Networking Today Flashcards

1
Q

Define Hosts

A

The term host specifically refers to devices on the network that are assigned an IP address (Internet Protocol).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the function of an IP address?

A

An IP address identifies the host and the network in which the host is attached.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Servers and Clients

A

Servers are computers with server software that allow them to provide information
Clients have software that allow them to request information obtained from servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define peer to peer

A

Computers that function as the client and server at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advantages and disadvantages of peer to peer

A

Advantages:
1) East to set up
2) Less complex
3) Can perform single tasks
4) Lower Cost
Disadvantages:
1) Not scalable
2) Not as secure
3) No centralized administration
4) Lower peerformance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does an end device initiate communication?

A

It uses the address of the destination end device to determine the path of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Talk about intermediary devices

A

Intermediary devices connect the individual end devices to the network. They can connect multiple individual networks to form an internetwork.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do intermediary devices determine the path of the message?

A

They use the destination end device address + information about network interconnections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Functions of Intermediary devices

A

1) Regenerate and transmit computer signals
2) Permit or deny the flow of data based on security setting
3) Maintain information about what pathways exist through the network and internetwork.
4) Direct data along alternate pathways in case of a link failure
5) Notify other devices about errors and communication failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the main types of media that interconnects devices?
What is the form of data in them?

A

1) Metal wires within cables(electrical impulses)
2) Fiber optic (pulses of light)
3) Wireless (electromagnetic waves)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Criteria for choosing media

A

1) Maximum distance
2) Environment
3) Speed/Amount
4) Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the terminology used to describe how media and devices connect?

A

1)NIC (Network interface card): connect end devices to the network
2)Physical Port: a connector or outlet on a networking device that connects the media to an end device or another networking device
3) Interface: Specialized ports on a networking device that connects to individual networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define physical topology diagrams

A

Illustrates the physical location of intermediary devices and cable installation (Allows u to see the specific rooms in which these devices are installed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define logical topology diagrams

A

Illustrate the ports, devices, and the addressing scheme of a network (Allows u to see which end devices connect to which intermediary devices and which media is being used)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define LANs and list its characteristics

A

a network infrastructure that spans a small geographical area
Characteristics:
1) Interconnect end devices in a limited area
2) Usually administrated by one single person or administration
3) LANs provide high speed bandwidth to internal end devices and intermediary devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define WANs and list its characteristics

A

A network infrastucture that spans a wide geographical area
Characteristics:
1) Interconnect LANs over a wide geographical area
2) Usually administrated by multiple service providers (SP and ISP)
3) Typically provide slower speed links between LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe cable connection

A

Typically offered by cable television service providers, the internal data signal transmits on the same cable that delivers the cable television, it provides high speed bandwidth, high availability,and an always on connection to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe DSL connection

A

Digital Subscriber Line provide high speed bandwidth, high availability, and an always on connection to the internet, it runs over the telephone line. SOHO users use ADSL, it means that the download speed is higher than the upload speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Describe cellular connection

A

uses a cell phone network to connect to the internet. It is only limited by the capabilities of the phone and the cell tower to which it is connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Describe Satellite connection

A

Benefits area that has no internet connectivity at all, satellite dishes require a clear line of site to the satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Describe Dial- up telephone

A

An inexpensive option that uses any phone line and a modem
the low speed bandwidth provided by the modem connection is not sufficient for large data transfer, although it is useful for traveling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Describe Dedicated Leased Lines

A

Reserved circuits within the service provider’s network that connect geographically separated offices for private and/or data networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe Metro Ethernet

A

Extend LAN access technology into the WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Describe Business DSL

A

SDSL(symmetric digital subscribers line/one form of it) provides uploads and downloads at the same high speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Describe Satellite(business)

A

provide connection when other services are not available

26
Q

Describe the converging network

A

converging networks are capable of delivering data, video and voice between many different type of devices over the same network infrastructure

27
Q

What are the four basic characteristics that network architectures must address to meet the user’s expectation?

A

1) Fault tolerance
2) Scalability
3)Quality of service
4) Network Security

28
Q

What is fault tolerant network?

A

A network that limits the number of affected devices during a failure and its built to quickly recover when such a failure occurs. These networks depend on redundancy

29
Q

Define redundancy. Explain how reliable networks provide it

A

Redundancy: having multiple paths between the source and destination of the message
Its provided by implementing a packet-switch network ( packet switching is splitting traffic into packets that are routed over a shared network)

30
Q

Define a scalable network

A

A scalable network expands quickly to support new users without downgrading the performance of services
Scalability happens when designers follow accepted standards and rules

31
Q

When does congestion occur?

A

Congestion occurs when the demand for bandwidth exceeds the amount available.
Network bandwidth is measured by bps.

32
Q

What are the primary requirements to achieve network security?

A

*Confidentiality - only the intended and authorized recipients can access and read data.
*Integrity - assures users that the information has not been altered in transmission, from origin to destination.
*Availability - assures users of timely and reliable access to data services for authorized users.

33
Q

What are the cloud types?

A

1) Public cloud
2) Private cloud
3) Hybrid cloud
4) Community cloud

34
Q

Define a public cloud

A

Services in it are available to the general population, may be free or on a pay per use model, it uses internet to provide services.

35
Q

Define a private cloud

A

Services are intended for a specific organization. A private cloud can be set up using the organization’s private network. It can also be managed by an outside organization with strict access security.

