Networking Chapter 1

Ace your homework & exams now with Quizwiz!

With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?

Quality of Service

Video communications

Video is used for communications, collaboration, and entertainment. Video calls are made to and from anyone with an internet connection, regardless of where they are located

What are the several common threats to networks?

Viruses, worms, and trojan horses, Spyware and adware, Zero-day attacks, threat actor attacks, denial of service attacks, data interception and theft, identity theft

Which network infrastructure provides access of other networks over a large goegraphical area, which is most often owned and managed by a telecommunications service provider?

WAN

Physical port

a connector or outlet on a networking device where the media conncects to an end device or another networking device

Intermediary devices

connect the individual end devices to the network; can also connect multiple individual networks to form an internetwork. These intermediary devices provide connectivity and ensure that data flows across the network

Bring your own device (BYOD)

enables end users the freedom to use personal tools to access information and communicate across a business or campus netowork.

Ethernet hub

ethernet hub is also known as a multiport repeater. Repeaters regenerate and retransmit communication signals

Advantages of peer to peer networking

easy to set up, less complex, lower cost, can be used for simple tasks such as transferring files and sharing printers

Congestion

occurs when the demand for bandwidth exceeds amount available

Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?

Fault tolerance

Which connection physically conects the end device to the network?

NIC network

Which feature uses the same cellular technology as a smart phone?

Wireless broadband

What is the rate for best customers called?

The Prime Rate

What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?

Scalability

When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved?

Scalability

Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?

Security

Extranet

provides secure and safe access to individuals who work for a different organization but require access to the organization's data.

Media

provides the channel over which the message travels from source to destination

Fiber-optic cable

Data is encoded into pulses of light

Side note:

the terms port and interface are often used interchangably

...

...

Which feature contains options such as Public, Private, Custom and Hybrid?

Cloud Computing

3 types of media to interconnect devices

Metal wires within cables, Glass/plastic fibers within cables (fiber-optic cables), wireless transmission

USB

Universal serial bus

Local area networks (LANs)

a network infrastructure that spans a small geographical area.

Logical topology

illustrate devices, ports, and the addressing scheme of the network

Topography diagrams

mandatory documentation for anyone working with a network. They provide a visual map of how the network is connected.

Network interface card (NIC)

physically connects the end device to the network

Power networking

uses existing electrical wiring to connect to connect drives

Criteria to consider when choosing network media

what is the maximum distance that the media can successfully carry a signal, what is the environment in which the media will be installed, what is the amount of data and at what speed must it be transmitted, what is the cost of the media and installation?

List the types of network medias

wireless media, LAN media, WAN media

The internet

worldwide collection of interconnected networks (internetworks or just internet for short).

Two types of topology diagrams

Physical and logical

Satellite service

Satellite service can provide a connection when a wired solution is not available.

Community clouds

A community cloud is created for exclusive use by specific entities or organizations. The differences between public clouds and community clouds are the functional needs that have been customized for the community. For example, healthcare organizations must remain compliant with policies and laws (e.g., HIPAA) that require special authentication and confidentiality. Community clouds are used by multiple organizations that have similar needs and concerns. Community clouds are similar to a public cloud environment, but with set levels of security, privacy, and even regulatory compliance of a private cloud.

Examples of extranets

A company that is providing access to outside suppliers and contractors. A hospital that is providing a booking system to doctors so they can make appointments for their patients. A local office of education that is providing budget and personnel information to the schools in its district

In which scenario would the use of a WISP be recommended?

A farm in a rural area without wired broadband access

Hybrid clouds

A hybrid cloud is made up of two or more clouds (example: part private, part public), where each part remains a distinct object, but both are connected using a single architecture. Individuals on a hybrid cloud would be able to have degrees of access to various services based on user access rights.

Threat actor attacks

A malicious person attacks user devices or network resources.

Wide area networks (WANs)

A network infrastructure that spans a wide geographical area; typically managed by service providers (SPs) or internet service providers (ISPs)

Scalability

A scalable network expands quickly to support new users and applications. It does this without degrading the performance of services that are being accessed by existing users.

Small office and home office networks

Allows computers in a home office or remote office to connect to a corporate network, or access centralized, shared resources

Zero-day attacks

Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.

Wireless broadband service

An antenna is installed outside the house providing either wireless or wired connectivity for devices in the home. In many areas, home wireless broadband is competing directly with DSL and cable services.

Dial-up Telephone

An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is not sufficient for large data transfer, although it is useful for mobile access while traveling.

Which feature describes using personal tools to access information and communicate across a business or campus network?

BYOD

How does BYOD change the way in which businesses implement networks?​

BYOD provides flexibility in where and how users can access network resources

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?

Bring your own device

Business DSL

Business DSL is available in various formats. A popular choice is Symmetric Digital Subscriber Line (SDSL) which is similar to the consumer version of DSL but provides uploads and downloads at the same high speeds.

Cellular

Cellular internet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected.

Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)

Cellular, satellite

Private clouds

Cloud-based applications and services offered in a private cloud are intended for a specific organization or entity, such as a government. A private cloud can be set up using the organization's private network, though this can be expensive to build and maintain. A private cloud can also be managed by an outside organization with strict access security.

Public clouds

Cloud-based applications and services offered in a public cloud are made available to the general population. Services may be free or are offered on a pay-per-use model, such as paying for online storage. The public cloud uses the internet to provide services.

In order to achieve the goals of network security there are three primary requirements that must be met

Confidentiality, integrity, availability

Small home networks

Connect a few computers to each other and the internet

Metal wires within cables

Data is encoded into electrical impulses

What are some other security requirements for larger networks?

Dedicated firewall systems, access control lists, intrusion prevention systems, virtual private networks

Which attack slows down or crashes equipment and programs?

Denial of service (DoS)

List the types of end devices

Desktop computers, laptops, printer, IP phone, wireless tablet, telepresence endpoint

DSL

Digital Subscriber Lines also provide high bandwidth, high availability, and an always-on connection to the internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.

Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data?

Extranet

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

Extranet

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

Fault tolerance

Fault Tolerance

Fault tolerant networks limit the number of affected devices during a failure.

When data is encoded as pulses of light, which media is being used to transmit the data?

Fiber-optic cable

Which option blocks unauthorized access to your network?

Firewall

Firewall filtering

Firewall filtering blocks unauthorized access into and out of the network. This may include a host-based firewall system that prevents unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network.

What are two characteristics of a scalable network? (Choose two.)

Grows in size without impacting existing users, suitable for modular devices that allow for expansion

Which of the following is the name for all computers connected to a network that participate directly in network communication?

Hosts

I.P. Address

Identifies the host and the network to which the host is attached

Physical topology

Illustrate the physical location of intermediary devices and cable installation

Wireless broadband

In many areas where cable and dsl are not available, wireless may be used to connect to the internet

Which connections are specialized ports on a networking device that connect to individual networks?

Interface

What is the Internet?

It provides connections through interconnected global networks

A company that is providing access to outside suppliers and contractors. A hospital that is providing a booking system to doctors so they can make appointments for their patients. A local office of education that is providing budget and personnel information to the schools in its district

LAN

Characteristics of lans

LANs interconnect end devices in a limited area such as a home, school, office building, or campus. A LAN is usually administered by a single organization or individual. Administrative control is enforced at the network level and governs the security and access control policies. LANS provide high-speed bandwidth to internal end devices and intermediary devices

Dedicated Leased Line

Leased lines are reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate.

Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used?

Logical topology

Online collaboration

Online collaboration is the act of using collaboration tools such as cisco webex, to give employees, students, teachers, customers, and partners a way to instantly connect, interact, and achieve their objectives.

Which type of network topology lets you see the actual location of intermediary devices and cable installation?

Physical topology

Which feature is being used when connecting a device to the network using an electrical outlet?

Powerline

What are the 4 types of cloud types?

Public clouds, private clouds, hybrid clouds, community clouds

Functions of intermediary network devices

Regulate and retransmit communication signals, maintain information about what pathways exist through the network and internetwork, notify other devices of errors and communication failures, direct data along alternate pathways if there is a link failure, classify and direct messages according to priorities, permit or deny the flow of data based on security settings

Which two devices are intermediary devices (choose two)

Routers, Switches

Satellite

The availability of satellite internet access is a benefit in those areas that would otherwise have no internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.

