CIS 3580 - Chapter 1 Study Guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What are common solutions to security threats?

- Antivirus and Anti-spyware - Firewall filtering - Dedicated firewall systems - Access control lists (ACL) - Intrusion prevention systems (IPS) - Virtual private networks (VPN)

What are the networking components?

- Client, Servers - Peer to Peer - End Devices - Intermediary Devices - Network Media

Networking Component, what it does, Advantages/Disadvantages: Client, Servers

- Clients are computers that send requests to the servers to retrieve information - Servers are computers that provide information to end devices

Clients

- Computers, such as users' personal computers, that use any of the services provided by servers. - A network device that accesses a service on another computer remotely threw a network*

Network Device representations and topologies: End Devices

- Desktop Computer - Laptop - Printer - IP Phone - Wireless Tablet - TelePresence Endpoint

Internet vs. Extranet vs. Intranet

- Internet: The internet is a worldwide collection of interconnected LANs and WANs - Extranet: An organization might use an extranet to provide secure access to their network for individuals who work for a different organization that need access to their data on their network. - Intranet: An intranet is a private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization.

What is a LAN or WAN? How are they different? Characteristics?

- LAN - is a network infrastructure that spans a small geographical area. It interconnects end devices in a limited area, it is administered by a single organization or individual, and it provides high-speed bandwidth to internal devices. - WAN - is a network infrastructure that spans a wide geographical area. It interconnects LANs over wide geographical areas, typically is administered by one or more service providers, and is typically providing lower speed links between LANs.

Difference between logical and physical topologies and what each one represents

- Physical topology diagrams illustrate the physical location of intermediary devices and cable installation. - Logical topology diagrams illustrate devices, ports, and the addressing scheme of the network.

Quality of Service (QoS)

- Policies that control how much bandwidth a protocol, PC, user, VLAN, or IP address may use. - A control mechanism that can provide different priorities to different users or data flows or guarantee a certain level of performance to a data flow in accordance with requests from the application program.

What are the different types of networks:

- Small Home Networks - Small Office/Home Office (SOHO) - Medium to Large Networks - World Wide Networks

When are the different types of networks used?

- Small Home Networks: connect a few computers to each other and the Internet - Small Office/Home Office: enables computer within a home or remote office to connect to a corporate network - Medium to Large Networks: many locations with hundreds or thousands of interconnected computers - World Wide Networks: connects hundreds of millions of computers world-wide, such as the internet

What are common types of EXTERNAL security threats?

- Viruses, worms, and trojan horses - Spyware and adware - Zero-day Attacks - Threat actor attacks - Denial-of-service attacks - Data interception and theft - Identity theft

Network Device representations and topologies: Network Media

- Wireless Media - LAN Media - WAN Media

Network Device representations and topologies: Intermediary Devices

- Wireless Router - LAN Switch - Router - Multilayer Switch - Firewall Appliance

Which device performs the function of determining the path that messages should take through internetworks? A) A router B) A Firewall C) A Web Server D) A DSL Modem

A A router is a device that interconnects multiple networks and is responsible for forwarding messages between them

Network Representations: Network Interface Card (NIC)

A NIC physically connects an end device to a network

What are two functions of end devices on a network? (Choose two) A) They originate the data that flows through the network B) They direct data over alternate paths in the event of a link failure C) They filter the flow of data to enhance security D) They are the interface between humans and the communications network E) They provide the channel over which the network message travels

A and D Users interface with a network using an end device. An end device is either the source or destination of a message transmitted over the network

Internet Service Provider (ISP)

A company that helps create the internet by providing connectivity to enterprises and individuals, as well as interconnecting to other ISPs to create connectivity to all other ISPs

Wide Area Networks (WANs)

A network infrastructure that provides access to other networks over a wise geographic area, which is typically owned and managed by a larger corporation or a telecommunications service provider.

Converged Data Networks

A network that aggregates various forms for traffic, such as, voice, video, and data, on the same network infrastructure.

Scalable Network

A network that can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users.

Fault Tolerant Network

A network that can recover from minor errors. A network that limits the number of devices affected by a failure

Network Representations: Physical Port

A port is a connector or an outlet on a networking device where a medium connects to an end device or another networking device

Extranet

A private network that uses Internet technologies to share business information with select corporate partners or key customers. Examples are: - A company that is providing access to outside supplies and contractors - A hospital that is providing a booking system to doctors so they can make appointments for their patients - A local education office that is providing budget and personnel information to the schools in its district

Network Representations: Interface

A specialized port on a networking device that connects to a network. Because routers connect networks, the ports on a router are referred to as network interfaces.

Internet

A worldwide collection of interconnected networks. Can also be viewed as a collection of interconnected LANs and WANs.

Small Office and Home office (SOHO) Networks

Allow people to work from home or a remote office. Many self-employed workers use these types of networks to advertise and sell products, order supplies, and communicate with customers

Common Types of Networks: SOHO Networks

Allows computers in a home office or a remote office to connect to a corporate network or access centralized, shared, resources

Cloud Computing

Allows us to store personal files - even back up an entire drive - on servers over the internet

Security Threats: Zero-day Attacks

Also called Zero-Hour attacks, these attacks occur on the first day that a vulnerability becomes known

Wireless Internet Service Provider (WISP)

An ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs).

Networking Component, what it does, Advantages/Disadvantages: End Devices

An end device is where a message originates from or where it is received. Data originates with an end device, flows through the network, and arrives at an end device. Some examples of end devices include Computers (work stations, laptops, file servers, web servers), Network printers, VoIP phones.

Dialup Telephone Connection

An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dialup modem connection is not sufficient for large data transfers, although it is useful for mobile access while traveling.

Networking Component, what it does, Advantages/Disadvantages: Intermediary Devices

An intermediary device interconnects end devices. Examples include switches, wireless access points, routers, and firewalls. Management of data as it flows through a network is also the role of an intermediary device, including: - Regenerate and retransmit data signals. - Maintain information about what pathways exist in the network. - Notify other devices of errors and communication failures.

Topology Diagram

Are mandatory documentation for anyone working with a network. Provides a visual map of how the network is connected. Two Types: - Physical - Logical

Business Internet Connections: Business DSL

Available in various formats. Provides high bandwidth, high availability, and an always-on connection to the internet. Runs over a telephone line.

What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users? A) Reliability B) Scalability C) Quality of Service D) Accessibility

B A scalable network expands quickly to support new users and applications

For which of the following would the use of a WISP be recommended? A) An internet café in a city B) A farm in a rural area without wired broadband access C) Any home with multiple wireless devices D) An apartment in a building with cable access to the internet

B A wireless internet service provider (WISP) is an ISP that connects subscribers to a designated access point or hotspot using wireless technologies similar to those in home wireless local-area networks (WLANs). WISPs are most commonly found in rural environments where DSL or cable services are not available

What type of network must a home user access in order to do online shopping? A) An intranet B) The Internet C) An Extranet D) A local area network

B The internet is the communications network for accessing ecommerce websites

Which two Internet connection options do not require that physical cables be run to the building? (Choose two.) A) DSL B) Cellular C) Satellite D) Dialup E) Dedicated leased line

B and C Cellular and satellite communications are wireless technologies that do not require physical cables

What are the two characteristics of a scalable network? (Choose Two) A) Easily overload with increased traffic B) Grows in size without impacting existing users C) Is not as reliable as a small network D) Suitable for modular devices that allow for expansion E) Offers limited number of applications

B and D A scalable network expands quickly to support new users and applications. It does this without degrading the performance of services that are being accessed by existing users. Scalability is typically required in networks with wireless and mobile devices, where the number of devices may increase at any time

What are the different types of internet connections?

Broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services.

What is an ISP? A) It is a standards body that develops cabling and wiring standards for networking B) It is a protocol that establishes how computers in a local network communicate C) It is an organization that enables individuals and businesses to connect to the internet D) It is a networking device that combines the functionality of several different networking devices in one

C Home users, remote workers, and small offices typically require a connection to an ISP (internet service provider) to access the internet

During a routine inspection, a technician discovered that software was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer? A) DoS Attack B) Identity Theft C) Spyware D) Zero-Day Attack

C Spyware us a type if software that is installed on a User's device to collect information about the user

What is the Internet? A) It is a network based on Ethernet Technology B) It provides network access for mobile devices C) It provides connections through interconnected global networks D) It is a private network for an organization with LAN and WAN connections

C The internet is a worldwide collection of interconnected networks (internetworks, or internet for short)

An employee wants to access the network of an organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network? A) ACL B) IPS C) VPN D) BYOD

