Networking Protocols and Concepts Quiz
65 Questions
100 Views

Networking Protocols and Concepts Quiz

Created by
@LionheartedBrazilNutTree

Questions and Answers

What is an IP address?

A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.

What does TCP/IP stand for?

Transmission Control Protocol/Internet Protocol

What does HTTP stand for?

HyperText Transfer Protocol

What is FTP?

<p>File Transfer Protocol</p> Signup and view all the answers

What is SMTP?

<p>Simple Mail Transfer Protocol</p> Signup and view all the answers

What is a botnet?

<p>A logical computer network of zombies under the control of an attacker.</p> Signup and view all the answers

What does DDoS stand for?

<p>Distributed Denial of Service</p> Signup and view all the answers

What is the Internet?

<p>A computer network consisting of a worldwide network of computer networks that use the TCP/IP protocols.</p> Signup and view all the answers

What is an intranet?

<p>A private network that uses internet software and TCP/IP protocols to share information within the network.</p> Signup and view all the answers

The usable intranet IP address ranges are _____ and _____ and _____

<p>10.0.0.1 through 10.255.255.254, 172.16.0.1 through 172.31.255.254, 192.168.1.1 through 192.168.255.254</p> Signup and view all the answers

What is Network Address Translation (NAT)?

<p>A service that translates private IP addresses to public IP addresses and vice versa.</p> Signup and view all the answers

What is a proxy server?

<p>A software server that handles communications to and from the Internet.</p> Signup and view all the answers

What is a firewall?

<p>A part of a computer system designed to block unauthorized access while permitting outward communication.</p> Signup and view all the answers

What is a packet-filtering firewall?

<p>A firewall that examines each packet to determine whether it should pass.</p> Signup and view all the answers

What is a stateful filtering firewall?

<p>A firewall that filters traffic based on network connections using a state table.</p> Signup and view all the answers

What type of firewall blocks traffic based on application data?

<p>Content-filtering firewall</p> Signup and view all the answers

What is a public network?

<p>A network that any user can access without restrictions.</p> Signup and view all the answers

What is a home network?

<p>A local area network designed for personal or business use in the home.</p> Signup and view all the answers

What is a work network?

<p>A network location that enables network discovery and allows computers to be part of a workgroup.</p> Signup and view all the answers

What is a domain network?

<p>A location type for computers joined to a domain.</p> Signup and view all the answers

What is a perimeter network?

<p>A network set up separately from a company's private local area network and the Internet.</p> Signup and view all the answers

What is the HTTP port?

<p>Port 80</p> Signup and view all the answers

What is the HTTPS port?

<p>Port 443</p> Signup and view all the answers

What does a reverse proxy server do?

<p>Protects, hides, offloads, and distributes access to web servers.</p> Signup and view all the answers

What is a guest network?

<p>A separate wireless network created to provide guests access to the Internet.</p> Signup and view all the answers

What is an extranet?

<p>An area between the Internet and intranet for trusted entities.</p> Signup and view all the answers

Which network security zone represents the highest risk? (Select one)

<p>Internet</p> Signup and view all the answers

What service translates private IP addresses to public ones?

<p>Network Address Translation (NAT)</p> Signup and view all the answers

What should be implemented to restrict web page access for employees? (Select one)

<p>Proxy Server</p> Signup and view all the answers

A DMZ provides a layer of security for internet-facing servers.

<p>True</p> Signup and view all the answers

How many firewalls are used to create a perimeter network? (Choose all that apply)

<p>One</p> Signup and view all the answers

What allows computers to locate each other in a Microsoft network? (Select one)

<p>Network discovery</p> Signup and view all the answers

What should you create to provide access to internal resources via the Internet?

<p>An extranet</p> Signup and view all the answers

What type of server should be used to cache web pages?

<p>Proxy</p> Signup and view all the answers

What device can detect network anomalies and report them?

<p>NIDS</p> Signup and view all the answers

Which of the following is not a type of firewall?

<p>DMZ</p> Signup and view all the answers

What tunneling protocol allows connections on inbound port 1723?

<p>PPTP</p> Signup and view all the answers

Which service should you choose for unencrypted or optionally encrypted tunnels?

<p>L2TP</p> Signup and view all the answers

What kind of network allows only users from a partner company?

<p>Extranet</p> Signup and view all the answers

What type of zone is set up for servers serving requests to the web?

<p>DMZ</p> Signup and view all the answers

What Windows Server service is used to set up a VPN server?

<p>RRAS</p> Signup and view all the answers

What is the appropriate tool for port scanning?

<p>NMAP</p> Signup and view all the answers

What tunneling protocol is currently running if your setup is not IPsec?

<p>PPTP</p> Signup and view all the answers

The firewall is running a type of packet filtering known as _____ packet filtering.

<p>stateful</p> Signup and view all the answers

The VPN server installed uses inbound port 1701. The server is utilizing the _____ protocol.

<p>L2TP or Layer 2 Tunneling Protocol</p> Signup and view all the answers

To verify all closed ports on the firewall, use the ____ option in Nmap.

<p>-PO</p> Signup and view all the answers

What allows users to interact and contribute to websites?

<p>Web 2.0</p> Signup and view all the answers

The connection failed because you skipped the _____ step.

<p>configure users, user account, or permissions</p> Signup and view all the answers

A network zone that allows access to resources on a LAN via VPN is known as an __________.

<p>intranet</p> Signup and view all the answers

A firewall normally has a private and a _______ IP address.

<p>public</p> Signup and view all the answers

The organization that defines DNS is the ______.

<p>IETF</p> Signup and view all the answers

The ______ is an enormous system of interlinked hypertext documents.

