Module 1 Bulk Review

Ace your homework & exams now with Quizwiz!

With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion? Fault Tolerance Scalability QoS Security

QoS

Interface

Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.

Which option describes malicious code running on user devices? Firewall Virus, Worm, or Trojan Horse Zero-day or Zero-hour VPN Denial of Service

Virus, Worm, Trojan Horse

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators? Internet intranet extranet extendednet

extranet

Video Communications

used for communications, collaboration, and entertainment. Video calls are made to and from anyone with an internet connection, regardless of where they are located.

Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider? Extranet Intranet LAN WAN

WAN

Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data? Extranet Intranet LAN WAN

Extranet

Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture? Fault Tolerance Scalability QoS Security

Fault Tolerance

four basic characteristics of network architecture

Fault Tolerance Scalability Quality of Service (QoS) Security

Logical Topology

Logical Topology diagrams illustrate devices, ports, and the addressing scheme of the network. You can see which end devices are connected to which intermediary devices and what media is being used.

Wireless Internet Service Provider

(WISP) is an ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs). WISPs are more commonly found in rural environments where DSL or cable services are not available.

Online Collaboration

the act of working with another or others on a joint project." Collaboration tools, like Cisco WebEx, shown in the figure, give employees, students, teachers, customers, and partners a way to instantly connect, interact, and achieve their objectives.

Functions of Intermediary Devices

- Regenerate and retransmit communication signals. - Maintain information about what pathways exists through the network and internetwork - Notify other devices of errors and communication failures - Direct data along alternate pathways when there is a link failure -Classify and direct messages according to priorities. -Permit or deny flow of data, based on security settings.

Intermediary Devices

- connect the individual end devices to the network - connect multiple individual networks to form an internetwork - Intermediary devices use the destination end device address, in conjunction with information about the network interconnections, to determine the path that messages should take through the network Examples: Wireless Router, LAN Switch, Router, Multilayer Switch, Firewall Appliance

Network Interface Card (NIC)

A NIC physically connects the end device to the network.

Community Clouds

A community cloud is created for exclusive use by specific entities or organizations. The differences between public clouds and community clouds are the functional needs that have been customized for the community. For example, healthcare organizations must remain compliant with policies and laws (e.g., HIPAA) that require special authentication and confidentiality. Community clouds are used by multiple organizations that have similar needs and concerns. Community clouds are similar to a public cloud environment, but with set levels of security, privacy, and even regulatory compliance of a private cloud.

Physical Port

A connector or outlet on a networking device where the media connects to an end device or another networking device.

Topology Diagram

A diagram that provides an easy way to understand how devices connect in a large network. In addition to these representations, specialized terminology is used to describe how each of these devices and media connect to each other.

In which scenario would the use of a WISP be recommended? - an internet cafe in a city - a farm in a rural area without wired broadband access - any home with multiple wireless devices - an apartment in a building with cable access to the internet

A farm in a rural area without wired broadband access

Hybrid Clouds

A hybrid cloud is made up of two or more clouds (example: part private, part public), where each part remains a distinct object, but both are connected using a single architecture. Individuals on a hybrid cloud would be able to have degrees of access to various services based on user access rights.

Threat Actor Attacks

A malicious person attacks user devices or network resources.

IP Address

A number assigned to any item that is connected to the Internet. Also known as "Internet Protocol" Address.

Quality of Service

A primary mechanism for managing congestion and ensuring reliable delivery of content to all users. An increasing requirement of networks today. The focus of QoS is to prioritize time-sensitive traffic. The type of traffic, not the content of the traffic, is what is important.

Scalable Network

A scalable network expands quickly to support new users and applications. It does this without degrading the performance of services that are being accessed by existing users. The figure shows how a new network is easily added to an existing network. These networks are scalable because the designers follow accepted standards and protocols. This lets software and hardware vendors focus on improving products and services without having to design a new set of rules for operating within the network.

Advantages & Disadvantages of P2P

Advantages: - Easy setup - Less Complex - Lower Cost - Used for simple tasks like file sharing and printing Disadvantages: - No Central Admin - Not as secure - Unscalable - Slower performance since more task are performed on a single machine

Zero-day Attacks

Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.

Dial-up Telephone

An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is not sufficient for large data transfer, although it is useful for mobile access while traveling.

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe? cloud computing online collaboration BYOD Video Conferencing

BYOD

Which feature describes using personal tools to access information and communicate across a business or campus network? BYOD Video Communications Cloud Computing

BYOD

Business DSL

Business DSL is available in various formats. A popular choice is Symmetric Digital Subscriber Line (SDSL) which is similar to the consumer version of DSL but provides uploads and downloads at the same high speeds.

Cellular

Cellular internet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected.

Which feature contains options such as Public, Private, Custom and Hybrid? BYOD Video Communications Cloud Computing

Cloud Computing

Private Clouds

Cloud-based applications and services offered in a private cloud are intended for a specific organization or entity, such as a government. A private cloud can be set up using the organization's private network, though this can be expensive to build and maintain. A private cloud can also be managed by an outside organization with strict access security.

