AP Networking Semester 1 Final

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/100

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

101 Terms

1
New cards

What are the three parts of the CIA Triad? What does each one protect?

Confidentiality (protects data from unauthorized access), Integrity (protects data from unauthorized changes), Availability (ensures data is accessible when needed)

2
New cards

What are the three parts of AAA? How do they work together in system security?

Authentication (verifying identity), Authorization (granting permissions), Accounting (tracking actions); they work together to control access and monitor usage

3
New cards

Why is it important to balance confidentiality, integrity, and availability?

Overemphasizing one may compromise the others and harm overall system security

4
New cards

What techniques do attackers use to manipulate human behavior?

Authority, urgency, familiarity, intimidation, and other psychological tricks

5
New cards

How do attackers trick users into giving up information without realizing it?

By exploiting human trust, fear, or curiosity through deception and manipulation

6
New cards

What are common social engineering scenarios?

Tailgating (following someone into a secure area), dumpster diving (searching trash for sensitive info), baiting (offering something enticing), shoulder surfing (observing input)

7
New cards

What makes phishing different from spam?

Phishing attempts to trick users into giving sensitive information, while spam is unsolicited messages that are not always malicious

8
New cards

What are the different types of phishing?

Spear phishing (targeted), whaling (targeting executives), vishing (voice phishing), smishing (SMS phishing)

9
New cards

Why are executives often targeted in phishing?

They have access to sensitive data and can authorize high-value transactions

10
New cards

What are the main types of malware?

Viruses, worms, trojans, rootkits, logic bombs, ransomware, keyloggers

11
New cards

How does each type of malware spread, hide, or cause damage?

Viruses attach to files, worms self-replicate, trojans disguise as useful software, rootkits hide in system, logic bombs trigger on conditions, ransomware locks files, keyloggers record keystrokes

12
New cards

What does a zero-day attack mean?

An attack exploiting a vulnerability that is unknown to the vendor and has no patch yet

13
New cards

What makes a strong password?

Long, complex, including letters, numbers, and symbols; not easily guessable

14
New cards

Why should passwords be updated regularly?

To reduce the risk if a password is compromised

15
New cards

What are the three MFA categories?

1) Something you know (password), 2) Something you have (security token), 3) Something you are (biometrics)

16
New cards

Why is MFA more secure than a password alone?

It requires multiple forms of authentication, making it harder for attackers to gain access

17
New cards

What are the main purposes of Task Manager?

Processes (view running apps), Performance (monitor CPU/RAM), Startup (manage startup apps), Users (see logged-in users)

18
New cards

What does System Information show?

Detailed hardware and software configuration of the system

19
New cards

What is Event Viewer used for?

Viewing system logs to diagnose errors and track events

20
New cards

Which command reveals your IP address?

ipconfig

21
New cards

What are the three types of access controls?

Physical (locks, badges), Logical (passwords, permissions), Administrative (policies, procedures)

22
New cards

Give examples of each type of access control.

Physical: door lock, badge; Logical: login/password, file permissions; Administrative: company security policies, user training

23
New cards

How do access controls work together to secure systems?

They provide multiple layers of protection: physical, digital, and policy enforcement

24
New cards

What do the symbols /, ~, $, and # represent in Linux?

/: root directory, ~: home directory, $: regular user prompt, #: root user prompt

25
New cards

What’s the difference between absolute and relative paths?

Absolute path specifies full location from root; relative path specifies location from current directory

26
New cards

What are the purposes of common Linux commands?

pwd: print working directory, cd: change directory, ls: list files, mkdir: create folder, cp: copy file, mv: move/rename file, rm: remove file

27
New cards

What are the types of Windows updates?

Quality (bug fixes), Feature (new features), Driver, Optional, Firmware

28
New cards

Why are updates critical for system stability and security?

They fix bugs, patch security vulnerabilities, and improve performance

29
New cards

What is the primary role of the CPU?

Process instructions and execute programs

30
New cards

What is the role of the motherboard?

Holds CPU, RAM, and other components; allows communication between them

31
New cards

What is the role of RAM?

