Unit 1 and Unit 2 Cisco Networking

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Virus or malware protection

By default, Windows uses Windows Defender. Windows Defender provides a suite of protection tools built into the system. If Windows Defender is turned off, the system becomes more vulnerable to attacks and malware.

What is the difference between the command line and PowerShell on Windows?

CLI: Can be used to run programs, navigate the file system, and manage files and folders. Batch files can be created to execute multiple commands in succession (like a script). CLI cannot work with the core of Windows, or the GUI. PowerShell: Can be used to create scripts to automate tasks, that CLI can not do.

Metro Ethernet

A WAN technology that sends Ethernet traffic across MAN connections.

Hardware Abstraction Layer (HAL)

A component of the Windows operating system that resides in a file and is loaded into memory during the kernel loading phase of the Windows startup. (10)

Interface

A connector or outlet on a networking device where the media connects to an end device or another networking device.

Physical Port

A connector or outlet on a networking device where the media is connected to an end device or another networking device.

Peer-to-peer

A controller network that simply connects computers to each other or to a device such as a printer, but a server is not necessary

End Devices

A device that is either the source or the destination of a packet on a network.

Internet

A global network connecting millions of computers, making it possible to exchange information.

What is the Windows registry?

A large database where information about the hardware, applications, user and systems settings is stored.

Protocol Interaction

A message sent over a computer network typically requires the use of several protocols, each one with its own functions and format. The figure shows some common network protocols that are used when a device sends a request to a web server for its web page

DHCP (Dynamic Host Configuration Protocol)

A network service that provides automatic assignment of IP addresses and other TCP /IP configuration information.

Windows Firewall

A personal firewall that protects a computer from intrusion and is automatically configured when you set your network location in the Network and Sharing Center.

Extranet

A private electronic network that links a company with its suppliers and customers

What is multiplexing?

A process in which multiple digital data streams are combined into one signal

CCNA (Cisco Certified Network Associate)

A professional certification that attests to one's skills in installing, configuring, maintaining, and troubleshooting medium-sized networks that use Cisco Systems' switches and routers.

Internet Protocol (IP)

A set of rules responsible for disassembling, delivering, and reassembling packets over the Internet.

Microsoft Disk Operating System (MS-DOS)

A single-user, single-task operating system created by Microsoft and was the first widely installed operating system in personal computers.

What is an ADS? (Write out acronym and take notes on how this works.)

Alternate Data Streams: File attribute in NTFS file systems, such as $DATA, known as a data stream

Which feature contains options such as Public, Private, Custom and Hybrid?

Cloud computing

Network Media

Communication across a network is carried on a medium. Copper, Fiber-optic, and wireless.

What is a converged network?

Converged networks can deliver data, voice, and video between multiple devices over the same network.

Which two protocols are service discovery protocols? (Choose two.)

DNS, DHCP

Which two protocols belong in the TCP/IP model application layer?

DNS, DHCP

Which attack slows down or crashes equipment and programs?

Denial of Service

Message Delivery Option

Network Network communications has similar delivery options to communicate. As shown in the figure, there three types of data communications include: Unicast - Information is being transmitted to a single end device. Multicast - Information is being transmitted to a one or more end devices. Broadcast - Information is being transmitted to all end devices.

Network Protocol Functions

Network communication protocols are responsible for a variety of functions necessary for network communications between end devices. For example, in the figure how does the computer send a message, across several network devices, to the server?

Define the phrase network protocol.

Network communication standard used to define a method of exchange data over a computer network.

Node Icon

Networking documents and topologies often represent networking and end devices using a node icon. Nodes are typically represented as a circle. The figure shows a comparison of the three different delivery options using node icons instead of computer icons. The figure uses circles representing network nodes to illustrate the three different message delivery options. There are three topologies shown from left to right. The topology on the left depicts a unicast message and consists of one red node, one green node, and four yellow nodes. It has an arrow from the red node leading to the green node. The middle topology depicts a multicast message and consists of one red node, three green nodes, and two yellow nodes. It has an arrow from the red node leading to each of the green nodes. The topology on the right depicts a broadcast. It has one red node and five green nodes. It has an arrow from the red node leading to each of the green nodes.

