Chapter 1 Explore the network Flashcards
Provides an interface between the human and the network.
End Devices
Provides Connectivity and ensures data flows across the network.
Intermediary Devices
Provides a channel for messages to travel from source to destination.
Network Media
(select the appropriate network architecture requirement) Network should always be available. [] Fault Tolerance [] Scalability [] Quality of Service [] Security
Fault Tolerance
(select the appropriate network architecture requirement)
Priority queues are implemented when demand for network bandwdith exceeds supply.[] Fault Tolerance
[] Scalability
[] Quality of Service
[] Security
quality of Service
(select the appropriate network architecture requirement)
Business and personal network equipment must be protected.
[] Fault Tolerance
[] Scalability
[] Quality of Service
[] Security
Security
Developing a plan for priority queuing is a strategy for quality delivery of information. [] Fault Tolerance [] Scalability [] Quality of Service [] Security
Quality of Service
(select the appropriate network architecture requirement)
Business and personal data must be protected.
[] Fault Tolerance
[] Scalability
[] Quality of Service
[] Security
Security
(select the appropriate network architecture requirement)
Networks can grow or expand with minimal impcat on performance.
[] Fault Tolerance
[] Scalability
[] Quality of Service
[] Security
Scalability
(select the appropriate network architecture requirement)
Data can travel trough more than one route for delivery from a remote source.
[] Fault Tolerance
[] Scalability
[] Quality of Service
[] Security
Fault Tolerance
(select the appropriate network architecture requirement)
Comon network standards allow hardware and software vendors to focus on product improvements and services.
[] Fault Tolerance
[] Scalability
[] Quality of Service
[] Security
Scalability
An attack which slows down or crashes equipment and programs.
Denial of Service
Creates a secure connection for remote workers.
Virtual Private Network (VPN)
Blocks unauthorized access to your network.
Firewall
Network attack that occurs on the first day that a vulnerability becomes known.
Zero-Day (-hour)