Module 1: Networking Today
These applications help to protect end devices from becoming infected with malicious software.
antivirus and antisoftware
Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.
Cable Internet
also provide high bandwidth, high availability, and an always-on connection to the internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
DSL
are reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate.
Dedicated leased line
These attacks slow or crash applications and processes on a network device.
Denial of service attacks
Three common types of server software
Email, web, file
An organization may use a ________ to provide secure and safe access to individuals who work for a different organization but require access to the organization's data.
Extranet
Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?
Fault Tolerance
four basic characteristics that network architects must address to meet user expectations:
Fault Tolerance Scalability Quality of Service (QoS) Security
A _____________ network is one that limits the number of affected devices during a failure.
Fault Tolerant
Data is encoded into pulses of light.
Glass or plastic fibers within cables (fiber-optic cable)
specifically refers to devices on the network that are assigned a number for communication purposes.
Hosts
All computers that are connected to a network and participate directly in network communication are classified as _________
Hosts also known as end devices
This number identifies the host within a particular network
IP
identifies the host and the network to which the host is attached.
IP
Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.
Interface
connect the individual end devices to the network
Intermediary
a term often used to refer to a private connection of LANs and WANs that belongs to an organization.
Intranet
designed to be accessible only by the organization's members, employees, or others with authorization.
Intranet
These identify fast-spreading threats, such as zero-day or zero-hour attacks.
Intrusion prevention systems (IPS)
a network infrastructure that provides access to users and end devices in a small geographical area.
LAN
These further filter access and traffic forwarding based on IP addresses and applications.
access control lists (ACL)
LAN stands for
Local Area Network
illustrate devices, ports, and the addressing scheme of the network, as shown in the figure.
Logical topology
Communication transmits across a network on
Media
Data is encoded into electrical impulses.
Metal wires within cables
These ethernets extend LAN access technology into the WAN
Metro / WAN Ethernet
_____________ is measured in the number of bits that can be transmitted in a single second, or bits per second (bps).
Network Bandwidth
physically connects the end device to the network.
Network interface card [NIC]
splits traffic into packets that are routed over a shared network. A single message, such as an email or a video stream, is broken into multiple message blocks
Packet Switching
A connector or outlet on a networking device where the media connects to an end device or another networking device.
Physical port
illustrate the physical location of intermediary devices and cable installation, as shown in the figure.
Physical topology
uses existing electrical wiring to connect devices
Powerline Networking
With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?
QOS
Having multiple paths to a destination is known as
Redundancy
When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved?
Scalability
Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?
Security
computers with software that allow them to provide information, like email or web pages, to other end devices on the network
Servers
These are types of software which are installed on a user's device. The software then secretly collects information about the user.
Spyware and adware
similar to the consumer version of DSL but provides uploads and downloads at the same high speeds.
Symmetric Digital Subscriber Line (SDSL)
This type of "picture" of a network is known as a
Topology diagram
List at least two functions of intermediary devices
Two functions of intermediary devices are toregenerate and retransmit data signals. also they permit or deny flow of data based on security rules
These provide secure access into an organization for remote workers.
Virtual private networks (VPN)
These contain malicious software or code running on a user device.
Viruses, worms, and Trojan horses
a network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a larger corporation or a telecommunications service provider.
WAN
interconnect LANs over wide geographical areas such as between cities, states, provinces, countries, or continents.
WAN
WAN stands for
Wide Area Network
Name some Intermediary Devices
Wireless router, LAN switch, router, firewall appliance, multilayer switch
Data is encoded via modulation of specific frequencies of electromagnetic waves.
Wireless transmission
Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.
Zero Day attacks
Unlike dedicated networks, ___________ networks are capable of delivering data, voice, and video between many different types of devices over the same network infrastructure.
converged
This attack captures private information from an organization's network.
data interception and theft
These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.
dedicated firewall systems
blocks unauthorized access into and out of the network.
firewall filtering
This attack steals the login credentials of a user in order to access private data.
identity theft
A _______________ expands quickly to support new users and applications. It does this without degrading the performance of services that are being accessed by existing users.
scalable network
malicious person attacks user devices or network resources.
threat actor attacks