Networking Basics Quiz
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary role of intermediary devices in a network?

  • To provide end user applications
  • To host websites and emails
  • To serve as the source of all data
  • To connect individual end devices to the network (correct)
  • Which type of network is typically managed by a telecommunications service provider?

  • Wireless LAN (WLAN)
  • Local Area Network (LAN)
  • Wide Area Network (WAN) (correct)
  • Metropolitan Area Network (MAN)
  • What type of cables encodes data as pulses of light?

  • Fiber optic cables (correct)
  • Coaxial cables
  • Metallic cables
  • Twisted pair cables
  • In which network type are LANs interconnected to create a private organizational network?

    <p>Intranet (B)</p> Signup and view all the answers

    How is data encoded for wireless transmission?

    <p>Using wavelengths from the electromagnetic spectrum (C)</p> Signup and view all the answers

    Which of the following best describes an end device in a network?

    <p>A source or destination of transmitted messages (D)</p> Signup and view all the answers

    What defines a Local Area Network (LAN)?

    <p>It serves users in a small geographic area (D)</p> Signup and view all the answers

    What is the main function of processes in a network?

    <p>To direct and move messages through the network (D)</p> Signup and view all the answers

    What type of Internet connection uses the same cable as cable television?

    <p>Broadband cable (B)</p> Signup and view all the answers

    Which technology provides a high bandwidth connection over a telephone line for small and home offices?

    <p>DSL (D)</p> Signup and view all the answers

    Which Internet access type is suitable for locations with no wired connectivity?

    <p>Satellite (B)</p> Signup and view all the answers

    What is a significant concern associated with the Bring Your Own Device (BYOD) trend?

    <p>Security risks (A)</p> Signup and view all the answers

    What is the primary benefit of dedicated leased lines for businesses?

    <p>Private voice and data networking (D)</p> Signup and view all the answers

    What is one primary benefit of cloud computing for businesses?

    <p>Helps to reduce investment in new infrastructure (B)</p> Signup and view all the answers

    What best describes the concept of online collaboration?

    <p>Working alongside others on a joint project (D)</p> Signup and view all the answers

    Which acronym describes a DSL technology that offers equal upload and download speeds?

    <p>SDSL (B)</p> Signup and view all the answers

    How do Software Defined Networks (SDN) enhance network functionality?

    <p>By separating decision-making from traffic forwarding (C)</p> Signup and view all the answers

    What is a limitation of dial-up telephone Internet connections?

    <p>Low bandwidth insufficient for large data transfers (A)</p> Signup and view all the answers

    Which type of connection is NOT typically used for business DSL services?

    <p>ADSL (B)</p> Signup and view all the answers

    What is a primary characteristic of the Internet of Things (IoT)?

    <p>Connecting physical items to the Internet (C)</p> Signup and view all the answers

    What does the term 'cloud computing' primarily refer to?

    <p>Accessing applications through the Internet (A)</p> Signup and view all the answers

    What is a critical requirement for satellite Internet access to function effectively?

    <p>Clear line of sight to the satellite (B)</p> Signup and view all the answers

    Which of the following is NOT a use for video communication?

    <p>Limiting user interactivity (B)</p> Signup and view all the answers

    Why is the traditional network architecture considered static?

    <p>It remains unchanged in response to new technologies (B)</p> Signup and view all the answers

    What is the primary benefit of integrating everyday objects into the Internet of Things (IoT)?

    <p>Improved efficiency and accuracy (D)</p> Signup and view all the answers

    Which characteristic is essential for a network to accommodate new users and applications without degrading service quality?

    <p>Scalability (C)</p> Signup and view all the answers

    What does Quality of Service (QoS) primarily manage in a network?

    <p>The prioritized delivery of services (A)</p> Signup and view all the answers

    How does a fault tolerant network respond to failures?

    <p>By limiting the impact of the failure (A)</p> Signup and view all the answers

    Which of the following is NOT a concern of network security?

    <p>Network scalability (B)</p> Signup and view all the answers

    What role do routers play in ensuring Quality of Service (QoS)?

    <p>They manage the flow of data and voice traffic. (B)</p> Signup and view all the answers

    Which characteristic of a network allows it to recover quickly from a failure?

    <p>Fault tolerance (D)</p> Signup and view all the answers

    What is one major consequence of network congestion without a QoS policy?

