1. Introduction to Networking Flashcards

1
Q

What are the names of computer that send requests to the servers to retrieve information

A
  1. Clients
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the name for every computer on a network? ( 2 )

A
  1. Host
  2. End Device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are servers?

A
  1. Computers that provide information to end devices
  • Email Server
    Web Server
    File Server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What scenario does Pear-to-Pear is recommended for?

A
  1. Very Small Networks ( Bluetooth )
  • It was decentralized
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the advantages of using Pear-to-Pear? ( 4 )

A
  1. Easy to set up ( no cable / just using some cable )
  2. Less complex
  3. Lower cost ( doesn’t need a server )
  4. Used for single tasks ( transferring files & sharing printers )
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the disadvantages of using Pear-to-Pear? ( 4 )

A
  1. No centralized administration
  2. Not as secure
  3. Not scalable
  4. Slower performance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the purpose of Intermediary Network Devices?

A
  1. To connect end devices ( computers, receiver ) to server ( sender )
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is end devices?

A
  1. Devices where a message originates from or where it is received
  • End Devices ( data ) -> Network ( Flow Through ) -> End Device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List out the examples of Intermediary Network Devices ( 5 )

A
  1. Switches
  2. Wireless Access Points
  3. Routers
  4. Firewalls
  5. Cables
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the role of Intermediary Network Devices in the management of data? ( 3 )

A
  1. Regenerate and retransmit data signals
  2. Maintain information about what pathways exist in the network
  3. Notify other devices of errors and communication failures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List out the Network Media types and descriptions ( 3 )

A
  1. Metal Wires within Cables ( Copper Cable )
    • Convert into electrical impulses
  2. Glass or Plastic Fibers within cables ( fibre-optic cable )
    • Convert into light
  3. Wireless Transmission
    • Convert into modulation of specific frequencies of electromagnetic waves
  • Communication is carry through a medium which allows a message to travel from source to destination
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is network diagrams often called as?

A
  1. Topology Diagrams
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the important terms we need to learn? ( 3 )

A
  1. Network Interface Card ( NIC )
  2. Physical Port
  3. Interface
  • Note that terms port and interface are used interchangeably
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List out end devices ( 6 )

A
  1. Desktop Computer
  2. Laptop Computer
  3. Printer
  4. IP Phone
  5. Wireless Tablet
  6. TelePresence Endport
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What network diagram uses to represent devices within the network?

A
  1. Symbols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of physical topology diagrams

A
  1. Illustrate the physical location of intemediary device and cable installation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of logical topology diagrams

A
  1. Illustrate devices ports, and the addressing scheme of the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

List out the size of networks ( 4 )

A
  1. Small Home Network
  2. SOHO ( Small Office / Home Office )
  3. Medium to Large Networks
  4. World Wide Networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

List out the 2 most common types of network

A
  1. LAN ( Local Area Network )
  2. WAN ( Wide Area Network )
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How was the network type ( LAN, WAN, MAN ) determined? ( 4 )

A
  1. Size of area covered
  2. Number of users connected
  3. Number and types of services available
  4. Area of responsibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the difference between LAN and WAN? ( 3 )

A
  1. Area
    • Interconnect end deveices in a limited area
    • Interconnect LAN over wide geographical areas
  2. Administration
    • By single organization or individual
    • By one or more service providers
  3. Speed
    • Provide high-speed bandwidth to internal devices
    • Typically provide slower speed between LANs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Internet?

A
  1. A worldwide collection of interconnected LANs and WANs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

LANs are connected to each other using what?

A
  1. WAN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

WAN may use what for transmissions? ( 3 )

A
  1. Copper Wires
  2. Fiber Optic
  3. Wireless Transmissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The internet is not owned by any individual or group, but there are some groups developed to help maintain structure on the internet, list out the group ( 3 )

A
  1. IETF (Internet Engineering Task Force)
  2. ICANN (Internet Corporation for Assigned Names and Numbers )
  3. IAB (Internet Architecture Board)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is an intranet?

A
  1. A private collection of LANs and WANs internal to an organizations that is meant to be accessible only to the organizations members or others with authorization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the difference between intranet, extranet and internet?

A
  1. Intranet - company only
  2. Extranet - suppliers, customers
  3. Internet - the world
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Why does an organization uses extranet?

A
  1. To provide secure access to their network for individuals who work for a different organization that need to access to their data on their network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

How does home users and small offices connect to the internet? ( 5 )

A
  1. Brodband Digital Subscriber Line ( DSL )
  2. Wireless WANs
  3. Mobile Services ( Cellular )
  4. Broadband Cable
  5. Dial-up Telephone
30
Q

How does organizations connect to the internet? ( 1 )

A
  1. Faster connections to support
    • IP phones,
    • Video conferencing
    • Data center storage
31
Q

How does business-class connect to the internet? ( 4 )

A
  1. Business DSL
  2. Leased Lines
  3. Metro Ethernet
  4. Satellite
32
Q

What area that satellite provide major benefit ?

A
  1. Rural Areas
33
Q

What connections that fit this description ?
An inexpensive, low bandwidth option using a modem

A
  1. Dial-up phone
34
Q

What device uses cellular to connect to the internet

A
  1. Cell phone
35
Q

Which connections types offers high bandwidth, always on service by ISP?

A
  1. Cable ( Offered by cable television service providers )
  2. DSL ( Internet connection that runs over a telephone line )
36
Q

Corporate business connection require what ? ( 3 )

A
  1. Higher bandwidth
  2. Dedicated connections
  3. Managed services
37
Q

When does businees need to use satellite for connection?