36
Q

Define a hybrid cloud

A

A hybrid cloud is made up of two or more clouds (example: part private, part public), where each part remains a distinct object, but both are connected using a single architecture. Individuals on a hybrid cloud would be able to have degrees of access to various services based on user access rights.

37
Q

Define a community cloud

A

A community cloud is created for exclusive use by specific organizations. They are used by multiple organizations that have similar needs and concerns. They are similar to a public cloud environment, but with set levels of security, privacy, and even regulatory compliance of a private cloud.

38
Q

What is QOS for?

A

QOS is a primary mechanism for managing congestion and ensuring reliable delivery of content to all users.

39
Q

What is the function of cloud computing?

A

Cloud computing allows us to store personal files, even backup an entire drive on servers over the internet.
In buisness, it extends the capabilities of IT without requiring investment in a new infrastructure, training new personnel, or licensing new software. These services are available on demand and delivered to any device without compromising security

40
Q

Explain power line networking

A

Using the same wiring that delivers electricity, power line networking sends information by sending data on certain frequencies

41
Q

Explain WISPs

A

A Wireless Internet Service Provider (WISP) is an ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs).
Commonly found in rural areas where DSL or cable aren’t available.
Although a separate transmission tower may be installed for the antenna, typically the antenna is attached to an existing elevated structure, such as a water tower or a radio tower. A small dish or antenna is installed on the subscriber’s roof in the range of the WISP transmitter. The subscriber’s access unit is connected to the wired network inside the home. From the perspective of the home user, the setup is not much different than DSL or cable service. The main difference is that the connection from the home to the ISP is wireless instead of a physical cable.

42
Q

Explain Wireless Broadband Service

A

uses the same cellular technology as a smart phone. An antenna is installed outside the house providing either wireless or wired connectivity for devices in the home

43
Q

What are the external security threats? Explain them

A
  • Viruses, worms, and Trojan horses: These contain malicious software or code running on a user device.
  • Spyware and adware: software which are installed on a user’s device. The software then secretly collects information about the user.
  • Zero-day attacks: occur on the first day that a vulnerability becomes known
  • Threat actor attacks: A malicious person attacks user devices or network resources.
  • Denial of service attacks: These attacks slow or crash applications and processes on a network device.
  • Data interception and theft: This attack captures private information from an organization’s network
  • Identity theft: This attack steals the login credentials of a user in order to access private data.
44
Q

what are the basic security components for a home or small office network?

A
  • Antivirus and antispyware - These applications help to protect end devices from becoming infected with malicious software.
  • Firewall filtering - Firewall filtering blocks unauthorized access into and out of the network ( host based firewall system that prevents unauthorized access to an end device, or basic filtering service in the home router to prevent unauthorized access from outside)
45
Q

What are the security components for larger networks and corporate networks?

A
  • Dedicated firewall systems - These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.
  • Access control lists (ACL) - These further filter access and traffic forwarding based on IP addresses and applications.
  • Intrusion prevention systems (IPS) - These identify fast-spreading threats, such as zero-day or zero-hour attacks.
  • Virtual private networks (VPN) - These provide secure access into an organization for remote workers.
46
Q

What are topology diagrams?

A

Mandatory documentation that provide visual maps of how the network is connected

47
Q

What are the types of networks?

A

1) Simple Home Networks: shares resources such as documentation, pics…
2) SOHO: Small office and home networks allows people to work from home or a remote office
3) Buisness and large organizations uses networks to provide storage, access to info, provide products to customers, emails…
4) Internet is the largest network

48
Q

Define intranet

A

A private connection of LANs and WANs that belongs to an organization. It’s designed to be accessible by only organization employees

49
Q

Define extranet

A

Provides secure and safe access to individuals who work for a different organization but require access to the organization’s data.

50
Q

What happens when the volume of traffic is greater than what can be transported across the network?

A

Devices will hold packets in memory until sources are available to transmit them.

51
Q

What happens if congestion occurs?

A

The router manages the flow of data and voice traffic, giving priority to voice communications if the network experience congestion.

52
Q

What is the focus of QoS?

A

To prioritize time-sensitive traffic, the type of traffic, not the content is what is important

53
Q

What type of network security concerns do network administrators address?

A

1) Network infrastructure security: physically securing devices (passwords) to prevent unauthorized access
2) Information security: NIC, physical port, interface

54
Q

How is cloud computing possible?

A

Data centers, facilities used to house computer signals and associated components, they are very expensive, so, only large organizations use privately build data centers to provide services to users and to house data

55
Q

How can small organizations that can’t afford data centers get them?

A

can reduce the cost of ownership by leasing server and storage services

56
Q

Why does the cloud store data in distributed data centers?

A

Security
Reliability
Fault tolerance

57
Q

What are the network trends that affect organization?

A

1) BYOD: Bring your own device, enables users the freedom to use personal tools to access information
2) Online Collaboration: for access to data application and to collaborate w each other
3) Video Communications
4) Cloud Computing

58
Q

Where do u implement home network security? What about buisness security?

A

Home: on end devices and point of connection to the internet
Buisness: components built into networks to monitor and filter traffic

59
Q

Define ISP

A

An organization that enables individuals and buisness to connect to the internet

60
Q

What is the internet

A

Provides connection through interconnected global networks

61
Q

What’s the functions of an end device?

A

1) Interface between humans and communication network
2) Originate the data that flows through the network