0% found this document useful (0 votes)
10 views2 pages

Tutorials 1

The document outlines a tutorial on Network Administration and Security, divided into five sections covering basic networking concepts, network administration basics, network security fundamentals, network tools and practices, and policy and best practices. Each section includes key questions and topics relevant to understanding and managing computer networks. The tutorial serves as a comprehensive guide for individuals seeking to enhance their knowledge in network administration and security.

Uploaded by

noukeufortune54
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views2 pages

Tutorials 1

The document outlines a tutorial on Network Administration and Security, divided into five sections covering basic networking concepts, network administration basics, network security fundamentals, network tools and practices, and policy and best practices. Each section includes key questions and topics relevant to understanding and managing computer networks. The tutorial serves as a comprehensive guide for individuals seeking to enhance their knowledge in network administration and security.

Uploaded by

noukeufortune54
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

PROPOSED BY AZOBOU CEDRIC

1. TUTORIALS: NETWORK
ADMINISTRATION AND SECURITY
2. Section 1: Basic Networking Concepts (1–10)
3. What is a computer network?
4. What is the difference between LAN and WAN?
5. What device connects multiple computers in a LAN?
6. What does IP stand for?
7. What is an IP address?
8. What is the purpose of a subnet mask?
9. What does DHCP do?
10. What is DNS used for?
11. What is a MAC address?
12. What is a router?

Section 2: Network Administration Basics (11–20)


13. What command shows your computer’s IP configuration on Windows?
14. What command is used to test connectivity between two devices?
15. What is the purpose of a firewall?
16. What is NAT?
17. What is the default gateway?
18. What is port forwarding?
19. What is bandwidth?
20. What is network latency?
21. What is an SSID?
22. What is a VPN?

Section 3: Network Security Fundamentals (21–30)


23. What is the principle of least privilege?
24. What is two-factor authentication (2FA)?
25. What is a brute-force attack?
26. What is a firewall rule?
27. What is encryption?
28. What is SSL/TLS used for?
29. What is phishing?
30. What is malware?
31. What is an IDS?
32. What is a DoS attack?

Page 1 of 2
PROPOSED BY AZOBOU CEDRIC

Section 4: Network Tools and Practices (31–40)

33. What does the tracert command do?


34. What is a packet sniffer?
35. What is port scanning?
36. What is the function of the OSI model?
37. What layer of the OSI model does IP work at?
38. What layer does Ethernet operate on?
39. What is a VLAN?
40. What is a honeypot in network security?
41. What is the difference between IDS and IPS?
42. What is the netstat command used for?

Section 5: Policy, Monitoring & Best Practices (41–50)


43. Why should you regularly update network devices?
44. What is network segmentation?
45. Why is logging important in network security?
46. What is a security policy?
47. What is role-based access control (RBAC)?
48. What is the first step in incident response?
49. What is wireless encryption?
50. Why is physical security important in network administration?
51. What is patch management?
52. What is defense in depth?

Page 2 of 2

You might also like