Network Engineering

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/53

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

54 Terms

1
New cards

What is network engineering?

Network engineering is the design, implementation, management, and maintenance of computer networks, including local area networks (LANs), wide area networks (WANs), and intranets.

2
New cards

What are the main roles of a network engineer?

Network engineers are responsible for designing network systems, troubleshooting network issues, and ensuring secure and efficient data communication.

3
New cards

What is a local area network (LAN)?

A LAN is a network that connects computers within a limited area, such as a residence, school, or office building.

4
New cards

What is a wide area network (WAN)?

A WAN spans a large geographic area, often connecting multiple LANs and is used by organizations with offices in different locations.

5
New cards

What protocol is used for internet communication?

The Transmission Control Protocol (TCP) and Internet Protocol (IP) are the foundational protocols used for internet communication.

6
New cards

What is the purpose of a router?

A router connects multiple networks, directing data packets between them and managing traffic.

7
New cards

What is a switch in networking?

A switch is a networking device that connects devices within a LAN, using MAC addresses to forward data to the correct destination.

8
New cards

What does DNS stand for and what is its function?

DNS stands for Domain Name System, and it translates human-readable domain names into IP addresses.

9
New cards

What is subnetting?

Subnetting is the process of dividing a larger IP network into smaller, manageable sub-networks.

10
New cards

What is a firewall and its purpose?

A firewall is a security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

11
New cards

What is a Virtual Private Network (VPN)?

A VPN is a secure connection over the internet that allows users to access a private network remotely.

12
New cards

What is network topology?

Network topology refers to the arrangement of different network elements, including nodes and connections, in a network.

13
New cards

What is a network protocol?

A network protocol is a set of rules and conventions for data transmission across a network.

14
New cards

What are the types of network protocols?

Common types include TCP/IP, HTTP, HTTPS, FTP, and SMTP.

15
New cards

What does IP address stand for?

IP address stands for Internet Protocol address, which is a unique address that identifies a device on a network.

16
New cards

What is the difference between IPv4 and IPv6?

IPv4 uses 32-bit addresses, allowing for about 4.3 billion addresses, whereas IPv6 uses 128-bit addresses, enabling a significantly larger address space.

17
New cards

What is Quality of Service (QoS) in networking?

QoS is a networking concept that prioritizes certain types of traffic to ensure optimal performance and reliability.

18
New cards

What is network latency?

Network latency is the time it takes for data to travel from the source to the destination across a network.

19
New cards

What is packet switching?

Packet switching is a method of grouping data transmitted over a digital network into packets.

20
New cards

What is a network interface card (NIC)?

A NIC is a hardware component that allows a device to connect to a network.

21
New cards

Define bandwidth in terms of networking.

Bandwidth refers to the maximum rate of data transfer across a network path.

22
New cards

What are the OSI model layers?

The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

23
New cards

What does NAT stand for?

NAT stands for Network Address Translation, which is a method used to remap one IP address space into another.

24
New cards

What is the function of DHCP?

DHCP, or Dynamic Host Configuration Protocol, automatically assigns IP addresses to devices on a network.

25
New cards

How can network security be enforced?

Network security can be enforced through firewalls, encryption, access controls, and continuous monitoring.

26
New cards

What is a proxy server?

A proxy server acts as an intermediary between a user and the internet, allowing for improved privacy and security.

27
New cards

What are VLANs?

VLANs, or Virtual Local Area Networks, are used to segment networks into smaller, more manageable groups.

28
New cards

What is the purpose of a network switch?

A network switch connects devices within a LAN and uses MAC addresses to forward data to the correct destination.

29
New cards

What are the types of switches?

Types of switches include unmanaged switches, managed switches, and smart switches.

30
New cards

What is VLAN tagging?

VLAN tagging is a method of identifying packets belonging to a specific VLAN using an identifier in the packet's header.

31
New cards

What is the role of a DHCP server?

A DHCP server automatically assigns IP addresses to devices on a network, reducing the need for manual configuration.

32
New cards

What is the difference between a hub and a switch?

A hub broadcasts data to all devices in a LAN, while a switch intelligently forwards data only to the intended recipient.

33
New cards

What is the OSI model?

The OSI model is a conceptual framework used to understand network interactions in seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

34
New cards

What is the Transport layer responsible for?

The Transport layer is responsible for end-to-end communication, error checking, and data flow control.

35
New cards

What are the main differences between TCP and UDP?

TCP is connection-oriented, ensuring reliable data transmission with error checking, while UDP is connectionless, offering faster, but less reliable transmission.

36
New cards

What is a subnet mask?

A subnet mask is used to divide an IP address into network and host portions, aiding in determining which part of the address refers to the network.

37
New cards

What is ICMP and its purpose?

ICMP, or Internet Control Message Protocol, is used for sending error messages and operational information regarding IP packet processing.

38
New cards

What is a subnet?

A subnet is a smaller network created by segmenting a larger network to improve performance and security.

39
New cards

What does ARP stand for?

ARP stands for Address Resolution Protocol, which resolves IP addresses to MAC addresses within a local network.

40
New cards

What is the purpose of a load balancer?

A load balancer distributes incoming network traffic across multiple servers to enhance performance and reliability.

41
New cards

What are wireless access points (WAPs)?

WAPs allow wireless devices to connect to a wired network using Wi-Fi or other wireless standards.

42
New cards

What type of firewalls are there?

Types of firewalls include packet-filtering firewalls, stateful inspection firewalls, and application-layer firewalls.

43
New cards

What is a DMZ in networking?

A DMZ, or Demilitarized Zone, is a physical or logical subnetwork that contains external-facing services, adding an additional layer of security.

44
New cards

What is NAT traversal?

NAT traversal is a technique that allows network packets to traverse NAT devices, enabling communication between devices behind NATs.

45
New cards

What is a crossover cable?

A crossover cable is used to connect two similar devices directly, such as two computers or two switches, without a hub or switch.

46
New cards

What are the advantages of using fiber optics?

Fiber optics offer higher bandwidth, long-distance transmission, and immunity to electromagnetic interference compared to copper wiring.

47
New cards

What is QoS and why is it important?

QoS, or Quality of Service, prioritizes network traffic to ensure the performance of critical applications by managing bandwidth usage.

48
New cards

What is a network diagram?

A network diagram visually represents the components and connections within a network, aiding in network design and troubleshooting.

49
New cards

What is WAN optimization?

WAN optimization refers to various techniques to increase data transfer efficiency across a WAN.

50
New cards

What are common routing protocols?

Common routing protocols include RIP, OSPF, EIGRP, and BGP.

51
New cards

What is a VPN concentrator?

A VPN concentrator is a device that creates and manages VPN communications and services.

52
New cards

What is device authentication?

Device authentication is the process of verifying the identity of devices before they can connect to a network.

53
New cards

What is a network security policy?

A network security policy is a formal document that outlines security measures and processes to protect network data and operations.

54
New cards

What is mode of operation in network security?

Modes of operation dictate how encryption algorithms encrypt data blocks, with modes like ECB, CBC, and GCM.