Traditional Separate Networks

Each network had its own set of rules and standards to ensure successful communication. Multiple services ran on multiple networks.

What is the process of converting information into the proper form for transmission?

Encoding

Which protocol operates at the network access layer of the TCP/IP model?

Ethernet

Which three are components of message timing?

Flow control, Access method, response timeout

Which two protocols function at the internet layer? (Choose two.)

ICMP, IP

Which of the following are protocols that provide feedback from the destination host to the source host regarding errors in packet delivery? (Choose two.)

ICMPv4, ICMPv6

Which standards organization oversees development of wireless LAN standards?

IEEE

A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the next to be processed by the receiving device?

IP at the internet layer

Logical topology diagrams

Identify devices, ports, and addressing scheme.

Physical topology diagrams

Identify the physical location of intermediary devices and cable installation.

To change the file path, you can use a simple cd command. Type cd\ What happened?

It changed the directory to C:_

Which statement correctly describes frame encoding?

It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits

What is one advantage of using fiber optic cabling rather than copper cabling?

It is able to carry signals much farther than copper cabling

What is an ISP?

It is an organization that enables individuals and businesses to connect to the Internet.

What is done to an IP packet before it is transmitted over the physical medium?

It is encapsulated in a Layer 2 frame

Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business?

LAN

Dedicated Leased Line

Leased lines are actually reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.

What is the difference between a local user and a domain user on Windows?

Local User: Is a user account that stores settings, permissions file locations, and other user data. Domain User: Is a network domain used to set permissions. All the users groups, computers, peripherals and security settings, and stored and controlled by a database. These databases are stored on domain controller computers. All computers on the domain have to authenticate, and get security settings

What is the difference between logical and physical addressing?

Logical addressing is used to deliver the IP packet from the original source to the final destination. Physical addresses are unique to a specified address.

Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used?

Logical topology

Network protocol requirements

Message encoding Message formatting and encapsulation Message size Message timing Message delivery options

message source (sender)

Message sources are people, or electronic devices, that need to send a message to other individuals or devices.

The OSI reference model provides an extensive list of functions and services that can occur at each layer.

OSI Model LayerDescription7 - ApplicationThe application layer contains protocols used for process-to-process communications.6 - PresentationThe presentation layer provides for common representation of the data transferred between application layer services.5 - SessionThe session layer provides services to the presentation layer to organize its dialogue and to manage data exchange.4 - TransportThe transport layer defines services to segment, transfer, and reassemble the data for individual communications between the end devices.3 - NetworkThe network layer provides services to exchange the individual pieces of data over the network between identified end devices.2 - Data LinkThe data link layer protocols describe methods for exchanging data frames between devices over a common media1 - PhysicalThe physical layer protocols describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for a bit transmission to and from a network device.

What are the main differences between a packet-switched and circuit-switched network?

Packet switched network splits traffic into packets that our routed over a shared network. Circuit switched network has a dedicated physical circuit path between the sender, and receiver. Circuit switched networks are typically used by telephone company networks.

Which type of network topology lets you see the actual location of intermediary devices and cable installation?

Physical topology

Which feature is being used when connecting a device to the network using an electrical outlet?

Powerline

Message Encoding

Preparing the information to be communicated and putting it in the correct format

Service Discovery Protocols

Protocols are used for the automatic detection of devices or services. Examples of service discovery protocols include Dynamic Host Configuration Protocol (DHCP) which discovers services for IP address allocation, and Domain Name System (DNS) which is used to perform name-to-IP address translation.

Routing Protocols

Protocols enable routers to exchange route information, compare path information, and then to select the best path to the destination network. Examples of routing protocols include Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP).

Network Communications Protocols

Protocols enable two or more devices to communicate over one or more networks. The Ethernet family of technologies involves a variety of protocols such as IP, Transmission Control Protocol (TCP), HyperText Transfer Protocol (HTTP), and many more.

