Big
Networking
Basics
OSI Model
Network Devices
Protocols and Standards

Security
100

What is the purpose of a subnet mask in networking?

A subnet mask is used to divide an IP address into network and host portions, enabling efficient routing and addressing.

100

How many layers are there in the OSI model, and name three of them.

There are seven layers. Three of them are Physical, Data Link, and Network.

100

What is the purpose of a router in a network?

A router forwards data between different networks, making decisions based on IP addresses.

100

What protocol is commonly used for secure communication over the web (HTTPS)?

HTTPS (Hypertext Transfer Protocol Secure) uses the SSL/TLS protocol for secure communication

100

A VPN provides a secure, encrypted connection over the internet, allowing users to access a private network in this manner.

What is remotely or securely?

200

What does the term "DNS" stand for in networking?

DNS stands for Domain Name System, which translates domain names to IP addresses.

200

Which layer is responsible for logical addressing, such as IP addresses?

The Network layer (Layer 3) is responsible for logical addressing.

200

What is the primary function of a switch in networking?

A switch connects devices within the same network, using MAC addresses to forward data only to the intended recipient.

200

Which protocol is used for email communication and retrieval?

SMTP (Simple Mail Transfer Protocol) is used for sending emails, and POP3/IMAP are used for retrieving emails.

200

WPA2 is a common security protocol for securing these networks.

What are wireless networks?

300

What is the function of ARP (Address Resolution Protocol)?

ARP is used to map an IP address to a MAC address in a local network

300

At which OSI layer does TCP (Transmission Control Protocol) operate?

TCP operates at the Transport layer (Layer 4).

300

How does a hub differ from a switch in terms of data forwarding?

A hub forwards data to all connected devices, while a switch forwards data only to the specific device it's intended for.

300

What is the purpose of the DHCP (Dynamic Host Configuration Protocol) in networking?

DHCP automatically assigns IP addresses to devices on a network, simplifying the network configuration process.

300

The principle of least privilege restricts users and systems to the minimum level of access needed to perform these.

What are tasks or functions?

400

Explain the difference between half-duplex and full-duplex communication.

In half-duplex, communication is one-way at a time, while full-duplex allows two-way communication simultaneously.

400

What is the primary function of the Data Link layer?

The Data Link layer is responsible for framing, addressing, and error detection on the local network segment.

400

What is the purpose of a firewall in network security?

A firewall controls incoming and outgoing network traffic based on predetermined security rules, protecting a network from unauthorized access.

400

Name a commonly used protocol for remote access to network devices.

SSH (Secure Shell) is commonly used for secure remote access.

400

IDS monitors network traffic for suspicious activity or security policy violations. What does IDS stand for?

What is Intrusion Detection System?

500

What is the purpose of a default gateway in a network configuration?

The default gateway is the router's IP address that a device uses to reach destinations outside its own subnet.

500

What is the role of the Presentation layer in the OSI model?

The Presentation layer is responsible for data translation, encryption, and compression.

500

Differentiate between a modem and a router.

A modem modulates and demodulates signals for internet connectivity, while a router forwards data between networks.

500

What is the function of ICMP (Internet Control Message Protocol)?

ICMP is used for error reporting and diagnostics, including ping requests and replies.

500

Two-factor authentication requires users to provide two forms of identification to access a system. What are these two forms?

What are something you know (password) and something you have (token or smartphone)?