Objective 1.1 Explain the functions and applications of various network devices Flashcards

1
Q

Router

A

A router [a] is a networking device that forwards data packets between computer networks. Routers perform the “traffic directing” functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it reaches its destination node.

One important thing to note, is a router forwards data packets from multiple networks, while a switch only does one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Switch

A

A network switch (also called switching hub, bridging hub, officially MAC bridge[1]) is a computer networking device that connects devices together on a computer network, by using packet switching to receive, process and forward data to the destination device. Unlike less advanced network hubs, a network switch forwards data only to one or multiple devices that need to receive it, rather than broadcasting the same data out of each of its ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Multi-layer Switch

A

A multilayer switch (MLS) is a computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Firewall

A

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HIDS

A

A host-based intrusion detection system (HIDS) is an intrusion detection system that monitors and analyzes the internals of a computing system as well as (in some cases) the network packets on its network interfaces (just like a network-based intrusion detection system (NIDS) would do)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IDS/IPS

A

Intrusion prevention systems (IPS), also known as intrusion detection and prevention systems (IDPS), are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it.[1]

An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces electronic reports to a management station. IDS come in a variety of “flavors” and approach the goal of detecting suspicious traffic in different ways. There are network based (NIDS) and host based (HIDS) intrusion detection systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access Point

A

An access point is a device, such as a wireless router, that allows wireless devices to connect to a network. Most access points have built-in routers, while others must be connected to a router in order to provide network access. In either case, access points are typically hardwired to other devices, such as network switches or broadband modems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Content Filter

A

Filtering what the end user are allowed to see on the web. Can be done through hardware or software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Load Balancer

A

A load balancer is a device that acts as a reverse proxy and distributes network or application traffic across a number of servers. Load balancers are used to increase capacity (concurrent users) and reliability of applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hub

A

An Ethernet hub, active hub, network hub, repeater hub, multiport repeater, or simply hub is a network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment. It has multiple input/output (I/O) ports, in which a signal introduced at the input of any port appears at the output of every port except the original incoming.[1] A hub works at the physical layer (layer 1) of the OSI model.[2] Repeater hubs also participate in collision detection, forwarding a jam signal to all ports if it detects a collision. In addition to standard 8P8C (“RJ45”) ports, some hubs may also come with a BNC or Attachment Unit Interface (AUI) connector to allow connection to legacy 10BASE2 or 10BASE5 network segments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Analog modem

A

A device that converts the computer’s digital pulses to tones that can be carried over analog telephone lines, and vice versa. Basically makes it possible to transmit data from computers over telephone lines at a very very slow rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Packet Shaper

A

Similar to a load balancer, it defines priority to certain traffic and provides appropriate bandwidth. Helps your network know the difference between Facebook and Office files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VPN concentrator

A

A VPN concentrator is a type of networking device that provides secure creation of VPN connections and delivery of messages between VPN nodes.

It is a type of router device, built specifically for creating and managing VPN communication infrastructures.

A VPN concentrator primarily adds the capabilities of a VPN router by adding advanced data and network security to the communications. It has the ability to create and manage a large quantity of VPN tunnels.

A VPN concentrator is typically used for creating site-to-site VPN architectures. It can:

Establish and configure tunnels
Authenticate users
Assign tunnel/IP addresses to users
Encrypt and decrypt data
Ensure end-to-end delivery of data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly