Cisco Chapter 1 Intro to Networks

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

This attack steals the login credentials of a user in order to access private data. A. Spyware and Adware B. Threat actor attacks C. Viruses, Worms, and Trojan horses D. Zero-day attacks E. Denial of service attacks F. Identity Theft G.Data interception and theft

F. Identity Theft

These provide secure access into an organization for remote workers. A. antivirus and antispyware B. Firewall filtering C. Dedicated firewall systems D. Access control lists (ACL) E. Intrusion prevention systems (IPS) F. Virtual private networks (VPN)

F. Virtual private networks (VPN)

What do intermediate devices do?

- Connect the individual (end devices) to the network. - They can connect multiple individual networks to form an Internetwork.

What are the criteria to consider when choosing network media?

- What is the maximum distance that the media can successfully carry a signal - What is the environment in which the media will be installed - What is the amount of data and at what speed must it transmitted - What is the cost of the media and installation

What are 5 intermediary devices?

- Wireless Router - Lan switch - Router - Multilayer Switch - Firewall Appliance

What are the advantages to having peer to peer networking?

- easy to setup -less complex -lower cost because network devices and dedicated servers many not be required -Can be used for simple tasks such as transferring files and sharing printers.

What are the disadvantages to having peer to peer networking?

-No centralized admin -Not as secure -Not scalable -All devices may act as both clients and server which can slow their performance.

Modern networks primarily use three types of media to interconnect devices, what are they?

1. Metal wires within cables- data is encoded into electrical impulses 2. Glass or plastic fibers within cables (fiber-optics) - Data is encoded into pulses of light. 3. Wireless transmission - Data is encoded via modulation of specific frequencies of electromagnetic waves.

LAN (Local Area Network)

A _____________ Is a network infrastructure that provides access to users and end devices in a small geographical area and is also typically used in a department within an enterprise, a home, or a small business network

WAN (Wide Area Network)

A _____________ is a network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a larger corporation or a telecommunications service provider.

Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet. A. Cable B. Satellite C. Cellular D. Dial - up Telephone

A. Cable

________________ are reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate. A. Dedicated Leased Line B. Metro Ethernet C. Business DSL D. Satellite

A. Dedicated Leased Line

Which type of network topology lets you see the actual location of intermediary devices and cable installation? A. Physical Topology B. Logical Topology

A. Physical Topology

Cloud-based applications and services offered in a _________________ are made available to the general population. Services may be free or are offered on a pay-per-use model, such as paying for online storage. The public cloud uses the internet to provide services. A. Public clouds B. Private clouds C. Hybrid clouds D. Community clouds

A. Public Clouds

These are types of software which are installed on a user's device. The software then secretly collects information about the user. A. Spyware and Adware B. Threat actor attacks C. Viruses, Worms, and Trojan horses D. Zero-day attacks E. Denial of service attacks F. Identity Theft G.Data interception and theft

A. Spyware and Adware

These applications help to protect end devices from becoming infected with malicious software. A. antivirus and antispyware B. Firewall filtering C. Dedicated firewall systems D. Access control lists (ACL) E. Intrusion prevention systems (IPS) F. Virtual private networks (VPN)

A. antivirus and antispyware

Extranet

An organization may use an ________________ to provide secure and safe access to individuals who work for a different organization but require access to the organization's data.

When data is encoded as pulses of light, which media is being used to transmit the data? A. Wirelss B. Fiber-optic cable C. Copper cable

B. Fiber-optic cable

_______________ blocks unauthorized access into and out of the network. This may include a host-based firewall system that prevents unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network. A. antivirus and antispyware B. Firewall filtering C. Dedicated firewall systems D. Access control lists (ACL) E. Intrusion prevention systems (IPS) F. Virtual private networks (VPN)

B. Firewall filtering

Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used? A. Physical Topology B. Logical Topology

B. Logical Topology

This is sometimes known as Ethernet WAN. In this module, we will refer to it as ______________ and they extend LAN access technology into the WAN. A. Dedicated Leased Line B. Metro Ethernet C. Business DSL D. Satellite

B. Metro Ethernet

Which connection physically connects the end device to the network? A. Port B. NIC C. Interface

B. NIC

Cloud-based applications and services offered in a ________________ are intended for a specific organization or entity, such as a government. A private cloud can be set up using the organization's private network, though this can be expensive to build and maintain. A private cloud can also be managed by an outside organization with strict access security. A. Public clouds B. Private clouds C. Hybrid clouds D. Community clouds

B. Private Cloud

Which two devices are intermediary devices? (Choose two) A. Hosts B. Routers C. Servers D. Switches

B. Routers D. Switches

Internet access is a benefit in those areas that would otherwise have no internet connectivity at all. Uses dishes and requires a clear line of sight to the satellite. A. Cable B. Satellite C. Cellular D. Dial - up Telephone

B. Satellite

A malicious person attacks user devices or network resources. A. Spyware and Adware B. Threat actor attacks C. Viruses, Worms, and Trojan horses D. Zero-day attacks E. Denial of service attacks F. Identity Theft G.Data interception and theft

B. Threat actor attacks

__________________________ is available in various formats. A popular choice is Symmetric Digital Subscriber Line (SDSL) which is similar to the consumer version of DSL but provides uploads and downloads at the same high speeds. A. Dedicated Leased Line B. Metro Ethernet C. Business DSL D. Satellite

C. Business DSL

Internet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected. A. Cable B. Satellite C. Cellular D. Dial - up Telephone

C. Cellular

Provides high bandwidth, high availability, and an always-on connection to the internet, and runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed. A. Cable B. Satellite C. DSL D. Dial - up Telephone

C. DSL

These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity. A. antivirus and antispyware B. Firewall filtering C. Dedicated firewall systems D. Access control lists (ACL) E. Intrusion prevention systems (IPS) F. Virtual private networks (VPN)

C. Dedicated firewall systems

Which of the following is the name for all computers connected to a network that participate directly in network communication? A. Servers B. Intermediary devices C. Hosts D. Media

C. Hosts

A ___________ is made up of two or more clouds (example: part private, part public), where each part remains a distinct object, but both are connected using a single architecture. Individuals on a hybrid cloud would be able to have degrees of access to various services based on user access rights. A. Public clouds B. Private clouds C. Hybrid clouds D. Community clouds

C. Hybrid Clouds

Which connections are specialized ports on a networking device that connect to individual networks? A. Port B. NIC C. Interface

C. Interface

These contain malicious software or code running on a user device. A. Spyware and Adware B. Threat actor attacks C. Viruses, Worms, and Trojan horses D. Zero-day attacks E. Denial of service attacks F. Identity Theft G.Data interception and theft

C. Viruses, worms and Trojan horses

These further filter access and traffic forwarding based on IP addresses and applications. A. antivirus and antispyware B. Firewall filtering C. Dedicated firewall systems D. Access control lists (ACL) E. Intrusion prevention systems (IPS) F. Virtual private networks (VPN)

D. Access control lists (ACL)

A community cloud is created for exclusive use by specific entities or organizations. The differences between public clouds and community clouds are the functional needs that have been customized for the community. For example, healthcare organizations must remain compliant with policies and laws (e.g., HIPAA) that require special authentication and confidentiality. _____________________ are used by multiple organizations that have similar needs and concerns. Community clouds are similar to a public cloud environment, but with set levels of security, privacy, and even regulatory compliance of a private cloud. A. Public clouds B. Private clouds C. Hybrid clouds D. Community clouds

D. Community Clouds

An inexpensive option that uses any phone line and a modem. The low bandwidth provided by this modem connection is not sufficient for large data transfer, although it is useful for mobile access while traveling. A. Cable B. Satellite C. Cellular D. Dial - up Telephone

D. Dial - up Telephone

____________ can provide a connection when a wired solution is not available. A. Dedicated Leased Line B. Metro Ethernet C. Business DSL D. Satellite

D. Satellite

Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known. A. Spyware and Adware B. Threat actor attacks C. Viruses, Worms, and Trojan horses D. Zero-day attacks E. Denial of service attacks F. Identity Theft G.Data interception and theft

D. Zero-day attacks

These attacks slow or crash applications and processes on a network device. A. Spyware and Adware B. Threat actor attacks C. Viruses, Worms, and Trojan horses D. Zero-day attacks E. Denial of service attacks F. Identity Theft G.Data interception and theft

E. Denial of service attacks

These identify fast-spreading threats, such as zero-day or zero-hour attacks. A. antivirus and antispyware B. Firewall filtering C. Dedicated firewall systems D. Access control lists (ACL) E. Intrusion prevention systems (IPS) F. Virtual private networks (VPN)

E. Intrusion prevention systems (IPS)

What are the 3 most common types of server software?

Email web File

This attack captures private information from an organization's network. A. Spyware and Adware B. Threat actor attacks C. Viruses, Worms, and Trojan horses D. Zero-day attacks E. Denial of service attacks F. Identity Theft G.Data interception and theft

G.Data interception and theft

Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as__________________________.

Interface OR network Interface

A __________________ physically connects the end device to the network.

NIC (network interface card)

A connector or outlet on a networking device where the media connects to an end device or another networking device.

Physical Port

What does email server software do?

The email server runs email server software. Clients use mail client software, such as Microsoft Outlook, to access email on the server.

What does File server software do?

The file server stores corporate and user files in a central location. The client devices access these files with client software such as the Windows File Explorer.

What does Web server software do?

The web server runs web server software. Clients use browser software, such as Windows Internet Explorer, to access web pages on the server.

Intranet

_________________ is a term often used to refer to a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorization.

A "picture" of a network is called what?

topology diagram

Digital Subscriber Line

what does DSL stand for?


Ensembles d'études connexes

ABC 3.1 Electrical (404 - Switches)

View Set

System Analysis And Design (Chap 7-9)

View Set

lecture 10: invasive physiological research methods (animals)

View Set

Abeka 5th Grade, History Quiz 1 ( Ch. 1; Geog. Facts 1)

View Set

Chapter 63 Care of Patients with Problems of the Thyroid and Parathyroid Glands

View Set