Chapter 1 Flashcards

1
Q

Name the advantages and disadvantages of peer-to-peer networking.

A

Adv:
Easy to set up
Less complexity
Lower cost (since network devices and dedicated servers may not be required.
Can be used for simple tasks, such as transferring files and sharing printers.

DisAdv:
No centralized administration
Not as secure
Not scalable
All devices may act as both clients and servers, which can slow their performance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Scalability

A

A scalable network can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users. The figure shows how a new network can be easily added to an existing network. In addition, networks are scalable because the designers follow accepted standards and protocols. This allows software and hardware vendors to focus on improving products and services without worrying about designing a new set of rules for operating within the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security
The network infrastructure, services and the data contained on network attached devices are crucial personal and business assets. There are two types of network security concerns that must be addressed. What are they?

A

network infrastructure security and information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Securing a network infrastructure includes the physical securing of devices that provide network connectivity, and preventing unauthorized access to the management software that resides on them.

Information security refers to:

A

protecting the information contained within the packets being transmitted over the network and the information stored on network attached devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three primary requirements needed to achieve network security?

A

1 - Confidentiality: data confidentiality means that only the intended and authorized recipients can access and read data.
2 - Integrity: Data integrity means having the assurance that the information has not been altered in transmission from origin to destination.
3 - Availability: data availability means having the assurance of timely and reliable access to data services for authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name some of the most common external threats to networks. Include definitions.

A

1) Viruses, worms and trojan horses - malicious software and arbitrary code running on a user device.
2) Spyware and adware - software installed on a user device that secretly collects information about the user.
3) Zero-day attacks (also called zero-hour attacks) - an attack that occurs on the first day that a vulnerability becomes known.
4) Hacker attacks - an attack by a knowledgeable person to user devices or network resources.
5) Denial of service attacks - attacks designed to slow or crash applications and processes on a network device.
6. Data interception and theft - an attack to capture private information from an organization’s network.
7. Identity theft - an attack to steal the login credentials of a user in order to access private data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

There have been studies shown that the most common data breaches happen because of ____.

A

internal users of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When developing a security policy, it is important to address both ___ and ___ security threats.

A

external and internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define what a “Host” is.

A

end device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a “server”?

A

Computers with software; provides information to other end devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define a “client”.

A

Computers with software installed that enable them to request or display information obtained from the server or web browser (chrome/firefox)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name several types of clients and several types of servers.

A

Clients: Web, file, email
Servers: email, web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define “peer-to-peer”.

A

Computers that function as the server and client on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What makes up the network infrastructure? Define what they are.

A

Devices and Media - the physical elements or hardware.

Services - network apps people use everyday. email hosting/web hosting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define “Intermediary Network Devices”.

A

connected end devices to the network and connect multiple individual networks to form an inter-network, provide connectivity and ensure data flows across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name some types of Intermediary Devices:

A

router, LAN switch, multi-layer switch, firewall appliance

17
Q

Name some Network Media (Medium).

A

Metallic wires, fiber, wireless

18
Q

Name the two types of Topology and define.

A

Physical - ID’s physical locations of intermediary devices and cable installation
Logical - ID’s devices, ports, and addressing schemes

19
Q

Name some types of Networks:

A

LAN, WAN, WLAN, SAN, MAN, PAN

20
Q

WANs are typically managed by ___.

A

Service providers or internet service providers

21
Q

LANs use ___ services to inter-connect.

A

WAN

22
Q

Define internet (lower case):

A

multiple networks inter-connected

23
Q

Define Internet (capital “I”)

A

World Wide Web

24
Q

Define Intranet

A

private connection of LANs and WANs that belong to an organization.

25
Q

Define Extranet

A

provides secure and safe access to indificuals who work for different organizations but require access to an organization’s data.

26
Q

Name some types of home/small office internet connections.

A

cable, DSL, cellular, satellite, dial-up, fiber

27
Q

Name some types of business internet connections.

A

dedicated leased line, ethernet WAN, DSL, satellite

28
Q

Multiple services are running on ____.

A

multiple networks

29
Q

Converged data networks carry ___ on one network.

A

multiple

30
Q

Name four characteristics of Network Architecture (reliable networks)

A

fault tolerances, scalability, quality of service (QoS), security

31
Q

Having multiple paths to a distribution is known as ___.

A

redundancy

32
Q

What is BYOD?

A

any device with any ownership used anywhere

33
Q

Name some types of clouds

A

public, private, hybrid, custom

34
Q

What is power-line networking?

A

connects a device to a network where ever there’s an electrical outlet

35
Q

Name some network security components for home/small business and define.

A

Antivirus or Spyware - protects end devices from malicious software
Firewall Filtering - blocks unauthorized access to internet.

36
Q

Name some network security components for larger networks and define.

A

Dedicated Firewalls - filters larger amounts of traffice with more graviibivity. I can’t read your handwriting.
Access Control List - filters access and traffic forwarding.
Intrusion Prevention - ID’s fast spreading threats, zero day or hour attacks.
Virtual Private Networks - secures access to remote workers.

37
Q

What do routers and switches do?

A

transfer data, voice and video communications.

38
Q

What does CCNA stand for?

A

Cisco Certified Network Associate

39
Q

The ___ is the platform that supports the network.

A

network infrastructure