Public clouds

Cloud-based applications and services offered in a public cloud are made available to the general population. Services may be free or are offered on a pay-per-use model, such as paying for online storage. The public cloud uses the internet to provide services.

Availability

Data availability assures users of timely and reliable access to data services for authorized users.

Confidentiality

Data confidentiality means that only the intended and authorized recipients can access and read data.

Integrity

Data integrity assures users that the information has not been altered in transmission, from origin to destination.

Which attack slows down or crashes equipment and programs? Firewall Virus, Worm, or Trojan Horse Zero-day or Zero-hour VPN Denial of Service

Denial of Service

DSL

Digital Subscriber Lines also provide high bandwidth, high availability, and an always-on connection to the internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.

Which option blocks unauthorized access to your network? Firewall Virus, Worm, or Trojan Horse Zero-day or Zero-hour VPN Denial of Service

Firewall

Firewall filtering

Firewall filtering blocks unauthorized access into and out of the network. This may include a host-based firewall system that prevents unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network.

Distributed Data Center

For security, reliability, and fault tolerance, cloud providers often store data in distributed data centers. Instead of storing all the data of a person or an organization in one data center, it is stored in multiple data centers in different locations.

Which of the following is the name for all computers connected to a network that participate directly in network communication? servers intermediary devices hosts media

Hosts

Peer-to-peer

In small businesses and homes, many computers function as the servers and clients on the network. Example: One PC has access to Files and the Printer, and the second only has files that the first may need. Technically, this is two, otherwise, client machines that are providing to service (server) to the customer (client)

Which connections are specialized ports on a networking device that connect to individual networks? Port NIC Interface

Interface

What is an ISP? -It is a standards body that develops cabling and wiring standard for networking. -It is a protocol that establishes how computers within a local network communicate - It is an organization that enables individual and businesses to connect to the internet - It is a networking device that combines the functionality of several different networking devices in one

It is an organization that enables individuals and businesses to connect to the internet.

Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business? Extranet Intranet LAN WAN

LAN

Dedicated Leased Lined

Leased lines are reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate.

Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used?

Logical Topology

Criteria When choosing network media

Max distance Environment Conditions What data and What speed Cost of Media and Installation

Medium to Large Networks

Medium to large networks, such as those used by corporations and schools, can have many locations with hundreds or thousands of interconnected hosts.

Network security

Must consider the environment, as well as the tools and requirements of the network. It must be able to secure data while still allowing for the quality of service that users expect of the network. Securing a network involves protocols, technologies, devices, tools, and techniques in order to protect data and mitigate threats. Threat vectors may be external or internal.

Which connection physically connects the end device to the network? Port NIC Interface

NIC

Network infrastructures variances

Network infrastructures vary greatly in terms of: Size of the area covered Number of users connected Number and types of services available Area of responsibility

Which type of network topology lets you see the actual location of intermediary devices and cable installation?

Physical Topology

Physical Topology

Physical topology diagrams illustrate the physical location of intermediary devices and cable installation. You can see that the rooms in which these devices are located are labeled in a physical topology.

Which feature is being used when connecting a device to the network using an electrical outlet? Smart home technology Powerline Wireless Broadband

Powerline

Which two devices are intermediary devices? (Choose two) Hosts Routers Switches Servers

Routers & Switches

When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved? Fault Tolerance Scalability QoS Security

Scalability

Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? Fault Tolerance Scalability QoS Security

Security

Servers

Servers are computers with software that allow them to provide information, like email or web pages, to other end devices on the network. Each service requires separate server software.

Small Home Networks

Small home networks connect a few computers to each other and to the internet.

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer? DoS Attack Identity Theft Spyware zero-day attack

Spyware

Satellite

The availability of satellite internet access is a benefit in those areas that would otherwise have no internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.

BYOD

The concept of any device, for any content, in any manner, is a major global trend that requires significant changes to the way we use devices and safely connect them to networks enables end users the freedom to use personal tools to access information and communicate across a business or campus network.

World Wide Networks

The internet is a network of networks that connects hundreds of millions of computers world-wide.

Network Security

The network infrastructure, services, and the data contained on network-attached devices are crucial personal and business assets. Network administrators must address two types of network security concerns: network infrastructure security and information security. Securing the network infrastructure includes physically securing devices that provide network connectivity and preventing unauthorized access to the management software that resides on them

Antivirus and antispyware

These applications help to protect end devices from becoming infected with malicious software.

Spyware or Adware

These are types of software which are installed on a user's device. The software then secretly collects information about the user.

Denial of Service Attacks

These attacks slow or crash applications and processes on a network device.

Viruses, worms, and Trojan horses

These contain malicious software or code running on a user device.

Access Control Lists (ACL)

These further filter access and traffic forwarding based on IP addresses and applications.

Intrusion Prevention System

These identify fast-spreading threats, such as zero-day or zero-hour attacks.

Dedicated Firewall Systems

These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.

