Intro to IT C182 - Unit 4 Computer Networks
What is the role of a firewall? (Select all that apply.)
- Block outgoing messages to specified destinations - Block incoming messages from untrustworthy sources
Which actions might be used to support the hardening of the systems you work with? (Select all that apply.)
- Maintain an antivirus system - Install security patches as they become available - Use a random password generator and change your passwords frequently
What is the tool used to encode a document while focusing on appearance known as?
HTML (Hypertext markup language)
What is the minimum grade of network cable required to transmit 1 Gpbs?
CAT5e
Which tool resides between the client and server to protect the client from adverse actions of the server?
Proxy server
What are the different types of distributed systems?
Cluster computing, Grid computing, Cloud computing
Which type of transmission media can broadcast in baseband mode?
Coax cable
True or False Data breaches are easy to detect.
False
The devices in Mei's office are interconnected in which type of network?
LAN
Client/Server Model:
The basic roles played by the processes are categorized as either a client making requests or a server satisfying client requests
Personal Area Network (PAN):
normally used for short-range communications, within a few feet, such as wireless headphones to a smartphone or a wireless mouse to a PC
Phishing:
obtain private information by simply asking for it. The perpetrator sends emails posing as a legitimate business asking for information.
Ring Network:
onnect directly to each other as a peer
VoIP (Voice over Internet Protocol):
operates by establishing a connection between two devices and then performing real-time, two-way transmission of audio data.
Peer-to-Peer (P2P):
processers both request and provide service to each other. Instant messaging and interactive games played by users on multiple machines
Cloud Computing:
provides large pools of shared computers that can be allocated to clients as needed
What are the common network media used in wireless networks?
radio waves, microwaves, and infrared waves
Spyware:
resides on a computer, collecting information about the computer's activities and reporting back to the spyware's instigator.
Virus:
software program that infects a computer by inserting itself into programs that already reside in the machine.
Proxy Server:
software that acts as an intermediary between a client and a server to shield the client from adverse actions of the server
Bus Network:
the machines are connected to a common communication line called a bus
Tier 3 of ISPs:
typically independent internets, sometimes called intranets, operated by a single organization that supplies internet access to homes and businesses.
Cluster Computing:
uses many independent computers to provide computation or services comparable to those of a larger machine
Fiber-Optic Cable:
uses the concept of reflection of light through a core made up of glass or plastic. The core is surrounded by a less dense glass or plastic covering called the cladding.
What are the common network media used in wired networks?
Twisted pair cables, coaxial cable, and optical fiber cables
Coaxial Cable:
a shielded and insulated copper cable that is used in computer networks and to deliver cable TV services
Star Network
a single machine serving as a central point to which all others are connected
Grid Computing:
a type of distributed system that is more loosely coupled than clusters but still works together as a system to complete large tasks
Firewalls:
block outgoing messages with certain destination addresses or block incoming messages from untrustworthy sources.
What are the four common topologies?
bus, star, ring, and mesh
Examples of malware?
computer viruses, worms, spyware, and phishing
Broadband:
considered high-capacity transmission technologies that are used to transmit data, voice, and video across long distances and at high speeds
Tier 1 of ISPs:
consist of high-speed, high-capacity, international WANs that are typically operated by large communication companies - least common type - backbone of the internet
IP addresses are traditionally written in _____________ notation.
dotted decimal
Mesh Network:
enable redundancy while also introducing significantly more network traffic - connects every device in a network to every other device
Tier 2 of ISPs:
essentially networks of routers that collectively provide the internet's communication infrastructure - more common and regional in scope
Distributed Systems:
execute software as processes on more than one computer
Wide Area Network (WAN):
link systems over a greater distance, including machines on the opposite sides of the world
Network bandwidth is typically measured in _________________ and _____________.
megabits per second (Mbps) and gigabits (Gbps) per second
Which network topology best handles downed links without losing connectivity between devices?
Mesh
Which technique allows someone to obtain sensitive information, such as usernames and passwords, by pretending to be a trustworthy person?
Phishing
Local Area Network (LAN):
a collection of computers in a single building or building complex
Transmission Medium:
a component that carries data from one network device to another
Malware:
any software intentionally designed to cause damage to a computer, server, client, or computer network
Worm:
autonomous program that forwards copies of itself to other machines in a network and could result in detriment of individual machines or the operations of the network