1. What is the internet?
a) Define the internet in your own words.
b) What are some of the key components that make up the internet?
2. Network Edge and Network Core:
a) What is the difference between the network edge and the network core?
b) What types of devices are typically found at the network edge? What types of devices are
typically found in the network core?
3. Delay, Loss, and Throughput in Packet Switched Networks:
a) What is packet loss? How can it impact network performance?
b) Explain the difference between latency and throughput in the context of packet-switched
networks.
4. Protocol Layers:
a) What is the OSI model? What are its seven layers?
b) Why is it useful to organize protocols into distinct layers?
5. Service Models:
a) What is Infrastructure as a Service (IaaS)? How does it differ from Platform as a Service (PaaS)
and Software as a Service (SaaS)?
b) What are some advantages of using a service model for providing computing resources?
6. Network Security Under Attack:
a) What is a denial-of-service (DoS) attack? How can it be prevented?
b) Describe the difference between phishing and malware attacks.
7. Is infrastructure network security enough to protect against all cyber threats?
a) Explain why or why not.
b) What are some common vulnerabilities in network infrastructure that can be exploited by
cybercriminals?
8. What is application security?
a) How does application security differ from infrastructure security?
b) Give an example of an application security vulnerability.
9. How can a security culture be developed within an organization?
a) What are some ways to promote security awareness and best practices among employees?
b) What are some benefits of having a strong security culture?
10. What is the role of risk management in network security?
a) Explain why risk management is important for network security.
b) What are some common risk assessment methodologies used in network security?

1 What is the internet a Define the internet in your own .pdf

  • 1.
    1. What isthe internet? a) Define the internet in your own words. b) What are some of the key components that make up the internet? 2. Network Edge and Network Core: a) What is the difference between the network edge and the network core? b) What types of devices are typically found at the network edge? What types of devices are typically found in the network core? 3. Delay, Loss, and Throughput in Packet Switched Networks: a) What is packet loss? How can it impact network performance? b) Explain the difference between latency and throughput in the context of packet-switched networks. 4. Protocol Layers: a) What is the OSI model? What are its seven layers? b) Why is it useful to organize protocols into distinct layers? 5. Service Models: a) What is Infrastructure as a Service (IaaS)? How does it differ from Platform as a Service (PaaS) and Software as a Service (SaaS)? b) What are some advantages of using a service model for providing computing resources? 6. Network Security Under Attack: a) What is a denial-of-service (DoS) attack? How can it be prevented? b) Describe the difference between phishing and malware attacks. 7. Is infrastructure network security enough to protect against all cyber threats? a) Explain why or why not. b) What are some common vulnerabilities in network infrastructure that can be exploited by cybercriminals? 8. What is application security? a) How does application security differ from infrastructure security? b) Give an example of an application security vulnerability. 9. How can a security culture be developed within an organization? a) What are some ways to promote security awareness and best practices among employees? b) What are some benefits of having a strong security culture? 10. What is the role of risk management in network security? a) Explain why risk management is important for network security. b) What are some common risk assessment methodologies used in network security?