answers

    What type of software has been used more recently by spammers to send spam?

    <p>Instant messaging software</p> Signup and view all the answers

    Which of the following should be a part of a security policy?

    <p>Identification and authentication policies</p> Signup and view all the answers

    What is the purpose of a security policy?

    <p>To define rules users must follow to secure the network</p> Signup and view all the answers

    Why is it important for all users of a network to support and follow a security policy?

    <p>For the security policy to be effective</p> Signup and view all the answers

    What is Social Engineering in the context of computer and network security?

    <p>A collection of techniques to deceive internal users</p> Signup and view all the answers

    How can an intruder gain access to a network, whether internal or external?

    <p>Exploiting human behavior</p> Signup and view all the answers

    What is one example of an unintentional internal threat mentioned in the text?

    <p>A trustworthy employee unknowingly bringing a security threat into the network</p> Signup and view all the answers

    What is a common method used by intruders to exploit human weaknesses?

    <p>Phishing attacks</p> Signup and view all the answers

    How does an internal threat caused by a trustworthy employee usually occur?

    <p>By unknowingly introducing a virus or security threat</p> Signup and view all the answers

    What does Social Engineering aim to achieve in the context of computer and network security?

    <p>Deceiving internal users into specific actions</p> Signup and view all the answers

    Which type of network topology involves a direct connection between computers?

    <p>P2P Topology</p> Signup and view all the answers

    What is a notable advantage of Bus Topology over other topologies?

    <p>Cost-effective cabling</p> Signup and view all the answers

    In which topology does each user set their own permissions?

    <p>Ring Topology</p> Signup and view all the answers

    Why is Point-to-Point Topology faster and highly reliable?

    <p>Direct connection between computers</p> Signup and view all the answers

    What is a significant drawback of the Point-to-Point Topology?

    <p>Limited to small areas</p> Signup and view all the answers

    Why is Bus Topology commonly used in building small networks?

    <p>Cost of cabling is very less</p> Signup and view all the answers

    Study Notes

    Internal Attacks

    • Not all internal attacks are intentional, some can come from trustworthy employees who unknowingly bring security threats into the internal network.

    Social Engineering

    • Social engineering is a term that refers to the ability of something or someone to influence the behavior of a group of people.
    • In the context of computer and network security, social engineering refers to a collection of techniques used to deceive internal users into performing specific actions or revealing confidential information.

    Computer Network Threat/Vulnerabilities

    • One of the easiest ways for an intruder to gain access, whether internal or external, is by exploiting human behavior.
    • A person or organization responsible for sending spam is called a spammer.
    • Spammers often make use of unsecured email servers to forward email.

    Computer Network Security Policy and Best Practice

    • A security policy is a formal statement of the rules that users must adhere to when accessing technology and information assets.
    • A security policy should be the central point for how a network is secured, monitored, tested, and improved upon.
    • Some things to include in a security policy are: identification and authentication policies, password policies, acceptable use policies, remote access policies, and incident handling procedures.

    TCP/IP Model

    • The TCP/IP model is used for exchanging information between a web server and a web client.
    • The protocols involved in the TCP/IP model are: application, transport, internetwork, and network access protocols.
    • HTTP governs the way that a web server and a web client interact.
    • TCP is the transport protocol that manages the individual conversations between web servers and web clients.
    • IP is responsible for taking the formatted segments from TCP, assigning logical addressing, and encapsulating them into packets for routing to the destination host.

    OSI Layer Model and Protocols

    • The OSI model was developed by the International Organization for Standardization (ISO) in 1984.
    • The OSI model does not specify the interaction of any specific protocols.
    • Examples of network devices are: routers, bridges/switches, repeater/hubs.
    • Examples of networking media are: cables (coaxial, copper twisted pair, fiber optics cable), or wireless technologies (radio wave, satellite).

    Computer Network Topology

    • Computer network topology refers to the way in which computers (nodes) are geometrically arranged and connected in a network.
    • Types of computer network topologies include: P2P, Bus, Ring, Star, Tree, Mesh, and Hybrid.

    Point-to-Point Network Topology

    • Advantages: faster and highly reliable, no need for a network operating system, no need for an expensive server, no need for dedicated network technicians.
    • Disadvantages: only suitable for small areas, no central backup of files and folders, no security besides permissions.

    Bus Topology

    • Advantages: low cost, widely used for building small networks, easy to install.

    Methods of Attack

    • Brute force attacks can cause a denial of service due to excessive traffic to a specific resource or by locking out user accounts.
    • Some attacks are designed to collect information about users, which can be used for advertising, marketing, and research purposes.
    • Examples of these types of attacks include: Spyware, Tracking Cookies, Adware, and Pop-ups.

    Spyware

    • Spyware is any program that gathers personal information from a computer without permission or knowledge.
    • Spyware can slow down a computer and make changes to internal settings, creating more vulnerabilities for other threats.

    Tracking Cookies

    • Cookies are a form of spyware, but are not always bad.
    • Cookies are used to record information about an Internet user when they visit websites.

    Adware

    • Adware is a form of spyware used to collect information about a user based on websites they visit.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on different types of computer network topologies including P2P, Bus, Ring, and Star. Learn about how computers are arranged and connected in a network.

    More Like This

    Use Quizgecko on...
    Browser
    Browser