Networking Today Flashcards

1
Q

If you want to be a part of a global online community, your computer, tablet, or smart phone must first be connected to a ______. That _______ must be connected to the _________.

A

network, network, internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are hosts?

A

All computers that are connected to a network and participate directly in network communication are classified as hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are two other names for hosts?

A

Hosts can be called end devices. Some hosts are also called clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an Internet Protocol (IP) address?

A

A number that identifies the host within a particular network. This number is called the Internet Protocol (IP) address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An ________ identifies the host and the network to which the host is attached.

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are servers?

A

Ex. a server requires web server software in order to provide web services to the network. A computer with server software can provide services simultaneously to many different clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are three common types of server software?

A

Email, web, and file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an email server?

A

The email server runs email server software. Clients use mail client software, such as Microsoft Outlook, to access email on the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a web server?

A

The web server runs web server software. Clients use browser software, such as Windows Internet Explorer, to access web pages on the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a file server?

A

The file server stores corporate and user files in a central location. The client devices access these files with client software such as the Windows File Explorer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: Client and server software usually run on separate computers, but it is also possible for one computer to be used for both roles at the same time.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What a peer-to-peer network?

A

In small businesses and homes, many computers function as the servers and clients on the network. This type of network is called a peer-to-peer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are four advantages of a peer-to-peer network?

A
  • Easy to set up
  • Less complex
  • lower cost because some network devices are not required
    -Can be used for simple tasks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the four disadvantages of peer-to-peer networking?

A

-No centralized administration
-Not as secure
-Not scalable
-All devices may act as both clients/servers slowing their performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are end devices? How do they know how to communicate?

A

To distinguish one end device from another, each end device on a network has an address. When an end device initiates communication, it uses the address of the destination end device to specify where to deliver the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An end device is either the _____ or _________ of a message transmitted over the network.

A

source, destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are intermediary devices?

A

Intermediary devices connect the individual end devices to the network. Can connect multiple individual networks (internetwork) and provide connectivity and ensure that data flows across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Intermediary devices use the ________ ___ ________ _______ , in conjunction with information about the __________ _________, to determine the path that messages should take through the network.

A

destination end device address, network interconnections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are five examples of intermediary devices?

A

-Wireless Router
-LAN Switch
-Multilayer Switch
-Firewall Appliance
-Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are five functions of intermediary network devices?

A

-Regenerate communication signals
-Maintain pathways that exist through the network
-Notify devices of errors
-Classify messages according to priorities
-Permit or deny data based on security settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a repeater?

A

Repeaters regenerate and retransmit communication signals. Ex. an Ethernet hub is a multiport repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

True or false: All intermediary devices perform the function of a repeater.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is media?

A

Communication transmits across a network on media. The media provides the channel over which the message travels from source to destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are three types of media used to interconnect devices?

A

-Metal wires within cables
-Glass or plastic fibers within fables (fiber-optic cables)
-Wireless transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How is data encoded within metal wires within cables?

A

Data is encoded into electrical impulses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How is data encoded within fiber-optic cables?

A

Data is encoded into pulses of light.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How is data encoded within wireless transmission?

A

Data is encoded via modulation of specific frequencies of electromagnetic waves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

True or false: Network architects and administrators must be able to show what their networks will look like. They need to be able to easily see which components connect to other components, where they will be located, and how they will be connected.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a topology diagram?

A

A diagram provides an easy way to understand how devices connect in a large network. Logical representations of the physical networking components are critical to visualizing a network’s organization and operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a Network Interface Card (NIC)?

A

A NIC physically connects the end device to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a physical port?

A

A connector or outlet on a networking device where the media connects to an end device or another networking device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is an interface?

A

Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are two types of topology diagrams?

A

Physical and logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a physical topology diagram?

A

Ex. You can see that the rooms in which these devices are located are labeled in the physical topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a logical topology diagram?

A

Ex. You can see which end devices are connected to which intermediary devices and what media is being used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are Small Office and Home Office (SOHO) Networks?

