Exam One Study Guide (Ch. 1 - 3) Flashcards
(102 cards)
What are the four basic elements of a network?
switches, routers, wireless access points, and the network itself
What are three elements of communication?
sender, receiver, and message
What is a LAN or WAN? How are they different? Characteristics?
An LAN is a network infrastructures that provides access to users and end devices in a small geographic area. A WAN is a network infrastructure that provides access to other networks over a wide geographic area.
Internet vs. Extranet vs. Intranet
The internet is a global network that connects millions of devices and computers worldwide. The intranet is a private network that is only accessible to authorized users within an organization. The extranet is a private network that allows external parties to access certain parts of an organization’s intranet.
What are the different types of home and small office internet connections/what are their purpose?
Cable: high bandwidth, always on, internet offered by cable television service providers.
DSL: high bandwidth, always on, internet connection that runs over a telephone line.
Cellular: uses a cell phone network to connect to the internet.
Satellite: major benefit to rural areas without Internet Service Providers.
Dial-up Telephone: an inexpensive, low bandwidth option using a modem.
What is a converged network?
carries multiple services on one network including data, voice, and video
What are the types of business internet connections?
Dedicated leased line: These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking.
Ethernet WAN: This extends LAN access technology into the WAN.
DSL: Business DSL is available in various formats including Symmetric Digital Subscriber Lines (SDSL).
Satellite: This can provide a connection when a wired solution is not available.
What are the four basic characteristics network admins must address at all times to meet user expectations and what does each represent?
Fault tolerance, Scalability, Quality of Service (QoS), and Security
The three primary requirements of network security and what they mean
Confidentiality: protecting sensitive information from unauthorized access, ensuring only those with proper credentials can view it.
Integrity: guaranteeing that data is not tampered with during transmission or storage, and that any changes are made by authoroized users only,
Availability: Ensuring that critical systems and data are accessible to authorized users whenever needed, without interuption.
Recent trends in networking and home technology
Bring your own device (BYOD)
Online Collaboration
Video Communications
Cloud Computing
What are the types of ‘clouds’ (four)
Public Clouds: available to the general publci through a pay-per-use model for a fee
Private Clouds: intended for a specific organization or entity such as the government
Hybrid Clouds: made up of two or more Cloud types - for example, part custom and part public. Each part remains a distinctive object but both are connected using the same architecture.
Custom Clouds: built to meet the needs of a specfic industry, such as healthcare or media. Can be private or public.
What are the different types of security threats and what solutions are available for security professionals?
Viruses, worms, and Trojan horses: These contain malicious software or code running on a user device.
Spyware and adware: These types of software are installed on a user’s device to secretly collect information about the user.
Zero-day attacks: Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.
Threat actor attacks: In these attacks, malicious persons attack user devices or network resources.
Denial-of-Service attacks: These attacks slow or crash applciations and processes on a network device.
Data Interception and theft: This type of attack involves capturing private information from an organization’s network.
Identity theft: This type of attack involves stealing the login credentials of a user in order to access private data.
Solutions: antivirus and antispyware, firewall filtering, dedicated firewall systems, access control lists (ACL), intrusion prevention systems (IPS), Virtual Private Network (VPN)
What are the three components of an operation system and what do they do?
Shell: The user interface that allows users to request specific tasks from the computer. These requests can be made through either the CLI or GUI.
Kernel: the kernel communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.
Hardware: the physical part of a computer, including underlying electronics.
What is a GUI?
Graphic User Interface: allows the user to interact with the system using an environement of graphical icons, menus, and windows
Why do most users rely on a GUI environment?
More user-friendly and requires less knowledge of the underlying command structure that controls the system.
What is the purpose of a CLI?
Allows the users to interact with a network device directly by typing text commands to configure settings and manage security features on a cisco device
Name at least one advantage and disadvantage of a CLI interface?
This type of interface needs much less memory (RAM) in order to use compared to other types of user interfaces. However, commands have to be typed precisely. If there is a spelling error the command will fail.
When would you have to use the console port rather than Telnet?
when you need to access a device directly, even if the device isn’t connected to its primary network.
Why is SSH not used instead of telnet all the time?
SSH protects user identities, passwords, and data from network snooping attacks, and allows secure logins and file transfers.
What are the main Cisco iOS modes (describe…i.e. privileged exec, etc…), and which do you enter first when you access the CLI?
User EXEC: log in (Router>)
Priviledged EXEC: use the enable exec command (Router#)
Global Configuration: use the configure terminal command (Router(config)#)
Interface Configuration: use the interface command (Router (config-if)#)
What are the three methods of accessing the Cisco IOS command line interface?
Console: access the CLI by connecting directly to the console port.
Telnet: access the CLI remotely using a telnet session.
SSH: access the CLI remotely during a SSH session.
You know that there is a show (help) command that will show you the contents of the routing table, but you cannot remember which show command it is. What should you do?
“show IP route” or “show running-config”
What do network operating systems enable users to do through a GUI?
interact with the system using an environment of graphical icons, menus, and windows.
Which access method needs a physical connection in order to access network components?
Ethernet: ethernet is a networking standard that uses physical cables like twisted pair to connect devices on a network, meaning a direct wired connection is necessary to access network componenets using this method.