Podcast
Questions and Answers
What is an IP address?
What is an IP address?
A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
What does TCP/IP stand for?
What does TCP/IP stand for?
Transmission Control Protocol/Internet Protocol
What does HTTP stand for?
What does HTTP stand for?
HyperText Transfer Protocol
What is FTP?
What is FTP?
What is SMTP?
What is SMTP?
What is a botnet?
What is a botnet?
What does DDoS stand for?
What does DDoS stand for?
What is the Internet?
What is the Internet?
What is an intranet?
What is an intranet?
The usable intranet IP address ranges are _____ and _____ and _____
The usable intranet IP address ranges are _____ and _____ and _____
What is Network Address Translation (NAT)?
What is Network Address Translation (NAT)?
What is a proxy server?
What is a proxy server?
What is a firewall?
What is a firewall?
What is a packet-filtering firewall?
What is a packet-filtering firewall?
What is a stateful filtering firewall?
What is a stateful filtering firewall?
What type of firewall blocks traffic based on application data?
What type of firewall blocks traffic based on application data?
What is a public network?
What is a public network?
What is a home network?
What is a home network?
What is a work network?
What is a work network?
What is a domain network?
What is a domain network?
What is a perimeter network?
What is a perimeter network?
What is the HTTP port?
What is the HTTP port?
What is the HTTPS port?
What is the HTTPS port?
What does a reverse proxy server do?
What does a reverse proxy server do?
What is a guest network?
What is a guest network?
What is an extranet?
What is an extranet?
Which network security zone represents the highest risk? (Select one)
Which network security zone represents the highest risk? (Select one)
What service translates private IP addresses to public ones?
What service translates private IP addresses to public ones?
What should be implemented to restrict web page access for employees? (Select one)
What should be implemented to restrict web page access for employees? (Select one)
A DMZ provides a layer of security for internet-facing servers.
A DMZ provides a layer of security for internet-facing servers.
How many firewalls are used to create a perimeter network? (Choose all that apply)
How many firewalls are used to create a perimeter network? (Choose all that apply)
What allows computers to locate each other in a Microsoft network? (Select one)
What allows computers to locate each other in a Microsoft network? (Select one)
What should you create to provide access to internal resources via the Internet?
What should you create to provide access to internal resources via the Internet?
What type of server should be used to cache web pages?
What type of server should be used to cache web pages?
What device can detect network anomalies and report them?
What device can detect network anomalies and report them?
Which of the following is not a type of firewall?
Which of the following is not a type of firewall?
What tunneling protocol allows connections on inbound port 1723?
What tunneling protocol allows connections on inbound port 1723?
Which service should you choose for unencrypted or optionally encrypted tunnels?
Which service should you choose for unencrypted or optionally encrypted tunnels?
What kind of network allows only users from a partner company?
What kind of network allows only users from a partner company?
What type of zone is set up for servers serving requests to the web?
What type of zone is set up for servers serving requests to the web?
What Windows Server service is used to set up a VPN server?
What Windows Server service is used to set up a VPN server?
What is the appropriate tool for port scanning?
What is the appropriate tool for port scanning?
What tunneling protocol is currently running if your setup is not IPsec?
What tunneling protocol is currently running if your setup is not IPsec?
The firewall is running a type of packet filtering known as _____ packet filtering.
The firewall is running a type of packet filtering known as _____ packet filtering.
The VPN server installed uses inbound port 1701. The server is utilizing the _____ protocol.
The VPN server installed uses inbound port 1701. The server is utilizing the _____ protocol.
To verify all closed ports on the firewall, use the ____ option in Nmap.
To verify all closed ports on the firewall, use the ____ option in Nmap.
What allows users to interact and contribute to websites?
What allows users to interact and contribute to websites?
The connection failed because you skipped the _____ step.
The connection failed because you skipped the _____ step.
A network zone that allows access to resources on a LAN via VPN is known as an __________.
A network zone that allows access to resources on a LAN via VPN is known as an __________.
A firewall normally has a private and a _______ IP address.
A firewall normally has a private and a _______ IP address.
The organization that defines DNS is the ______.
The organization that defines DNS is the ______.
The ______ is an enormous system of interlinked hypertext documents.
The ______ is an enormous system of interlinked hypertext documents.
When the VPN server is set up and running, clients get their IP addresses from a _______ server.
When the VPN server is set up and running, clients get their IP addresses from a _______ server.
What is the HTTP TCP port?
What is the HTTP TCP port?
What is the HTTPS (Hypertext Transfer Protocol Secure) port?
What is the HTTPS (Hypertext Transfer Protocol Secure) port?
What defines the nearest router for a host?
What defines the nearest router for a host?
What type of address is 202.23.2.255?
