Module 1: Networking Today

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

These applications help to protect end devices from becoming infected with malicious software.

antivirus and antisoftware

Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.

Cable Internet

also provide high bandwidth, high availability, and an always-on connection to the internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.

DSL

are reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate.

Dedicated leased line

These attacks slow or crash applications and processes on a network device.

Denial of service attacks

Three common types of server software

Email, web, file

An organization may use a ________ to provide secure and safe access to individuals who work for a different organization but require access to the organization's data.

Extranet

Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?

Fault Tolerance

four basic characteristics that network architects must address to meet user expectations:

Fault Tolerance Scalability Quality of Service (QoS) Security

A _____________ network is one that limits the number of affected devices during a failure.

Fault Tolerant

Data is encoded into pulses of light.

Glass or plastic fibers within cables (fiber-optic cable)

specifically refers to devices on the network that are assigned a number for communication purposes.

Hosts

All computers that are connected to a network and participate directly in network communication are classified as _________

Hosts also known as end devices

This number identifies the host within a particular network

IP

identifies the host and the network to which the host is attached.

IP

Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.

Interface

connect the individual end devices to the network

Intermediary

a term often used to refer to a private connection of LANs and WANs that belongs to an organization.

Intranet

designed to be accessible only by the organization's members, employees, or others with authorization.

Intranet

These identify fast-spreading threats, such as zero-day or zero-hour attacks.

Intrusion prevention systems (IPS)

a network infrastructure that provides access to users and end devices in a small geographical area.

LAN

These further filter access and traffic forwarding based on IP addresses and applications.

access control lists (ACL)

LAN stands for

Local Area Network

illustrate devices, ports, and the addressing scheme of the network, as shown in the figure.

Logical topology

Communication transmits across a network on

Media

Data is encoded into electrical impulses.

Metal wires within cables

These ethernets extend LAN access technology into the WAN

Metro / WAN Ethernet

_____________ is measured in the number of bits that can be transmitted in a single second, or bits per second (bps).

Network Bandwidth

physically connects the end device to the network.

Network interface card [NIC]

splits traffic into packets that are routed over a shared network. A single message, such as an email or a video stream, is broken into multiple message blocks

Packet Switching

A connector or outlet on a networking device where the media connects to an end device or another networking device.

Physical port

illustrate the physical location of intermediary devices and cable installation, as shown in the figure.

Physical topology

uses existing electrical wiring to connect devices

Powerline Networking

With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?

QOS

Having multiple paths to a destination is known as

Redundancy

When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved?

Scalability

Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?

Security

computers with software that allow them to provide information, like email or web pages, to other end devices on the network

Servers

These are types of software which are installed on a user's device. The software then secretly collects information about the user.

Spyware and adware

similar to the consumer version of DSL but provides uploads and downloads at the same high speeds.

Symmetric Digital Subscriber Line (SDSL)

This type of "picture" of a network is known as a

Topology diagram

List at least two functions of intermediary devices

Two functions of intermediary devices are toregenerate and retransmit data signals. also they permit or deny flow of data based on security rules

These provide secure access into an organization for remote workers.

Virtual private networks (VPN)

These contain malicious software or code running on a user device.

Viruses, worms, and Trojan horses

a network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a larger corporation or a telecommunications service provider.

WAN

interconnect LANs over wide geographical areas such as between cities, states, provinces, countries, or continents.

WAN

WAN stands for

Wide Area Network

Name some Intermediary Devices

Wireless router, LAN switch, router, firewall appliance, multilayer switch

Data is encoded via modulation of specific frequencies of electromagnetic waves.

Wireless transmission

Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.

Zero Day attacks

Unlike dedicated networks, ___________ networks are capable of delivering data, voice, and video between many different types of devices over the same network infrastructure.

converged

This attack captures private information from an organization's network.

data interception and theft

These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.

dedicated firewall systems

blocks unauthorized access into and out of the network.

firewall filtering

This attack steals the login credentials of a user in order to access private data.

identity theft

A _______________ expands quickly to support new users and applications. It does this without degrading the performance of services that are being accessed by existing users.

scalable network

malicious person attacks user devices or network resources.

threat actor attacks


Set pelajaran terkait

nur 111 - Davis - Left and Right Heart Failure

View Set

Ibrahim Breaks the Idols/ قصّة سيّدنا إبراهيم: إِبْرَاهِيم يَكْسِرُ الأصْنَام Story 4

View Set

Six Sigma Green Belt-Value of Six Sigma

View Set