<p>World Wide Web, www, or web</p> Signup and view all the answers

When the VPN server is set up and running, clients get their IP addresses from a _______ server.

<p>DHCP or VPN server</p> Signup and view all the answers

What is the HTTP TCP port?

<p>TCP 80</p> Signup and view all the answers

What is the HTTPS (Hypertext Transfer Protocol Secure) port?

<p>Port 443</p> Signup and view all the answers

What defines the nearest router for a host?

<p>Default gateway</p> Signup and view all the answers

What type of address is 202.23.2.255?

<p>Broadcast address</p> Signup and view all the answers

What server translates host names to IP addresses?

<p>DNS</p> Signup and view all the answers

What is the maximum number of hosts that you can use for each subnet in a class C address?

<p>254</p> Signup and view all the answers

What is the default subnet mask for a Class B network?

<p>255.255.0.0</p> Signup and view all the answers

How many bits is an IPv6 address?

<p>128</p> Signup and view all the answers

For IPv4, what class is used for multicasting?

<p>Class D</p> Signup and view all the answers

What type of address is used to send a single set of packets to multiple hosts?

<p>Multicast address</p> Signup and view all the answers

What do you call a smaller network that is part of a larger network?

<p>Subnet</p> Signup and view all the answers

Which of the following is not a private address?

<p>200.23.34.120</p> Signup and view all the answers

Study Notes

IP Address

  • A unique string of numbers identifying devices in a network, formatted as a sequence of numbers separated by periods.
  • Public IP addresses are used on the internet, while private IP addresses are used within internal networks.

TCP/IP

  • Stands for Transmission Control Protocol/Internet Protocol.
  • Fundamental protocol allowing computers to communicate over the internet.

HTTP

  • HyperText Transfer Protocol.
  • Used for transmitting web pages on the internet, typically operates over port 80.

FTP

  • File Transfer Protocol.
  • Facilitates file uploads from one computer to another and file retrieval from servers.

SMTP

  • Simple Mail Transfer Protocol.
  • Enables email sending between clients and servers, operates on TCP port 25.

Botnet

  • A network of infected computers under the control of an attacker, often referred to as "zombies."

DDoS

  • Distributed Denial of Service.
  • Involves multiple computers overwhelming a device with requests, hindering normal operations.

Internet

  • A vast network of interconnected computer networks utilizing TCP/IP protocols to facilitate data exchange.

Intranet

  • A private network utilizing internet software and TCP/IP to share information internally.

Intranet IP Address Ranges

  • Usable private IP address ranges include:
    • 10.0.0.1 to 10.255.255.254
    • 172.16.0.1 to 172.31.255.254
    • 192.168.1.1 to 192.168.255.254

Network Address Translation (NAT)

  • A service that converts private IP addresses to public ones and vice versa, aiding in security and address conservation.

Proxy Servers

  • Software solutions that manage internet communications for an organization.
  • Benefits include caching, filtering, and content checking.

Firewall

  • A system designed to block unauthorized access while allowing outbound communication.

Packet-filtering Firewall

  • Examines packets for access control based on source and destination addresses.

Stateful Filtering Firewall

  • Monitors active connections and filters traffic based on each connection's state.

Content-filtering Firewall

  • Blocks traffic based on application data within packets.

Application Layer Filtering

  • Filters network traffic based on specific applications or services.

Public Network

  • A freely accessible network, with the internet being the most common example.

Home Network

  • A local area network for personal or business use, typically secure and user-trusted.

Work Network

  • Similar to home networks, designed for use in organizational settings.

Domain Network

  • Configured for computers joined to a domain, commonly used in corporate environments.

Perimeter Network

  • Also known as DMZ (Demilitarized Zone).
  • Enhances security for internet-facing servers, isolated from the internal network.

HTTPS

  • An encrypted version of HTTP, operating over port 443 for secure communications.

Guest Network

  • A wireless network for visitors that maintains privacy and security of the primary network.

Extranet

  • A semi-private network allowing trusted external partners access to specific internal resources.

Security Considerations

  • The internet is the highest-risk network zone due to its global access.
  • NAT services reduce the number of public IPs needed and increase internal security.

VPNs

  • PPTP is a tunneling protocol used for VPN connections over port 1723.
  • L2TP can offer encrypted tunnels using IPSec for secure communications.

IP Address Classes

  • Class C supports 254 hosts per subnet; Class B has a default subnet mask of 255.255.0.0.
  • IPv6 addresses are 128 bits long, vastly expanding address capacity compared to IPv4.

Multicast and Broadcast

  • Multicast addresses are used to send data to multiple hosts simultaneously.
  • Broadcast addresses allow communication across all hosts in a network segment.

Subnet

  • A smaller network within a larger one, created through the process of subnetting.

Private and Public IP Addresses

  • Private IP addresses are used within local networks, while public IPs are exposed to the internet.
  • Private IP ranges include 10.x.x.x, 172.16.x.x to 172.31.x.x, and 192.168.x.x.

Additional Networking Tools

  • DNS translates host names to IP addresses, essential for network navigation.
  • NMAP is a tool used for scanning and analyzing network ports.

Firewall Functionality

  • Firewalls can accept or reject packets based on rules and maintain connection states for security.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on essential networking protocols such as TCP/IP, HTTP, FTP, SMTP, and more. This quiz covers key concepts like IP addresses, botnets, and DDoS attacks. Challenge yourself to see how well you understand these foundational elements of internet communication.

More Quizzes Like This

TCP/IP and Internet Basics Quiz
5 questions
Modelo TCP/IP - Camadas e Protocolos
13 questions
Modelul TCP/IP si comunicarea in retele
24 questions
Use Quizgecko on...
Browser
Browser