Computer Networks and Security Overview
29 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of a Router in a computer network?

  • To broadcast data to all connected devices
  • To amplify weak signals for longer distance transmission
  • To connect multiple networks and route data packets (correct)
  • To filter and forward data based on MAC addresses
  • Which networking device operates primarily at Layer 2 of the OSI model?

  • Hub
  • Switch (correct)
  • Bridge
  • Router
  • What does a Network Interface Card (NIC) provide to a device in a network?

  • A unique MAC address for identification (correct)
  • Signal amplification for long distances
  • Connection to multiple networks
  • Data forwarding capabilities
  • Which of the following best describes a Hub in a network?

    <p>Broadcasts data to all connected devices inefficiently (B)</p> Signup and view all the answers

    What role do protocols play in computer networks?

    <p>Define rules for data transmission across networks (A)</p> Signup and view all the answers

    Which network device is specifically designed to connect two similar networks?

    <p>Bridge (C)</p> Signup and view all the answers

    What does a Repeater do in a network?

    <p>Extends the reach of a network by amplifying signals (D)</p> Signup and view all the answers

    Which of the following is not considered a component of network hardware?

    <p>Network Operating System (C)</p> Signup and view all the answers

    What is the primary function of HTTPS compared to HTTP?

    <p>To provide an encrypted channel for security (D)</p> Signup and view all the answers

    Which statement about FTP is true?

    <p>It is a protocol for transferring files over a network. (D)</p> Signup and view all the answers

    What role does a firewall play in network security?

    <p>It acts as a barrier between trusted and untrusted networks. (D)</p> Signup and view all the answers

    How does IMAP differ from POP3?

    <p>IMAP stores emails on the server while POP3 downloads them locally. (D)</p> Signup and view all the answers

    What is a primary characteristic of 5G technology?

    <p>It supports IoT and real-time applications. (D)</p> Signup and view all the answers

    What kind of malware is categorized as a Trojan?

    <p>Malicious software disguised as legitimate applications. (D)</p> Signup and view all the answers

    Which method is commonly used to prevent SQL Injection attacks?

    <p>Input validation and secure coding practices (D)</p> Signup and view all the answers

    What is the effect of a DDoS attack on a server?

    <p>It temporarily renders the server unavailable. (A)</p> Signup and view all the answers

    Which type of network typically allows for high-speed connectivity and resource sharing within a single building?

    <p>LAN (D)</p> Signup and view all the answers

    What is the primary difference between a Client-Server model and a Peer-to-Peer (P2P) network?

    <p>In a Client-Server model, servers are dedicated to specific tasks. (A)</p> Signup and view all the answers

    Which switching technique establishes a dedicated communication path for the entire session?

    <p>Circuit Switching (C)</p> Signup and view all the answers

    What does bandwidth measure in the context of data communication?

    <p>The amount of data transmitted in a specific time frame. (C)</p> Signup and view all the answers

    Which protocol is crucial for ensuring reliable and error-free data delivery?

    <p>TCP (C)</p> Signup and view all the answers

    Which type of transmission media is immune to electromagnetic interference?

    <p>Fiber Optics (D)</p> Signup and view all the answers

    What is a characteristic feature of a Star Topology in networking?

    <p>It is dependent on a central hub or switch. (C)</p> Signup and view all the answers

    Which device is responsible for forwarding data packets between different networks?

    <p>Router (B)</p> Signup and view all the answers

    What is a major limitation of the Message Switching technique?

    <p>It can lead to high delays for large messages. (D)</p> Signup and view all the answers

    Which type of network typically spans a city or large campus?

    <p>MAN (C)</p> Signup and view all the answers

    Which characteristic defines the Peer-to-Peer (P2P) network model?

    <p>Each computer can act as both a client and a server. (D)</p> Signup and view all the answers

    Which of the following is considered unguided media in data transmission?

    <p>Radio Waves (A)</p> Signup and view all the answers

    Which of the following best describes Latency in data communication?

    <p>The time delay between sending and receiving data. (C)</p> Signup and view all the answers

    Flashcards

    Network Interface Card (NIC)

    A hardware component that lets devices connect to a network. It has a unique identifier (MAC address) that distinguishes it on the network.

    Router

    A device that connects multiple networks, determining the best path for data packets based on their destination IP addresses.