VPNs (Virtual Private Networks)

These provide secure access into an organization for remote workers.

Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country? BYOD Video Communications Cloud Computing

Video Communications

Data Interception or Theft

This attack captures private information from an organization's network.

Identity Theft

This attack steals the login credentials of a user in order to access private data.

Metro Ethernet

This is sometimes known as Ethernet WAN. In this module, we will refer to it as Metro Ethernet. Metro ethernets extend LAN access technology into the WAN. Ethernet is a LAN technology you will learn about in a later module.

Wireless Broadband Service

This solution uses the same cellular technology as a smart phone. An antenna is installed outside the house providing either wireless or wired connectivity for devices in the home. In many areas, home wireless broadband is competing directly with DSL and cable services.

End Device Communication

To distinguish one end device from another, each end device on a network has an address. When an end device initiates communication, it uses the address of the destination end device to specify where to deliver the message. An ed device is either the source or the destination on the network.

Converged Networks

Today, the separate data, telephone, and video networks converge. Unlike dedicated networks, converged networks are capable of delivering data, voice, and video between many different types of devices over the same network infrastructure. This network infrastructure uses the same set of rules, agreements, and implementation standards. Converged data networks carry multiple services on one network.

Cable

Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.

Which option creates a secure connection for remote workers? Firewall Virus, Worm, or Trojan Horse Zero-day or Zero-hour VPN Denial of Service

VPN

Which option describes a network attack that occurs on the first day that a vulnerability becomes known? Firewall Virus, Worm, or Trojan Horse Zero-day or Zero-hour VPN Denial of Service

Zero-day or Zero-hour

WAN

a network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a larger corporation or a telecommunications service provider. A WAN is a network infrastructure that spans a wide geographical area. WANs are typically managed by service providers (SPs) or Internet Service Providers (ISPs).

LAN

a network infrastructure that provides access to users and end devices in a small geographical area. A LAN is typically used in a department within an enterprise, a home, or a small business network. usually administered by a single organization or individual. Administrative control is enforced at the network level and governs the security and access control policies.

Intranet

a term often used to refer to a private connection of LANs and WANs that belongs to an organization. An intranet is designed to be accessible only by the organization's members, employees, or others with authorization.

Small office and home office (SOHO) networks

allow people to work from home, or a remote office. Many self-employed workers use these types of networks to advertise and sell products, order supplies, and communicate with customers.

Cloud Computing

allows us to store personal files, even backup an entire drive on servers over the internet. Applications such as word processing and photo editing can be accessed using the cloud. Allows us to store personal files, even backup an entire drive on servers over the internet. Applications such as word processing and photo editing can be accessed using the cloud.

Extranet

an extranet to provide secure and safe access to individuals who work for a different organization but require access to the organization's data. Examples: - A company that is providing access to outside suppliers and contractors - A hospital that is providing a booking system to doctors so they can make appointments for their patients - A local office of education that is providing budget and personnel information to the schools in its district

Hosts

are classified all computers that are connected to a network and participate directly in network communication. The term hosts specifically refers to devices on the network that are assigned a number for communication purposes. Also known as "Clients" or "End Devices"

When data is encoded as pulses of light, which media is being used to transmit the data? wireless fiber-optic cables copper cable

fiber-optic cables

Congestion

occurs when the demand for bandwidth exceeds the amount available.

Fault Tolerant Network

one that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs. These networks depend on multiple paths between the source and destination of a message. If one path fails, the messages are instantly sent over a different link. Having multiple paths to a destination is known as redundancy.

Packet-Switched Network

one way that reliable networks provide redundancy. Packet switching splits traffic into packets that are routed over a shared network. A single message, such as an email or a video stream, is broken into multiple message blocks, called packets. Each packet has the necessary addressing information of the source and destination of the message. The routers within the network switch the packets based on the condition of the network at that moment. This means that all the packets in a single message could take very different paths to the same destination.

Internet Standard Organizations

the Internet Engineering Task Force (IETF), Internet Corporation for Assigned Names and Numbers (ICANN), and the Internet Architecture Board (IAB), plus many others.

Powerline networking

the connection of devices to the Internet through the use of existing electrical wiring. No data cables need to be installed, and there is little to no additional electricity used. Especially useful when wireless access points cannot reach all the devices in the home.

The internet

the largest network in existence. In fact, the term internet means a "network of networks". It is a collection of interconnected private and public networks.

Types of Network Media

• Metallic wires within cables - data is encoded into electrical impulses • Glass or plastic fibers (fiber optic cable) - data is encoded as pulses of light • Wireless transmission - data is encoded using wavelengths from the electromagnetic spectrum


Related study sets

Ch 18 Cardiovascular System Practice Qs A&P 2

View Set

BMGT 110f Midterm Exam - CHAPTER 10 Motivating Employees

View Set

Psychology of Advertising- Chapter 14

View Set

LC17: LearningCurve - Ch. 17: The Federal Budget: Taxes and Spending

View Set

Chem Chapter 6 Chemical Composition

View Set