0% found this document useful (0 votes)
3 views3 pages

Full Conversation Network Security QA

A computer network consists of interconnected devices for communication and resource sharing, with applications like file sharing and remote access. Web servers host websites and process user requests, while topologies describe network arrangements, such as star and ring. Key concepts include TCP vs. UDP protocols, OSI model layers, hub functions, Layer 3 switches, IPv4 and IPv6 addressing, and security basics including threats like viruses and worms.

Uploaded by

loidforger037
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views3 pages

Full Conversation Network Security QA

A computer network consists of interconnected devices for communication and resource sharing, with applications like file sharing and remote access. Web servers host websites and process user requests, while topologies describe network arrangements, such as star and ring. Key concepts include TCP vs. UDP protocols, OSI model layers, hub functions, Layer 3 switches, IPv4 and IPv6 addressing, and security basics including threats like viruses and worms.

Uploaded by

loidforger037
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Q.1 (a) Define computer network and list out its applications.

A computer network is a group of interconnected devices that can communicate and share resources.

Applications include file sharing, internet access, communication (email, chat), and remote access.

(b) Explain web server. List out its two applications.

A web server hosts websites and delivers web pages to clients via HTTP/HTTPS protocols.

Applications:

1. Hosting websites and web apps.

2. Processing user requests (e.g., login, form submission).

(c) Define Topology. Explain any two topologies in detail.

Topology refers to the physical or logical arrangement of network devices.

- Star Topology: All devices connected to a central hub/switch.

- Ring Topology: Each device connected to two others, forming a ring.

Q.2 (a) Differentiate between TCP and UDP protocol.

- TCP: Connection-oriented, reliable, slower.

- UDP: Connectionless, faster, less reliable.

(b) Advantages and disadvantages of Co-axial cable.

Advantages: Shielded, durable, better bandwidth than twisted pair.

Disadvantages: Bulky, harder to install, more expensive.

(c) Explain OSI model with function of each layer in detail.

1. Physical: Transmits raw bits.


2. Data Link: Handles error detection/correction.

3. Network: Manages addressing and routing.

4. Transport: Ensures reliable data transfer.

5. Session: Manages sessions between apps.

6. Presentation: Translates data formats.

7. Application: Interfaces with the end user.

Q.3 (a) Write a short note on hub.

A hub is a basic networking device that connects multiple computers in a LAN and broadcasts data to all

devices.

(b) Explain Layer 3 Switch in detail.

Layer 3 switches perform routing functions, manage traffic, and can segment networks using IP addresses.

(c) Explain IPV4 classful addressing in detail.

IPv4 uses five classes (A to E). Class A starts from 0.0.0.0 to 127.255.255.255, Class B from 128 to 191, etc.

Used to allocate IP ranges based on network size.

Q.4 (a) Define IPv6 protocol and list out its features.

IPv6 is the latest IP version with a 128-bit address space.

Features:

- Larger address space

- Better routing

- Built-in security

(b) Differentiate between IPv4 and IPv6.


IPv4: 32-bit, dotted decimal.

IPv6: 128-bit, hexadecimal.

(c) List out IPv4 characteristics and explain its advantages and disadvantages.

IPv4 is widely used, supports around 4.3 billion addresses.

Advantages: Easy to deploy, compatible.

Disadvantages: Limited address space, security issues.

Q.5 (a) Define security basics in detail.

Security basics include confidentiality, integrity, availability, authentication, authorization, and

non-repudiation.

(b) Explain satellite communication in brief.

Satellite communication involves sending signals to satellites which relay them to receivers. Used for GPS,

TV, remote internet.

(c) Define threats to security and explain viruses, worms and intruders in detail.

- Viruses: Attach to files and spread.

- Worms: Replicate independently and spread.

- Intruders: Unauthorized access to systems.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy