Module 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What are the different network sizes?

- Small home networks - Small office and home networks - Medium to large networks - World wide networks

What is the four main criteria for choosing network media?

1) Distance 2) Environment media is being installed in 3) Amount of data & speed it must be transmitted 4) Cost

Three types of media used to interconnect devices?

1) Metal wires within cables 2) Glass or plastic fibers within cables 3) Wireless transmission

These further filter access and traffic forwarding based on IP addresses and applications.

Access control lists (ACL)

These applications help to protect end devices from becoming infected with malicious software.

Antivirus and antispyware

Basic security components for a home or small office network:

Antivirus and antispyware & Firewall filtering

Which feature describes using personal tools to access information and communicate across a business or campus network? - BYOD - video communications - cloud computing

BYOD

______________________ use networks to provide consolidation, storage, and access to information on network servers. Networks provide email, instant messaging, and collaboration among employees. Many organizations use their network's connection to the internet to provide products and services to customers.

Businesses and large organizations

In order to achieve the goals of network security, there are three primary requirements:

Confidentiality, integrity, & availability

Home and small office internet connections?

DSL, cable, cellular, satellite, dial-up telephone

This attack captures private information from an organization's network.

Data interception and theft

Reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. They are rented at a monthly or yearly rate.

Dedicated Leased Line

Businesses internet connections?

Dedicated Leased Line, metro ethernet, business DSL, satellite

These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.

Dedicated firewall systems

Larger networks and corporate networks use antivirus, antispyware, and firewall filtering, but they also have other security requirements:

Dedicated firewall systems, Access control lists (ACL), Intrusion prevention systems (IPS), Virtual private networks (VPN)

These attacks slow or crash applications and processes on a network device.

Denial of service attacks

Which attack slows down or crashes equipment and programs? - firewall - virus, worm, trojan horse - zero-day or zero-hour - virtual private network (VPN) - denial of service (DoS)

DoS

Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data? - Extranet - Intranet - LAN - WAN

Extranet

When data is encoded as pulses of light, which media is being used to transmit the data? - wireless - Fiber-optic cable - copper cable

Fiber-optic cable

Blocks unauthorized access into and out of the network.

Firewall filtering

Which connections are specialized ports on a networking device that connect to individual networks? - Port - NIC - Interface

Interface

These are organizations that were developed to help maintain the structure and standardization of internet protocols and processes?

Internet Engineering Task Force (IETF), Internet Corporation for Assigned Names and Numbers (ICANN), and the Internet Architecture Board (IAB), plus many others

An ______________ identifies the host and the network to which the host is attached.

Internet Protocol (IP) address

These identify fast-spreading threats, such as zero-day or zero-hour attacks.

Intrusion prevention systems (IPS)

A __________ is typically used in a department within an enterprise, a home, or a small business network.

LAN

Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business? - Extranet - Intranet - LAN - WAN

LAN

The two most common types of network infrastructures are _________________ & _________________.

Local area networks (LANS) & Wide area networks (WANS)

Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used? - Physical - Logical

Logical

Data is encoded into electrical impulses.

Metal wires within cables

Which connection physically connects the end device to the network? - Port - NIC - Interface

NIC

_____________________ is measured in the number of bits that can be transmitted in a single second, or bits per second (bps).

Network bandwidth

A NIC physically connects the end device to the network.

Network interface card (NIC)

__________________ splits traffic into packets that are routed over a shared network.

Packet switching

A single message, such as an email or a video stream, is broken into multiple message blocks, called ______________.

Packets

Which type of network topology lets you see the actual location of intermediary devices and cable installation? - Physical - Logical

Physical

A connector or outlet on a networking device that connect to an end device or another networking device.

Physical port

There are four primary types of clouds:

Public clouds, Private clouds, Hybrid clouds, and Community clouds

With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion? - fault tolerance - scalability - QoS - security

QoS

Which two devices are intermediary devices? - hosts - routers - servers - switches

Routers & switches

___________________ let you share resources, such as printers, documents, pictures, and music, among a few local end devices.

Simple home networks

________________ allow people to work from home, or a remote office. Many self-employed workers use these types of networks to advertise and sell products, order supplies, and communicate with customers.

Small office and home office (SOHO)

These are types of software which are installed on a user's device. The software then secretly collects information about the user.

Spyware and adware

________________is the largest network in existence.

The internet

A malicious person attacks user devices or network resources.

Threat actor attacks

These provide secure access into an organization for remote workers.