C A virtual private network (VPN) provides secure access to an organization's network for remote workers

Which term refers to a network that provides secure access to the corporate offices for suppliers, customers, and collaborators? A) Internet B) Intranet C) Extranet D) Extended Net

C An organization may use an extranet to provide safe access to individuals who work for a different organization but require access to the organization's data

A large corporation has modified its network to allow users to access network resources from their personal laptops and smartphones. Which Networking trend does this describe? A) Cloud Computing B) Online Collaboration C) Bring Your Own Device (BYOD) D) Video Conferencing

C BYOD gives end users the freedom to use personal devices to access information and communicate across a business or campus network

Networking Component, what it does, Advantages/Disadvantages: Network Media

Communication across a network is carried through a medium which allows a message to travel from source to destination. Media types include metal wires within cables (uses electrical impulses), glass or plastic fibers within cables (uses pulses of light), and wireless transmission (Uses modulation of specific frequencies of electromagnetic waves.)

Server

Computers with software that allows them to provide information, such as email or web pages, to other end devices on the network

Satellite connection

Connection that provides limited high speed connections through a dish pointed in the sky. The availability of satellite internet access is a benefit in areas that would otherwise have no internet connectivity at all. A satellite dish must have a clear line of sight to the satellite.

Cloud Types: Community

Created for exclusive use by specific entities or organizations. The difference between public and community clouds are the functional needs that have been customized for the community. For example: healthcare organizations must remain compliant with policies and laws (such as HIPAA) that require special authentication and confidentiality. Community clouds are used by multiplue organizations that have similar needs and concerns. It is similar to a public cloud environment but with set levels of security, privacy, and even regulatory compliance, as in a private cloud.

A college is building a new dormitory on its campus. Workers are digging the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber-optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories experience only a very short interruption of network services. What characteristic of the network is described here? A) Quality of Service B) Scalability C) Security D) Fault Tolerance E) Integrity

D A fault-tolerant network limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs

How does BYOD change the way in which businesses implement networks?​ A) BYOD requires organizations to purchase laptops rather then desktops B) BYOD users are responsible for their own network security, thus reducing the need for organizational security policies C) BYOD devices are more expensive than devices that are purchased by an organization D) BYOD provides flexibility in where and how users can access network resources

D BYOD gives end users the freedom to use personal devices to access information and communicate across a business or campus network. The trend has been to allow employees access to internal network services and information from personal devices

Availability

Data Availability assures users of timely and reliable access to data and services for authorized users.

Integrity

Data Integrity assures users that the information has not been altered in transmission, from origin to destination

Confidentiality

Data confidentially means that only the intended and authorized recipients can access and read data

Network Media: Metal Wires within Cables

Data is encoded into electrical Impulses

Network Media: Glass or Plastic Fibers within Cables (Fiber-Optic Cable)

Data is encoded into pulses of light

Network Media: Wireless transmission

Data is encoded via modulation of specific frequencies of Electromagnetic waves

End Device

Either the source or the destination of a message transmitted over the network

Four basic characteristics of network architecture and how they are used to meet customer expectations.

Fault tolerance, Scalability, Quality of Service (QoS), and Security.

Security Solutions: Access control lists (ACL)

Further filter access and traffic forwarding based on IP Addresses and applications

Business Internet Connections: Asymmetrical DSL (ADSL)

Generally, small office and home office users connect using asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.

Bring Your Own Device (BYOD)

Gives end users the freedom to use personal tools to access information and communicate across a business or campus network

What are the four basic elements of a network?

Hardware, Software, Protocols, and the connection Medium

Security Solutions: Antivirus and Anti-spyware

Help to protect end devices from becoming infected with malicious software

Topology Diagrams: Logical

Illustrates devices, ports, and the addressing scheme of a network. You can see which end devices are connected to which intermediary Devices and what media are being used.

Topology Diagrams: Physical

Illustrates the physical locations of intermediary devices and cable installation. You can see that the rooms in which these are devices are located are labeled.

Security Threats: Threat actor attacks

In these attacks, malicious persons attack user devices or network resources

Cloud Types: Private

Intended for a specific organization or entity, such as a government. Can be set up using the organization's private network, although this can be expensive to build and maintain. Can also be managed by an outside organization with strict access security.