    <p>Decreased reliability of voice communications (B)</p> Signup and view all the answers

    What is a primary reason for the vulnerability of corporate data in a BYOD environment?

    <p>Lost or stolen devices (C)</p> Signup and view all the answers

    Which of the following is considered an external threat to network security?

    <p>Viruses and worms (C)</p> Signup and view all the answers

    What security approach is suggested to protect a network from various threats?

    <p>Implementing security in multiple layers (A)</p> Signup and view all the answers

    Which of the following types of attacks captures private information from an organization’s network?

    <p>Data interception and theft (A)</p> Signup and view all the answers

    What does the physical layout of a network primarily describe?

    <p>The arrangement and interconnections of network devices (C)</p> Signup and view all the answers

    Which type of attack occurs on the first day that a vulnerability is known?

    <p>Zero-day attack (B)</p> Signup and view all the answers

    What is one of the most common internal causes of data breaches in organizations?

    <p>Accidental misuse by employees (B)</p> Signup and view all the answers

    Which of the following security measures provides secure access to a private network over the internet?

    <p>Virtual Private Networks (VPNs) (A)</p> Signup and view all the answers

    Which physical topology is characterized by end devices connected to a central intermediate device?

    <p>Star topology (C)</p> Signup and view all the answers

    In which physical topology do all end systems connect in a linear sequence without the need for infrastructure devices?

    <p>Bus topology (C)</p> Signup and view all the answers

    Which WAN topology uses a central point to connect multiple branch sites?

    <p>Hub and spoke (D)</p> Signup and view all the answers

    What advantage does star topology provide over bus topology in a LAN setting?

    <p>Scalability and easier troubleshooting (A)</p> Signup and view all the answers

    Which of the following is NOT a characteristic of a ring topology?

    <p>Requires termination at both ends (C)</p> Signup and view all the answers

    What is a defining feature of a mesh topology in a WAN?

    <p>All devices are interconnected directly (D)</p> Signup and view all the answers

    Which topology is a variation called 'partial mesh' part of?

    <p>Mesh topology (A)</p> Signup and view all the answers

    What primarily defines logical topology in networking?

    <p>The way data is framed and transferred (C)</p> Signup and view all the answers

    Flashcards

    Broadband cable

    High-speed internet access using cable TV lines.

    DSL

    High-speed internet over phone lines. Asymmetrical DSL means faster downloads than uploads.

    Cellular Internet

    Internet access through a cell phone network.

    Satellite Internet

    Internet access using a satellite dish. Useful in remote areas.

    Signup and view all the flashcards

    Dial-up

    Slow internet access using a standard phone line.

    Signup and view all the flashcards

    Leased Lines

    Reserved network circuits for dedicated business internet, often expensive.

    Signup and view all the flashcards

    Ethernet WAN

    Extending LAN technology to the internet.

    Signup and view all the flashcards

    Business DSL

    A type of DSL connection designed for businesses, offering symmetrical speeds.

    Signup and view all the flashcards

    End Device

    A device that sends or receives data on a network, like a computer or phone.

    Signup and view all the flashcards

    Intermediate Device

    A device that connects devices on a network, routing and managing data, like a router or switch.

    Signup and view all the flashcards

    Local Area Network (LAN)

    A network that covers a small geographic area, like a home or office.

    Signup and view all the flashcards

    Wide Area Network (WAN)

    A network that spans a large geographic area, connecting LANs together.

    Signup and view all the flashcards

    Network Media

    The physical pathway for data transmission, including cables and wireless signals.

    Signup and view all the flashcards

    Metallic Wires

    Network cables that transmit data as electrical signals.

    Signup and view all the flashcards

    Fiber Optic Cable

    Network cables that transmit data as light signals, often faster and more secure than metallic cables.

    Signup and view all the flashcards

    Network Services

    Applications used over a network, for example, email hosting.

    Signup and view all the flashcards

    BYOD

    Employees using personal devices for work on a network.

    Signup and view all the flashcards

    Online Collaboration

    Working together on a project with others, usually through technology.

    Signup and view all the flashcards

    Video Communication

    Using video to talk to people remotely.

    Signup and view all the flashcards

    Cloud Computing

    Using servers on the internet to store and access data.

    Signup and view all the flashcards

    Major Global Trend

    A significant development or change widely adopted internationally.

