Network Fundamentals and Simulation Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of a Virtual Private Network (VPN)?

  • To encrypt your internet connection (correct)
  • To connect multiple devices within a home network
  • To act as a hardware interface for network devices
  • To manage data flow between routers

Which of the following statements accurately describes a WAN?

  • A network smaller than a local area network (LAN)
  • A large network that connects multiple LANs over long distances (correct)
  • A network that operates only within a single building
  • A network used for connecting devices in a personal space

Which device typically connects a local area network (LAN) to a wide area network (WAN)?

  • Switch
  • Access Point
  • Router (correct)
  • Modem

Which of the following is an example of social engineering in cyber security?

<p>User receiving phishing emails pretending to be from a bank (D)</p> Signup and view all the answers

What is one of the best practices for maintaining online security?

<p>Periodic software updates of applications (C)</p> Signup and view all the answers

Which type of cable is typically used for connecting two switches?

<p>Copper Crossover Cable (A)</p> Signup and view all the answers

What do ransomware attacks typically do to data?

<p>Encrypt data and demand payment for access (D)</p> Signup and view all the answers

What is the primary function of a firewall in network security?

<p>To act as a security barrier against unauthorized access (D)</p> Signup and view all the answers

Flashcards

Local Area Network (LAN)

A network used in small areas like homes or offices.

Malware

Malicious software designed to harm or disrupt a system.

Firewall

A security system that blocks unauthorized access to a network.

Cyber Security

Protecting computer systems and networks from cyber threats.

Signup and view all the flashcards

Virus

A type of malicious software that attaches to files or software.

Signup and view all the flashcards

Strong Password

A password that combines letters, numbers, and symbols for better security.

Signup and view all the flashcards

Router

A device that connects a LAN to a WAN, or multiple networks.

Signup and view all the flashcards

VPN

Encrypts your internet connection for secure communication.

Signup and view all the flashcards

Study Notes

Module 1: Network Fundamentals

  • A network is a system that allows multiple devices to communicate.
  • Personal Area Network (PAN): A small network for personal use.
  • Local Area Network (LAN): A network for a small area (home, office).
  • Wide Area Network (WAN): Connects multiple LANs over long distances.
  • Metropolitan Area Network (MAN): Larger than a LAN but smaller than a WAN.
  • Virtual Private Network (VPN): A secure network.
  • Network Interface Card (NIC): Hardware component for computer connection.
  • Router: Typically connects a LAN to a WAN.
  • Switch: Connects multiple devices within a LAN.
  • Modem: Covers digital data.
  • Access Point (AP): Allows wireless devices to connect.

Module 2: Network Simulation and Cabling

  • Cisco Packet Tracer: Network simulation tool.
  • Router/Router connection (WAN): Connecting two routers.
  • Serial Cable: Use for long-distance connections.
  • Router/PC connection: Used for testing or configuration.
  • Crossover Cable: Similar devices (e.g., two PCs).
  • Straight-Through Cable: Different devices (e.g., router to switch).
  • Copper Crossover Cable: Connects two switches.
  • Copper Straight-Through Cable: Connects a PC to a switch.

Module 3: Cyber Security Threats and Practices

  • Cybersecurity: Protecting systems from harm.

  • Cyber Threats: Malicious attempts to damage systems.

  • Malware: Malicious software.

  • Viruses: Attach to files/software.

  • Worms: Self-replicating programs.

  • Trojans: Disguised malicious programs.

  • Ransomware: Encrypts data and demands payment.

  • Spyware: Secretly monitors user activity.

  • Phishing: Fake emails to steal information.

  • Social Engineering: Manipulating individuals to obtain information.

  • Denial-of-Service (DoS): Overloads a system.

  • Man-in-the-Middle (MitM): Interrupts communication between parties.

  • Insider Threats: Attacks by trusted individuals.

  • Zero-day Exploits: Unpatched vulnerabilities.

  • 3 Best Practices for Online Security:

    • Strong Passwords: Combine letters, numbers, and symbols.
    • Two-Factor Authentication (2FA): Requires two forms of verification.
    • Software Updates: Keep operating systems and software updated.
  • Network Security:

    • Safe Browsing: Ensure websites are secure.
    • Data Encryption: Transforming data into a secure format.
    • Firewalls: Blocking malware.

Module 4: Data Protection Tools and Techniques

  • Data Branches: Access points to the system.
  • Antivirus Software: Detects, prevents, and removes malicious software.
  • VPN (Virtual Private Network): Encrypts internet connections.
  • Firewall: Security barrier.
  • Encryption Tools: Convert sensitive data to unreadable code.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Network Fundamentals: Application Layer
10 questions
Network Fundamentals Quiz
10 questions
Network Fundamentals
10 questions

Network Fundamentals

BeneficentHarmony avatar
BeneficentHarmony
Network Fundamentals Quiz
65 questions
Use Quizgecko on...
Browser
Browser