Network Security and Infrastructure Quiz
40 Questions
0 Views

Network Security and Infrastructure Quiz

Created by
@ConstructiveDevotion

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What feature allows an employee to gain secure remote access to a company network?

  • Firewall
  • Proxy server
  • Router
  • VPN (correct)
  • Which statement is true about the running configuration file in a Cisco IOS device?

  • It is only effective after a reboot.
  • It is the default configuration file.
  • It affects the operation of the device immediately when modified. (correct)
  • It must be saved to NVRAM to take effect.
  • What is the default VLAN on a Cisco switch?

  • VLAN1 (correct)
  • VLAN5
  • VLAN2
  • VLAN10
  • Which term describes a network that allows external parties secure access to company resources?

    <p>Extranet</p> Signup and view all the answers

    What kind of threat is described when software collects data about users' website visits without their knowledge?

    <p>Spyware</p> Signup and view all the answers

    What networking trend allows employees to use their personal devices to access company networks?

    <p>Bring your own device</p> Signup and view all the answers

    Which two functions do end devices serve on a network?

    <p>They originate the data that flows through the network.</p> Signup and view all the answers

    What must an administrator do after changing the IP address of an interface on an IOS device?

    <p>Nothing, changes take effect immediately.</p> Signup and view all the answers

    What does ISP stand for in networking?

    <p>Internet Service Provider</p> Signup and view all the answers

    When a router boots up with an enable secret password but no console password, which mode will display?

    <p>User EXEC mode</p> Signup and view all the answers

    In which situation would a WISP be particularly useful?

    <p>A rural farm without wired broadband</p> Signup and view all the answers

    What aspect of a network allows it to efficiently grow as new users and applications are added?

    <p>Scalability</p> Signup and view all the answers

    Which of the following is part of the guidelines for configuring a hostname in Cisco devices?

    <p>The hostname should begin with a letter.</p> Signup and view all the answers

    Which memory location on a Cisco router will lose all content when the device is restarted?

    <p>RAM</p> Signup and view all the answers

    If a fiber optic cable is accidentally damaged, but network services are only briefly interrupted, what characteristic does this indicate?

    <p>Fault tolerance</p> Signup and view all the answers

    Which devices can provide Internet connectivity without the need for physical wires to the building?

    <p>Satellite and Cellular</p> Signup and view all the answers

    What is the primary functionality provided by DHCP?

    <p>Automatic assignment of an IP address to each host</p> Signup and view all the answers

    Which memory location stores the startup configuration file on a Cisco device?

    <p>NVRAM</p> Signup and view all the answers

    When using a subnet mask of 255.255.0.0, to which subnet does the IP address 10.1.100.50 belong?

    <p>10.1.0.0</p> Signup and view all the answers

    What does message encoding achieve in computer communication?

    <p>Converts information to a suitable form for transmission</p> Signup and view all the answers

    Which term describes a piece of data at any layer of a networking model?

    <p>Protocol data unit</p> Signup and view all the answers

    What is the function of protocols in data communications?

    <p>To provide rules required for communication</p> Signup and view all the answers

    Which type of message delivery sends a message to all devices on a local area network?

    <p>Broadcast</p> Signup and view all the answers

    What process is used to convert transmitted data into a readable message?

    <p>Decoding</p> Signup and view all the answers

    What is done to an IP packet before it is transmitted over the physical medium?

    <p>It is encapsulated in a Layer 2 frame.</p> Signup and view all the answers

    Which order of protocols is used by a web client when sending a request for a webpage?

    <p>HTTP, TCP, IP, Ethernet</p> Signup and view all the answers

    Which characteristic of the network is violated if there is unauthorized access?

    <p>Security</p> Signup and view all the answers

    What command is used to verify the condition of switch interfaces?

    <p>show ip interface brief</p> Signup and view all the answers

    What happens when the Ctrl-Shift-6 key combination is used after issuing a ping command?

    <p>It interrupts the ping process.</p> Signup and view all the answers

    Which password is required to access user EXEC mode using a console connection?

    <p>lineconin</p> Signup and view all the answers

    What is the primary function of the command 'service password-encryption'?

    <p>To prevent unencrypted passwords from displaying in plain text.</p> Signup and view all the answers

    Which two host names conform to Cisco IOS naming conventions?

    <p>SwBranch799</p> Signup and view all the answers

    What allows remote management of a Layer 2 switch?

    <p>Switch virtual interface</p> Signup and view all the answers

    Which key completes a partially typed command in IOS?

    <p>Tab</p> Signup and view all the answers

    Which characteristics apply to RAM in Cisco devices? (Choose two.)

    <p>Temporary storage of data</p> Signup and view all the answers

    How does SSH differ from Telnet?

    <p>SSH encrypts messages while Telnet does not</p> Signup and view all the answers

    Which addressing does ServerB generate? (Choose two.)

    <p>Frame with RouterB's MAC address</p> Signup and view all the answers

    Which application layer protocols are part of the TCP/IP protocol suite? (Choose three.)

    <p>FTP</p> Signup and view all the answers

    What is a characteristic of multicast messages?

    <p>Sent to a select group of hosts</p> Signup and view all the answers

    What process involves placing one PDU inside another PDU?