    Signup and view all the flashcards

    Security Concerns (BYOD)

    Risks associated with using personal devices for work.

    Signup and view all the flashcards

    What is IoT?

    The interconnection of everyday objects (smart devices) enabling them to collect and exchange data, creating an intelligent network of physical things.

    Signup and view all the flashcards

    What are the benefits of IoT?

    Improved efficiency, accuracy, and economic benefit through automation and reduced human intervention. It also brings new security challenges.

    Signup and view all the flashcards

    Fault Tolerance

    The ability of a network to withstand failures and minimize their impact on users, with swift recovery.

    Signup and view all the flashcards

    Scalability

    The capacity of a network to expand quickly to accommodate new users and applications without compromising performance for existing users.

    Signup and view all the flashcards

    Quality of Service (QoS)

    A mechanism to prioritize different types of network traffic according to their importance, like voice or video, ensuring reliable delivery.

    Signup and view all the flashcards

    Network Congestion

    Occurs when simultaneous communications exceed network bandwidth, causing delays and performance issues.

    Signup and view all the flashcards

    Network Infrastructure Security

    Protecting the physical network devices and infrastructure from unauthorized access or damage.

    Signup and view all the flashcards

    Information Security

    Protecting the data transmitted over the network from unauthorized access, modification, or disclosure.

    Signup and view all the flashcards

    Internal Threats

    Security risks originating from within the network, often caused by employees or compromised devices. Examples include accidental misuse, lost devices, and malicious insiders.

    Signup and view all the flashcards

    External Threats

    Security risks originating from outside the network, often exploiting vulnerabilities in systems or devices. Examples include viruses, spyware, and denial of service attacks.

    Signup and view all the flashcards

    Zero-day Attack

    An attack that exploits a newly discovered vulnerability before a patch or fix is available, making it difficult to defend against.

    Signup and view all the flashcards

    Firewall Filtering

    A security measure that examines incoming and outgoing network traffic, blocking unauthorized access and preventing malicious data from entering the network.

    Signup and view all the flashcards

    Intrusion Prevention System (IPS)

    A security system that identifies and blocks malicious network activity in real-time, preventing attacks from reaching their target.

    Signup and view all the flashcards

    Virtual Private Network (VPN)

    A secure connection over a public network, encrypting traffic and creating a private tunnel for secure communication.

    Signup and view all the flashcards

    Logical Network Layout

    The way devices are interconnected and communicate on a network, focusing on the connections and relationships between them.

    Signup and view all the flashcards

    Physical Topology

    The actual physical arrangement of devices and cables in a network, showing their physical locations and connections.

    Signup and view all the flashcards

    Logical Topology

    Defines how network data travels between devices, including communication protocols and data transfer methods.

    Signup and view all the flashcards

    Star Topology

    A network structure where all devices connect to a central device like a hub or switch.

    Signup and view all the flashcards

    Extended Star Topology

    Multiple star topologies connected together through additional switches, creating a larger network.

    Signup and view all the flashcards

    Bus Topology

    A network where all devices are connected in a single line, sharing the same communication channel.

    Signup and view all the flashcards

    Ring Topology

    A network where devices are connected in a closed loop, with data circulating in one direction.

    Signup and view all the flashcards

    Point-to-Point WAN Topology

    A simple topology where two devices have a dedicated connection, creating a direct link.

    Signup and view all the flashcards

    Hub and Spoke WAN Topology

    A central site connects to multiple branch sites with individual, point-to-point links.

    Signup and view all the flashcards

    Study Notes

    Course Information

    • Course title: INFO 1220 Network Fundamentals
    • Course provider: Fanshawe College

    Introduction to Networking

    • Networking encompasses various communication methods
    • Examples include word of mouth, cell phones, and computer networks
    • Computer networks connect devices and transfer data, voice, and video through cables, fiber-optics, and radio waves

    Computer Networks

    • Systems include computers, print devices, network devices, and software
    • Networks transmit data, voice, and video over different types of media (cables, fiber-optics, radio waves)
    • A major advantage is the ability to share information across the network

    Networks

    • Networks support various activities, including learning, communication, work, and play

    Networks of Many Sizes

    • Vary from two computers to millions of devices
    • Networks accommodate diverse needs in businesses and organizations, facilitating efficient communication and access to information

    Client-Server

    • Computers on a network can be classified as hosts
    • Servers are hosts providing information to other hosts (clients)

