Module 1 Networking Today CISCO 1 Networking Fundamentels

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Physical Port

A connector or outlet on a networking device where the media connects to an end device or another networking device.

Threat actor attacks

A malicious person attacks user devices or network resources.

Internet Protocol (IP) address

A numeric string that identifies a device on a network. identifies the host and the network to which the host is attached. This number identifies the host within a particular network.

Packets

A single message, such as an email or a video stream, is broken into multiple message blocks,

Zero-day attacks

Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.

Client Software

An example of client software is a web browser, like Chrome or FireFox. A single computer can also run multiple types of client software.

Dial-Up Telephone

An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is not sufficient for large data transfer, although it is useful for mobile access while traveling.

Which feature describes using personal tools to access information and communicate across a business or campus network?

BYOD

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?

BYOD(Bring your own device)

Dedicated Leased Line, Metro Ethernet, Business DSL, and Satellite are all examples of ___________

Business internet connections

Which feature contains options such as Public, Private, Custom and Hybrid?

Cloud computing

Wireless broadband

Computer technology. High speed internet. At least 10 times faster than modems.

Community clouds

Created for exclusive use by specific entities or organizations. functional needs that have been customized for the ______ . For example, healthcare organizations must remain compliant with policies and laws (e.g., HIPAA) that require special authentication and confidentiality. Used by multiple organizations that have similar needs and concerns. These are similar to a public cloud environment, but with set levels of security, privacy, and even regulatory compliance of a private cloud.

Metal wires within cables

Data is encoded into electrical impulses.

Glass or plastic fibers within cables (fiber-optic cable)

Data is encoded into pulses of light.

Wireless transmission

Data is encoded via modulation of specific frequencies of electromagnetic waves.

Which attack slows down or crashes equipment and programs?

Denial of Service (DoS)

Name the End Devices

Desktop computer, laptop, printer, IP Phone, Wireless Tablet, TelePresence Endpoint

DSL

Digital Subscriber Lines also provide high bandwidth, high availability, and an always-on connection to the internet. runs over a telephone line.

Four basic characteristics that network architects must address

Fault Tolerance, Scalability, Quality of Service (QoS), Security

Which option blocks unauthorized access to your network?

Firewall

Dedicated Leased Line

Leased lines are reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate.

With this type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion

QoS

cable, DSL, Cellular, Satellite, and Dial-up telephone are all examples of _____________

SOHO Internet Connections

Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?

Security

Interface

Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.

Satellite

The availability of this access is a benefit in those areas that would otherwise have no internet connectivity at all. Dishes require a clear line of sight to the satellite.

Antivirus and antispyware

These applications help to protect end devices from becoming infected with malicious software.

Spyware and adware

These are types of software which are installed on a user's device. The software then secretly collects information about the user.

Denial of service attacks

These attacks slow or crash applications and processes on a network device.

Viruses, worms, and Trojan horses

These contain malicious software or code running on a user device.

Access control lists (ACL)

These further filter access and traffic forwarding based on IP addresses and applications.

Intrusion prevention systems (IPS)

These identify fast-spreading threats, such as zero-day or zero-hour attacks.

Dedicated firewall systems

These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.

Virtual private networks (VPN)

These provide secure access into an organization for remote workers.

Data interception and theft

This attack captures private information from an organization's network.

Identity theft

This attack steals the login credentials of a user in order to access private data.

Metro Ethernet

This is sometimes known as Ethernet WAN. extends LAN access technology into the WAN. Ethernet is a LAN technology you will learn about in a later module.

Cable internet connection

Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.

Media

What communication transmits across a network, provides the channel over which the message travels from source to destination.

Scalability

When designers follow accepted standards and protocols,

Which feature uses the same cellular technology as a smart phone?

Wireless broadband

What are some intermediary devices?

Wireless router, LAN switch, Router, Multilayer switch, Firewall Appliance

Intermediary Device Categories

Wireless routers, Multi Layers Switch, LAN Switch

Which option describes a network attack that occurs on the first day that a vulnerability becomes known?

Zero-day or Zero-hour

In which scenario would the use of a WISP be recommended?

a farm in a rural area without wired broadband access

WAN

a network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a larger corporation or a telecommunications service provider.

LAN

a network infrastructure that provides access to users and end devices in a small geographical area. typically used in a department within an enterprise, a home, or a small business network

Quality of Service(QOS)

a primary mechanism for managing congestion and ensuring reliable delivery of content to all users.

Topology Diagram

a visual map of how the network is connected. There are two types: physical and logical.