Volatile memory used for temporary data storage and quick access

32
New cards

What is the role of the GPU?

Process graphics and rendering tasks

33
New cards

What is the role of the chipset?

Manages data flow between CPU, memory, and peripherals

34
New cards

What is the difference between volatile and non-volatile memory?

Volatile memory loses data when powered off (RAM); non-volatile memory retains data (HDD, SSD)

35
New cards

What is the purpose of firmware?

Low-level software stored on hardware to initialize and control devices during boot

36
New cards

What are the differences between HDDs and SSDs?

HDD: mechanical, slower, more storage; SSD: no moving parts, faster, more reliable

37
New cards

What are cooling methods for PCs?

Active (fans, liquid cooling), Passive (heat sinks)

38
New cards

What are the purposes of an operating system?

Manage hardware, files, memory, processes, and user access

39
New cards

Compare GUI vs CLI operating systems.

GUI: user-friendly visual interface; CLI: command-line interface, faster for advanced tasks

40
New cards

What are drivers and why are they important?

Software that allows OS to communicate with hardware devices

41
New cards

What is an application?

Software that performs specific tasks for the user, unlike the OS which manages system resources

42
New cards

What is Device Manager used for?

Manage hardware, install drivers, and troubleshoot devices

43
New cards

What is a browser cache and why can it cause problems?

Temporary storage of web data; can cause display or loading issues if outdated

44
New cards

What is an HCL and why does it matter?

Hardware Compatibility List; ensures hardware works with software or OS

45
New cards

What is a QVL and why does it matter?

Qualified Vendor List; ensures approved hardware meets compatibility requirements

46
New cards

What are the benefits of virtualization?

Cost savings, disaster recovery, efficiency, easier management

47
New cards

What does a hypervisor do?

Allows multiple virtual machines to run on a single physical host

48
New cards

Which file systems are used by Windows, macOS, and Linux?

Windows: NTFS/FAT32, macOS: APFS/HFS+, Linux: ext4, ext3, etc.

49
New cards

Why is a file system important?

Organizes data for storage and retrieval

50
New cards

Give examples of common file extensions.

.docx: Word document, .jpg: image, .mp3: audio

51
New cards

Explain star, mesh, bus, and hybrid topologies.

Star: central device; risk of central failure. Mesh: devices interconnected; high redundancy. Bus: single backbone; easy but limited. Hybrid: combination of topologies.

52
New cards

When would a business choose a mesh network instead of star?

For smaller networks requiring high redundancy and speed

53
New cards

How do physical and logical topologies differ?

Physical: how devices are physically connected; Logical: how data flows across the network

54
New cards

Describe encapsulation and decapsulation.

Encapsulation: adding headers/trailers at each OSI layer; Decapsulation: removing them to extract data

55
New cards

Why is encapsulation important?

It ensures data is properly packaged and delivered to the correct destination

56
New cards

What happens when a user enters a website address?

DNS resolves domain to IP, TCP handshake establishes connection, HTTP request retrieves website data

57
New cards

Match OSI layers with examples.

Application: Browser; Presentation: Encryption; Session: session management; Transport: TCP/UDP; Network: Router; Data Link: Switch; Physical: cables

58
New cards

Which OSI layer ensures reliable delivery with acknowledgments?

Transport layer; it handles acknowledgments and retransmissions

59
New cards

How does the Data Link layer ensure data reaches the correct device?

Uses MAC addresses, frames, error checking, and retransmission if needed

60
New cards

Convert decimal to binary.

Show division by 2 and remainders, then reverse remainders for binary result

61
New cards

Convert binary to decimal.

Multiply each bit by its positional value and sum the results

62
New cards

Why do computers rely on binary numbers?

Easier for electronic circuits to store and transmit as on/off signals

63
New cards

Define latency, reliability, and scalability.

Latency: time data travels; Reliability: consistent delivery; Scalability: ability to grow network capacity

64
New cards

Why is scalability important for LANs?

Allows the network to accommodate more users/devices as the company grows

65
New cards

How does redundancy improve reliability?

