Cisco Introduction to Networks Module 1
Hosts are
All computers that are connected to a network and participate directly in network communication
What is one way that reliable networks provide redundancy?
By implementing a packet-switched network.
Which feature contains options such as Public, Private, Custom, and Hybrid? BYOD Video Communications Cloud computing
Cloud computing
What does CIA stand for?
Confidentiality, Integrity, Availability
What are the three primary requirements for network security?
Confidentiality, Integrity, Availabilty
When does congestion occur?
Congestion occurs when the demand for bandwidth exceeds the amount available.
What are common connection options for businesses?
DDL (Dedicated Leased Lines), Metro Ethernet, Business DSL
What is availability?
Data availability assures users of timely and reliable access to data services for authorized users.
Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business?
LAN
What is powerline networking?
Powerline networking for home networks uses existing electrical wiring to connect devices.
What is the focus of QoS?
To prioritize time-sensitive traffic
Which feature is a good converencing tool to use with other who are located elsewhere in your city, or even in another country? BYOD Video Communications Cloud computing
Video communications
Which option creates a secure connection fo rremote workers? Firewall Virus, worm, or Trojan horse Zero-day or Zero-hour Virtual Private Network (VPN) Denial of Service (DoS)
Virtual Private Network (VPN)
Which option describes malicious code running on user devices? Firewall Virus, worm, or Trojan horse Zero-day or Zero-hour Virtual Private Network (VPN) Denial of Service (DoS)
Virus, worm, or Trojan horse.
A NIC
physically connects the end device to the network
Name some intermediary devices:
wireless router, LAN switch, router, multilayer switch, firewall appliance
What is confidentiality?
Data confidentiality means that only the intended and authorized recipients can access and read data.
Which connection physically connects the end device to the network?
NIC
When the volume of traffic is greater than what can be transported across the network, devices will ___.
hold the packets in memory until resources become available to transmit them.
All computers that are connected to a network and participate directly in network communication are classified as ___.
hosts
Network administrators must address two types of network security concerns:
network infrastructure security and information security
Which two devices are intermediary devices? hosts routers servers switches
routers and switches
A physical port
A connector or outlet on a networking device where the media connects to an end device or another networking device
What is a fault tolerant network?
A fault tolerant netowrk is one that limits the number of affected devices during a failure.
Which feature describes using personal tools to access information and communicate across a business or campus network? BYOD Video Communications Cloud computing
BYOD
What is integrity?
Data integrity assures users that the information has not been altered in transmission, from orgin to destination.
Which attack slows down or crashes equipment and programs? Firewall Virus, worm, or Trojan horse Zero-day or Zero-hour Virtual Private Network (VPN) Denial of Service (DoS)
Denial of Service (DoS)
Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access ot the organization's data?
Extranet
What are the four aspects of network reliability?
Fault tolerance, scalability, quality of service (QoS), security.
When data is encoded as pulses of light, which media is being used to transmit the data?
Fiber-optic cable
Which option blocks unauthorized access to your network? Firewall Virus, worm, or Trojan horse Zero-day or Zero-hour Virtual Private Network (VPN) Denial of Service (DoS)
Firewall
What is redundancy?
Having multiple paths to a destination
Which connections are specialized ports on a networking device that connects to individual networks?
Interface
What does packet switching do?
Packet switching splits traffic into packets that are routed over a shared network.
Which type of network topology lets you see the actual location of intermediary devices and cable installation?
Physical topology
With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?
QoS
Intermediary network devices perform some or all of these functions:
Regenerate and retransmit communication signals Maintain information about what pathways exist through the network and internetwork Notify other devices of errors and communication failures Direct data along alternate pathways when there is a link failure Classify and direct messages according to priorities Permit or deny the flow of data, based on security settings
When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved?
Scalability
Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?
Security
Which network infrastructure provides access to other netowrks over a large geographical area, which is often owned and managed by a telecommunications service provider?
WAN
Which feature uses the same cellular technology as a smart phone? Smart home technology Powerline Wireless broadband
Wireless broadband
Which option describes a network attack that occurs on the first day that a vulnerability becomes known? Firewall Virus, worm, or Trojan horse Zero-day or Zero-hour Virtual Private Network (VPN) Denial of Service (DoS)
Zero-day or Zero-hour
Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?
Fault Tolerance.
Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used?
Logical topology
Which feature is being used when connecting a device to the network using an eletrical outlet? Smart home technology Powerline Wireless broadband
Powerline
How do intermediary devices determine the path that messages should take through the network?
Intermediary devices use the destination end device address, in conjunction with information about the network interconnections, to determine the path that messages should take through the network.
How is a single message transmitted?
It is broken into multiple message blocks called packets. Each packet has the addressing info of the source and destination of the message. Routers switch the packets based on the condition of the network at that moment. All the packets could take very different paths to the same destination. The router is dynamically changing the route when a link fails.
What is scalability?
A network that expands quickly to support new users and applications without degrading the performance of services being accessed by existing users.
What manages QoS?
Router
Interface
Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.