Module 1
What are the different network sizes?
- Small home networks - Small office and home networks - Medium to large networks - World wide networks
What is the four main criteria for choosing network media?
1) Distance 2) Environment media is being installed in 3) Amount of data & speed it must be transmitted 4) Cost
Three types of media used to interconnect devices?
1) Metal wires within cables 2) Glass or plastic fibers within cables 3) Wireless transmission
These further filter access and traffic forwarding based on IP addresses and applications.
Access control lists (ACL)
These applications help to protect end devices from becoming infected with malicious software.
Antivirus and antispyware
Basic security components for a home or small office network:
Antivirus and antispyware & Firewall filtering
Which feature describes using personal tools to access information and communicate across a business or campus network? - BYOD - video communications - cloud computing
BYOD
______________________ use networks to provide consolidation, storage, and access to information on network servers. Networks provide email, instant messaging, and collaboration among employees. Many organizations use their network's connection to the internet to provide products and services to customers.
Businesses and large organizations
In order to achieve the goals of network security, there are three primary requirements:
Confidentiality, integrity, & availability
Home and small office internet connections?
DSL, cable, cellular, satellite, dial-up telephone
This attack captures private information from an organization's network.
Data interception and theft
Reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. They are rented at a monthly or yearly rate.
Dedicated Leased Line
Businesses internet connections?
Dedicated Leased Line, metro ethernet, business DSL, satellite
These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.
Dedicated firewall systems
Larger networks and corporate networks use antivirus, antispyware, and firewall filtering, but they also have other security requirements:
Dedicated firewall systems, Access control lists (ACL), Intrusion prevention systems (IPS), Virtual private networks (VPN)
These attacks slow or crash applications and processes on a network device.
Denial of service attacks
Which attack slows down or crashes equipment and programs? - firewall - virus, worm, trojan horse - zero-day or zero-hour - virtual private network (VPN) - denial of service (DoS)
DoS
Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data? - Extranet - Intranet - LAN - WAN
Extranet
When data is encoded as pulses of light, which media is being used to transmit the data? - wireless - Fiber-optic cable - copper cable
Fiber-optic cable
Blocks unauthorized access into and out of the network.
Firewall filtering
Which connections are specialized ports on a networking device that connect to individual networks? - Port - NIC - Interface
Interface
These are organizations that were developed to help maintain the structure and standardization of internet protocols and processes?
Internet Engineering Task Force (IETF), Internet Corporation for Assigned Names and Numbers (ICANN), and the Internet Architecture Board (IAB), plus many others
An ______________ identifies the host and the network to which the host is attached.
Internet Protocol (IP) address
These identify fast-spreading threats, such as zero-day or zero-hour attacks.
Intrusion prevention systems (IPS)
A __________ is typically used in a department within an enterprise, a home, or a small business network.
LAN
Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business? - Extranet - Intranet - LAN - WAN
LAN
The two most common types of network infrastructures are _________________ & _________________.
Local area networks (LANS) & Wide area networks (WANS)
Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used? - Physical - Logical
Logical
Data is encoded into electrical impulses.
Metal wires within cables
Which connection physically connects the end device to the network? - Port - NIC - Interface
NIC
_____________________ is measured in the number of bits that can be transmitted in a single second, or bits per second (bps).
Network bandwidth
A NIC physically connects the end device to the network.
Network interface card (NIC)
__________________ splits traffic into packets that are routed over a shared network.
Packet switching
A single message, such as an email or a video stream, is broken into multiple message blocks, called ______________.
Packets
Which type of network topology lets you see the actual location of intermediary devices and cable installation? - Physical - Logical
Physical
A connector or outlet on a networking device that connect to an end device or another networking device.
Physical port
There are four primary types of clouds:
Public clouds, Private clouds, Hybrid clouds, and Community clouds
With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion? - fault tolerance - scalability - QoS - security
QoS
Which two devices are intermediary devices? - hosts - routers - servers - switches
Routers & switches
___________________ let you share resources, such as printers, documents, pictures, and music, among a few local end devices.
Simple home networks
________________ allow people to work from home, or a remote office. Many self-employed workers use these types of networks to advertise and sell products, order supplies, and communicate with customers.