What type of address is 202.23.2.255?
What server translates host names to IP addresses?
What server translates host names to IP addresses?
What is the maximum number of hosts that you can use for each subnet in a class C address?
What is the maximum number of hosts that you can use for each subnet in a class C address?
What is the default subnet mask for a Class B network?
What is the default subnet mask for a Class B network?
How many bits is an IPv6 address?
How many bits is an IPv6 address?
For IPv4, what class is used for multicasting?
For IPv4, what class is used for multicasting?
What type of address is used to send a single set of packets to multiple hosts?
What type of address is used to send a single set of packets to multiple hosts?
What do you call a smaller network that is part of a larger network?
What do you call a smaller network that is part of a larger network?
Which of the following is not a private address?
Which of the following is not a private address?
Study Notes
IP Address
- A unique string of numbers identifying devices in a network, formatted as a sequence of numbers separated by periods.
- Public IP addresses are used on the internet, while private IP addresses are used within internal networks.
TCP/IP
- Stands for Transmission Control Protocol/Internet Protocol.
- Fundamental protocol allowing computers to communicate over the internet.
HTTP
- HyperText Transfer Protocol.
- Used for transmitting web pages on the internet, typically operates over port 80.
FTP
- File Transfer Protocol.
- Facilitates file uploads from one computer to another and file retrieval from servers.
SMTP
- Simple Mail Transfer Protocol.
- Enables email sending between clients and servers, operates on TCP port 25.
Botnet
- A network of infected computers under the control of an attacker, often referred to as "zombies."
DDoS
- Distributed Denial of Service.
- Involves multiple computers overwhelming a device with requests, hindering normal operations.
Internet
- A vast network of interconnected computer networks utilizing TCP/IP protocols to facilitate data exchange.
Intranet
- A private network utilizing internet software and TCP/IP to share information internally.
Intranet IP Address Ranges
- Usable private IP address ranges include:
- 10.0.0.1 to 10.255.255.254
- 172.16.0.1 to 172.31.255.254
- 192.168.1.1 to 192.168.255.254
Network Address Translation (NAT)
- A service that converts private IP addresses to public ones and vice versa, aiding in security and address conservation.
Proxy Servers
- Software solutions that manage internet communications for an organization.
- Benefits include caching, filtering, and content checking.
Firewall
- A system designed to block unauthorized access while allowing outbound communication.
Packet-filtering Firewall
- Examines packets for access control based on source and destination addresses.
Stateful Filtering Firewall
- Monitors active connections and filters traffic based on each connection's state.
Content-filtering Firewall
- Blocks traffic based on application data within packets.
Application Layer Filtering
- Filters network traffic based on specific applications or services.
Public Network
- A freely accessible network, with the internet being the most common example.
Home Network
- A local area network for personal or business use, typically secure and user-trusted.
Work Network
- Similar to home networks, designed for use in organizational settings.
Domain Network
- Configured for computers joined to a domain, commonly used in corporate environments.
Perimeter Network
- Also known as DMZ (Demilitarized Zone).
- Enhances security for internet-facing servers, isolated from the internal network.
HTTPS
- An encrypted version of HTTP, operating over port 443 for secure communications.
Guest Network
- A wireless network for visitors that maintains privacy and security of the primary network.
Extranet
- A semi-private network allowing trusted external partners access to specific internal resources.
Security Considerations
- The internet is the highest-risk network zone due to its global access.
- NAT services reduce the number of public IPs needed and increase internal security.
VPNs
- PPTP is a tunneling protocol used for VPN connections over port 1723.
- L2TP can offer encrypted tunnels using IPSec for secure communications.
IP Address Classes
- Class C supports 254 hosts per subnet; Class B has a default subnet mask of 255.255.0.0.
- IPv6 addresses are 128 bits long, vastly expanding address capacity compared to IPv4.
Multicast and Broadcast
- Multicast addresses are used to send data to multiple hosts simultaneously.
- Broadcast addresses allow communication across all hosts in a network segment.
Subnet
- A smaller network within a larger one, created through the process of subnetting.
Private and Public IP Addresses
- Private IP addresses are used within local networks, while public IPs are exposed to the internet.
- Private IP ranges include 10.x.x.x, 172.16.x.x to 172.31.x.x, and 192.168.x.x.
Additional Networking Tools
- DNS translates host names to IP addresses, essential for network navigation.
- NMAP is a tool used for scanning and analyzing network ports.
Firewall Functionality
- Firewalls can accept or reject packets based on rules and maintain connection states for security.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on essential networking protocols such as TCP/IP, HTTP, FTP, SMTP, and more. This quiz covers key concepts like IP addresses, botnets, and DDoS attacks. Challenge yourself to see how well you understand these foundational elements of internet communication.