Question: block 1 (computer networking basics) 1. Determine the computer network. Name the main components that make up it. Give examples of networks you use in

block 1 (computer networking basics)
1. Determine the computer network. Name the main components that make up it. Give examples of networks you use in your daily life.
2. Specify the types of addresses: unicast, multicast, simulcast. What is each of these types used for?
3. Tell us about the layers of the OSI and TCP/IP models. What is the role of each of these levels.
4. Tell us about the pros and cons of using wireless communication lines.
5. What is the Spanning Tree Protocol and what is its purpose? Operating principle. What network problems can occur when using the spanning tree protocol?
6. What is the purpose of a MAC address and why is it unique?
7. What is Ethernet and what criteria does it define? What are the communication lines and devices used to build an Ethernet network?
8. List the link and physical layer protocols that you know, with a brief description of their functions.
9. What is the broadcast field. What are the pros and cons of resizing? What is a broadcast storm?
10. List network structures with examples and identify features of their use
Cluster 2 (TCP/IP stack)
1. What is the IPv4 address format and how is it different from a MAC address? How is the uniqueness of IP addresses ensured?
2. What is the mechanism of IP packet fragmentation? What contracts are you working on? Why do some hosts not accept fragmented packets?
3. What is the purpose of the ARP protocol? Describe the algorithm for finding a match between an IP address and a MAC address. How is an ARP spoofing attack performed?
4. What is the purpose of ICMP? What is the package format used? Give 3-4 examples of ICMP message types and their uses.
5. What is the difference between UDP and TCP protocols? Give examples of services that can work on both protocols. Explain your examples.
6. What fields are in a TCP packet? Give examples of applications that use TCP.
7. Define the router and the router is jumping. What information is contained in the routing table, and how do you get there?
8. What are the implications of each router independently defining the next step for the packet?
9. How do routers determine which route to use from the table? What is the default path and black hole? What is Proxy-ARP Technology?
10. What dynamic routing protocols do you know? What features do they have?
Block 3 (computer network protection)
1. What is a firewall and what are the criteria by which it can be implemented? How is SPI different from DPI?
2. How is a connection established and disconnected in TCP? What are receipts and a sliding window? Describe a SYN-Flood attack.
3. What is title translation and what types are there? What are the advantages and disadvantages of address translation technology?
4. The purpose, principle of operation and classification of VPNs.
5. What are virtual networks and why are they used? How do many switches tell each other that packets belong to a particular virtual network?
6. Describe the link layer attacks known to you (performed within the broadcast segment) and the measures needed to combat them.
7. List the protocols and terminal access tools known to you with a brief description.
8. List the communications equipment access controls and the most common equipment control protocols.
9. What is the firewall policy? What are the main groups that policies can be divided into? Give examples of union policies.
10. List and describe the security mechanisms known to you that are implemented on switches to protect against link layer attacks.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!