Small office and home office (SOHO)
These are types of software which are installed on a user's device. The software then secretly collects information about the user.
Spyware and adware
________________is the largest network in existence.
The internet
A malicious person attacks user devices or network resources.
Threat actor attacks
These provide secure access into an organization for remote workers.
Virtual private networks (VPN)
These contain malicious software or code running on a user device.
Viruses, worms, and Trojan horses
Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider? - Extranet - Intranet - LAN - WAN
WAN
Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.
Zero-day attacks
Data ___________________ assures users of timely and reliable access to data services for authorized users.
availability
Available in various formats. A popular choice is Symmetric Digital Subscriber Line (SDSL) which is similar to the consumer version of but provides uploads and downloads at the same high speeds.
business DSL
_____________ have software for requesting and displaying the information obtained from the server, as shown in the figure.
clients
Which feature contains options such as Public, Private, Custom and Hybrid? - BYOD - video communications - cloud computing
cloud computing
Data ___________________ means that only the intended and authorized recipients can access and read data.
confidentiality
_____________ occurs when the demand for bandwidth exceeds the amount available.
congestion
The term host specifically refers to?
devices on the network that are assigned a number for communication purposes
Logical topology diagrams illustrate?
devices, ports, and the addressing scheme of the network
How to distinguish one end device from another?
each end device on a network has an address.
An organization may use an ________________ to provide secure and safe access to individuals who work for a different organization but require access to the organization's data.
extranet
Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture? - fault tolerance - scalability - QoS - security
fault tolerance
A _____________________ network is one that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs. These networks depend on multiple paths between the source and destination of a message. If one path fails, the messages are instantly sent over a different link. Having multiple paths to a destination is known as redundancy.
fault tolerence
Which option blocks unauthorized access to your network? - firewall - virus, worm, trojan horse - zero-day or zero-hour - virtual private network (VPN) - denial of service (DoS)
firewall
Which of the following is the name for all computers connected to a network that participate directly in network communication? - servers - intermediary devices - hosts - media
hosts
This attack steals the login credentials of a user in order to access private data.
identity theft
Data ________________ assures users that the information has not been altered in transmission, from origin to destination.
integrity
Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.
interface
_________________ connect the individual end devices to the network.
intermediary devices
______________ is a term often used to refer to a private connection of LANs and WANs that belongs to an organization. It is designed to be accessible only by the organization's members, employees, or others with authorization.
intranet
Sometimes known as Ethernet WAN. Extend LAN access technology into the WAN.
metro ethernet
Network administrators must address two types of network security concerns:
network infrastructure security and information security
A WAN is a?
network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a larger corporation or a telecommunications service provider
A LAN is a?
network infrastructure that provides access to users and end devices in a small geographical area
In small businesses and homes, many computers function as both the servers and clients on the network. This type of network is called a ____________________.
peer-to-peer network
Which feature is being used when connecting a device to the network using an electrical outlet? - smart home technology - powerline - wireless broadband
powerline
Having multiple paths to a destination is known as __________________.
redundancy
____________ generate and retransmit communication signals.
repeaters
Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? - fault tolerance - scalability - QoS - security
scalability
A ________________________ expands quickly to support new users and applications. It does this without degrading the performance of services that are being accessed by existing users.
scalable network
When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved? - fault tolerance - scalability - QoS - security
security
__________________ are computers with software that allow them to provide information, like email or web pages, to other end devices on the network.
servers
Physical topology diagrams illustrate?
the physical location of intermediary devices and cable installation
Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country? - BYOD - video communications - cloud computing
video communications
Which option creates a secure connection for remote workers? - firewall - virus, worm, trojan horse - zero-day or zero-hour - virtual private network (VPN) - denial of service (DoS)
virtual private network (VPN)
Which option describes malicious code running on user devices? - firewall - virus, worm, trojan horse - zero-day or zero-hour - virtual private network (VPN) - denial of service (DoS)
virus, worm, or trojan horse
Which feature uses the same cellular technology as a smart phone? - smart home technology - powerline - wireless broadband
wireless broadband
Which option describes a network attack that occurs on the first day that a vulnerability becomes known? - firewall - virus, worm, trojan horse - zero-day or zero-hour - virtual private network (VPN) - denial of service (DoS)
zero-day or zero-hour