Chapter 1: Networking Today

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is a physical port?

A connector or outlet on a networking device where the media connects to an end device or another networking device.

The acronym _________ refers to the policy that allows employees to use their personal devices in the business office to access the network and other resources.

BYOD

Which two Internet connection options do not require that physical cables be run to the building? (Choose two.) A. DSL B. dedicated leased line C. dialup D. satellite E. cellular

D. satellite E. cellular

This attack captures private information from an organization's network.

Data interception and theft

These attacks slow or crash applications and processes on a network device.

Denial of service attacks

A __________ network is one that limits the number of affected devices during a failure

Fault tolerant

This attack steals the login credentials of a user in order to access private data.

Identity theft

What is an ISP?

It is an organization that enables individuals and businesses to connect to the Internet.

What is the Internet?

It provides connections through interconnected global networks.*

What are the two types of topology diagrams?

Physical Topologies Logical Topologies

________service can provide a connection when a wired solution is not available.

Satellite

Interface

Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.

These are types of software which are installed on a user's device. The software then secretly collects information about the user.

Spyware and adware

A malicious person attacks user devices or network resources.

Threat actor attacks

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

VPN

These contain malicious software or code running on a user device

Viruses, worms, and Trojan horses

What are the three types of network media?

Wireless media WAN media LAN media

What are examples of intermediary devices?

Wireless router, LAN switch, Firewall Appliances, router, multilayer switch

These occur on the first day that a vulnerability becomes known.

Zero-day attacks

What is an extranet?

a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

Which device performs the function of determining the path that messages should take through internetworks?

a router*

Which two Internet solutions provide an always-on, high-bandwidth connection to computers on a LAN? (Choose two.) cellular a. DSL b. satellite c. cable d. dial-up telephone

a. DSL* c. cable*

In which scenario would the use of a WISP be recommended? a. a farm in a rural area without wired broadband access b. any home with multiple wireless devices c. an apartment in a building with cable access to the Internet d. an Internet cafe in a city

a. a farm in a rural area without wired broadband access

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.) a. implementing a firewall b. installing a wireless network c. installing antivirus software d. implementing an intrusion detection system e. adding a dedicated intrusion prevention device

a. implementing a firewall* c. installing antivirus software*

Which statement describes a characteristic of cloud computing? a. A business can connect directly to the Internet without the use of an ISP. b. Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world. c. Devices can connect to the Internet through existing electrical wiring. d. Investment in new infrastructure is required in order to access the cloud.

b. Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.*

What type of network must a home user access in order to do online shopping? a. an intranet b. Internet c. an extraneta d. local area network

b. Internet

Which two statements about the relationship between LANs and WANs are true? (Choose two.) a. Both LANs and WANs connect end devices. b. WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices. c. LANs connect multiple WANs together. d. WANs must be publicly-owned, but LANs can be owned by either public or private entities. e. WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or individuals.

b. WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices.* e. WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or individuals.*

Which two statements describe intermediary devices? (Choose two.) a. Intermediary devices generate data content. b. Intermediary devices alter data content. c. Intermediary devices direct the path of the data. d. Intermediary devices connect individual hosts to the network. e. Intermediary devices initiate the encapsulation process.

c. Intermediary devices direct the path of the data. * d. Intermediary devices connect individual hosts to the network.*

What two criteria are used to help select a network medium from various network media? (Choose two.) a. the types of data that need to be prioritized b. the cost of the end devices utilized in the network c. the distance the selected medium can successfully carry a signal d. the number of intermediary devices installed in the network e. the environment where the selected medium is to be installed

c. the distance the selected medium can successfully carry a signal d. the number of intermediary devices installed in the network

A _________is capable of delivering voice, video, text, and graphics over the same communication channels.

converged network

What are two characteristics of a scalable network? (Choose two.) a. easily overloaded with increased traffic b. is not as reliable as a small network c. offers limited number of applications d. suitable for modular devices that allow for expansion e. grows in size without impacting existing users

d. suitable for modular devices that allow for expansion e. grows in size without impacting existing users

A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)

easy to create* lacks centralized administration * less cost to implement*

What are end devices? Examples.

is either the source or destination of a message transmitted over the network. EXAMPLES: computer, laptop, phone, printer

What is a Network Interface Card (NIC)

physically connects the end device to the network.

What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?

scalability


Ensembles d'études connexes

Entrepreneurship: Chapters 7 & 8

View Set

Garcia v. San Antonio Metro. Transit Authority

View Set

Fed Tax II - Chapter 3: The Corporate Income Tax

View Set

Positive and Negative Predictive Values

View Set

11 MKC1 CH-15 Price, the Only Revenue Generator

View Set

Checking a conscious and unconscious person

View Set

Medical Surgical Chapter 66 Critical Care

View Set

LearningCurve 4b. Infancy and Childhood

View Set

Social Studies: Philippine History

View Set

Ch 22: Assessment of the Integumentary System

View Set