    Switch

    A device that efficiently connects network devices. It forwards data only to the intended recipient based on their MAC addresses.

    Hub

    A simple network device that sends data to all connected devices, regardless of the intended recipient. This can lead to network congestion.

    Signup and view all the flashcards

    Bridge

    A device that connects two similar networks and filters traffic by MAC addresses to reduce collisions.

    Signup and view all the flashcards

    Repeater

    A device that strengthens weak network signals, allowing data to travel longer distances without degradation.

    Signup and view all the flashcards

    Network Operating System (NOS)

    A software platform that manages network resources and communication. Examples include Windows Server, Linux, and Cisco IOS.

    Signup and view all the flashcards

    Network Protocols

    A set of standardized rules that dictate how data is transmitted across networks.

    Signup and view all the flashcards

    HTTP/HTTPS

    Used for transferring web pages, HTTPS provides an encrypted channel for secure communication.

    Signup and view all the flashcards

    SMTP

    A protocol used for sending emails.

    Signup and view all the flashcards

    Firewall

    A barrier between a trusted internal network and untrusted external networks. It can be hardware or software-based and uses predefined rules to block or allow traffic.

    Signup and view all the flashcards

    Encryption

    Converts readable data (plaintext) into a scrambled format (ciphertext). The data is only readable with the correct decryption key.

    Signup and view all the flashcards

    Virus

    A malicious program designed to spread and cause harm. It can corrupt files, steal information, or disrupt operations.

    Signup and view all the flashcards

    Trojan

    Malware disguised as legitimate software. When executed, it can grant unauthorized access to the system.

    Signup and view all the flashcards

    Phishing

    Fraudulent attempts to steal sensitive information by pretending to be a trustworthy entity.

    Signup and view all the flashcards

    LAN (Local Area Network)

    A network that covers a small geographical area, like a building or office, providing high-speed connectivity and sharing resources like printers.

    Signup and view all the flashcards

    MAN (Metropolitan Area Network)

    Spans a larger geographical area, like a city or campus, connecting multiple LANs with high-speed fiber optics.

    Signup and view all the flashcards

    WAN (Wide Area Network)

    Connects networks over vast distances, spanning cities, countries, or even the globe.

    Signup and view all the flashcards

    Client-Server Model

    A network where a central server provides resources (files, applications) to client computers.

    Signup and view all the flashcards

    Peer-to-Peer (P2P) Network

    A decentralized network where every computer acts as both a client and a server, sharing resources equally.

    Signup and view all the flashcards

    ARPANET

    The first true network, developed by the US Department of Defense, that implemented TCP/IP and laid the groundwork for the modern internet.

    Signup and view all the flashcards

    The Internet

    The global interconnected network of networks, enabling services like email, the World Wide Web, and cloud computing.

    Signup and view all the flashcards

    The Internet of Things (IoT)

    A growing network of smart devices that communicate autonomously to gather and share data.

    Signup and view all the flashcards

    Circuit Switching

    A way of establishing a dedicated communication path between two devices for the entire duration of a session.

    Signup and view all the flashcards

    Message Switching

    Sends entire messages from sender to receiver, with each node storing and forwarding the message.

    Signup and view all the flashcards

    Packet Switching

    The most efficient and common method for data transmission, breaking data into packets that are routed independently.

    Signup and view all the flashcards

    Bandwidth

    The amount of data that can be transmitted in a given amount of time, measured in bits per second.

    Signup and view all the flashcards

    Latency

    The time delay between sending and receiving data, usually measured in milliseconds.

    Signup and view all the flashcards

    Protocol

    A set of rules that govern how devices in a network communicate with each other.

    Signup and view all the flashcards

    Study Notes

    Computer Networks and Security Overview

    • Computer networks are the basis for almost all digital communication. They connect systems for resource sharing, collaboration, and data exchange.
    • Networks are crucial for services like social media, banking, and cloud computing, whether local (LAN) or global (WAN). The core challenge is ensuring efficient, secure, and reliable communication.

    Network Components

    • Hardware: Physical devices managing data flow.
      • Network Interface Card (NIC): Hardware interface for network connection with a unique MAC address.
      • Router: Connects multiple networks, routes data based on IP addresses.
      • Switch: Intelligently forwards data based on MAC addresses (Layer 2).
      • Hub: Broadcasts data to all connected devices (inefficient).
      • Bridge: Connects similar networks, filters data, reduces collisions
      • Repeater: Amplifies weak signals to expand network reach
    • Software: Network operating systems and protocols govern data flow.
      • Network Operating Systems (NOS): Software managing network resources (e.g., Windows Server, Linux).
      • Protocols: Rules for data transmission (e.g., TCP/IP for reliable internet communication).

