Network Security
Wireless Networking
Network Layers/OSI Model
Packets
VPN
100
One physical way to secure computers
lock doors/reinforced rooms/security personnel
100

What does WLAN stand for

wireless local area network

100

What is an OSI (Open Systems Interconnection) model?

the blueprint for how computers talk to each other over a network.

100

What is a packet?

A unit of data that is routed between an origin destination on a network.

100

What does VPN stand for?

Virtual Private Network

200

What is the purpose of a firewall?

Control incoming and outgoing network traffic.
200

Describe one disadvantage of a wireless network

Hackers

 Limited Range

Interference

Health Concerns (radiation)

200

What is the layer the user interacts with (The final layer)

Application

200
State the two main components of a packet.

Header, Payload

200

What is the purpose of a VPN?

Allows the user to access networks remotely by  encrypting the connection

300
What is the evolution of wireless security?
WEP (wireless equivalent privacy) to WPA (Wifi-Protected Access) to WPA2
300

Name 1 software component in wireless networking

network operating system

protocol stack

applications

300

What is the first layer in the OSI model?

Physical (media)

300

Name two pieces of information stored in the header of a packet.

The origin address and destination address, and the header length, timestamp

300

What are the two fundamental VPN technologies and their definitions?

Encryption: encoding data with a key that only the user can access

Tunnelling: encapsulating one data transmission protocol within another so the data can travel securely.

400

Describe the three factors in three-factor authentication?

1: something you know (password)

2: something you have (phone number/email/card)

3: something you are (biometric/finger/retina)

400

List 2 hardware components in a wireless network

NIC

node (computer)

radio waves

router

400

List four different layers of the OSI model.

Application

Presentation

Session

Transport

Network

Data Link

Physical

400

What happens to a the data as it is transported from the origin to the destination

It is pulverized into packets at the origin, then transported through various routes and reorganized and reassembled at the destination.

400

What are the four requirements for a VPN

A LAN with internet connection

A computer outside the LAN with a connection

VPN client and server running on both networks

Internet Connection

500

List 3 disadvantages with encryption security

users make easy passwords

some encryptions have built-in backdoors

passwords needs to be sent through a network to the user

500

What is a feature of 4G wireless that other generations do not boast?

HD streaming/HD phones, lightning fast connection

500

Name all the layers of an OSI model in order

Application

Presentation

Session

Transport

Network

Data Link

Physical

500

Explain the difference between lossy and lossless compression and the way these methods are carried out in the process of packet switching

Lossless Compression

  • Nothing is lost — all original data can be perfectly restored.

  • Looks for patterns or redundancies in data (like repeating letters or numbers).

  • Decompression restores the exact original data.

  • Ex. Emails

Lossy Compression

  • Some data is permanently removed — can't get back the original exactly

  • Removes data that's less noticeable to humans (like subtle colors or sound frequencies).

  • Achieves much smaller file sizes than lossless methods.

  • Ex. Audio and Video





500
How have VPNs contributed to the rise of telecommuting?
Workers can access a protected LAN through the internet from anywhere in the world (home offices, remote working).
M
e
n
u