Network Security Protocols

Protocols secure data to provide authentication, data integrity, and data encryption. Examples of secure protocols include Secure Shell (SSH), Secure Sockets Layer (SSL), and Transport Layer Security (TLS).

With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?

QOS

Quality of Service (QoS)

Refers to the capability of a network to provide better service to selected network traffic over various technologies, New applications available to users over networks, such as voice and live video transmissions, create higher expectations for the quality of the delivered services.

Which services are provided by the internet layer of the TCP/IP protocol suite? (Choose three.)

Routing protocols, Messaging, Internet Protocol

When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved?

Scalability

Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?

Security

Wide Area Network (WAN)

Spans a large geographic area such as a state, province, or country

This protocol is responsible for guaranteeing the reliable delivery of information.

TCP

SSH (Secure Shell)

TCP 22 UDP 22

The TCP/IP protocol model for internetwork communications was created in the early 1970s and is sometimes referred to as the internet model. This type of model closely matches the structure of a particular protocol suite. The TCP/IP model is a protocol model because it describes the functions that occur at each layer of protocols within the TCP/IP suite. TCP/IP is also used as a reference model. The table shows details about each layer of the OSI model. TCP/IP Model LayerDescription4 - ApplicationRepresents data to the user, plus encoding and dialog control.3 - TransportSupports communication between various devices across diverse networks.2 - InternetDetermines the best path through the network.1 - Network AccessControls the hardware devices and media that make up the network.

TCP/IP Model LayerDescription4 - ApplicationRepresents data to the user, plus encoding and dialog control.3 - TransportSupports communication between various devices across diverse networks.2 - InternetDetermines the best path through the network.1 - Network AccessControls the hardware devices and media that make up the network. The definitions of the standard and the TCP/IP protocols are discussed in a public forum and defined in a publicly available set of IETF RFCs. An RFC is authored by networking engineers and sent to other IETF members for comments.

Describe the ARP (address resolution protocol) process noting why this is important

The ARP provides dynamic address mapping between an IPv4 address and a hardware address. Used for the source host to determine the destination MAC address. Important because it tells how to send packets over a router.

DNS (Domain Name System)

The Internet's system for converting alphabetic names into numeric IP addresses.

7 - Application

The application layer contains protocols used for process-to-process communications.

2 - Data Link

The data link layer protocols describe methods for exchanging data frames between devices over a common media

A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?

The end-user device needs mobility when connecting to the network

3 - Network

The network layer provides services to exchange the individual pieces of data over the network between identified end devices.

1 - Physical

The physical layer protocols describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for a bit transmission to and from a network device.

6 - Presentation

The presentation layer provides for common representation of the data transferred between application layer services.

Which type of communication will send a message to a group of host destinations simultaneously?

multicast

A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

physical layer

Bring Your Own Device (BYOD)

policy allows employees to use their personal mobile devices and computers to access enterprise data and applications

What is the general term that is used to describe a piece of data at any layer of a networking model?

protocol data unit

TCP (Transmission Control Protocol)

provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.

What is the purpose of protocols in data communications?

providing the rules required for a specific type of communication to occur

Scalability

refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.

What type of cable is used to connect a workstation serial port to a Cisco router console port?

rollover

Which two devices are intermediary devices? (Choose two)

routers, switches

BGP and OSPF are examples of which type of protocol?

routing

What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?

scalability

What is the PDU associated with the transport layer?

segment

What is the process of dividing a large data stream into smaller pieces prior to transmission?

segmentation

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

spyware

Which type of UTP cable is used to connect a PC to a switch port?

straight-through

What is used to determine the network portion of an IPv4 address?

subnet mask

shutdown

t is always best to perform a proper shutdown to turn off the computer. Files that are left open, services that are closed out of order, and applications that hang can all be damaged if the power is turned off without first informing the operating system. The computer needs time to close each application, shut down each service, and record any configuration changes before power is lost.

