Introduction to Computer Networks
37 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of creating a computer network?

  • To eliminate the need for internet service
  • To increase the speed of individual computers
  • To link multiple computers for sharing resources and communication (correct)
  • To improve the aesthetic of the office
  • Which role specifically involves the security aspects of networking?

  • Network security (correct)
  • IT technician
  • Network infrastructure manager
  • Network administrator
  • What is a common term used to refer to devices like computers and printers that are connected in a network?

  • Hub
  • Server
  • Node (correct)
  • Router
  • How have modern networks impacted global communication?

    <p>By making distance and national borders less relevant</p> Signup and view all the answers

    Which of the following is NOT a job role typically associated with computer networking?

    <p>Graphic designer</p> Signup and view all the answers

    What does dB express in relation to signal strength?

    <p>The ratio between two measurements of signal strength</p> Signup and view all the answers

    What is typically the cause of crosstalk in a network cable?

    <p>Bad wiring or improper termination</p> Signup and view all the answers

    What must be unique when using a public addressing scheme?

    <p>Network ID</p> Signup and view all the answers

    Which type of cable is required to support Power over Ethernet?

    <p>Cat 3 or better</p> Signup and view all the answers

    Which command line tool is used in both Windows and Linux environments for checking IP configuration?

    <p>Ipconfig</p> Signup and view all the answers

    Which of the following typically causes increased heat when drawing power down a cable?

    <p>Using cables of lower categories than required</p> Signup and view all the answers

    What unique identifier does every NIC (Network Interface Card) have?

    <p>A 48-bit MAC address</p> Signup and view all the answers

    What is the primary purpose of the Internet Control Message Protocol (ICMP)?

    <p>To report errors and send messages about packet delivery</p> Signup and view all the answers

    When troubleshooting an IP network, which issue should be addressed first?

    <p>Hardware failures</p> Signup and view all the answers

    How is an IPv4 address expressed?

    <p>As four decimal octets</p> Signup and view all the answers

    Which of the following is NOT a common issue to look for when troubleshooting networks?

    <p>Application Layer Bugs</p> Signup and view all the answers

    Which tool is used for testing fiber optic cables?

    <p>Optical spectrum analyser (OSA)</p> Signup and view all the answers

    In the context of using the ping utility, what does it test?

    <p>Basic connectivity to a destination host</p> Signup and view all the answers

    What can a cable tester report on?

    <p>The physical and electrical properties of the cable</p> Signup and view all the answers

    What common network issue might result from duplicate IP addresses?

    <p>Packet loss</p> Signup and view all the answers

    What does the process of routing involve?

    <p>Selecting a path across networks</p> Signup and view all the answers

    What is the primary benefit of a redundant network?

    <p>Enhanced network reliability</p> Signup and view all the answers

    Which of the following is NOT a common type of network attack?

    <p>Caching Attacks</p> Signup and view all the answers

    What does network hardening aim to accomplish?

    <p>Minimize security gaps</p> Signup and view all the answers

    What should be done to ensure secure configuration in device and service hardening?

    <p>Change default passwords</p> Signup and view all the answers

    Which type of attack is characterized by the use of false identity to gain unauthorized access?

    <p>MAC Spoofing</p> Signup and view all the answers

    Which of the following is an example of an insider threat?

    <p>Unauthorized access using employee credentials</p> Signup and view all the answers

    What does endpoint security focus on?

    <p>Restricting access at a device level</p> Signup and view all the answers

    Which of the following measures is effective for securing network access?

    <p>Disabling unneeded network services</p> Signup and view all the answers

    What does elasticity in cloud computing refer to?

    <p>The system's ability to handle changes on demand in real time</p> Signup and view all the answers

    Which type of hypervisor runs guest virtual machines directly on the hardware?

    <p>Bare metal hypervisor</p> Signup and view all the answers

    What is a significant characteristic of a storage area network (SAN)?

    <p>It provisions access to storage devices at block level</p> Signup and view all the answers

    Which of the following is NOT a cloud service model?

    <p>Connection as a Service (CaaS)</p> Signup and view all the answers

    What allows developers and data scientists to manage software and support infrastructure in the cloud?

    <p>User empowerment features</p> Signup and view all the answers

    Which cloud deployment model is primarily accessible by a single organization?

    <p>Hosted private cloud</p> Signup and view all the answers

    Which of the following accurately describes a Virtual Network Interface Card (vNIC)?

    <p>A representation of a VM's network connection, resembling a normal network adapter</p> Signup and view all the answers

    What is a virtual machine (VM)?

    <p>An emulated equivalent of a computer system running on another system</p> Signup and view all the answers

    Study Notes

    Introduction to Computer Networks

    • Two or more computers connected to share data and communicate
    • Data transfer via wired (cable), wireless (frequency), LAN, cloud services, etc.
    • A resource is anything accessible from a different computer on the network

    Computer Networks Today

    • Communication is as essential as basic needs like air, water, and food
    • Modern communications have advanced due to robust data networks
    • Networks minimize the relevance of physical limitations (distance, borders)
    • Networks have transformed work, learning, play, communication, etc.