What type of network must a home user access in order to do online shopping?

The internet

Worldwide networks

The internet is a network of networks that connects hundreds of millions of computers world-wide

Antivirus and antispyware

These applications help to protect end devices from becoming infected with malicious software

Spyware and adware

These are types of software which are installed on a user's device. The software then secretly collects information about the user.

Denial of service attacks

These attacks slow or crash applications and processes on a network device.

Viruses, worms, and Trojan horses

These contain malicious software or code running on a user device.

Access control lists (ACL)

These further filter access and traffic forwarding based on IP addresses and applications.

Intrusion prevention systems (IPS)

These identify fast-spreading threats, such as zero-day or zero-hour attacks.

Dedicated firewall systems

These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.

Virtual private networks (VPN)

These provide secure access into an organization for remote workers.

What are two functions of end devices on a network? (Choose two.)

They originate the data that flows through the network, they are the interface between humans and the communication network

Data interception and theft

This attack captures private information from an organization's network.

Identity theft

This attack steals the login credentials of a user in order to access private data.

Metro Ethernet

This is sometimes known as Ethernet WAN. In this module, we will refer to it as Metro Ethernet. Metro ethernets extend LAN access technology into the WAN. Ethernet is a LAN technology you will learn about in a later module.

Clients

Type of host that has software for requesting and displaying the information obtained from the server, examples enclude web browsers

Cable

Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.

Medium to large networks

Used by corporations and schools, can have many locations with hundreds or thousands of interconnected hosts

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

VPN

Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country?

Video communications

Which option creates a secure connection for remote workers?

Virtual Private Network (VPN)

Which option describes malicious code running on user devices?

Virus, worm, or trojan horse

Characteristics of WANs

WANs interconnect LANs over wide geographical areas such as between cities, states, provinces, countries, or continents. Wans are usually administered by multiple service providers. Wans typically provide slower speed links between LANs

List the types of intermediary devices

Wireless router, lan switch, router, multilayer switch, firewall appliance

Which option describes a network attack that occurs on the first day that a vulnerability becomes known?

Zero-day/zero-hour

Which device performs the function of determining the path that messages should take through internetworks?

a router

Cloud computing

allows us to store personal files, even backup on an entire drive on servers or over the internet

Wireless internet service provicer (WISP)

an ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs). WISPs are more commonly found in rural environments where DSL or cable services are not available.

Quality of service

an increasing requirement of networks today, primary mechanism for managing congestion and ensuring reliable delivery of content to all users.

Availibility

data availability assures users of timely and reliable access to data services for authorized users.

Confidentiality

data confidentiality means that the intended and authorized recipients can access and read data.

Integrity

data integrity assures users that the information has not been altered in transmission, from origin to destination.

Wireless transmission

data is encoded via modulation of specific frequencies of electromagnetic waves.

What is an ISP?

it is an organization that enables individuals and businesses to connect to the internet

End devices

network devices most people are familiar with. To distinguish one end device from another, each end device on a network has an address. When an end device initiates communication, it uses the address of the destination end device to specify where to deliver the message; an end device is either the source or destination of a message transmitted over the network.

Disadvantages of peer to peer networking

no centralized administration, not as secure, not as scalable, all devices may act as both clients and servers which can slow their performance

Intranet

often used to refer to a private connection of LANS and WANs that belongs to an organization. An intranet is designed to be accessible only by the organization's members, employees, or others with authorization.

Network infrastructures vary greatly in terms of...

size of the area covered, number of users connected, number and types of services available, area of responsibility

Interface

specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router or referred to as network interfaces

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

spyware

Network security

the network infrastructure, services, and the data contained on network attached devices are crucial personal and business assets. Network administrators must address two types of network security concerns: network infrastructure security and information security.


Related study sets

AP WORLD UNIT 4: Japan, China, and Russia

View Set

Accounting Senior Sem Midterm pt 2

View Set

State Laws, Rules, and Regulations

View Set

Ch. 37: Management of Patients With HIV Infection and AIDS

View Set