A

Small office and home office (SOHO) networks allow people to work from home, or a remote office. Many self-employed workers use these types of networks to advertise and sell products, order supplies, and communicate with customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the Internet?

A

The Internet is the largest network in existence. In fact, the term internet means a “network of networks”. It is a collection of interconnected private and public networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are small home networks?

A

Small home networks connect a few computers to each other and to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is a medium to large network?

A

Medium to large networks, such as those used by corporations and schools, can have many locations with hundreds or thousands of interconnected hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is a worldwide network?

A

The Internet is a network of networks that connects hundreds of millions of computers world-wide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are the two most common types of network infrastructures?

A

Local Area Networks (LAN) and Wide Area Networks (WANs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is a LAN?

A

A LAN is a network infrastructure that provides access to users and end devices in a small geographical area. It’s typically used in a department within an enterprise, a home, or a small business network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is a WAN?

A

A WAN is a network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a larger corporation or a telecommunications service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What are three specific characteristics of a LAN?

A

-Are interconnected end devices in a limited area.
-Usually administered by a single organization or individual.
-Provide high-speed bandwidth to end/intermediary devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

WANs are typically managed by _____ _____ or _______ _______ ______.

A

Service providers (SPs), Internet Service Providers (ISPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What are three specific characteristics of WANs?

A

-WANs interconnect LANs over wide geographical areas.
-WANS are administered by multiple service providers.
-WANs provide slower-speed links between LANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is the Internet?

A

The internet is a worldwide collection of interconnected networks (internetworks, or internet for short).

48
Q

What are three organizations that were developed to help maintain the structure and standardization of Internet protocols and processes?

A
  • Internet Engineering Task Force (IETF)
    -Internet Corporation for Assigned Names and Numbers (ICANN)
    -Internet Architecture Board (IAB)
49
Q

What is the intranet?

A

Intranet is a term often used to refer to a private connection of LANs and WANs that belong to an organization. It’s designed to be accessible only by the organization’s members, employees, or others with authorization.

50
Q

What is an extranet?

A

An organization may use an extranet to provide secure and safe access to individuals who work for a different organization but require access to the organization’s data.

51
Q

What are five possible Home and Small Office Internet Connection devices?

A

-Cable
-Digital Subscriber Lines (DSL)
-Cellular
-Satellite
-Dial-up Telephone

52
Q

What is cable?

A

Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television.

53
Q

What are Digital Subscriber Lines (DSL)?

A

DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.

54
Q

What is cellular internet access?

A

Cellular internet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected.

55
Q

What is satellite internet access?

A

The availability of satellite internet access is a benefit in those areas that would otherwise have no internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.

56
Q

What is a dial-up telephone?

A

An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is not sufficient for large data transfer, although it is useful for mobile access while traveling.

57
Q

True or false: Both cable and DSL provide high bandwidth, high availability, and an always-on connection to the internet.

A

True

58
Q

How do corporate connection options differ from home user options?

A

Businesses may require higher bandwidth, dedicated bandwidth, and managed services. Connection options that are available differ depending on the type of service providers located nearby.

59
Q

What are four possible business internet connection devices?

A

-Dedicated Leased Line
-Metro Ethernet
-Business DSL
-Satellite

60
Q

What is a Dedicated Leased Line?

A

Leased lines are reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking.

61
Q

What is Metro Ethernet?

A

Metro ethernets extend LAN access technology into the WAN and is sometimes known as Ethernet WAN.

62
Q

What is Business DSL?

A

Business DSL is available in various formats. A popular choice is Symmetric Digital Subscriber Line (SDSL) which is similar to the consumer version of DSL but provides uploads and downloads at the same high speeds.

63
Q

What is a satellite connection?

A

Satellite service can provide a connection when a wired solution is not available.

64
Q

What were traditional separate networks?

A

These separate networks could not communicate with each other. Each network used different technologies to carry the communication signal. Each network had its own set of rules and standards to ensure successful communication.

65
Q

What are converged networks?

A

Unlike dedicated networks, converged networks are capable of delivering data between many different types of devices over the same network infrastructure. This network infrastructure uses the same set of rules and implementation standards. Converged data networks carry multiple services on one network.

