NETWORKING 1 Flashcards
(214 cards)
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?
physical layer
A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?
bring your own device
What three application layer protocols are part of the TCP/IP protocol suite?
DHCP
DNS
FTP
Which name is assigned to the transport layer PDU?
segment
What process involves placing one PDU inside of another PDU?
encapsulation
Which PDU format is used when bits are received from the network medium by the NIC of a host?
frame
Which networking trend involves the use of personal tools and devices for accessing resources on a business or campus network?
BYOD (bring your own devices)
Which type of attack involves an adversary attempting to gather information about a network to identify vulnerabilities?
reconnaissance
How does BYOD change the way in which businesses implement networks?
BYOD provides flexibility in where and how users can access network resources.
An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?
VPN
What is the Internet?
It provides connections through interconnected global networks.
What are two functions of end devices on a network?
- They originate the data that flows through the network.
- They are the interface between humans and the communication network.
In which scenario would the use of a WISP be recommended?
a farm in a rural area without wired broadband access
What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?
scalability
A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?
fault tolerance
What are two characteristics of a scalable network?
- grows in size without impacting existing users
- suitable for modular devices that allow for expansion
Which device performs the function of determining the path that messages should take through internetworks?
a router
Which two Internet connection options do not require that physical cables be run to the building?
- cellular
- satellite
What type of network must a home user access in order to do online shopping?
the Internet
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?
spyware
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?
extranet
What is an ISP?
It is an organization that enables individuals and businesses to connect to the Internet.
Which two protocols function at the internet layer?
ICMP
IP
What process is used to receive transmitted data and convert it into a readable message?
decoding