A
  1. When wired solution is not possible
38
Q

Which type of connection that connect distant offices with private voice and/or data networking

A
  1. Dedicated Leased Line
39
Q

What does Ethernet WAN do ? ( Business )

A
  1. Access technology into the WAN
40
Q

What can converging network do?

A
  1. Deliver data, voice and video over the same network infrastructure
  • Before converging network, people cabled for telephone, send videos, data using different network
41
Q

What is Network architecture?

A
  1. Refers to the technologies that support the infrastructure that moves data across the network
42
Q

What are the four basic characteristics for a reliable network?

A
  1. Fault Tolerance ( Stability )
  2. Scalability
  3. Quality of Service ( QoS )
  4. Security
43
Q

What can fault tolerance do ? ( 2 )

A
  1. Limits the impact of a failure by limiting the number of affected deveices
  2. Continue operating despite failures or malfunctions
44
Q

What are required for fault tolerance?

A
  1. Multiple paths
45
Q

What does reliable network provide when implementing a packet switched network

A
  1. redundancy
46
Q

How does reliable network provide redundancy by implementing a packet switched network ? ( 2 )

A
  1. Packet switching splits traffic into packets that are routed over a network
  2. Each packet could theoretically take a different path to the destination

Packet Switched Network vs Circult Switched Network in Notion

47
Q

Which network is not possible for using fault tolerance?

A
  1. Circuit-switched networks
48
Q

What can a scalable network do? ( 2 )

A
  1. Expand quickly
  2. Expand easily
49
Q

What activities consume more bandwidth

A
  1. Voice Transmissions
  2. Video Trnasmissions
  • Real-Time Application
50
Q

What is Quality of Service ( QoS ) ?

A
  1. Is the primary mechanism used to ensure reliable delivery of content for all users
51
Q

What can QoS policy do to improve network quality?

A
  1. Manage the flow of data and voice traffic through priority
52
Q

Which network components that manages the quality of service?

A
  1. Router
53
Q

How does router manages the quality of services?

A
  1. Deciding on the priority
  • Web-pages receive lower priority
    Video-conference receive higher priority
54
Q

What are the main types of network security must be addressed? ( 5 )

A
  1. Network infrastructure security
  2. Physical security of network devices
  3. Preventing unauthorized access to the devices
  4. Information Security
  5. Protection of the information or data transmitted over the network
55
Q

What are the 3 main goals of network security?

A
  1. Confidentially
    • Only intended recipients can read the data
  2. Integrity ( Quality )
    • Assure that the data won’t altered during transmission
  3. Availability
    • Assure timely and reliable access to data for authorized users
56
Q

List out new network trends

A
  1. Bring Your Own Device ( BYOD )
  2. Online Collaboration
  3. Video Communications ( Video Calls, Conferencing )
  4. Cloud Computing
57
Q

What does cloud computing allow us? ( 2 )

A
  1. Store personal files
  2. Backup data on servers over the internet
58
Q

How is cloud computing possible?

A
  1. It was possible by using data centers
59
Q

List out the four types of cloud

A
  1. Public Clouds
    • Available to the public through payment or free
  2. Private Clouds
    • For specific organization or entity ( government )
  3. Hybrid Clouds
    • Made up of 2 or more cloud types
    • Combination of public and private clouds
  4. Custom Clouds
    • Built to meet the needs for a specific industry ( healthcare )
    • It can be private or public
60
Q

What is smart home technology?

A
  1. Allows technology to be integrated into every-day appliances which allows them to interconnect with other devices
    * Examples : Ovens might know what time to cook a meal
61
Q

List out the example for a smart home

A
  1. Ovens might know what time to cook a meal for you by communicating with your calendar on what time you are scheduled to be home
62
Q

What does powerline networking allow devices do?

A
  1. Connect to a LAN where data network cables or wireless communications are not a viable option
63
Q

What is Wireless Internet Service Provider ( WISP )

A
  1. An ISP that connects subscribers to designated access points or hotspots
64
Q

What condition is best for using wireless broadband? ( 2 )

A
  1. Home
  2. Small Business
65
Q

What are the technologies used in wireless broadband ?

A
  1. Cellular technology used by smart phone
66
Q

List out the external threats ( 7 )

A
  1. Viruses, worms, and trojan horses
  2. Spyware and adware
  3. Zero-day attacks ( Exploit unknown software vulnerabilities )
  4. Threat Actor attacks ( Malicious actions by various entities (e.g., hackers, nation-states) )
  5. Denial of service attacks ( Overwhelm a system to make it unavailable )
  6. Data interception and theft ( Unauthorized access and theft of data during transmission )
  7. Identity theft ( Stealing personal information to impersonate the victim )
67
Q

List out all the internal threats

A
  1. Lost or Stolen devices
  2. Accidental Misuse by Employees
  3. Malicious Employees
68
Q

What can home or small office network do to prevent security threads? ( 2 )

A
  1. Install antivirus and antispyware software on end devices
  2. Use firewall to block unauthorized access to the network
69
Q

What can larger network do to prevent security threads? ( 2 )

A
  1. Dedicated firewall system
  2. Access Control Lists ( ACL )
  3. Intrusion Prevention System ( IPS )
  4. Virtual Private Networks ( VPN )
70
Q

What does the study of network security starts

A
  1. A clear understanding of the underlying switching and routing infrastructure
71
Q

What does the Cisco Certified Network Associatate ( CCNA ) certification provides? ( 2 )

A
  1. Demonstrates that you have a knowledge of foundational technologies
  2. Ensure you stay relevant with skills needed for the adoption of next-generation technologies
72
Q

What does the new CCNA focus on? ( 2 )

A
  1. IP foundation and security topics
  2. Wireless virtualization automation, and network programmability