66
Q

What is network infrastructure?

A

The term network architecture refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.

67
Q

What are the four basic characteristics that network architects must address to meet user expectations?

A

-Fault tolerance
-Scalability
-Quality of Service (QoS)
-Security

68
Q

What is fault tolerance?

A

A fault-tolerant network is one that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs.

69
Q

What is redundancy?

A

These networks depend on multiple paths between the source and destination of a message. If one path fails, the messages are instantly sent over a different link. Having multiple paths to a destination is known as redundancy.

70
Q

Implementing a ______ _______ is one way that reliable networks provide _________.

A

packet-switched network, redundancy

71
Q

What is packet switching? (3 Points)

A

-Packet switching splits traffic into packets that are routed over a shared network.
-A single message is broken into multiple message blocks, called packets. Each packet has the necessary addressing information on the source/ destination of the message.
-The routers within the network switch the packets based on the condition of the network at that moment.

72
Q

What is scalability?

A

A scalable network expands quickly to support new users and applications. It does this without degrading the performance of services that are being accessed by existing users.

73
Q

What is Quality of Service? (2 Points)

A

-New applications available to users over networks create higher expectations for the quality of the delivered services.
-As content continues to converge onto the same network, QoS becomes important for managing congestion and ensuring reliable delivery of content to all users.

74
Q

What is congestion? (2 Points)

A

-Congestion occurs when the demand for bandwidth exceeds the amount available.
-When simultaneous communications are attempted across the network, the demand for network bandwidth can exceed its availability, creating network congestion.

75
Q

How is network bandwidth measured?

A

Network bandwidth is measured in the number of bits that can be transmitted in a single second, or bits per second (bps).

76
Q

When the volume of traffic is greater than what can be transported across the network…

A

devices will hold the packets in memory until resources become available to transmit them.

77
Q

With a QoS policy in place, the router can manage the flow of data and voice traffic, giving priority to…

A

voice communications if the network experiences congestion.

78
Q

What are the two types of network security concerns network administrators must address?

A

-Network infrastructure security
-Information security

79
Q

What does securing the network infrastructure include?

A

Securing the network infrastructure includes physically securing devices that provide network connectivity and preventing unauthorized access to the management software that resides on them.

80
Q

What are the three primary requirements to achieve the goals of network security?

A

-Confidentiality
-Integrity
-Availability

81
Q

What is confidentiality?

A

Data confidentiality means that only the intended and authorized recipients can access and read data.

82
Q

What is integrity?

A

Data integrity assures users that the information has not been altered in transmission, from origin to destination.

83
Q

What is availablity?

A

Data availability assures users of timely and reliable access to data services for authorized users.

84
Q

What is Bring Your Own Device (BYOD)?

A

BYOD enables end users the freedom to use personal tools to access information and communicate across a business or campus network. BYOD means any device, with any ownership, used anywhere.

85
Q

What is cloud computing?

A

Cloud computing is one of the ways that we access and store data. Cloud computing allows us to store personal files, even backup an entire drive on servers over the internet.

86
Q

What are data centers? (2 Points)

A

-Cloud computing is possible because of data centers. Data centers are facilities used to house computer systems and associated components.
-Data centers are typically very expensive to build and maintain.

87
Q

For _______, _______, and _____ _______, cloud providers often store data in distributed data centers.

A

Instead of storing all the data of a person or an organization in one data center, it is stored in multiple data centers in different locations.

88
Q

What do smaller organizations do if they can’t afford to maintain their own private data center?

A

Smaller organizations that cannot afford to maintain their own private data can lease server and storage services from a larger data center organization in the cloud.

89
Q

What are the four primary types of clouds?

A

-Public clouds
-Private clouds
-Hybrid clouds
-Community clouds

90
Q

What is a public cloud? (2 Points)

A

-Are made available to the general population.
-Services may be free or are offered on a pay-per-use model, such as paying for online storage.

91
Q

What are private clouds? (2 Points)

A
  • Are intended for a specific organization or entity, such as a government.
    -A private cloud can be set up using the organization’s private network or an outside organization.
92
Q

What is a hybrid cloud?