What is the definition of bandwidth?

the amount of data that can flow from one place to another in a given amount of time

Powerline Networking

the connection of devices to the Internet through the use of existing electrical wiring

Which characteristic describes crosstalk?

the distortion of the transmitted messages from signals carried in adjacent wires

What is indicated by the term throughput?

the measure of the bits transferred across the media over a given period of time

A wireless LAN is being deployed inside the new one room office that is occupied by the park ranger. The office is located at the highest part of the national park. After network testing is complete, the technicians report that the wireless LAN signal is occasionally affected by some type of interference. What is a possible cause of the signal distortion?

the microwave oven

HTTP (Hypertext Transfer Protocol)

the protocol used for transmitting web pages over the Internet

Which of these is a measure of the transfer of bits across the media?

throughput

In computer communication, what is the purpose of message encoding?

to convert information to the appropriate form for transmission

What is the purpose of the sequencing function in network communication?

to uniquely label transmitted segments of data for proper reassembly by the receiver

What is the purpose of the OSI physical layer?

transmitting bits across the local media

UDP and TCP belong to which layer of the TCP/IP protocol?

transport

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?

transport

Which procedure is used to reduce the effect of crosstalk in copper cables?

twisting opposing circuit wire pairs together

Which media uses patterns of microwaves to represent bits?

wireless

User mode and kernel mode

The two separate modes of operating in a system are

Why are two strands of fiber used for a single fiber optic connection?

They allow for full-duplex connectivity

After packets are segmented and multiplexed, how can they be reassembled?

They are reassembled using sequencing where each segment of a message is labeled based on the order it will need to be assembled.

Why is the Internet called open standards if we have standards and protocols?

They have open standards to encourage interoperability, competition, and innovation. No single company can have a monopoly or unfair competitive advantage. These standards are made available to the public and are developed and maintained by a collaborative consensus process. Open standards encourages data exchanges among different products and services and are intended for widespread adoption.

What are two functions of end devices on a network?

They originate the data that flows through the network, they are the interface between humans and the communication network

Hierarchical File System (HFS)

This file system is used on MAC OS X computers and allows much longer filenames, file sizes, and partition sizes than previous file systems. Although it is not supported by Windows without special software, Windows is able to read data from HFS+ partitions.

Application Interface

This function contains information used for process-to-process communications between network applications. For example, when accessing a web page, HTTP or HTTPS protocols are used to communicate between the client and server web processes.

Flow control

This function ensures that data flows at an efficient rate between two communicating devices. TCP provides flow control services.

Error Detection

This function is used to determine if data became corrupted during transmission. Various protocols that provide error detection include Ethernet, IPv4, IPv6, and TCP.

Reliability

This function provides guaranteed delivery mechanisms in case messages are lost or corrupted in transit. TCP provides guaranteed delivery.

Sequencing

This function uniquely labels each transmitted segment of data. The receiving device uses the sequencing information to reassemble the information correctly. This is useful if the data segments are lost, delayed or received out-of-order. TCP provides sequencing services.

Addressing

This identifies the sender and the intended receiver of the message using a defined addressing scheme. Examples of protocols that provide addressing include Ethernet, IPv4, and IPv6.

File Allocation Table (FAT)

This is a simple file system supported by many different operating systems. FAT has limitations to the number of partitions, partition sizes, and file sizes that it can address, so it is not usually used for hard drives (HDs) or solid state drives (SSDs) anymore. Both FAT16 and FAT32 are available to use, with FAT32 being the most common because it has many fewer restrictions than FAT16.

exFAT (Extended File Allocation Table)

This is an extended version of FAT that has even fewer restrictions than FAT32, but is not supported very well outside of the Windows ecosystem.

Partition Boot Sector

This is the first 16 sectors of the drive. It contains the location of the Master File Table (MFT). The last 16 sectors contain a copy of the boot sector.

NTFS (New Technology File System)

This is the most commonly used file system when installing Windows. All versions of Windows and Linux support NTFS while Mac-OS X computers can only read an NTFS partition. They are able to write to an NTFS partition after installing special drivers.

MFT (master file table)

This table contains the locations of all the files and directories on the partition, including file attributes such as security information and timestamps.

True or false. Standards organizations are usually vendor-neutral.

True

True or false? Frames exchanged between devices in different IP networks must be forwarded to a default gateway.

