Definitions Flashcards

(23 cards)

1
Q

1.1.1 Reliable Networks - Fault Tolerance

A

1.1.1 - A fault tolerant network is one that limits the number of affected devices during a failure. Having multiple paths to a destination is known as redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1.1.2 Reliable Networks - Scalability

A

1.1.2 - A scalable network expands quickly to support new users and applications. Networks are scalable because the designers follow accepted standards and protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

1.1.3 Reliable Networks - Quality of Service

A

1.1.3 - QoS is a primary mechanism for managing congestion and ensuring reliable delivery of content to all users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

1.1.4 Reliable Networks - Security

A

1.1.4 - Network administrators must address two types of network security concerns: network infrastructure security and information security. To achieve the goals of network security, there are three primary requirements: Confidentiality, Integrity, and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

1.2.1 Network Trends - BYOD

A

1.2.1 - BYOD means any device, with any ownership, used anywhere.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

1.2.2 Network Trends - Online Collaboration

A

1.2.2 - Collaboration tools, like Cisco WebEx give employees, students, teachers, customers, and partners a way to instantly connect, interact, and achieve their objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

1.2.3 Network Trends - Video Communication

A

1.2.3 - Video calls are made to and from anyone with an internet connection, regardless of where they are located.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

1.2.4 Network Trends - Cloud Computing

A

1.2.4 - Cloud computing allows us to store personal files, even backup an entire drive on servers over the internet. Applications such as word processing and photo editing can be accessed using the cloud. There are four primary types of Clouds: Public Clouds, Private Clouds, Hybrid Clouds, and Custom Clouds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

1.2.5 Network Trends - Smart Home Technology

A

1.2.5 - Smart home technology integrates into every-day appliances, which can then connect with other devices to make the appliances more ‘smart’ or automated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

1.3.1 Common external threats to networks - Viruses, worms, and Trojan horses

A

1.3.1 - These contain malicious software or code running on a user device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

1.3.2 Common external threats to networks - Spyware and adware

A

1.3.2 - These are types of software which are installed on a user’s device. The software then secretly collects information about the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

1.3.3 Common external threats to networks - Zero-day attacks

A

1.3.3 - Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

1.3.4 Common external threats to networks - Threat actor attacks

A

1.3.4 - A malicious person attacks user devices or network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

1.3.5 Common external threats to networks - Denial of service (DoS) attacks

A

1.3.5 - These attacks slow or crash applications and processes on a network device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

1.3.6 Common external threats to networks - Data interception and theft

A

1.3.6 - This attack captures private information from an organization’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

1.3.7 Common external threats to networks - Identity theft

A

1.3.7 - This attack steals the login credentials of a user in order to access private data.

17
Q

1.4.1 Larger networks and corporate networks Security measures - Dedicated firewall systems

A

1.4.1 - Dedicated firewall systems provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.

18
Q

1.4.2 Larger networks and corporate networks Security measures - Access control lists (ACL)

A

1.4.2 - Access control lists (ACL) further filters access and traffic forwarding based on IP addresses and applications.

19
Q

1.4.3 Larger networks and corporate networks Security measures - Intrusion prevention systems (IPS)

A

1.4.3 - Intrusion prevention systems (IPS) identify fast-spreading threats, such as zero-day or zero-hour attacks.

20
Q

1.4.4 Larger networks and corporate networks Security measures - Virtual private networks (VPN)

A

1.4.4 - Virtual private networks (VPN) provide secure access into an organization for remote workers.

21
Q

2.1.1 Shell

A

2.1.1 - A user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces.

22
Q

2.1.2 Kernel

A

2.1.2 - Communicates between the hardware and software of a computer and manages how resources are used to meet software requirements

23
Q

2.1.3 Hardware

A

2.1.3 - The physical part of a computer including underlying electronics