Cisco Network Flashcards
(105 cards)
What does a Network interface card do
Physically connects the end device to the network
What connection physically connects the end device to the network
Network interface card
What connections are specialised ports on a network that connects to individuals networks
Interface
What type of network lets you see which end devices are connected to intermediary devices and what media is being used
Logical. Topology
What type of network topology lets you see the actual location of intermediary devices and cable installations
Physical topology
What is LAN
LAN is a small geographical area of network administered by a individual and provides bandwidth to internal end devices and intermediary devices
What is a wan
Wan is a network infrastructure that covers wide geographical area managed by service providers it connects lan to other lan networks
What is an intranet
An intranet is a private connection of Lans and wans that belong to an organisation it’s designed to only be accessed by the organisation’s members
What is a extranet
An networks for organisation to use for providing access to suppliers and customers
Name 5 common connections for home and offices
-Cable
-DSL
-Cellular
-Satellite
-Dial-up Telephone
Name 4 business internet connections
-Dedicated Leased Line
-Metro Ethernet
-Business DSL
-Satellite
What is the purpose of a fault tolerant network
To limit the number of affected devices during a failure it is built to allow quick recovery when a failure occurs
How does a fault tolerant network work
The network depends on multiple paths and allows traffic to be split in packets that are routed over a shared network
What is a scalability network
This expands quickly to support new users and applications it does this without degrading the performance of services that are being used by users
What is quality of service
Controls the flow of bandwidth (bits) and if network bandwidth is exceeded and network congestion happens devices will hold the packets in memory until resources become available to transmit them
What are the primary requirements of network security
-Confidentiality
-integrity
-availability
Having multiple paths to a destination is known as redundancy this is an example of what network architecture
Fault tolerance
Switch1> config t
% Invalid input detected at ‘^’ marker.
(Refer to the exhibit^)
An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?
The administrator must first enter privileged EXEC mode before issuing the command
What are the four cloud types
-public clouds
Made for general population
-private clouds
Set up by private organisations can be expansive
-Hybrid clouds
Made up of two or more clouds can be part private and part public
-Community clouds
Follows a set level of security and privacy and regulations open for organisations
What are the 7 common security Threats
Viruses - contain malicious software or code running on a device
Spyware and adware- installed on device and secretly collects information about the user
Zero day attacks- Occur on the first day vulnerabilities become known
Threat actor attacks-A person attacks users devices or network resources
Denial of service attacks- Slows or crashes applications and processes on a network device
Data interception and theft-This attack captures private information from organisations network
Identity theft- steals the login credentials of a user to access private data
What are the 6 security solutions to protect network
Antivirus and antispyware- Help protect end devices becoming infected
Firewall Filtering- Blocks unauthorised access into and out of the network
Dedicated firewall systems- Provide more advanced firewall capabilities that can filter larger amounts of traffic
Access control lists-These further filter access and traffic forwarding based on IP addresses and applications
Intrusion prevention systems- Identify fast spreading threats such as zero day or zero hour attacks
Virtual private network (VPN)- Provide secure access into an organisation for remote workers
What are the 6 security solutions to protect network
Antivirus and antispyware- Help protect end devices becoming infected
Firewall Filtering- Blocks unauthorised access into and out of the network
Dedicated firewall systems- Provide more advanced firewall capabilities that can filter larger amounts of traffic
Access control lists-These further filter access and traffic forwarding based on IP addresses and applications
Intrusion prevention systems- Identify fast spreading threats such as zero day or zero hour attacks
Virtual private network (VPN)- Provide secure access into an organisation for remote workers
What is an ISP
It is an internet service provider that is any company that provides individuals and organisations access to the internet
Which term refers to a network that provided access to the corporate offices by suppliers customers etc.
Extranet