Networks Flashcards
20 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a Host/Client?

  • A network device that connects multiple devices
  • An application or system accessing a remote service (correct)
  • Software framework for execution of procedures
  • An application running a standalone program
  • What is an Application Server?

    A software framework dedicated to the efficient execution of procedures for supporting the construction of applications.

    What does a Hub do?

    Connects multiple devices together and makes them act as a single network segment.

    What is a Switch in networking?

    <p>A device that connects network segments and processes data at the data link layer.</p> Signup and view all the answers

    What is a Router?

    <p>An electronic device that interconnects two or more computer networks and selectively interchanges data packets.</p> Signup and view all the answers

    What does WAP stand for?

    <p>Wireless Access Point.</p> Signup and view all the answers

    What is a Proxy Server?

    <p>A server that acts as an intermediary for requests from clients.</p> Signup and view all the answers

    What is the purpose of a Firewall?

    <p>Blocks unauthorized access while permitting authorized communications.</p> Signup and view all the answers

    What does VPN Concentrator do?

    <p>Incorporates advanced encryption and authentication techniques for remote-access connections.</p> Signup and view all the answers

    What is a Repeater?

    <p>An electronic device that receives a signal and retransmits it at a higher level.</p> Signup and view all the answers

    What is the Access Layer in networking?

    <p>Interfaces with endpoint nodes like access points, hubs, and routers.</p> Signup and view all the answers

    What does the Distribution Layer do?

    <p>Acts as a middleman between the Access Layer and Core Layer.</p> Signup and view all the answers

    What is Topology in networking?

    <p>Refers to the layout of connected devices within a network.</p> Signup and view all the answers

    What is a LAN?

    <p>A group of computers and associated resources within a small geographic area.</p> Signup and view all the answers

    What does WAN stand for?

    <p>Wide Area Network.</p> Signup and view all the answers

    What is the OSI Model?

    <p>A 7-layer framework that standardizes network communication.</p> Signup and view all the answers

    What is SQL Injection?

    <p>A code injection technique that exploits security vulnerabilities in databases.</p> Signup and view all the answers

    What is Phishing?

    <p>A fraudulent process to acquire sensitive information by masquerading as a trustworthy entity.</p> Signup and view all the answers

    What is a Virus in computing?

    <p>A computer program that can copy itself and infect a computer.</p> Signup and view all the answers

    What is a Trojan?

    <p>Malware that appears to perform a desirable function but facilitates unauthorized access.</p> Signup and view all the answers

    Study Notes

    Networking Concepts and Devices

    • Host/Client: Refers to systems accessing remote services. Initially applied to devices incapable of standalone operations but could interact through a network.
    • Application Server: A software framework focused on executing procedures for application support efficiently.
    • Hub: Multiport device connecting several devices, functioning at the physical layer (Layer 1) of the OSI Model.
    • Switch: Connects network segments, primarily at the data link layer (Layer 2). Switches that operate at Layer 3 are termed multilayer switches.
    • Router: Electronic device interlinking multiple computer networks and managing packet data exchange between them.
    • Wireless Access Point (WAP): Enables wireless devices to connect to wired networks via standards like Wi-Fi and Bluetooth.
    • Proxy Server: Acts as an intermediary for client requests, enhancing security and network performance.
    • Firewall: Protects networks by blocking unauthorized access and permitting approved communications via a defined set of rules.
    • VPN Concentrator: Facilitates precise remote-access connections using advanced encryption and authentication methods.
    • Repeater: Amplifies signals to prevent loss or degradation during transmission.

    Network Layers and Architecture

    • Access Layer: Interfaces with endpoint nodes, including wireless access points, hubs, and switches. Critical for user network connections.
    • Distribution Layer: Serves as an intermediary to route data between access and core layers while enhancing network security and managing broadcast domains.
    • Core Layer: Acts as the backbone of local area networks (LANs), providing WAN connectivity and efficient data processing.
    • Topology: The layout and interconnection of network devices, including bus, ring, star, and mesh configurations.

