Podcast
Questions and Answers
What is the purpose of the Service Set Identifier (SSID) in a wireless network?
What is the purpose of the Service Set Identifier (SSID) in a wireless network?
- To act as a network password for association (correct)
- To connect wired devices
- To encrypt network data
- To broadcast network speed
Ad hoc mode requires a centralized device for communication between wireless clients.
Ad hoc mode requires a centralized device for communication between wireless clients.
False (B)
Name one method to enhance wireless security.
Name one method to enhance wireless security.
Limit wireless coverage, Disable SSID Broadcast, or Enable Mac filtering.
An ____ is a device that connects multiple networks and passes information between them.
An ____ is a device that connects multiple networks and passes information between them.
Match the Wi-Fi modes with their characteristics:
Match the Wi-Fi modes with their characteristics:
What protocol is used to securely transfer files over a network?
What protocol is used to securely transfer files over a network?
SMTP was originally configured to support secure email transmission.
SMTP was originally configured to support secure email transmission.
Who invented email?
Who invented email?
The protocol used to match a domain name to an IP address is called __________.
The protocol used to match a domain name to an IP address is called __________.
Which of the following protocols is designed for managing networks?
Which of the following protocols is designed for managing networks?
Match the type of data transmission with its definition:
Match the type of data transmission with its definition:
Full duplex mode allows a network interface card to send and receive data simultaneously.
Full duplex mode allows a network interface card to send and receive data simultaneously.
What is the primary function of DHCP in a network?
What is the primary function of DHCP in a network?
Which protocol is primarily used for transferring files securely?
Which protocol is primarily used for transferring files securely?
UDP establishes a connection before data transmission.
UDP establishes a connection before data transmission.
What is the purpose of the DNS protocol?
What is the purpose of the DNS protocol?
The three-way handshake in TCP consists of ______, ______, and ______.
The three-way handshake in TCP consists of ______, ______, and ______.
Match the following protocols with their primary purposes:
Match the following protocols with their primary purposes:
Which of the following is a security protocol used to ensure data is sent securely?
Which of the following is a security protocol used to ensure data is sent securely?
What does MAC stand for in networking?
What does MAC stand for in networking?
WPA is an older security protocol than WEP.
WPA is an older security protocol than WEP.
Flashcards
TCP
TCP
A connection-oriented protocol that allows two devices to form a connection and stream data.
UDP
UDP
A connectionless protocol that doesn't establish a connection before transmitting data. Less reliable than TCP.
HTTP
HTTP
A protocol that allows communication between clients and web servers.
DNS
DNS
Signup and view all the flashcards
HTTPS
HTTPS
Signup and view all the flashcards
Three-way handshake
Three-way handshake
Signup and view all the flashcards
SNMP
SNMP
Signup and view all the flashcards
ICMP
ICMP
Signup and view all the flashcards
Unicast Transmission
Unicast Transmission
Signup and view all the flashcards
Broadcast Transmission
Broadcast Transmission
Signup and view all the flashcards
MAC Address
MAC Address
Signup and view all the flashcards
Half-duplex
Half-duplex
Signup and view all the flashcards
Full-duplex
Full-duplex
Signup and view all the flashcards
WLAN
WLAN
Signup and view all the flashcards
Association (WLAN)
Association (WLAN)
Signup and view all the flashcards
Infrastructure Mode (Wi-Fi)
Infrastructure Mode (Wi-Fi)
Signup and view all the flashcards
WPS (Wi-Fi)
WPS (Wi-Fi)
Signup and view all the flashcards
Wi-Fi Extender
Wi-Fi Extender
Signup and view all the flashcards
Study Notes
Networking and Security Midterm
-
Protocols:
- TCP (Transmission Control Protocol): Reliable, connection-oriented transmission of data.
- UDP (User Datagram Protocol): Connectionless, less reliable, faster data transmission.
- HTTP (Hypertext Transfer Protocol): Method for web clients and servers to communicate.
- HTTPS (HTTP Secure): Secure web communication using SSL/TLS.
- DNS (Domain Name System): Translates domain names to IP addresses.
- FTP (File Transfer Protocol): Transfers files between computers.
- SFTP (Secure File Transfer Protocol): Secure method for file transfers.
- TFTP (Trivial File Transfer Protocol): Simple file transfer protocol.
- SMTP (Simple Mail Transfer Protocol): Email transmission protocol.
- IMAP (Internet Message Access Protocol): Protocol for retrieving email messages.
- POP (Post Office Protocol): Protocol for retrieving email messages.
- DHCP (Dynamic Host Configuration Protocol): Assigns IP addresses to devices on a network.
- SNMP (Simple Network Management Protocol): Used to monitor and manage network devices.
- ICMP (Internet Control Message Protocol): Used for network diagnostics and error reporting.
- SSL/TLS (Secure Sockets Layer/Transport Layer Security): Protocols for secure communication.
- SSH (Secure Shell): Secure network protocol for remote login.
- AES (Advanced Encryption Standard): Encryption method for data security.
- MAC (Media Access Control): Unique hardware address for network devices.
-
Network Concepts:
- Communication Protocols: Protocols for exchanging network information.
- Management Protocols: Protocols for monitoring and managing network activity.
- Security Protocols: Protocols for ensuring data security during transmission.
- Three-Way Handshake (TCP): SYN, SYN-ACK, and ACK steps in establishing a TCP connection.
- Wireless Protocols and Standards: WPS, Wi-Fi, Wireless Security, WAPs (Wireless Access Points), WPA/WPA2.
Network Layer Protocols
- Unicast: Transmission to a specific destination.
- Broadcast: Transmission to all devices on the network.
- Multicast: Transmission to a group of devices.
- NIC (Network Interface Card): Component inside computers, converts data to network signals.
- Duplex (Network Connections): Half-duplex – transmit or receive, but not both simultaneously; Full-duplex– transmit and receive at the same time.
- MAC Addresses (Media Access Control), Unique identifiers for network devices, usually expressed as hex (hexadecimal) numbers including a manufacturer ID.
- Hubs: Early network devices that broadcast data to all connected devices.
- Switches: Modern network devices that selectively route data to the intended destination, improving efficiency.
- Routers: Devices that connect different networks and forward data between them.
Network Protocols, Models, and Security
- WLAN (Wireless Local Area Network): Network spread over a local area like a building, enabling network access from wireless devices, including smartphones.
- Service Set Identifier (SSID): Network name used by wireless devices to identify a network.
- Wi-Fi Modes: Infrastructure: Centrally managed data transmission within a network using a point or access point; Ad hoc: Direct peer-to-peer communication between devices.
- WPS (Wi-Fi Protected Setup): Security configuration protocol to quickly set up Wi-Fi security.
- Protection (Network): "Open" networks rely on SSIDs; password-protected networks are more secure.
- Data Transmission Methods: Exchange of data across a network.
- Instantaneous Data Transfer: Data transmission for online applications like chats and videoconferences.
- Digital Data Transmission: Method for capturing data in bits (0's and 1's) from voltage differences to transfer the data across a network.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.