    Peer-to-Peer

    • A network where computers can act as both clients and servers

    Network Components

    • Devices, media, and software are the physical elements of the network
    • Hardware includes devices like laptops, PCs, switches, routers, and wireless access points
    • Data flows through intermediate devices and arrives at end devices

    Network Components (Devices)

    • End Devices - Desktop computers, laptops, printers, IP phones, and wireless tablets
    • Intermediary Devices - Routers, switches, multi-layer switches, and firewall appliances

    Network Components

    • Different types of media facilitate data transmission.
    • Examples include metallic wires, glass/plastic fibers, and wireless transmission (electromagnetic waves)

    Types of Networks

    • Local Area Networks (LANs): Network infrastructure covering a small geographical area
    • Wide Area Networks (WANs): Cover larger geographical areas, often using telecom service providers' infrastructure
    • Other types include Metropolitan Area Networks (MANs), Wireless LANs (WLANs), and Storage Area Networks (SANs)

    WANs

    • LANs are interconnected using WAN services and technologies
    • Includes satellite, leased lines, cellular, DSL and cable connections

    Internet Access Technologies

    • Various technologies provide access to the Internet
    • Internet Service Providers, Broadband Cable, DSL, Wireless WANs, and Mobile services are some examples

    Home/Small Office Internet Connections

    • DSL, Cable, Cellular, Satellite, and Dial-up connections provide Internet access for homes and small offices

    Internet Connections (Business)

    • Dedicated leased lines, Metro Ethernet, DSL and satellite connections are used for business connections
    • Bring Your Own Device (BYOD)
    • Online Collaboration
    • Video Communications
    • Cloud Computing
    • Software-Defined Networking
    • Internet of Things (IoT)

    Bring Your Own Device

    • The concept where users bring their own devices to access network resources
    • This trend introduces new challenges to information security

    Online Collaboration

    • Communication tools for joint projects
    • Enables students, employees, teachers, and customers to interact and work together

    Video Communications

    • A powerful tool used for both local and global communication.

    Cloud Computing

    • A trend changing the way people access and store data
    • Personal files and backups are stored on servers over the internet

    Software-Defined Networks(SDN)

    • A network architecture that addresses scalable needs
    • Decouples control plane (decision making) from the data plane (data forwarding)

    Internet of Things (IoT)

    • The continuous networking of existing physical devices (smart devices)
    • Data exchange between these devices and the Internet occurs to make them efficient and accurate

    Network Characteristics

    • Fault tolerance
    • Quality of Service
    • Reliability
    • Scalability
    • Security

    Fault Tolerance

    • A network has multiple paths and mechanisms in place if a device or link fails
    • Aims to reduce the impact of failures on users and operations

    Scalability

    • The capacity to grow and adapt to changing levels of network use
    • Enables the incorporation of new or additional users, while preserving performance for existing users

    Quality of Service (QoS)

    • A mechanism that can establish and prioritize traffic
    • Important for network applications and traffic prioritizing

    Security

    • An important aspect to protect resources and data from attacks
    • Software and hardware protections exist alongside physical protection to prevent unauthorized access

    Threats to Networks

    • External threats - viruses, worms, trojan horses, spyware, adware, zero-day, hacker attacks, denial of service attacks, data interception, and identity theft
    • Internal threats - lost, stolen devices, accidental misuse, malware-infected employees

    Security Solutions

    • Multiple layers to protect from threats
    • Include antivirus, firewalls, access control lists, intrusion prevention systems, and virtual private networks

    Network Equipment

    • Network Interface Card (NIC)
    • Switch
    • Router

    Network Layouts

    • Topology diagram

    LAN Physical Topologies

    • Star
    • Extended Star
    • Bus
    • Ring

    WAN Physical Topologies

    • Point-to-point
    • Hub-and-spoke
    • Full mesh

    Network Diagrams

    • Shows the arrangement and relationship of devices and connections in the network

    Network Tools

    • Wireshark and Packet Tracer

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on key concepts in networking with this quiz. Topics include network devices, types of networks, data transmission methods, and more. Perfect for students and professionals looking to reinforce their understanding of networking fundamentals.

    More Like This

    Networking Devices: Types and Functions
    18 questions
    Dispositivos de Interconexión y Redes LAN
    40 questions
    Use Quizgecko on...
    Browser
    Browser