True

Converged networks

Unlike dedicated networks, converged networks are capable of delivering data, voice, and video between many different types of devices over the same network infrastructure.

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

VPN

Which option creates a secure connection for remote workers?

VPN

Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country?

Video communications

Which option describes malicious code running on user devices?

Virus, worms or trojan horses

Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider?

WAN

Which option describes a network attack that occurs on the first day that a vulnerability becomes known?

Zero day or zero hour

Local Area Network (LAN)

a computer network that covers a small area

In which scenario would the use of a WISP be recommended?

a farm or rural area without wired broadband

Intranet

a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization

Which device performs the function of determining the path that messages should take through internetworks?

a router

Ethernet

a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.

What five fundamental traits do network protocols usually share?

a. Message encoding b. Message formatting and encapsulation c. Message Size d. Message Timing e. Message Delivery Options

What are two benefits of using a layered network model? (Choose two.)

assists in protocol design, prevents technology in one layer fro affecting other layers

The physical layer of the receiving device passes bits up to which higher level layer?

data link

Which protocol stack layer encapsulates data into frames?

data link

What process is used to receive transmitted data and convert it into a readable message?

decoding

Which logical address is used for delivery of data to a remote network?

destination IP address

What is the order of the two addresses in the data link frame?

destination MAC, source MAC

Internet Standards

developed through non-hierarchical consensus building.

What types of standards are developed by the Electronics Industries Alliance (EIA)?

electric wiring and connections

What is the name of the process of adding protocol information to data as it moves down the protocol stack?

encapsulation

What process is used to place one message inside another message for transfer from the source to the destination?

encapsulation

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

extranet

True or false? The physical layer is only concerned with wired network connections.

false

True or false? When a frame is encoded by the physical layer, all bits are sent over the media at the same time.

false

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

fault tolerance

Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?

fault tolerance

Which media uses patterns of light to represent bits?

fiber-optic

What PDU is received by the physical layer for encoding and transmission?

frame

What are two characteristics of a scalable network? (Choose two.)

grows in size without impacting existing users, suitable for modular devices that allow for expansion

Which of the following is the name for all computers connected to a network that participate directly in network communication?

hosts

What type of network must a home user access in order to do online shopping?

internet

Fault tolerance

is a computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service. Fault tolerance can be provided with software, or embedded in hardware, or provided by some combination.

General

- Three different startup types can be chosen here. Normal loads all drivers and services. Diagnostic loads only basic drivers and services. Selective allows the user to choose what to load on startup.

What is a characteristic of UTP cabling?

cancellation

What command would you use to change back to C:/Program Files

cd "\program files"

Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)

cellular, satellite

Network Security

concerned with addressing vulnerabilities and threats in computer networks that may or may not be connected to the internet

Intermediary Devices

connect the individual end devices to the network and can connect multiple individual networks to form an internetwork

Which media uses electrical pulses to represent bits?

copper

Login as Administrator

- When a user logs in as an administrator, any program that they run will have the privileges of that account. It is best to log in as a Standard User and only use the administrator password to accomplish certain tasks.

Encryption

- When data is not encrypted, it can easily be gathered and exploited. This is not only important for desktop computers, but especially mobile devices.

Business DSL

Business DSL is available in various formats. A popular choice is Symmetric Digital Subscriber Line (SDSL) which is similar to the consumer version of DSL but provides uploads and downloads at the same high speeds.

When data is encoded as pulses of light, which media is being used to transmit the data?

Fiber-optic cable

Which option blocks unauthorized access to your network?

Firewall

Extended File System (ext)

First file system created specifically for Linux where the metadata and file structure is based on the Unix File system

4 - Transport

The transport layer defines services to segment, transfer, and reassemble the data for individual communications between the end devices.

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?

bring your own device

What type of communication will send a message to all devices on a local area network?

broadcast

Which message delivery option is used when all devices need to receive the same message simultaneously?

broadcast

Event Viewer

A GUI application that allows users to easily view and sort events recorded in the event log on a computer running a Windows-based operating system.