Provides backup paths and prevents single points of failure

66
New cards

Compare MAC addresses vs IP addresses.

MAC: hardware identifier, unique, stays with device; IP: logical identifier, can change, used for network routing

67
New cards

Why does a LAN need both physical and logical addressing?

MAC identifies local device; IP identifies device on wider network

68
New cards

How does a switch use MAC address table?

Records which MAC is on which port to forward frames efficiently

69
New cards

Which device operates at Layer 2 of OSI?

Switch; connects devices in LAN and forwards frames using MAC addresses

70
New cards

What Windows command shows your MAC address?

ipconfig /all

71
New cards

Give an example of an Application layer protocol.

HTTP; used to request and transfer web content

72
New cards

What is the wiring order for T-568A and T-568B?

T-568A: White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown, Brown; T-568B: White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown

73
New cards

How does a switch learn which devices are connected to its ports?

Records MAC addresses during communication with devices

74
New cards

What happens when a switch receives a frame for an unknown MAC?

Floods frame to all ports except source; updates table when device responds

75
New cards

Why do switches age out MAC addresses?

Addresses may change; aging prevents outdated entries

76
New cards

Why is flooding inefficient?

Sends data to all devices unnecessarily, wasting bandwidth

77
New cards

How does a MAC table improve switch efficiency?

Only forwards frames to correct port, reducing unnecessary traffic

78
New cards

What is the purpose of a default gateway?

Sends traffic to devices outside the local network; misconfiguration prevents external communication

79
New cards

What is the purpose of the loopback address?

Used for testing network interface; example: 127.0.0.1

80
New cards

What is the APIPA range and why can't it reach the internet?

169.254.x.x; assigned automatically when DHCP fails; no default gateway, so no internet access

81
New cards

Convert binary IPv4 to dotted decimal.

Example: 11000000.10101000.00000001.00001010 = 192.168.1.10

82
New cards

What does a subnet mask do?

Defines which portion of IP is network and which is host

83
New cards

With subnet mask 255.255.255.0, how many host bits? How many usable addresses?

8 host bits; 256 addresses; 254 usable (excluding network/broadcast)

84
New cards

What problem does ARP solve?

Maps IP addresses to MAC addresses for local delivery

85
New cards

How does a device use ARP?

Sends broadcast requesting MAC for an IP; device responds; stored in ARP cache

86
New cards

Which command shows ARP cache in Windows?

arp -a

87
New cards

What is IPv6 equivalent of ARP? NDP (Neighbor Discovery Protocol); sends solicitation and advertisement messages to map IP to MAC

88
New cards

What is the main purpose of DHCP?

Automatically assigns IP addresses and configuration to devices

89
New cards

What is a DHCP scope?

Defines range of IP addresses and settings DHCP can assign

90
New cards

What is a DHCP lease and what happens when it expires?

Temporary IP assignment; client requests renewal or receives new IP when expired

91
New cards

Difference between DHCP reservation and exclusion?

Reservation: always assigned to same device; Exclusion: IP cannot be assigned

92
New cards

Which devices are good candidates for DHCP reservations?

Printers, servers; need consistent IP for accessibility

93
New cards

List four steps in DHCP process (DORA).

Discover, Offer, Request, Acknowledge

94
New cards

How do routers separate broadcast domains?

They forward traffic between subnets, reducing congestion and improving security

95
New cards

Why do routers only need to know networks, not individual hosts?

Send traffic to correct network; devices/switches handle host delivery

96
New cards

How does a host determine if destination is local or remote?

Compare destination IP with own network/subnet

97
New cards

How does a router use the default gateway?

Sends outbound traffic to external networks through gateway

98
New cards

Define unicast, broadcast, multicast with examples.

Unicast: one-to-one (email); Broadcast: one-to-all (alerts); Multicast: one-to-group (video call)

99
New cards

What MAC address is used in Ethernet broadcast?

FF:FF:FF:FF:FF:FF

100
New cards

Why can too many devices in one broadcast domain cause problems?

Increases traffic, potential network slowdowns