Networking and Security Midterm
21 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of the Service Set Identifier (SSID) in a wireless network?

  • To act as a network password for association (correct)
  • To connect wired devices
  • To encrypt network data
  • To broadcast network speed
  • Ad hoc mode requires a centralized device for communication between wireless clients.

    False

    Name one method to enhance wireless security.

    Limit wireless coverage, Disable SSID Broadcast, or Enable Mac filtering.

    An ____ is a device that connects multiple networks and passes information between them.

    <p>router</p> Signup and view all the answers

    Match the Wi-Fi modes with their characteristics:

    <p>Infrastructure mode = Uses a centralized device to manage data Ad hoc mode = Communicates directly without a central device WPS = Connects devices with a button or PIN Open network = Requires no password for association</p> Signup and view all the answers

    What protocol is used to securely transfer files over a network?

    <p>SFTP</p> Signup and view all the answers

    SMTP was originally configured to support secure email transmission.

    <p>False</p> Signup and view all the answers

    Who invented email?

    <p>Ray Tomlinson</p> Signup and view all the answers

    The protocol used to match a domain name to an IP address is called __________.

    <p>DNS</p> Signup and view all the answers

    Which of the following protocols is designed for managing networks?

    <p>SNMP</p> Signup and view all the answers

    Match the type of data transmission with its definition:

    <p>Unicast = One-to-One transmission Broadcast = One-to-All transmission Multicast = One-to-Many transmission</p> Signup and view all the answers

    Full duplex mode allows a network interface card to send and receive data simultaneously.

    <p>True</p> Signup and view all the answers

    What is the primary function of DHCP in a network?

    <p>Supplies IP addresses to clients</p> Signup and view all the answers

    Which protocol is primarily used for transferring files securely?

    <p>SFTP</p> Signup and view all the answers

    UDP establishes a connection before data transmission.

    <p>False</p> Signup and view all the answers

    What is the purpose of the DNS protocol?

    <p>To translate internet domain names into IP addresses.</p> Signup and view all the answers

    The three-way handshake in TCP consists of ______, ______, and ______.

    <p>SYN, SYN-ACK, ACK</p> Signup and view all the answers

    Match the following protocols with their primary purposes:

    <p>SNMP = Monitoring and managing devices ICMP = Reporting transmission errors HTTPS = Secure communication over the web SMTP = Sending emails</p> Signup and view all the answers

    Which of the following is a security protocol used to ensure data is sent securely?

    <p>TLS</p> Signup and view all the answers

    What does MAC stand for in networking?

    <p>Media Access Control</p> Signup and view all the answers

    WPA is an older security protocol than WEP.

    <p>False</p> Signup and view all the answers

    Study Notes

    Networking and Security Midterm

    • Protocols:

      • TCP (Transmission Control Protocol): Reliable, connection-oriented transmission of data.
      • UDP (User Datagram Protocol): Connectionless, less reliable, faster data transmission.
      • HTTP (Hypertext Transfer Protocol): Method for web clients and servers to communicate.
      • HTTPS (HTTP Secure): Secure web communication using SSL/TLS.
      • DNS (Domain Name System): Translates domain names to IP addresses.
      • FTP (File Transfer Protocol): Transfers files between computers.
      • SFTP (Secure File Transfer Protocol): Secure method for file transfers.
      • TFTP (Trivial File Transfer Protocol): Simple file transfer protocol.
      • SMTP (Simple Mail Transfer Protocol): Email transmission protocol.
      • IMAP (Internet Message Access Protocol): Protocol for retrieving email messages.
      • POP (Post Office Protocol): Protocol for retrieving email messages.
      • DHCP (Dynamic Host Configuration Protocol): Assigns IP addresses to devices on a network.
      • SNMP (Simple Network Management Protocol): Used to monitor and manage network devices.
      • ICMP (Internet Control Message Protocol): Used for network diagnostics and error reporting.
      • SSL/TLS (Secure Sockets Layer/Transport Layer Security): Protocols for secure communication.
      • SSH (Secure Shell): Secure network protocol for remote login.
      • AES (Advanced Encryption Standard): Encryption method for data security.
      • MAC (Media Access Control): Unique hardware address for network devices.
    • Network Concepts:

      • Communication Protocols: Protocols for exchanging network information.
      • Management Protocols: Protocols for monitoring and managing network activity.
      • Security Protocols: Protocols for ensuring data security during transmission.
      • Three-Way Handshake (TCP): SYN, SYN-ACK, and ACK steps in establishing a TCP connection.
      • Wireless Protocols and Standards: WPS, Wi-Fi, Wireless Security, WAPs (Wireless Access Points), WPA/WPA2.

    Network Layer Protocols

    • Unicast: Transmission to a specific destination.
    • Broadcast: Transmission to all devices on the network.
    • Multicast: Transmission to a group of devices.
    • NIC (Network Interface Card): Component inside computers, converts data to network signals.
    • Duplex (Network Connections): Half-duplex – transmit or receive, but not both simultaneously; Full-duplex– transmit and receive at the same time.
    • MAC Addresses (Media Access Control), Unique identifiers for network devices, usually expressed as hex (hexadecimal) numbers including a manufacturer ID.
    • Hubs: Early network devices that broadcast data to all connected devices.
    • Switches: Modern network devices that selectively route data to the intended destination, improving efficiency.
    • Routers: Devices that connect different networks and forward data between them.

    Network Protocols, Models, and Security

    • WLAN (Wireless Local Area Network): Network spread over a local area like a building, enabling network access from wireless devices, including smartphones.
    • Service Set Identifier (SSID): Network name used by wireless devices to identify a network.
    • Wi-Fi Modes: Infrastructure: Centrally managed data transmission within a network using a point or access point; Ad hoc: Direct peer-to-peer communication between devices.
    • WPS (Wi-Fi Protected Setup): Security configuration protocol to quickly set up Wi-Fi security.
    • Protection (Network): "Open" networks rely on SSIDs; password-protected networks are more secure.
    • Data Transmission Methods: Exchange of data across a network.
    • Instantaneous Data Transfer: Data transmission for online applications like chats and videoconferences.
    • Digital Data Transmission: Method for capturing data in bits (0's and 1's) from voltage differences to transfer the data across a network.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers essential protocols used in networking and security, including TCP, UDP, HTTP, and DNS. Understand their functionalities and differences to excel in the midterm assessment. Test your knowledge on both secure and non-secure protocols.

    More Like This

    Networking Protocols and Security Quiz
    7 questions
    Networking Protocols and Concepts Quiz
    65 questions
    Network Protocols and Security Quiz
    16 questions
    Internet Protocols and Layers
    18 questions
    Use Quizgecko on...
    Browser
    Browser