Network Interface Card (NIC)

A NIC physically connects the end device to the network.

Security policy

- A good security policy must be configured and followed. Many settings in the Windows Security Policy control can prevent attacks.

Threat actor attacks

- A malicious person attacks user devices or network resources.

Describe a PDU and its relationship to encapsulation.

A PDU (Protocol Data Unit) the form the data takes at any layer, during encapsulation each succeeding layer encapsulates the PDU. The PDU that is received from the layer above is in accordance with the protocol being used. At each stage of the process a PDU has a different name to reflect its new function.

File and share permissions

- These permissions must be set correctly. It is easy to just give the "Everyone" group Full Control, but this allows all people to do what they want to all files. It is best to provide each user or group with the minimum necessary permissions for all files and folders.

Dedicated firewall systems

- These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.

Virtual private networks (VPN)

- These provide secure access into an organization for remote workers.

Data interception and theft

- This attack captures private information from an organization's network.

Identity theft

- This attack steals the login credentials of a user in order to access private data.

Channel

- This consists of the media that provides the pathway over which the message travels from source to destination.

Startup

- All the applications and services that are configured to automatically begin at startup can be enabled or disabled by opening the task manager from this tab. The Startup tab is shown in Figure 4.

Services

- All the installed services are listed here so that they can be chosen to start at startup. The Services tab is shown in Figure 3

Zero-day attacks

- Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.

Boot

- Any installed operating system can be chosen here to start. There are also options for Safe boot, which is used to troubleshoot startup. The Boot tab is shown in Figure 2.

Firewall

- By default, Windows uses Windows Firewall to limit communication with devices on the network. Over time, rules may no longer apply. For example, a port may be left open that should no longer be readily available. It is important to review firewall settings periodically to ensure that the rules are still applicable and remove any that no longer apply.

Availability

- Data availability assures users of timely and reliable access to data services for authorized users.

Confidentiality

- Data confidentiality means that only the intended and authorized recipients can access and read data.

Integrity

- Data integrity assures users that the information has not been altered in transmission, from origin to destination.

Firewall filtering

- Firewall filtering blocks unauthorized access into and out of the network. This may include a host-based firewall system that prevents unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network.

Tools

- Many common operating system tools can be launched directly from this tab. The Tools tab is shown in Figure 5.

Weak or no password

- Many people choose weak passwords or do not use a password at all. It is especially important to make sure that all accounts, especially the Administrator account, have a very strong password.

Message Destination (receiver)

- The destination receives the message and interprets it.

File Area

- The main area of the partition where files and directories are stored.

Unknown or unmanaged services

- There are many services that run behind the scenes. It is important to make sure that each service is identifiable and safe. With an unknown service running in the background, the computer can be vulnerable to attack.

Antivirus and antispyware

- These applications help to protect end devices from becoming infected with malicious software.

System Files

- These are hidden files that store information about other volumes and file attributes

Spyware/Adware

- These are types of software which are installed on a user's device. The software then secretly collects information about the user.

Denial of service attacks

- These attacks slow or crash applications and processes on a network device.

Viruses, worms, and Trojan horses

- These contain malicious software or code running on a user device.

Access control lists (ACL)

- These further filter access and traffic forwarding based on IP addresses and applications.

Intrusion prevention systems (IPS)

- These identify fast-spreading threats, such as zero-day or zero-hour attacks.

Windows Boot Process

BIOS init phaase - Firmware ids and inits hardware devices then runs POST - BIOS detecs MBR of a disk - Starts Bootmgr.exe - Bootmgr.exe finds Winload.exe - Winload.exe enforces KMCS to load signed drivers - Winload loads Ntoskrnl to set up HAL - Pass to SMSS to load user environment

Which feature describes using personal tools to access information and communicate across a business or campus network?

BYOD

How does BYOD change the way in which businesses implement networks?​

BYOD provides flexibility in where and how users can access network resources

Why are networks converging?

Before converged networks, networks were separate, used different technologies, had its own rules, standards, and were not able to communicate with each other. With a converged network all these devices can have standardized rules, use the same technologies to communicate, and be able to be used in the same environment.

Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data?

Extranet

True or False? Data Link addresses are physical so they never change in the data link frame from source to destination.

False

True or false? The right-most part of an IP address is used to identify the network that a device belongs to.

False

As networks evolve, we have learned that there are four basic characteristics that network architects must address to meet user expectations:

Fault Tolerance Scalability Quality of Service (QoS) Security

Which step of the communication process is concerned with properly identifying the address of the sender and receiver?

Formatting

What are two important registry items and why?

HKEY_LOCAL_MACHINE: Windows configurations are stored on this key, including information about services that start each boot. HKEY_CURRENT_USER: The key has stored information about services, that start only when the user logs into the computer.

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?

HTTP, TCP, IP, Ethernet

Which connections are specialized ports on a networking device that connect to individual networks?

Interface

This standards organization is responsible for IP address allocation and domain name management.

Internet Assigned Numbers Authority

This standards organization is concerned with the Request for Comments (RFC) documents that specify new protocols and update existing ones.

Internet Engineering Task Force

Message Timing

Message timing is also very important in network communications. Message timing includes the following: Flow Control - This is the process of managing the rate of data transmission. Flow control defines how much information can be sent and the speed at which it can be delivered. For example, if one person speaks too quickly, it may be difficult for the receiver to hear and understand the message. In network communication, there are network protocols used by the source and destination devices to negotiate and manage the flow of information. Response Timeout - If a person asks a question and does not hear a response within an acceptable amount of time, the person assumes that no answer is coming and reacts accordingly. The person may repeat the question or instead, may go on with the conversation. Hosts on the network use network protocols that specify how long to wait for responses and what action to take if a response timeout occurs. Access method - This determines when someone can send a message. Click Play in the figure to see an animation of two people talking at the same time, then a "collision of information" occurs, and it is necessary for the two to back off and start again. Likewise, when a device wants to transmit on a wireless LAN, it is necessary for the WLAN network interface card (NIC) to determine whether the wireless medium is available.

Which delivery method is used to transmit information to one or more end devices, but not all devices on the network?

Multicast

Which connection physically connects the end device to the network?

NIC

HKEY_LOCAL_MACHINE

Several aspects of Windows configuration are stored in this key, including information about services that start with each boot.

HKEY_CURRENT_USER:

Several aspects related to the logged in user are stored in this key, including information about services that start only when the user logs on to the computer.

Network Protocols

The rules of initiating, interrupting, and continuing communication on a computer network.

5 - Session

The session layer provides services to the presentation layer to organize its dialogue and to manage data exchange.

Message Size

The size restrictions of frames require the source host to break a long message into individual pieces that meet both the minimum and maximum size requirements. The long message will be sent in separate frames, with each frame containing a piece of the original message. Each frame will also have its own addressing information. At the receiving host, the individual pieces of the message are reconstructed into the original message.

standards-based protocol suite

This means it has been endorsed by the networking industry and approved by a standards organization. This ensures that products from different manufacturers can interoperate successfully.

Open standard protocol suite

This means it is freely available to the public and can be used by any vendor on their hardware or in their software

Alternate Data Streams

Ways in which data can be appended to a file (intentionally or not) and potentially obscure evidentiary data. In NTFS, alternate data streams become an additional file attribute.

Message formating

When a message is sent from source to destination, it must use a specific format or structure. Message formats depend on the type of message and the channel that is used to deliver the message.

Local Security Policy

Windows tool used to set local security policies on an individual system.

Which feature uses the same cellular technology as a smart phone?

Wireless broadband

Which of these is the name for the capacity of a medium to carry data?

bandwidth


Ensembles d'études connexes

Unit 7: International Trade and Currency, Unit 6: Keeping the Economy on Track, Unit 5: Tracking the Economy, Unit 4: Demand Supply Market Forces, Unit 3: Doing Business in a Market Economy, Unit 2: Economic Systems and Role of Government, Unit 1: Ac...

View Set

Chapter 7- personal family finance

View Set

Government Unit 2 Potential Test Questions

View Set