definitions Flashcards

(60 cards)

1
Q

All computers that are connected to a network and participate directly in network communication are classified as

A

hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

can be called end devices. Some are also called clients.

A

hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

specifically refers to devices on the network that are assigned a number for communication purposes

A

hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This number identifies the host within a particular network.

A

Internet Protocol (IP) address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

identifies the host and the network to which the host is attached

A

Internet Protocol (IP) address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

are computers with software that allow them to provide information, like email or web pages, to other end devices on the network

A

Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In small businesses and homes, many computers function as the servers and clients on the network.

A

Peer-to-peer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is either the source or destination of a message transmitted over the network

A

end device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

connect the individual end devices to the network

A

intermediary devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

provide connectivity and ensure that data flows across the network

A

intermediary devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

physically connects the end device to the network

A

Network Interface Card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A connector or outlet on a networking device where the media connects to an end device or another networking device

A

Physical Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Specialized ports on a networking device that connect to individual networks.

A

Interface/Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

illustrate the physical location of intermediary devices and cable installation

You can see that the rooms in which these devices are located

A

physical topology diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

illustrate devices, ports, and the addressing scheme of the network

You can see which end devices are connected to which intermediary devices and what media is being used

A

logical topology diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

means a “network of networks”

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

the largest network in existence

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

collection of interconnected private and public networks

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

connect a few computers to each other and to the internet.

A

small home networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

allows computers in a home office or a remote office to connect to a corporate network, or access centralized, shared resources

A

Small Office and Home Office (SOHO) Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

such as those used by corporations and schools, can have many locations with hundreds or thousands of interconnected hosts

A

medium to large networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The internet is a network of networks that connects hundreds of millions of computers world-wide.

A

World Wide Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is a network infrastructure that provides access to users and end devices in a small geographical area

A

LAN (local area networks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

is a network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a larger corporation or a telecommunications service provider

A

WAN (wide area networks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
is a term often used to refer to a private connection of LANs and WANs that belongs to an organization
intranet
26
to provide secure and safe access to individuals who work for a different organization but require access to the organization’s data
extranet
27
Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.
cable
28
also provide high bandwidth, high availability, and an always-on connection to the internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
DSL (digital subscriber lines)
29
Cellular internet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected.
cellular
30
The availability of satellite internet access is a benefit in those areas that would otherwise have no internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
satellite
31
An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is not sufficient for large data transfer, although it is useful for mobile access while traveling.
dial-up telephone
32
are reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate.
dedicated leased line
33
This is sometimes known as Ethernet WAN. extend LAN access technology into the WAN.
metro ethernet
34
can provide a connection when a wired solution is not available.
satellite service
35
is one that limits the number of affected devices during a failure
fault tolerant network
36
Having multiple paths to a destination is known as
redundancy
37
occurs when the demand for bandwidth exceeds the amount available
congestion
38
is measured in the number of bits that can be transmitted in a single second, or bits per second (bps)
network bandwidth
39
means that only the intended and authorized recipients can access and read data.
data confidentiality
40
assures users that the information has not been altered in transmission, from origin to destination.
data integrity
41
assures users of timely and reliable access to data services for authorized users
data availability
42
is an ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs).
Wireless Internet Service Provider (WISP)
43
Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country?
video communications
44
These contain malicious software or code running on a user device
viruses, worms, trojan horses
45
These are types of software which are installed on a user’s device. The software then secretly collects information about the user.
spyware, adware
46
Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.
zero-day attacks
47
A malicious person attacks user devices or network resources.
threat actor attacks
48
These attacks slow or crash applications and processes on a network device.
denial of service attacks
49
This attack captures private information from an organization’s network.
Data interception and theft
50
This attack steals the login credentials of a user in order to access private data.
identity theft
51
These applications help to protect end devices from becoming infected with malicious software.
antivirus and antispyware
52
blocks unauthorized access into and out of the network. This may include a host-based firewall system that prevents unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network.
firewall filtering
53
These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.
dedicated firewall systems
54
These further filter access and traffic forwarding based on IP addresses and applications.
Access control lists (ACL)
55
These identify fast-spreading threats, such as zero-day or zero-hour attacks.
Intrusion prevention systems (IPS)
56
These provide secure access into an organization for remote workers.
Virtual private networks (VPN)
57
Used to configure console, SSH, Telnet, or AUX access.
line configuration mode
58
Used to configure a switch port or router network interface.
interface configuration mode
59
Cisco IOS software separates management access into the following two command modes:
User EXEC and Privileged EXEC mode
60