    <p>Encapsulation</p> Signup and view all the answers

    Study Notes

    Network Threats

    • Spyware is software secretly collecting data about user activity, including websites visited.

    Network Types

    • An extranet is a secure network for suppliers, customers, and collaborators to access corporate resources.
    • A WISP (Wireless Internet Service Provider) is recommended in rural areas without wired broadband access.

    Network Characteristics

    • Scalability enables a network to grow without impacting existing users.
    • Fault tolerance allows for service continuity despite hardware failures, like a cut fiber optic cable.

    Network Devices

    • A router determines the path messages take through internetworks.

    Internet Access

    • Cellular and satellite internet connections do not require physical cables.
    • The internet is a global network of interconnected networks used for online activities like shopping.

    BYOD (Bring Your Own Device)

    • BYOD allows users to access network resources from personal devices, enhancing flexibility and security.
    • VPNs (Virtual Private Networks) provide secure remote access to company networks.

    Cisco IOS Configuration

    • The running configuration file takes effect immediately when modified.
    • User EXEC mode allows viewing some configuration aspects and uses the '>' symbol as its prompt.
    • The enable secret command secures privileged EXEC mode access.
    • The default SVI (Switch Virtual Interface) on a Cisco switch is VLAN1.
    • The hostname must be less than 64 characters, start with a letter, and contain no spaces.
    • NVRAM stores the startup configuration file, while RAM holds the running configuration.
    • The copy startup-config running-config command copies the startup configuration to RAM.

    DHCP (Dynamic Host Configuration Protocol)

    • DHCP automatically assigns IP addresses to hosts.

    TCP/IP (Transmission Control Protocol/Internet Protocol) Suite

    • ICMP (Internet Control Message Protocol) and IP (Internet Protocol) function at the Internet layer (Layer 3 of the OSI model).
    • The Transport layer (Layer 4 of the OSI model) segments and reassembles data.

    Message Delivery

    • Broadcast messages transmit to all devices on a local area network.
    • Multicast messages transmit to a specific group of devices.

    Data Encoding and Decoding

    • Encoding converts information into a format suitable for transmission.
    • Decoding converts received data into a readable message.

    Network Encapsulation

    • An IP packet is encapsulated in a Layer 2 frame before transmission.
    • Encapsulation places one message inside another for transfer.
    • From a web client's perspective, the protocol stack order for a web request is: HTTP, TCP, IP, Ethernet.

    Network Security

    • Implementing a firewall and antivirus software provides basic network security.

    Cisco IOS Command Basics

    • Ctrl-Shift-6 interrupts the ping process.
    • The show ip interface brief command displays switch interface status and configured IP addresses.

    Cisco IOS Configuration Management

    • The reload command resets the device without saving changes.
    • lineconin is the console password for user EXEC mode.
    • This command (copy startup-config running-config) copies the startup configuration to the running configuration.
    • The service password-encryption command hides passwords in plain text.

    Cisco IOS Command Syntax

    • running-config is a keyword in the show running-config command.

    Cisco IOS Devices and Interfaces

    • The switch virtual interface allows remote management of a Layer 2 switch.

    Cisco IOS CLI (Command Line Interface)

    • The Tab key completes partially typed words in commands.

    Cisco IOS Memory

    • RAM (Random Access Memory) loses its contents during a power cycle.
    • The device's running configuration is stored in RAM.

    Telnet vs. SSH

    • SSH provides secure remote sessions with encryption and user authentication, unlike Telnet.

    Password Security

    • Console, VTY, and privileged EXEC mode can be protected with passwords.

    OSI Model

    • A logical address is added at the Network layer (Layer 3) during encapsulation.

    Network Addressing

    • ServerB will generate a packet with the destination IP address of HostA.
    • ServerB will generate a frame with the destination MAC address of RouterB.

    TCP/IP Protocol Suite

    • FTP (File Transfer Protocol), DNS (Domain Name System), and DHCP (Dynamic Host Configuration Protocol) are application layer protocols in the TCP/IP suite.

    Protocol Data Units (PDUs)

    • A frame format is used when bits are received from the network by a host's NIC.

    Multicast Messages

    • These messages are sent to a select group of hosts.

    Encapsulation

    • Encapsulation is the process of placing one PDU inside another.

    Protocols and Data Communications

    • Protocols define the rules for message exchange between source and destination.

    Network Request/Response

    • The protocol stack order for decoding a received transmission is: Ethernet, IP, TCP, HTTP.

    TCP/IP Encapsulation

    • Segments are sent from the transport layer to the internet layer.

    OSI Model and TCP/IP Model

    • The Data Link and Physical layers of the OSI model correspond to the Network Access layer of the TCP/IP model.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers key concepts related to network threats, types, characteristics, and devices. Topics include spyware, extranet functionality, scalability, and BYOD practices. Test your knowledge on how these elements interact to facilitate secure internet access and connectivity.

    More Like This

    Network and Internet Security
    5 questions

    Network and Internet Security

    WorkableThunderstorm avatar
    WorkableThunderstorm
    مفاهيم أمن الإنترنت
    43 questions
    Networking Module 3 Quiz
    27 questions
    Use Quizgecko on...
    Browser
    Browser