Podcast
Questions and Answers
What is the purpose of the Service Set Identifier (SSID) in a wireless network?
What is the purpose of the Service Set Identifier (SSID) in a wireless network?
Ad hoc mode requires a centralized device for communication between wireless clients.
Ad hoc mode requires a centralized device for communication between wireless clients.
False
Name one method to enhance wireless security.
Name one method to enhance wireless security.
Limit wireless coverage, Disable SSID Broadcast, or Enable Mac filtering.
An ____ is a device that connects multiple networks and passes information between them.
An ____ is a device that connects multiple networks and passes information between them.
Signup and view all the answers
Match the Wi-Fi modes with their characteristics:
Match the Wi-Fi modes with their characteristics:
Signup and view all the answers
What protocol is used to securely transfer files over a network?
What protocol is used to securely transfer files over a network?
Signup and view all the answers
SMTP was originally configured to support secure email transmission.
SMTP was originally configured to support secure email transmission.
Signup and view all the answers
Who invented email?
Who invented email?
Signup and view all the answers
The protocol used to match a domain name to an IP address is called __________.
The protocol used to match a domain name to an IP address is called __________.
Signup and view all the answers
Which of the following protocols is designed for managing networks?
Which of the following protocols is designed for managing networks?
Signup and view all the answers
Match the type of data transmission with its definition:
Match the type of data transmission with its definition:
Signup and view all the answers
Full duplex mode allows a network interface card to send and receive data simultaneously.
Full duplex mode allows a network interface card to send and receive data simultaneously.
Signup and view all the answers
What is the primary function of DHCP in a network?
What is the primary function of DHCP in a network?
Signup and view all the answers
Which protocol is primarily used for transferring files securely?
Which protocol is primarily used for transferring files securely?
Signup and view all the answers
UDP establishes a connection before data transmission.
UDP establishes a connection before data transmission.
Signup and view all the answers
What is the purpose of the DNS protocol?
What is the purpose of the DNS protocol?
Signup and view all the answers
The three-way handshake in TCP consists of ______, ______, and ______.
The three-way handshake in TCP consists of ______, ______, and ______.
Signup and view all the answers
Match the following protocols with their primary purposes:
Match the following protocols with their primary purposes:
Signup and view all the answers
Which of the following is a security protocol used to ensure data is sent securely?
Which of the following is a security protocol used to ensure data is sent securely?
Signup and view all the answers
What does MAC stand for in networking?
What does MAC stand for in networking?
Signup and view all the answers
WPA is an older security protocol than WEP.
WPA is an older security protocol than WEP.
Signup and view all the answers
Study Notes
Networking and Security Midterm
-
Protocols:
- TCP (Transmission Control Protocol): Reliable, connection-oriented transmission of data.
- UDP (User Datagram Protocol): Connectionless, less reliable, faster data transmission.
- HTTP (Hypertext Transfer Protocol): Method for web clients and servers to communicate.
- HTTPS (HTTP Secure): Secure web communication using SSL/TLS.
- DNS (Domain Name System): Translates domain names to IP addresses.
- FTP (File Transfer Protocol): Transfers files between computers.
- SFTP (Secure File Transfer Protocol): Secure method for file transfers.
- TFTP (Trivial File Transfer Protocol): Simple file transfer protocol.
- SMTP (Simple Mail Transfer Protocol): Email transmission protocol.
- IMAP (Internet Message Access Protocol): Protocol for retrieving email messages.
- POP (Post Office Protocol): Protocol for retrieving email messages.
- DHCP (Dynamic Host Configuration Protocol): Assigns IP addresses to devices on a network.
- SNMP (Simple Network Management Protocol): Used to monitor and manage network devices.
- ICMP (Internet Control Message Protocol): Used for network diagnostics and error reporting.
- SSL/TLS (Secure Sockets Layer/Transport Layer Security): Protocols for secure communication.
- SSH (Secure Shell): Secure network protocol for remote login.
- AES (Advanced Encryption Standard): Encryption method for data security.
- MAC (Media Access Control): Unique hardware address for network devices.
-
Network Concepts:
- Communication Protocols: Protocols for exchanging network information.
- Management Protocols: Protocols for monitoring and managing network activity.
- Security Protocols: Protocols for ensuring data security during transmission.
- Three-Way Handshake (TCP): SYN, SYN-ACK, and ACK steps in establishing a TCP connection.
- Wireless Protocols and Standards: WPS, Wi-Fi, Wireless Security, WAPs (Wireless Access Points), WPA/WPA2.
Network Layer Protocols
- Unicast: Transmission to a specific destination.
- Broadcast: Transmission to all devices on the network.
- Multicast: Transmission to a group of devices.
- NIC (Network Interface Card): Component inside computers, converts data to network signals.
- Duplex (Network Connections): Half-duplex – transmit or receive, but not both simultaneously; Full-duplex– transmit and receive at the same time.
- MAC Addresses (Media Access Control), Unique identifiers for network devices, usually expressed as hex (hexadecimal) numbers including a manufacturer ID.
- Hubs: Early network devices that broadcast data to all connected devices.
- Switches: Modern network devices that selectively route data to the intended destination, improving efficiency.
- Routers: Devices that connect different networks and forward data between them.
Network Protocols, Models, and Security
- WLAN (Wireless Local Area Network): Network spread over a local area like a building, enabling network access from wireless devices, including smartphones.
- Service Set Identifier (SSID): Network name used by wireless devices to identify a network.
- Wi-Fi Modes: Infrastructure: Centrally managed data transmission within a network using a point or access point; Ad hoc: Direct peer-to-peer communication between devices.
- WPS (Wi-Fi Protected Setup): Security configuration protocol to quickly set up Wi-Fi security.
- Protection (Network): "Open" networks rely on SSIDs; password-protected networks are more secure.
- Data Transmission Methods: Exchange of data across a network.
- Instantaneous Data Transfer: Data transmission for online applications like chats and videoconferences.
- Digital Data Transmission: Method for capturing data in bits (0's and 1's) from voltage differences to transfer the data across a network.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers essential protocols used in networking and security, including TCP, UDP, HTTP, and DNS. Understand their functionalities and differences to excel in the midterm assessment. Test your knowledge on both secure and non-secure protocols.