    Common Networking Terms

    • Node: A single device (computer, server, printer) connected to a network
    • Noise: Interference within or close to the channel that isn't the intended signal
    • Cable Tester: Reports on physical and electrical properties (crosstalk attenuation, noise)
    • Attenuation: Signal strength loss over distance can cause connectivity problems
    • Electromagnetic Interference (EMI): External interference affecting signal transmission
    • Crosstalk: Interference between signals on neighboring cables, often due to bad wiring
    • Patch Cord Form Factors:
      • Straight Through
      • Crossover
    • Rollover Cable/Console Cable: Connects a computer to a switch or router's command line terminal
    • Power over Ethernet (PoE): Cat 3 or higher cable required, generates heat
    • Fiber Optic Cable Testing Tools:
      • Optical Time Domain Reflectometer (OTDR)
      • Optical Spectrum Analyzer (OSA)

    IP Addressing Schemes

    • Addressing techniques work at Data Link, Network, and Application layers to locate devices on a network
    • Data Link Layer MAC Address: Unique 48-bit address for each Network Interface Card (NIC) (e.g., 00:60:8C:00:54:99)
    • Network Layer IP Address: Assigned to each network interface, used for routing

    IP Addressing (IPv4)

    • 32-bit addresses in four decimal octets (e.g., 192.168.1.1)
    • Unique network ID required for public addressing (internet) or private addressing (internal systems)

    Config and Troubleshooting IP Networks and Routing Concepts

    • Command-line tools (like ipconfig) provide information about system configuration and data transfer
    • Ipconfig: Used for network configuration information (Windows)
    • Ifconfig: Used for network configuration information (Linux)
    • ARP Cache Utility: Maps IP addresses to MAC addresses
    • Internet Control Message Protocol (ICMP) and Ping:
      • Used to report errors and send messages about packet delivery
      • Ping sends ICMP requests to a destination host to test connectivity

    Troubleshoot IP Networks

    • Troubleshooting Steps:
      • Eliminate physical hardware failure and Data Link layer issues first
      • Check power failures, cable/transceiver issues, and interface status
    • Interface Status Issues:
      • Use LED indicators and switch command line to diagnose interface problems (collisions, connectivity)
    • Other Issues:
      • Incorrect IP address
      • Incorrect Subnet Mask
      • DNS issues
      • Duplicate IP and MAC address issues
      • Multicast Flooding issues

    Routing Concepts

    • The process of selecting a path across networks
    • Redundant networks improve reliability

    Recovery Sites

    • Alternate locations providing similar services in case of disaster or failure
    • Other factors: Heating, Ventilation, Air Conditioning (HVAC); Power Management; Network Device Backup Management

    Network Attacks

    • Intruders try to steal information, misuse network services, or compromise availability
    • Insider threats may have privileged access; external threats may need to gain access (e.g., malware)

    Types of Attacks

    • Foot Printing or Fingerprinting
    • Spoofing Attacks
    • Denial of Service (DoS or DDoS)
    • MAC Spoofing and IP Spoofing
    • ARP Spoofing
    • Rogue DHCP
    • DNS Poisoning
    • VLAN Hopping
    • Rogue Access Points
    • Evil Twins
    • DE authentication Attacks
    • Distributed DoS Attacks and Botnets
    • Viruses and Worms
    • Potentially Unwanted Programs (PUPs) / Potentially Unwanted Applications (PUAs)
    • Trojan
    • Password Attacks
    • Phishing Attacks
    • Shoulder Surfing
    • Tailgating and Piggybacking

    Network Hardening Techniques

    • Minimizing security gaps in cybersecurity infrastructure
    • Device and Service Hardening (Secure Configuration):
      • Change default passwords/credentials
      • Enforce password complexity/length requirements
      • Configure role-based access
      • Disable unneeded network services
      • Disable unsecure protocols

    Endpoint Security and Switchport Protection

    • Secures network access at the device level
    • Cloud improves security by enabling user self-sufficiency (e.g., developers, data scientists)

    Cloud Deployment Models

    • Elasticity: Ability to handle changes in demand in real time
    • Public (Multitenant)
    • Hosted Private
    • Private
    • Community
    • Hybrid

    Cloud Service Models

    • XaaS (Something/Anything/Everything as a service):
    • Infrastructure as a Service (IaaS): Provides virtualized infrastructure
    • Software as a Service (SaaS): Software applications delivered over the internet
    • Platform as a Service (PaaS): Development platform with tools and services
    • Desktop as a Service (DaaS): Provides virtual desktops accessible over the network

    Virtualization and Storage Area Network Technologies

    • Virtualization: Running virtual instances of systems on abstracted hardware
    • Virtual Machine: Emulated computer system running on top of another system
    • Hypervisor: Program for creating and running virtual machines
      • Type 1 (Bare Metal): Runs directly on hardware, acts as the OS
      • Type 2 (Hosted): Runs as a traditional application
    • Virtual Network Interface Card (vNIC): Configures a VM's network connection
    • Storage Area Network (SAN): Provides block-level access to storage devices
      • Isolated from main network, accessed only by servers

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Explore the fundamentals of computer networks, including their structure and importance in facilitating communication and data transfer. Understand key networking terms and the advancements that have made modern communication as crucial as basic needs. This quiz covers essential concepts related to wired and wireless networks, their role in various fields, and common terminology.

    More Like This

    Computer Networks Basics Quiz
    15 questions
    Computer Networking Fundamentals Quiz
    12 questions

    Computer Networking Fundamentals Quiz

    BeneficentIntelligence9039 avatar
    BeneficentIntelligence9039
    Networking Concepts Chapter 7
    30 questions
    Use Quizgecko on...
    Browser
    Browser