A

-A hybrid cloud is made up of two or more clouds (example: part private, part public), where each part remains a distinct object, but both are connected using a single architecture.
-Would be able to have degrees of access to various services based on user access rights.

93
Q

What are community clouds? (3 Points)

A

-A community cloud is created for exclusive use by specific entities or organizations.
- Community clouds are used by multiple organizations that have similar needs and concerns.
- Are similar to a public cloud environment, but with set levels of security, privacy, and regulatory compliance of a private cloud.

94
Q

What are smart home technologies?

A

Smart home technology integrates into everyday appliances, which can then connect with other devices to make the appliances more ‘smart’ or automated.

95
Q

What is powerline networking? (3 Points)

A

-Powerline networking for home networks uses existing electrical wiring to connect devices.
-Using a standard powerline adapter, devices can connect to the LAN wherever there is an electrical outlet.
-No data cables need to be installed, and there is little to no additional electricity used.

96
Q

In many areas where cable and DSL are not available…

A

wireless may be used to connect to the internet.

97
Q

What is a Wireless Internet Service Provider (WISP)? (2 Points)

A

-A Wireless Internet Service Provider (WISP) is an ISP that connects subscribers to a designated access point using similar wireless technologies found in home wireless local area networks (WLANs).
-WISPs are more commonly found in rural environments where DSL or cable services are not available.

98
Q

How do subscribers receive wireless internet service? (2 Points)

A

-Typically the antenna is attached to an existing elevated structure, such as a water tower or a radio tower.
-A small dish or antenna is installed on the subscriber’s roof in the range of the WISP transmitter.

99
Q

What is wireless broadband service? (2 Points)

A

-Another wireless solution for the home and small businesses is wireless broadband which uses the same cellular technology as a smartphone.
-An antenna is installed outside the house providing either wireless or wired connectivity for devices in the home.

100
Q

What are viruses, worms, and Trojan horses?

A

These contain malicious software or code running on a user device.

101
Q

What is spyware and adware?

A

These are types of software which are installed on a user’s device. The software then secretly collects information about the user.

102
Q

What are zero-day attacks?

A

Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.

103
Q

What are threat actor attacks?

A

A malicious person attacks user devices or network resources.

104
Q

What are denial-of-service attacks?

A

These attacks slow or crash applications and processes on a network device.

105
Q

What is data interception and theft?

A

This attack captures private information from an organization’s network.

106
Q

What is identity theft?

A

This attack steals the login credentials of a user in order to access private data.

107
Q

There have been many studies that show that the most common data breaches happen because of…

A

internal users of the network.

108
Q

No single solution can protect the network from the variety of threats that exist. For this reason, security should be implemented in…

A

multiple layers, using more than one security solution. If one security component fails to identify and protect the network, others may succeed.

109
Q

What are the two basic security components for a home or small office network?

A

-Antivirus and antispyware
-Firewall filtering

110
Q

What is antivirus and antispyware?

A

These applications help to protect end devices from becoming infected with malicious software.

111
Q

What is firewall filtering?

A

Firewall filtering blocks unauthorized access into and out of the network.

112
Q

How is the network security implementation for a corporate network different from a home network security implementation? (2 Points)

A
  • A home network security implementation is usually rather basic. You implement it on the end devices and can even rely on contracted services from the ISP.
    -The network security implementation for a corporate network usually consists of many components built into the network. All components work together, which minimizes maintenance and improves security.
113
Q

What are four security requirements for larger networks?

A

-Dedicated firewall systems
-Access control lists (ACL)
-Intrusion prevention systems (IPS)
-Virtual private networks (VPN)

114
Q

What are dedicated firewall systems?

A

These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.

115
Q

What are access control lists (ACLs)?

A

These further filter access and traffic forwarding based on IP addresses and applications.

116
Q

What are Intrusion Prevention Systems (IPS)?

A

These identify fast-spreading threats, such as zero-day or zero-hour attacks.

117
Q

What are Virtual Private Networks (VPN)?

A

These provide secure access to an organization for remote workers.