Module 1 Flashcards

1
Q

End Devices (Host)?

A

All computers that are connected to a network and participate directly in network communication are classified as hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This number identifies the host within a particular network.

A

Internet Protocol Address (IP Address)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Identifies the host and the network to which the host is attached.

A

IP Address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Servers

A

computers with software that allow them to provide information, like email or web pages, to other end devices on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

________ have software for requesting and displaying the information obtained from the server

A

Clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In small businesses and homes, many computers function as the servers and clients on the network. Which type of network does this describe?

A

Peer-to-peer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

USB Acronym.

A

Universal Serial Bus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NIC Acronym.

What does it do?

A

Network Interface Card.

physically connects the end device to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You can differentiate end devices because all end devices have an…

A

Address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

connect the individual end devices to the network.

A

Intermediary devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

5 common intermediary devices…

A
Wireless Router. 
LAN switch
Router. 
Multilayer Switch. 
Firewall Appliance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 main types of network media…

A

Copper
Fiber-Optic
Wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Four Main criteria for choosing network media…

A

Max distance media can carry signal.
Environment which media will be installed.
Amount of data and at what speed transmitted.
Cost of the media and installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When data is encoded as pulses of light, which media is being used to transmit the data?

A

Fiber-optic cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the name for all computers connected to a network that participate directly in network communication?

A

Hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Physical Port

A

A connector or outlet on a networking device where the media connects to an end device or another networking device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Interface

A

Specialized ports on a networking device that connect to individual networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Physical topology diagrams illustrate…

A

the physical location of intermediary devices and cable installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Logical topology diagrams illustrate….

A

devices, ports, and the addressing scheme of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which connections are specialized ports on a networking device that connect to individual networks?

A

Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used?

A

Logical Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which type of network topology lets you see the actual location of intermediary devices and cable installation?

A

Physical Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

a collection of interconnected private and public networks. (Network of Networks)

A

the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Small home networks connect

A

a few computers to each other and to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
allows computers in a home office or a remote office to connect to a corporate network, or access centralized, shared resources.
SOHO Network (Small Office Home Office)
26
type of network that can have many locations with hundreds or thousands of interconnected hosts.
Medium to Large Networks.
27
Network infrastructures vary greatly in terms of: (4 ways)
Size of the area covered Number of users connected Number and types of services available Area of responsibility
28
LAN (Local Area Network)
a network infrastructure that provides access to users and end devices in a small geographical area
29
WAN (Wide Area Network)
a network infrastructure that provides access to other networks over a wide geographical area
30
interconnect end devices in a limited area such as a home, school, office building, or campus.
LAN
31
administered by a single organization or individual. Administrative control is enforced at the network level and governs the security and access control policies.
LAN
32
interconnect LANs over wide geographical areas such as between cities, states, provinces, countries, or continents.
WAN
33
term often used to refer to a private connection of LANs and WANs that belongs to an organization
Intranet
34
designed to be accessible only by the organization's members, employees, or others with authorization.
Intranet
35
A local office of education that is providing budget and personnel information to the schools in its district is an example of an....
extranet
36
Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization’s data?
extranet
37
Type of connection that provides a high bandwidth, high availability, and an always-on connection to the internet. Transmitted on same connection that transmits television.
Cable
38
It provides a high bandwidth, high availability, and an always-on connection to the internet. Runs over a telephone line.
DSL ( Digital Subscriber Lines)
39
Type of internet access that uses a cell phone network to connect.
Cellular.
40
An inexpensive type of connection option that uses any phone line and a modem.
Dial-Up Telephone.
41
reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking
Dedicated Leased Line
42
extend LAN access technology into the WAN
Metro Ethernet
43
four basic characteristics that network architects must address to meet user expectations:
Fault Tolerance Scalability Quality of Service (QoS) Security
44
Fault Tolerance Network
Limits the number of affected devices during a failure.
45
splits traffic into packets that are routed over a shared network
Packet Switching
46
A scalable network expands quickly to support new users and applications without...
degrading the performance of services that are being accessed by existing users
47
Congestion occurs when...
the demand for bandwidth exceeds the amount available.
48
QoS prioritizes...
time-sensitive traffic.
49
When the volume of traffic is greater than what can be transported across the network devices...
will hold the packets in memory until resources become available to transmit them
50
two types of network security concerns
network infrastructure security and information security.
51
Securing the network infrastructure includes...
physically securing devices that provide network connectivity and preventing unauthorized access to the management software that resides on them
52
Data Confidentiality
only the intended and authorized recipients can access and read data.
53
Data Integrity
assures users that the information has not been altered in transmission, from origin to destination.
54
Data Availability
assures users of timely and reliable access to data services for authorized users.
55
When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved?
Scalability
56
Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?
Security
57
With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?
QoS
58
Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?
fault tolerance
59
enables end users the freedom to use personal tools to access information and communicate across a business or campus network
BYOD (Bring Your Own Device)
60
allows us to store personal files, even backup an entire drive on servers over the internet
Cloud Computing
61
an ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs)
Wireless Internet Service Provider (WISP)
62
Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country?
Video Communications
63
Which feature describes using personal tools to access information and communicate across a business or campus network?
BYOD
64
Which feature contains options such as Public, Private, Custom and Hybrid?
Cloud Computing
65
Which feature is being used when connecting a device to the network using an electrical outlet?
Powerline
66
Which feature uses the same cellular technology as a smart phone?
Wireless Broadband
67
These contain malicious software or code running on a user device
Viruses, worms, and Trojan horses
68
These are types of software which are installed on a user’s device. The software then secretly collects information about the user
Spyware and adware
69
Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.
Zero-day attacks
70
A malicious person attacks user devices or network resources.
Threat actor attacks
71
These attacks slow or crash applications and processes on a network device.
Denial of service attacks
72
This attack captures private information from an organization’s network.
Data interception and theft
73
This attack steals the login credentials of a user in order to access private data.
Identity theft
74
These applications help to protect end devices from becoming infected with malicious software.
Antivirus and antispyware
75
blocks unauthorized access into and out of the network.
Firewall filtering
76
These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.
Dedicated firewall systems
77
These further filter access and traffic forwarding based on IP addresses and applications.
Access control lists (ACL)
78
These identify fast-spreading threats, such as zero-day or zero-hour attacks.
Intrusion prevention systems (IPS)
79
These provide secure access into an organization for remote workers.
Virtual private networks (VPN)
80
Which attack slows down or crashes equipment and programs?
Denial of Service (DoS)
81
Which option creates a secure connection for remote workers?
Virtual Private Network(VPN)
82
Which option blocks unauthorized access to your network?
Firewall
83
Which option describes a network attack that occurs on the first day that a vulnerability becomes known?
Zero-day to Zero-hour
84
Which option describes malicious code running on user devices?
Virus, worm, or Trojan horse.