Explore the Network Flashcards

(78 cards)

1
Q

A connection between a computer or a network that allows external devices to communicate with the computer.

A

Physical Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network that is easy to set up, less complex, lower cost, and used for simple tasks.

A

Peer-to-Peer Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Connecting to the internet using ____. Greatly beneficial to rural places without Internet Service Provider.

A

Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In this network it prioritizes real time data such as voice or video communication.

A

Converge Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It refers to the technologies that support the infrastructure that moves data across the network.

A

Network Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a network infrastructure that spans a wide geographical area.

A

Wide Area Network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Uses modulation of specific frequencies of electromagnetic waves.

A

Wireless Transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It enables computer within a home or remote office to connect to a corporate network

A

Small Office/Home Office (SOHO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It is a growing trend that allows technology to be integrated into every-day appliances which allows them to interconnect with other devices.

A

Smart home technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The following are example of what threat?
● Viruses, worms, and Trojan horses
● Spyware and adware
● Zero-day attacks
● Threat Actor attacks
● Denial of service attacks
● Data interception and theft
● Identity theft

A

External Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The groups that are developed to help maintain structure on the internet.

A

Internet Engineering Task Force (IETF)
Internet Corporation for Assigned Names and Numbers (ICANN)
Internet Architecture Board (IAB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It has many locations with hundreds or thousands of interconnected computers

A

Medium to Large Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Home and Small Office Internet Connections

A

Cable, DSL, Cellular, Satellite, Dial-up Telephone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It provide redundancy by implementing a packet switched network.

A

Reliable networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is where a message originates from or where it is received

A

End Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A type of cloud made up of two or more Cloud types, and each part remains a distinctive object but both are connected using the same architecture.

A

Hybrid Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the Security Solution for Larger Network?

A

● Firewall
● Access control lists (ACL)
● Intrusion prevention systems (IPS)
● Virtual private networks (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The following are example of what threat?
● lost or stolen devices
● accidental misuse by employees
● malicious employees

A

Internal Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It lets you collaborate and work with others over the network on joint projects using platforms such as zoom, ms teams and google meet.

A

Online Collaboration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

It is a private connection that is meant to be accessible only to an organization and its members and people who have authority within it.

A

Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Every computer on a network is called?

A

Host or End Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Two types of Network Threats

A

Internal & External Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

True or False:
The study of network security shouldn’t start with a clear understanding of the underlying switching and routing infrastructure.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An Inexpensive low-bandwidth option with the use of a modem.

A

Dial-up Telephone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A high bandwidth Internet data that is provided by a cable television service provider.
Cable
26
It is the physical security of network devices and preventing unauthorized access to the devices
Network infrastructure security
27
A type of cloud built to meet the needs of a specific industry, such as healthcare or media. It can be private or public.
Custom Cloud
28
a worldwide collection of interconnected LANs and WANs.
Internet
29
Diagrams illustrate devices, ports, and the addressing scheme of the network.
Logical Topology
30
This Network Infrastructure uses the same set of rules and standards.
Converge Network
31
Communication across a network is carried through a ____ which allows a message to travel from source to destination.
Medium or Network Media
32
It allows us to store personal files or backup our data on servers over the internet.
Cloud Computing
33
Reserved circuits within the service provider’s that connect distance offices to private data networking.
Dedicated Leased Line
34
It is useful when wireless access points cannot reach all the devices in the home. In other words, it is like an extender.
Powerline networking
35
assurance of timely and reliable access to data for authorized users.
Availability
36
A network that carries data to multiple devices over the same network infrastructure.
Converge Network
37
It splits traffic into packets that are routed over a network, and each packet could theoretically take a different path to the destination.
Packet switching
38
What are the computers that provide information to end devices?
Server
39
It interconnects end devices. Examples include switches, wireless access points, routers, and firewalls.
Intermediary Devices
40
Businesses Internet Connections
Dedicated Leased Line, Ethernet WAN, Business DSL (SDSL), Satellite
41
assurance that the data has not been altered during transmission.
Integrity
42
What are the Security Solution for Small Office Network?
● Anti virus and anti spyware soft ware ● Firewall
43
What are the four basic characteristics of Network Architecture?
Fault Tolerance, Scalability, Quality of Service (QoS), Security
44
Connecting to the internet using a cellular phone with sim cards.
Cellular
45
It is the protection of the information or data transmitted over the network
Information Security
46
It prioritizes the bandwidth of live transmissions such as voice or live video which means other devices that are connected to the network will receive much lesser bandwidth causing it to be slow.
Quality of Service (QoS)
47
It allows users to use their own devices giving them more opportunities and greater flexibility.
Bring your own device (BYOD)
48
It manages data as it flows through a network
Intermediary Devices
49
A network that lets one computer run both server and client soft ware at the same time.
Peer-to-Peer Network
50
a network infrastructure that spans a small geographical area.
Local Area Network (LAN)
51
A type o f cloud Intended for a specific organization or entity such as the government.
Private Cloud
52
It is the point where two pieces of network equipment or protocol layers connect.
Interface or Network interface
53
Uses electrical impulses
Copper cable
54
A Computer hardware device that sends and receives data packets over the network.
NIC (Network Interface Card)
55
diagrams illustrate the physical location of intermediary devices and cable installation
Physical Topology
56
Uses pulses of light.
Fiber-optic cable
57
It use symbols to represent devices within the network.
Network Diagram or Topology
58
Same as a Normal DSL but dedicated to more of a Business approach. It also uses various formats such as Symmetric Digital Subscriber Line (SDSL).
Business DSL
59
What are the 3 goals in Network Security?
Confidentiality, Integrity, Availability
60
Provide a secure access network for individuals who work for different organizations that need access to their data on their network.
Extranet
61
What are the computers that send requests to the servers to retrieve information?
Client
62
A type o f cloud available to the general public through a pay-per-use model or for free.
Public Cloud
63
Keeping your network secure
Network Security
64
A high bandwidth internet connection that runs over a telephone line.
Digital Subscriber Line (DSL)
65
Just like in Home office connection it can also use ________ but only if wired solution is not available.
Satellite
66
It can allow devices to connect to a LAN where data network cables or wireless communications are not a viable option.
Powerline networking
67
True or False: The internet is not owned by any individual or group
True
68
It is when a network can expand quickly and easily to support new users and applications without impacting the performance of services to existing users.
Scalability
69
only intended recipients can read the data.
Confidentiality
70
It limits the impact of a failure by simply limiting the number of affected devices.
Fault Tolerance
71
It extends LAN access technology into the WAN connection.
Ethernet WAN
72
Unlike DSL and cable, ________ is also a type of connection that lets you connect to wireless.
Wireless Broadband
73
It connects hundreds of millions of computers world-wide – such as the internet
World Wide Networks
74
Lets you Communicate with one another face to face using video platforms such as messenger.
Video Communication
75
What are the two main types of network security that must be addressed?
Network infrastructure security and Information Security
76
Three types of server
Email, Web, File Server
77
It is the primary mechanism used to ensure reliable delivery of content for all users.
Quality of Service (QoS)
78
It connect a few computers to each other and the Internet
Small Home Networks