preFinals ITC Flashcards

(72 cards)

1
Q

links computers for shared resources through
the internet.

A

Computer Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List all 5 Network Categories based on Geography

A

Personal Area Network (PAN)
Local Area Network (LAN)
Campus Area Network (CAN)
Metropolitan Area Network (MAN)
Wide Area Network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The smallest type of network with
a limited span interconnects compatible personal devices.
Examples include wireless earphones-to-smartphone and
computer-to-printer connections.

A

Personal Area Network (PAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is used to interconnect and
share computer resources in an establishment such as a
corporate building, house, or several buildings in a limited area.

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An enterprise network covering
multiple buildings in a campus environment, including universities
and large organizations.

A

Campus Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This covers multiple city
buildings, traffic lights, and parking meters, connecting wirelessly
as a metropolitan area network.

A

Metropolitan Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A much larger network covering vast
areas, such as cities, provinces, and countries. WAN can also be
a bigger network consisting of LANs and MANs.

A

Wide Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is a diagram displaying the structure of network devices and services to serve the clients’ connectivity needs.

A

Network Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Common Types of Network Architecture

Fulfilling the needs of the client is the biggest goal of computer
networks.

What are the three common types of enterprise networks:

A

Access networks
Networks for data centers
Wide-area Networks (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

in campuses and branches bring users and devices together, such as linking employees in a corporate building.

A

Access networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

in a company link multiple servers
with data and applications and make them easily accessible to users.

A

Networks for data centers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

connect users to programs and
services, such as hospital employees connecting to health applications.

A

Wide-area Networks (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

reference model of the
International Organization for Standardization was developed in 1984 as an open standard for every communication system to allow the
interlinking of different types of networks.

A

The Open Systems Interconnection Model

or

The Open Systems Interconnection (OSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 7 layers of OSI model?
IN ORDER!!

A

Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

gives electrical and mechanical connections to
the network.

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

handles error recovery, flow control, and sequencing of terminals that are either sending or receiving. It is the media access control (MAC) layer where MAC addressing is defined.

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

acts as the network controller that receives outgoing messages and combines messages and segments into packets with a header detailing the routing information.

A

Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

liable for end-to-end delivery between devices. It deals with message integrity between source and destination and segmenting and reassembling packets.

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

provides the control functions required to start, manage, and end connections to satisfy user requests.

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

accepts and structures the messages for an application by converting the message from one code to another.
It also processes data compression and encryption.

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

It interacts with application programs with communication components such as a web browser and email. It is responsible for recording a message, understanding the request, and identifying the information needed to support it.

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

_____ Layer : Handles signal and media

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

_____ Layer: Assigned for the flow of data

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Provides addressing and routing decisions

