Why is star topology commonly used today?
reliability and scalability
What flaw is associated with a star topology?
If the hardware connecting devices fails, those devices can no longer send or receive data.
How does a bus topology connect devices?
It relies on a single backbone cable.
Why is a bus topology cost-efficient to set up?
It has lower expenses, such as cabling and dedicated networking equipment.
What are the flaws of a bus topology?
It can become slow when multiple devices request data simultaneously
How does a ring topology work?
Devices are connected directly to each other in a loop.
What is a significant drawback of a ring topology?
fault such as a cut cable or a broken device can result in the entire network breaking down.
What is subnetting?
subnetting involves splitting a network into smaller networks.
How is subnetting achieved?
using subnet masks
What is the purpose of the ARP protocol in networking?
ARP protocol associate MAC addresses with IP addresses
What does DHCP stand for?
DHCP stands for Dynamic Host Control Protocol.
What is the Three-Way Handshake in TCP?
It’s a connection-based process that establishes a connection between a client and a server before data transfer.
What are the three key elements of the Three-Way Handshake?
SYN, SYN/ACK, and ACK.
What is the purpose of the SYN packet in the Three-Way Handshake?
initiate a connection and synchronize the two devices.
What is the SYN/ACK packet’s role in the Three-Way Handshake?
acknowledge the synchronization attempt from the client.
When is the ACK packet used in the Three-Way Handshake?
acknowledge that a series of messages/packets have been successfully received.
What are the port numbers for FTP, SSH, HTTP, and HTTPS?
FTP: 21, SSH: 22, HTTP: 80, HTTPS: 443.
What does SMB stand for, and what is its port number?
SMB stands for Server Message Block, and its port number is 445.
What is the port number for Remote Desktop Protocol (RDP)?
The port number for RDP is 3389.
What is a firewall’s primary role in a network?
A firewall determines what traffic is allowed to enter and exit a network
What are the two types of firewalls?
Hardware Firewalls and Host-Based Firewalls.
What is the main advantage of using a VPN?
Privacy and encryption
What should you look for in a VPN to ensure privacy?
A VPN that does not log or keep logs of your data.
What is a URL, and what does it instruct?
A URL is an instruction on how to access a resource on the internet, instructing what protocol to use, the host, port, and more.