Cisco Introduction to Networking Chapter 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

Intermediary Network Devices Some Responsibilities.

1. Classify and Direct Data. 2. Permit or deny flow of data. 3. Notify other devices if an error in the pathway exists 14 Maintain information.

Three types of media to interconnect devices.

1. Copper 2. Fiber-Optic 3. Wireless

Four basic characteristics of a reliable network

1. Fault Tolerance 2. Security 3. Quality of Service 4. Scalability

Some Intermediary Network Devices

1. Wireless Router 2. Multi-layer Switch 3. Firewall Application 4. Router 5. LAN Switch

Network Interface Card

A NIC, or LAN adapter, provides the physical connection to the network at the PC or other end device.

Physical Port

A connector or outlet on a networking device where the media is connected to an end device or another networking device.

What is a fault tolerant network.

A fault tolerant network is one that limits the impact of a failure, so that the fewest number of devices are affected. This means multiple paths for packets to take to get to their end destination.

Scalable Network

A scalable network can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users.

Hacker attacks

An attack by a knowledgeable person to user devices or network resources

Zero-day attacks, also called zero-hour attacks

An attack that occurs on the first day that a vulnerability becomes known

Data interception and theft

An attack to capture private information from an organization's network

Identity theft

An attack to steal the login credentials of a user in order to access private data

Wireless Broadband Service

Another wireless solution uses the same cellular technology used to access the Internet with a smart phone or tablet

Denial of service attacks

Attacks designed to slow or crash applications and processes on a network device

Three Components of Security

Confidentially Integrity Availability

Data encoding for each type of media that interconnects devices

Copper: Electric Pulses Fibre-Optic: Pulses of light Wireless: wavelengths

End Device

End device is either the source or destination of a message transmitted over the network

All computers connected to a network that participates directly in network communication are classified as.

Hosts known as end devices.

Wireless Internet Service Provider (WISP)

ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs)

One way reliable networks provide redundancy.

Implementing a packet switched network

Extranet

Individuals who do not work directly for the org but still need access to the organizations network.

Ports on a router are considered

Interfaces

Role of Intermediary Network Devices

Intermediary devices connect the individual end devices to the network and can connect multiple individual networks to form an internetwork

Man Size

Larger then a LAN Smaller then a WAN

LAN

Local Area Network

Viruses, worms, and Trojan horses

Malicious software and arbitrary code running on a user device

MAN

Metropolitan Area Network

Who owns the internet

Nobody

Intranet

Private collection of LANS and WANS that belong to an organization.

What is a server?

Servers are computers with s software that enable them to provide services to devices on the network.

Geographical location of LAN

Single

Three Main Characteristics of a WAN

Slower speeds between LANS Administrated by multiple providers WANS intro connect LANS

Spyware and adware

Software installed on a user device that secretly collects information about the user

Geographical location

Spans multiple geographical location

Interface

Specialized ports on a networking device that connect to individual networks.

SAN

Storage Area Network

File Server

Stores corporate and user files in a central location. Client devices access this media.

Access control lists (ACL)

These are used to further filter access and traffic forwarding.

Intrusion prevention systems (IPS)

These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.

Dedicated firewall systems

These are used to provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.

Virtual private networks (VPN)

These are used to provide secure access to remote workers.

Peer to Peer Networking

When one computer carries out the role of both client and server.

WAN

Wide Area Network s

What is the Internet

Worldwide collection of intro connected networks.

Three Main Characteristics of a LAN

interconnects end devices. Administrated by a single org High speed bandwidth for internal devices and Intermediary devices.


Conjuntos de estudio relacionados

Focus on personal finance - ch 1

View Set

Living Environment Regents questions

View Set

CompTIA Security+ SY0-601 (Section 5.0 Governance, Risk and Compliance)

View Set

HW7- Chapter 10 Basic Economic Relationships

View Set