Back to notes
How do switches at Layer 2 of the OSI model communicate with devices on the network?
Press to flip
Switches use MAC addresses for communication and utilize Application Specific Integrated Circuits (ASIC) to learn device addresses to efficiently route traffic.
What types of tools are used in active network monitoring and what information do they provide?
Active network monitoring tools include port scanners and packet sniffers, providing detailed insights into network vulnerabilities, traffic patterns, and potential security threats.
How does Dynamic Host Configuration Protocol (DHCP) simplify IP address management?
DHCP automates the assignment of IP addresses to devices on a network, using a four-step process (discovery, offer, request, acknowledgment) to dynamically assign IPs.
What are the key responsibilities of a router in a network?
Routers connect different networks using Layer 3 logical network information and make routing decisions based on the best path to forward packets.
What are the primary characteristics that distinguish IPv6 from IPv4?
IPv6 features 128-bit addresses, uses hexadecimal representation, and has built-in support for auto-configuration, unlike the 32-bit address structure of IPv4.
What role does environmental monitoring play in network management?
Environmental monitoring ensures optimal conditions for network equipment by tracking power, temperature, and humidity levels, preventing potential hardware failures and performance issues.
What is the primary function of a modem in a network?
A modem (Modulator-Demodulator) converts digital signals to analog for transmission and vice versa, operating at the Physical layer (Layer 1) of the OSI model.
How do load balancers and proxy servers optimize network performance?
Load balancers distribute workloads across multiple servers to ensure efficiency and reliability. Proxy servers act on behalf of clients to retrieve resources, control internet usage, and enhance security.
What types of networks are categorized under SCADA and what are their applications?
SCADA (Supervisory Control and Data Acquisition) networks monitor and control industrial processes, such as manufacturing, energy production, and water treatment, ensuring efficient and reliable operations.
What are the benefits of fiber optic networking compared to other cabling types?
Fiber optic cabling offers higher speed, longer distance transmission, and immunity to electromagnetic interference, making it highly efficient.
Explain the main difference between Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS).
IDS passively monitors network traffic for signs of breaches and issues alerts, while IPS actively stops breaches by blocking IPs or terminating sessions.
Describe the purpose of a VPN Concentrator in a network.
A VPN Concentrator allows secure VPN connections, operating at layers 2, 3, and 7, and is responsible for IPsec encryption to ensure secure communication.
Differentiate between Static NAT, Dynamic NAT, and Port Address Translation (PAT).
Static NAT maps a single private IP to a single public IP. Dynamic NAT maps a private IP address to an available public IP from a pool. PAT (also known as Overloading) maps multiple private IPs to a single public IP with different ports.
What is the function of DNS MX (Mail Exchange) records in a network?
DNS MX records determine the routing of email, specifying the mail servers responsible for receiving email for a domain.
What is the significance of using IPsec as a VPN protocol?
IPsec provides robust encryption and secure tunneling for VPN connections, ensuring data integrity, confidentiality, and authentication over public networks.
Explain the difference between physical and logical network topologies.
Physical topology describes the actual physical layout of network devices and cabling. Logical topology refers to the way data flows within the network, regardless of its physical design.
Previous
Next