    Network Types

    • By Geographical Spread:
      • LAN (Local Area Network): Within a building or campus, high-speed connectivity.
      • MAN (Metropolitan Area Network): Connects LANs across a city.
      • WAN (Wide Area Network): Large geographic area, using public/private lines, fiber, or satellites.
    • By Component Roles:
      • Client-Server Model: Servers provide resources to clients (centralized);
      • Peer-to-Peer (P2P): Every device acts as client and server (equally shares resources).

    Network Evolution

    • ARPANET: US Department of Defense's first TCP/IP network, a predecessor to the internet.
    • The Internet: Global network connecting many smaller networks, supporting email, the Web, and cloud computing.
    • Internet of Things (IoT): Network of interconnected devices; needs specialized protocols (MQTT, CoAP).

    Switching Techniques

    • Circuit Switching: Dedicated communication path for an entire session (e.g., old phone lines).
    • Message Switching: Messages stored and forwarded by nodes.
    • Packet Switching: Data broken into packets, routed independently, reassembled at destination (most common).

    Data Communication Terms

    • Bandwidth: Data transmitted per unit time (bps). Higher is faster.
    • Latency: Time delay between sending and receiving data (milliseconds). Lower is better.
    • Protocols: Rules for data exchange. Examples include:
      • IP (Internet Protocol): Addresses and routes data.
      • TCP (Transmission Control Protocol): Ensures reliable delivery.
      • UDP (User Datagram Protocol): Connectionless, prioritizes speed over reliability

    Transmission Media

    • Guided Media: Physical channels.
      • Twisted Pair Cable: Low cost, prone to interference, limited distance.
      • Coaxial Cable: Robust, used in cable TV/internet services.
      • Fiber Optics: Extremely high speed, long range, resistant to interference.
    • Unguided Media: Wireless channels.
      • Radio Waves: Wi-Fi, Bluetooth, cellular.
      • Microwaves: Line-of-sight transmission.
      • Satellite Communication: relays signals, critical in remote areas.

    Network Topologies

    • Star Topology: All devices connected to a central hub/switch.
    • Bus Topology: All devices share a single communication line.
    • Ring Topology: Devices form a closed loop.
    • Mesh Topology: Each device connected to every other device (redundant).

    Networking Devices

    • Router: Network Layer (Layer 3), uses IP addresses to route data.
    • Switch: Data Link Layer (Layer 2), uses MAC addresses.
    • Gateway: Connects different networks, converts protocols.

    Networking Protocols

    • HTTP/HTTPS: Web page transfer; HTTPS is encrypted.
    • FTP (File Transfer Protocol): File transfer.
    • SMTP (Simple Mail Transfer Protocol): Email sending.
    • IMAP/POP3: Email retrieval (IMAP synchronizes, POP3 downloads locally).

    Wireless/Mobile Computing

    • Wi-Fi: Wireless standard, based on IEEE 802.11, used for LANs.
    • Bluetooth: Short-range wireless for peripherals.
    • 4G/5G: Faster, more reliable mobile internet.

    Network Security

    • Firewall: Barrier between internal and external networks.
    • Encryption: Converts readable data to scrambled format.
    • VPN (Virtual Private Network): Secure connections over the internet.

    Security Threats

    • Viruses/Worms/Trojans: Malicious software that can corrupt data or compromise systems.
    • DDoS (Distributed Denial of Service): Attacks overload a server.
    • Phishing: Fraudulent attempts to steal information.
    • SQL Injection: Attacking database integrity via malicious SQL code.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Explore the essential components and functions of computer networks in this quiz. Understand the roles of hardware and software in maintaining efficient, secure, and reliable communication systems. Ideal for anyone looking to deepen their knowledge of network architecture and security.

    More Like This

    Computer Networks Overview
    12 questions

    Computer Networks Overview

    DiversifiedPersonification avatar
    DiversifiedPersonification
    Cybersecurity and OSI Model Quiz
    10 questions
    Use Quizgecko on...
    Browser
    Browser