Virtual private networks (VPN)

These contain malicious software or code running on a user device.

Viruses, worms, and Trojan horses

Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider? - Extranet - Intranet - LAN - WAN

WAN

Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.

Zero-day attacks

Data ___________________ assures users of timely and reliable access to data services for authorized users.

availability

Available in various formats. A popular choice is Symmetric Digital Subscriber Line (SDSL) which is similar to the consumer version of but provides uploads and downloads at the same high speeds.

business DSL

_____________ have software for requesting and displaying the information obtained from the server, as shown in the figure.

clients

Which feature contains options such as Public, Private, Custom and Hybrid? - BYOD - video communications - cloud computing

cloud computing

Data ___________________ means that only the intended and authorized recipients can access and read data.

confidentiality

_____________ occurs when the demand for bandwidth exceeds the amount available.

congestion

The term host specifically refers to?

devices on the network that are assigned a number for communication purposes

Logical topology diagrams illustrate?

devices, ports, and the addressing scheme of the network

How to distinguish one end device from another?

each end device on a network has an address.

An organization may use an ________________ to provide secure and safe access to individuals who work for a different organization but require access to the organization's data.

extranet

Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture? - fault tolerance - scalability - QoS - security

fault tolerance

A _____________________ network is one that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs. These networks depend on multiple paths between the source and destination of a message. If one path fails, the messages are instantly sent over a different link. Having multiple paths to a destination is known as redundancy.

fault tolerence

Which option blocks unauthorized access to your network? - firewall - virus, worm, trojan horse - zero-day or zero-hour - virtual private network (VPN) - denial of service (DoS)

firewall

Which of the following is the name for all computers connected to a network that participate directly in network communication? - servers - intermediary devices - hosts - media

hosts

This attack steals the login credentials of a user in order to access private data.

identity theft

Data ________________ assures users that the information has not been altered in transmission, from origin to destination.

integrity

Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.

interface

_________________ connect the individual end devices to the network.

intermediary devices

______________ is a term often used to refer to a private connection of LANs and WANs that belongs to an organization. It is designed to be accessible only by the organization's members, employees, or others with authorization.

intranet

Sometimes known as Ethernet WAN. Extend LAN access technology into the WAN.

metro ethernet

Network administrators must address two types of network security concerns:

network infrastructure security and information security

A WAN is a?

network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a larger corporation or a telecommunications service provider

A LAN is a?

network infrastructure that provides access to users and end devices in a small geographical area

In small businesses and homes, many computers function as both the servers and clients on the network. This type of network is called a ____________________.

peer-to-peer network

Which feature is being used when connecting a device to the network using an electrical outlet? - smart home technology - powerline - wireless broadband

powerline

Having multiple paths to a destination is known as __________________.

redundancy

____________ generate and retransmit communication signals.

repeaters

Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? - fault tolerance - scalability - QoS - security

scalability

A ________________________ expands quickly to support new users and applications. It does this without degrading the performance of services that are being accessed by existing users.

scalable network

When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved? - fault tolerance - scalability - QoS - security

security

__________________ are computers with software that allow them to provide information, like email or web pages, to other end devices on the network.

servers

Physical topology diagrams illustrate?

the physical location of intermediary devices and cable installation

Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country? - BYOD - video communications - cloud computing

video communications

Which option creates a secure connection for remote workers? - firewall - virus, worm, trojan horse - zero-day or zero-hour - virtual private network (VPN) - denial of service (DoS)

virtual private network (VPN)

Which option describes malicious code running on user devices? - firewall - virus, worm, trojan horse - zero-day or zero-hour - virtual private network (VPN) - denial of service (DoS)

virus, worm, or trojan horse

Which feature uses the same cellular technology as a smart phone? - smart home technology - powerline - wireless broadband

wireless broadband

Which option describes a network attack that occurs on the first day that a vulnerability becomes known? - firewall - virus, worm, trojan horse - zero-day or zero-hour - virtual private network (VPN) - denial of service (DoS)

zero-day or zero-hour


Ensembles d'études connexes

NASM Corrective exercise specialist

View Set

Exercise 9 vertebral column and thorax review

View Set

Chapter 32 Quiz: Environmental Emergencies

View Set

Kapitel 3 - marked, udbud og efterspørgsel

View Set

Chapter 21 Blood Vessels and Circulation

View Set

Chapter 5: How Sociologists Do Research

View Set

Saunder's Comp Review NCLEX-PN Exam

View Set