Business Internet Connections: Symmetric DSL (SDSL)

Is similar to the consumer version of DSL by provides uploads and downloads at the same high speeds

Networking Component, what it does, Advantages/Disadvantages: Peer to Peer

It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of network design is only recommended for very small networks. -Some advantages include, easy to set up, less complex, lower cost, and it's used for simple tasks: transferring files and sharing printers. -Some disadvantages include no centralized administration, not as secure, not as scalable, and slower performance.

Business Internet Connections: Dedicated leased lines

Leased lines are reserved circuits within a service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate.

Cloud Types: Public

Made available to the general population. Services may be free or offered on a pay-per-use model, such as paying for online storage. Uses the internet to provide services

Cloud Types: Hybrid

Made up of two or more clouds (for example: part private and part public), where each part remains a distint objective but the two are connected using a single architecture. Individuals on a hybrid cloud would be able to have degreed of access to various services based on user access rights.

Intranet

Often used to refer to a private connection of LANs and WANs that belong to an organization. Designed to be accessible only by the organization's members, employees, or others with authorization

Security Solutions: Dedicated firewall systems

Provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity

Digital Subscriber Line (DSL)

Provides high bandwidth, high availability, and an always-on connection to the internet. Runs over a telephone line. Generally, small office and home office users connect using asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.

Business Internet Connections: Satellite

Satellite service can provide a connection when a wired solution is not available

What are three elements of communication in technology

Sender, Receiver, and message

Common Types of Networks: Medium to Large Networks

Such those used by corporations or schools, can have many locations with hundreds or thousands of interconnected hosts

Topology

The arrangement of networking components or nodes. Examples include star, extended star, ring, and mesh.

Common Types of Networks: Worldwide Networks

The internet is a network of networks that connects hundreds of millions of computers worldwide

Security Threats: Denial-of-service attacks

These attacks slow or crash applications and processes on a network device

Security Threats: Viruses, worms, and trojan horses

These contain malicious software or code running on a user device

Security Solutions: Virtual private networks (VPN)

These networks provide secure access into an organization for remote workers

Security Solutions: Intrusion prevention systems (IPS)

These systems identify fast-spreading threats, such as zero-day or zero-hour attacks.

Security Threats: Spyware and adware

These types of software are installed on a user's device to secretly collect information about the user

Business Internet Connections: Metro Ethernet

This is sometimes known as Ethernet WAN. Can be used to extend LAN access technology into the WAN.

Security Threats: Data interception and theft

This type of attack involves capturing private information from an organization's network

Security Threats: Identity theft

This type of attack involves stealing the login credentials of a user in order to access private data

Wireless Broadband Service

This uses the same cellular technology used to access the Internet with a smart phone or tablet. An antenna is installed outside the house providing either wireless or wired connectivity for devices in the home.

Cellular Connection

Uses a cellphone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone or other device and the cell tower which is connected.

Home and Small office Internet Connections: Cable Connection

With this type of connection, typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. This connection type provides high-bandwidth, high availability, and an always-on connection to the internet.

Local Area Networks (LANs)

a Network infrastructure that provides access to users and end devices in a small geographical area. Typically used in a department within an enterprise, a home, or a small business network.

Security Solutions: Firewall filtering

blocks unauthorized access into and out of the network. May include a host-based firewall system that prevents unauthorized access to the end device or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network

Common Types of Networks: Small Home Networks

connect a few computers to each other and to the internet

Intermediary Devices

connect the individual end devices to the network and can connect multiple individual networks to form an internetwork

Powerline Networking

the connection of devices to the Internet through the use of existing electrical wiring to connect devices


Ensembles d'études connexes

NCLEX Pediatric Drugs, Integumentary, Sensory perception, NMNC 1110 EAQ 6: Pain, Clinical judgement-Adaptive Assessments (Nursing Concepts Online for RN 2.0, 2nd Edition), Chapter 13 fundies, Nursing Process PrepU (with explanations), Module 1 Exam,...

View Set

Chapter 42: Drug Therapy for Hyperthyroidism and Hypothyroidism

View Set

A Short History of the Middle Ages Chapter 1

View Set

ATR 4132 Quiz 1-4, Exam 2-3 Material Human Injuries

View Set

Oct. 13 - Sampling Distribution of X-Bar(Pt. 1; The Central Limit Theorem)

View Set