Cisco Introduction to Networks Module 1

Ace your homework & exams now with Quizwiz!

Hosts are

All computers that are connected to a network and participate directly in network communication

What is one way that reliable networks provide redundancy?

By implementing a packet-switched network.

Which feature contains options such as Public, Private, Custom, and Hybrid? BYOD Video Communications Cloud computing

Cloud computing

What does CIA stand for?

Confidentiality, Integrity, Availability

What are the three primary requirements for network security?

Confidentiality, Integrity, Availabilty

When does congestion occur?

Congestion occurs when the demand for bandwidth exceeds the amount available.

What are common connection options for businesses?

DDL (Dedicated Leased Lines), Metro Ethernet, Business DSL

What is availability?

Data availability assures users of timely and reliable access to data services for authorized users.

Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business?

LAN

What is powerline networking?

Powerline networking for home networks uses existing electrical wiring to connect devices.

What is the focus of QoS?

To prioritize time-sensitive traffic

Which feature is a good converencing tool to use with other who are located elsewhere in your city, or even in another country? BYOD Video Communications Cloud computing

Video communications

Which option creates a secure connection fo rremote workers? Firewall Virus, worm, or Trojan horse Zero-day or Zero-hour Virtual Private Network (VPN) Denial of Service (DoS)

Virtual Private Network (VPN)

Which option describes malicious code running on user devices? Firewall Virus, worm, or Trojan horse Zero-day or Zero-hour Virtual Private Network (VPN) Denial of Service (DoS)

Virus, worm, or Trojan horse.

A NIC

physically connects the end device to the network

Name some intermediary devices:

wireless router, LAN switch, router, multilayer switch, firewall appliance

What is confidentiality?

Data confidentiality means that only the intended and authorized recipients can access and read data.

Which connection physically connects the end device to the network?

NIC

When the volume of traffic is greater than what can be transported across the network, devices will ___.

hold the packets in memory until resources become available to transmit them.

All computers that are connected to a network and participate directly in network communication are classified as ___.

hosts

Network administrators must address two types of network security concerns:

network infrastructure security and information security

Which two devices are intermediary devices? hosts routers servers switches

routers and switches

A physical port

A connector or outlet on a networking device where the media connects to an end device or another networking device

What is a fault tolerant network?

A fault tolerant netowrk is one that limits the number of affected devices during a failure.

Which feature describes using personal tools to access information and communicate across a business or campus network? BYOD Video Communications Cloud computing

BYOD

What is integrity?

Data integrity assures users that the information has not been altered in transmission, from orgin to destination.

Which attack slows down or crashes equipment and programs? Firewall Virus, worm, or Trojan horse Zero-day or Zero-hour Virtual Private Network (VPN) Denial of Service (DoS)

Denial of Service (DoS)

Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access ot the organization's data?

Extranet

What are the four aspects of network reliability?

Fault tolerance, scalability, quality of service (QoS), security.

When data is encoded as pulses of light, which media is being used to transmit the data?

Fiber-optic cable

Which option blocks unauthorized access to your network? Firewall Virus, worm, or Trojan horse Zero-day or Zero-hour Virtual Private Network (VPN) Denial of Service (DoS)

Firewall

What is redundancy?

Having multiple paths to a destination

Which connections are specialized ports on a networking device that connects to individual networks?

Interface

What does packet switching do?

Packet switching splits traffic into packets that are routed over a shared network.

Which type of network topology lets you see the actual location of intermediary devices and cable installation?

Physical topology

With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?

QoS

Intermediary network devices perform some or all of these functions:

Regenerate and retransmit communication signals Maintain information about what pathways exist through the network and internetwork Notify other devices of errors and communication failures Direct data along alternate pathways when there is a link failure Classify and direct messages according to priorities Permit or deny the flow of data, based on security settings

When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved?

Scalability

Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?

Security

Which network infrastructure provides access to other netowrks over a large geographical area, which is often owned and managed by a telecommunications service provider?

WAN

Which feature uses the same cellular technology as a smart phone? Smart home technology Powerline Wireless broadband

Wireless broadband

Which option describes a network attack that occurs on the first day that a vulnerability becomes known? Firewall Virus, worm, or Trojan horse Zero-day or Zero-hour Virtual Private Network (VPN) Denial of Service (DoS)

Zero-day or Zero-hour

Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?

Fault Tolerance.

Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used?

Logical topology

Which feature is being used when connecting a device to the network using an eletrical outlet? Smart home technology Powerline Wireless broadband

Powerline

How do intermediary devices determine the path that messages should take through the network?

Intermediary devices use the destination end device address, in conjunction with information about the network interconnections, to determine the path that messages should take through the network.

How is a single message transmitted?

It is broken into multiple message blocks called packets. Each packet has the addressing info of the source and destination of the message. Routers switch the packets based on the condition of the network at that moment. All the packets could take very different paths to the same destination. The router is dynamically changing the route when a link fails.

What is scalability?

A network that expands quickly to support new users and applications without degrading the performance of services being accessed by existing users.

What manages QoS?

Router

Interface

Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.


Related study sets

CA 45 - Hour Real Estate Finance Course

View Set

5 Renal Question Collection for Exam

View Set

Environmental Public Health Chp 1-10, 12

View Set

TMC test bank wrong questions 6-10/NBRC

View Set

Public Speaking final study guide

View Set

Chapter 4.2: Niches and Community Interactions

View Set