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Manages end-to-end delivery to ensure error-free packets
Transport Layer
26
Establishes, manages, and terminates sessions
Session Layer
27
Manages protocol conversion and data translation
Presentation Layer
28
Provides support for applications
Application Layer
29
These are devices required for communication and interaction between components on a computer network, either wired or wireless.
Network Types and Devices
30
uses cabling and connectors to initiate network connections.
Wired Network
31
uses radio signals to initiate network connections. It is the most common home network configuration today.
Wireless Network
32
Network type: _______ Advantages: • Faster network data transfer speed • inexpensive setup • Not susceptible to outside interference Disadvantages: • Specialized tools for cable connections • Labor intensive
Wired
33
Network type: _______ Advantages: • User mobility • Simple installation Disadvantages: • Security issues • Slower data transfer
Wireless
34
What are the 6 Wired Network Devices?
Lan Ethernet Cable Hub Switch Cable Modem Servers Firewall
35
connects devices within a local area network. It is limited by length and durability specifications resulting in a bad signal if the cable is too long or of poor quality.
Lan Ethernet Cable
36
interconnects networking devices but risks the broadcast of data it receives to all devices connected to it.
Hub
37
initiates a direct connection from the sender to the destination bypassing the data traffic to ensure data privacy, unlike a hub. It is best for interconnecting networking devices.
Switch
38
uses a cable connection to create a broadband network connection from a home network to the internet service provider (ISP). This setup needs a splitter to divide the cable TV from the home network.
Cable Modem
39
provide resources, data, services, and programs to other computers or clients over a network. It is tasked to handle complex operations such as databases, emails, and shared files.
Servers
40
a security device that monitors and secures incoming and outgoing network traffic based on established security policies. It is essentially the barrier between a private internal network and the public Internet.
Firewall
41
What are the 3 Wireless Network Devices?
Wireless Access Point Wireless Router WiFi Modem
42
connects wireless devices and provides a connection to wired LANs.
Wireless Access Point
43
consists of a router, switch, and wireless access point that uses radio frequency to link networking devices. It is the most common way to connect wireless LANs to the ISP’s access device.
Wireless Router
44
combines the functionality of a modem and a router, thus making it a convenient source for Internet connectivity.
WiFi Modem
45
is the rule for users to exchange information.
Networking Protocol
46
is the physical and logical arrangement of nodes such as a switch or hub and connections in a network.
Network Topology
47
The most common topologies for LANs are (there are 5)..
Point-to-point Token ring Bus Star Mesh
48
the simplest network topology where two devices, like a computer or router, are connected directly. With this, the communication only flows between the two devices.
Point-to-point
49
Its deterministic nature ensures access to message transmissions at regular or fixed time intervals for each connected station.
Token Ring
50
occurs when computers share the media for data transmission using a coaxial cable, preventing data transmission from being extremely bandwidth efficient.
Bus
51
the most common networking topology in LANs today, where all the devices connect to a central switch or hub.
Star
52
it is when the networking devices are directly connected where several paths exist between the end devices.
Mesh
53
deals with the fundamental human rights of a person’s privacy on the Internet, including the rights to the privacy of an owner's displayed, stored, and confidential information.
Internet Privacy
54
Different Techniques to Protect Internet Privacy (there are 5)
Securing Web Browser Using a Virtual Private Network (VPN) Double-checking Unfamiliar Links Limited Sharing on Social Media Using Multi-factor Authentication
55
Web browsers such as Google Chrome and Mozilla Firefox are the most used browsers online for their specific features and familiarity, although a total security guarantee is not automatic.
Securing Web Browser
56
It is the best way to have Internet privacy. It does not just change the IP address; it also protects incoming and outgoing Internet traffic with extensive encryption. Online activities and personal information stay secure and private from snoopers because of this technology.
Using a Virtual Private Network (VPN)
57
Never trust links from suspicious emails, sketchy websites, and advertisements. Double-check the URL to see if it has the correct format before clicking.
Double-checking unfamiliar links
58
Social media platforms like Instagram, Facebook, and Twitter are all publicly accessible. Their privacy protection is optional by locking the account or making it private.
Limited sharing on social media
59
is an added verification step besides a conventional password. Google applies this wherein the users must provide a specific code sent to their smartphones to access their accounts.
Using Multi-factor authentication
60
It ensures the integrity, confidentiality, and accessibility of computer networks. It is relevant when cybercriminals are becoming more dominant in exploiting new users and enterprises, then it is vital to take extra precautions to avoid any data breach.
Network Security
61
Network Technologies What are some 5 network security technologies of today:
Firewall Intrusion Detection System (IDS) Wi-Fi Protected Access 3 (WPA3) Virtual Privacy Network (VPN) Email Security
62
It was previously stated that it monitors and filters incoming and outgoing network traffic. Additionally, it serves as a “wall,” either hardware or software, between the trusted internal and untrusted external Internet by only allowing the verified traffic based on the predetermined set of rules in place.
Firewall
63
It is a software or a device for closely monitoring a network for any malicious activity or intrusion at the network or the host.
Intrusion Detection System (IDS)
64
It is the latest wireless network security certificate protocol by the WiFi alliance. It focuses its filtering at the “entry” when a new device requests to connect to the network.
Wi-Fi Protected Access 3 (WPA3)
65
It connects any remote device to an enterprise server wherein company data is hosted. 1It piggybacks on a public network to directly access the server, ensuring that the users' online activities are publicly hidden. This feature makes it one of the most powerful network security tools.
Virtual Private Network (VPN)
66
As emails allow scripts to be embedded inside the device, it is easier for anyone to write a code, attach it to an email, then send it. Receivers tend to click this email which can comprise the device. The most effective security methods include email spam filters with deep learning to filter domains that send spam.
Email Security
67
What are the following 5 consequences of combined failures of the internet and network:
Revenue Loss Maintenance Cost Laser productivity Damaged Reputation Legal Repercussions
68
One of the most significant consequences companies face during an internet, and network downtime is revenue loss. Even if the downtime only lasts minutes, it still puts operations and transactions on hold, which is considered a revenue loss for these companies. Proper cable management is the best way to ensure network reliability, as well as an occasional internet check-up and monitoring.
Revenue Loss
69
Repairing damaged internet and network lines consumes both time and maintenance costs, including acquiring new cables and upgraded network devices for replacement. Daily monitoring of the cables and network devices is encouraged to prevent sudden company downtime.
Maintenance Cost
70
Internet and network failure significantly affect productivity as tasks heavily rely on the internet. Employees will remain stagnant until the downtime is fixed, causing low productivity outcomes. It is advisable to provide a backup network and a backup internet service provider for quick resolutions for sudden downtimes.
Lesser Productivity
71
If internet and network failures regularly occur, it negatively impacts the employees and the company’s clients and partners. Reoccurring internet and network problems could be interpreted as negligence, reflecting bad management and maintenance. It is encouraged to maintain a system that would ensure the reoccurrence of the problems, and it is advisable to assure everyone of the internet and network security in place.
Damaged Reputation
72
Failures in operations and transactions mean failure to meet agreedupon outputs and deliverables on time. It could lead to legal repercussions, especially when crucial outputs are at risk. The best way to prevent this is by alerting every concerned party as soon as failure happens to lay down plans of recovery without compromising the quality and the demand of the clients.
Legal Repercussions