Internet

a worldwide collection of interconnected networks (internetworks)

small office/home office (SOHO) network

allows computers in a home office or a remote office to connect to a corporate network, or access centralized, shared resources.

Cloud computing

allows us to store personal files, even backup an entire drive on servers over the internet. Applications such as word processing and photo editing can be accessed using this

Wireless Internet Service Provider (WISP)

an ISP that connects subscribers to a designated access point or hotspot using similar wireless technologies found in home wireless local area networks (WLANs). more commonly found in rural environments where DSL or cable services are not available.

Internet Service Provider(ISP)

an organization that provides access to the internet for businesses and individuals

BYOD(Bring your own device)

any device, with any ownership, used anywhere. enables end users the freedom to use personal tools to access information and communicate across a business or campus network.

Availability

assures users of timely and reliable access to data services for authorized users.

Integrity

assures users that the information has not been altered in transmission, from origin to destination.

Business DSL

available in various formats. A popular choice is Symmetric Digital Subscriber Line (SDSL) which is similar to the consumer version of DSL but provides uploads and downloads at the same high speeds.

Business Satellite

can provide a connection when a wired solution is not available.

Public clouds

clouds made available to the general population. Services may be free or are offered on a pay-per-use model, such as paying for online storage. uses the internet to provide services.

Servers

computers with software that allow them to provide information, like email or web pages, to other end devices on the network. Each service requires separate software.

Intermediary devices

connect the individual end devices to the network. They can connect multiple individual networks to form an internetwork. These devices provide connectivity and ensure that data flows across the network.

What can WANs connect through?

copper wires, fiber-optic cables, and wireless transmissions

hosts

devices on the network that are assigned a number for communication purposes. All computers that are connected to a network and participate directly in network communication. Can be called end devices

End device

either the source or destination of a message transmitted over the network

A scalable network

expands quickly to support new users and applications.

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

extranet

Data centers

facilities used to house computer systems and associated components.

Redundancy is an example of which characteristic of network architecture?

fault tolerance

Redundancy

having multiple paths to a destination

Logical topology diagrams-

illustrate devices, ports, and the addressing scheme of the network, see which end devices are connected to which intermediary devices and what media is being used.

Physical topology diagrams

illustrate the physical location of intermediary devices and cable installation, you can see that the rooms in which these devices are located are labeled in this

Smart home technology

integrates into every-day appliances, which can then connect with other devices to make the appliances more 'smart' or automated.

Private clouds

intended for a specific organization or entity, such as a government. can be set up using the organization's private network, though this can be expensive to build and maintain. can also be managed by an outside organization with strict access security.

Hybrid clouds

made up of two or more clouds (example: part private, part public), where each part remains a distinct object, but both are connected using a single architecture. Individuals on this cloud would be able to have degrees of access to various services based on user access rights.

Peer-to-peer Network

many computers function as the servers and clients on the network

Confidentiality

means that only the intended and authorized recipients can access and read data.

Congestion

occurs when the demand for bandwidth exceeds the amount available.

fault tolerant network

one that limits the number of affected devices during a failure.

Network Interface Card (NIC)

physically connects the end device to the network.

Network Infrastructure Security

physically securing devices that provide network connectivity and preventing unauthorized access to the management software that resides on them

Which feature is being used when connecting a device to the network using an electrical outlet?

powerline

Firewall filtering

prevents unauthorized access into and out of the network. This may include a host-based firewall system that prevents unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network.

Information Security

protects the information contained within the packets being transmitted over the network and the information stored on network-attached devices.

extranet

provides secure and safe access to individuals who work for a different organization but require access to the organization's data.

What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?

scalability

Packet switching

splits traffic into packets that are routed over a shared network.

Collaboration

the act of working with another or others on a joint project

How is Network Bandwidth measured?

the number of bits that can be transmitted in a single second, or bits per second (bps).

Network Architecture

the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.

Intranet

used to refer to a private connection of LANs and WANs that belongs to an organization. designed to be accessible only by the organization's members, employees, or others with authorization.

Cellular

uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected.

Powerline Networking

uses existing electrical wiring to connect devices, using the same wiring that delivers electricity, this type of networking sends information by sending data on certain frequencies.

A multilayer switch

what is the device in the middle called?


Kaugnay na mga set ng pag-aaral

Physics First H(Vining) - Semester 1 Final Study Guide

View Set

BEM 251 (MIS) MIDTERM (Lectures 2-6; Austin)

View Set

Data Collection, Behavior, and Decisions

View Set

The Cardiovascular System (Chapter 6)

View Set