    Types of Networks

    • LAN (Local Area Network): A network of computers in a small geographic area, typically within a single organization.
    • WAN (Wide Area Network): Telecommunications network covering a large geographic area.
    • MAN (Metropolitan Area Network): Large network spanning a metro area or campus.
    • GAN (Global Area Network): Extensive network composed of multiple smaller networks.

    OSI Model and Layers

    • OSI Model Layers:
      • Physical Layer: Electrical and physical device specifications.
      • Data Link Layer: Ensures node-to-node data transfer, identifying devices via MAC addresses.
      • Network Layer: Manages data transfer across networks, performing routing functions.
      • Transport Layer: Guarantees data transfer reliability, flow control, and uses TCP/UDP protocols.
      • Session Layer: Manages connections between applications, overseeing initiation and termination.
      • Presentation Layer: Formats and encrypts data for transmission, handling compatibility issues.
      • Application Layer: Interacts with software applications, supporting communication protocols like HTTP and FTP.

    Internet Protocols

    • TCP/IP Model Layers:
      • Link Layer: Networking scope for local connections, facilitating packet movement within the same network.
      • Internet Layer: Handles packet routing and addressing.
      • Transport Layer (TCP): Ensures independent message transfer with error control and flow management.
      • Application Layer (TCP): Utilizing protocols for network communication, such as FTP and SMTP.

    Internet Protocol Versions

    • IPv4: Internet standard using 32-bit addresses for internetworking.
    • IPv6: Designed to replace IPv4, utilizing 128-bit addresses for expanded connectivity.

    U.S. Military Networks

    • SIPRNET: Classified network for secure communication within the Department of Defense.
    • NIPRNET: Nonsecure network for exchanging sensitive but unclassified information.
    • JWICS: High-security system for transmitting classified data, cleared up to Top Secret.
    • DoDN (GIG): Comprehensive communication infrastructure for the Department of Defense.
    • DISN: Offers various information services to Defense users, including data networking and telephony.
    • NMCI: Outsourced program for IT services within the Department of the Navy and Marine Corps.
    • ONENET: Initiative for common IT infrastructure in Navy locations.
    • IT21: Focuses on technology solutions tailored to specific business challenges.

    Software and Security Concepts

    • Machine Language: Low-level instructions executed directly by CPUs.
    • Assembly Language: Low-level language with symbolic representations for different CPU architectures.
    • High-Level Language: User-friendly programming languages abstracted from hardware details.
    • Malware Types:
      • Virus: Self-replicating program that infects computers.
      • Worm: Autonomous malware that replicates over networks without user input.
      • Trojan: Malware masquerading as legitimate software to gain unauthorized system access.
    • Backdoor: A method for bypassing security protocols, enabling undetected access.
    • Phishing: Fraudulent attempts to acquire personal information by impersonating a trustworthy entity.
    • Network Enumeration: Gathering information about a network's users, services, and resources.
    • Buffer Overflow: Error causing erratic behavior when data exceeds a buffer's boundary.
    • SQL Injection: Exploiting database vulnerabilities by executing unfiltered user input.
    • Dictionary Attack: Testing a list of likely passwords to break encryption.
    • Privilege Escalation: Gaining unauthorized access to restricted resources through software flaws.
    • Brute Force: Exhaustive trial-and-error method to discover encryption keys.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on key networking concepts with these flashcards. This quiz covers important terms like Host/Client and Application Server, helping you understand their roles in a network environment. Perfect for students studying computer networking or IT professionals looking to refresh their skills.

    More Like This

    DHCPv4 Concepts Quiz
    16 questions
    Networking Concepts Quiz
    67 questions

    Networking Concepts Quiz

    BrainiestDouglasFir avatar
    BrainiestDouglasFir
    Networking Concepts Quiz
    12 questions
    IPv4 Addressing Concepts Quiz
    18 questions
    Use Quizgecko on...
    Browser
    Browser