Chapter 1 Test Flashcards

1
Q

What is the human network?

A

Centers on the impact of the Internet and networks on people and businesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List some of the forms of communications that can be accessed by global audience.

A
A.  Instant messaging (IM) / Text
B.  Social media
C.  Collaboration tools
D.  Weblogs (blogs)
E.  Wikis
F.   Podcasting
G.  Peer-to-peer (P2P) File Sharing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of a SoHo or small office/home office?

A

These networks enable computers within the home office or a remote office to connect to a corporate network or access to centralized, shared resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the term Internet mean?

A

“Network of networks”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the simplest peer to peer network?

A

The simplest peer-to-peer network consists of two directly connected computers using a wired or wireless connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the advantages of peer to peer networking?

A

A. Easy to set up
B. Less complexity
C. Lower cost since network devices and dedicated servers may not be required.
D. Can be used for simple tasks such as transferring files and sharing printers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the disadvantages of peer-to-peer networking?

A

A. No centralized administration
B. Not as secure
C. Not scalable
D. All Devices may act as both clients and servers which can slow their performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List the three network infrastructure categories of network components.

A

A. Devices
B. Media
C. Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List examples of intermediary network devices.

A

A. Network access (switches and wireless access points)
B. Internetworking (routers)
C. Security (firewalls)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Processes running on the intermediary network devices perform what functions?

A

A. Regenerate and re-transmit data signals
B. Maintain information about what pathways exist through the network and Internetwork.
C. Notify other devices of errors and communication failures.
D. Direct data along alternate pathways when there is a link failure.
E. Classify and direct messages according to quality of service (QOS) priorities.
F. Permit or deny the flow of data, based on security settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the function of End Devices?

A

Provides an interface between the human network and the communication network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the function of Intermediary Devices?

A

Provides a connection for a host to the network and can connect multiple networks to form an internetwork.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the function of network media?

A

Provides a channel for messages to travel from source to destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is network media?

A

The media provides the channel over which the message travels from source to destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three most common types of media?

A

A. Metallic wires within cables
B. Glass or plastic fibers (fiber optic cable)
C. Wireless transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Different types of network media have different features and benefits. Not all network media has the same characteristics and is appropriate for the same purpose. What are the criteria for choosing network media?

A

A. The distance the media can successfully carry a signal
B. The environment in which the media is to be installed
C. The amount of data and the speed of which must be transmitted
D. The cost of the media and installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a physical topology diagram?

A

Identifies the physical location of intermediary devices, configured ports, and cable installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a logical topology diagram?

A

Identifies devices, ports, and IP addressing schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the two most common types of network infrastructure’s?

A

Local area network (L AN)

Wide area network (W AN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the two types of topology diagrams?

A

Physical topology

Logical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the local area network (L AN)?

A

A network infrastructure that provides access to users and end devices in a small geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a wide area network (W AN)?

A

A network infrastructure that provides access to other networks over a wide geographic area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a metropolitan area network (M AN)?

A

A network infrastructure that spans a physical area larger than an L AN but smaller than a W AN (E. G., A city). MANs are typically operated by a single entity such as a large organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a wireless L AN (WL AN)?

A

Similar to a L AN but wirelessly interconnects users and end points in a small geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a storage area network (SAN)?

A

A network infrastructure design to support file servers and provide data storage, retrieval, and replication. It involves high-end servers, multiple disc arrays (Called blocks), and fibre channel interconnection technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What specific features do LANs include?

A

A. LANs interconnect end devices in a limited area such as home, school, office building, or campus.
B. Usually administered by a single organization or individual. The administrative control that governs the security and access control policies are enforced on the network level.
C. Provide high-speed bandwidth to internal end devices and intermediary devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

WANs are typically managed by service providers (SP) or (ISP). What specific features do WANs include?

A

A. WANs interconnect LANs over wide geographical areas such as between cities, states, provinces, countries or counties.

B. Are usually administered by multiple service providers

C. Typically provide slower speed links between LANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the Internet?

A

a conglomerate of networks and is not owned by any individual or group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is an intranet?

A

A term often used to refer to a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organizations members, employees, or others with authorization. Intranets are basically an Internet which is usually only accessible from with in the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is an extranet?

A

Used to provide secure and safe access to individuals who work for a different organization but require company data.

Example: a company providing access to outside suppliers

31
Q

List the most common ways home users connect to the Internet through an ISP.

A
A. Cable
B. DSL
C. Cellular
D. Satellite
E. Dial-up telephone
32
Q

Business-class Internet is typically done through an SP, this may include?

A

A. Dedicated Leased Line

B. Metro Ethernet

C. DSL Satellite

33
Q

What Internet connection options are commonly used by Soho’s or small office home office users?

A
A. DSL
B. Cable
C. Cellular
D. Satellite 
E. Dial up telephone
34
Q

Out of all the Internet connection options which ones did not require a physical cable to be run to the building?

A

A. Cellular

B. Satellite

35
Q

What is a dedicated leased line?

A

This is a dedicated connection from the service provider to the customer premise. Reserved circuits that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate which tends to make it expensive. In North America, common least line circuits include T1 and T3 while in other parts of the world they are available in E1 and E3

36
Q

What is Metro ethernet?

A

Metro ethernet is typically available from a provider to the customer premise over a dedicated copper or fiber connection providing bandwidth speeds of 10 Mb/s to 10 gb/s. Ethernet over copper (EoC) is more economical than fiber optic ethernet service in many cases, quite widely available, and reachable speeds of up to 40 Mbps. However, ethernet over copper is limited by distance. Fiber optic ethernet service delivers the fastest connections available at an economical price per megabit. unfortunately, there are still many areas where the service is unavailable.

37
Q

What is business DSL?

A

Available in various formats. A popular choice is symmetric digital subscriber lines (SDSL) which is similar to asymmetric digital subscriber line (ADSL), but provides the same upload and download speeds. ADSL is designed to deliver been with a different rates downstream then upstream. For example, a customer getting Internet access may have downstream rates that range from 1.5 to 9 Mbps, whereas upstream bandwidth ranges are from 16 to 640 Kbps. ADSL Transmission work at distances up to 18,000 feet (5,488 meters) over a single copper twisted-pair.

38
Q

What is satellite service?

A

Can provide a connection when I wired solution is not available. Requires a clear line of sight. Equipment and installation costs can be high, with a moderate monthly fee thereafter. Connections tend to be slower and less reliable than it’s terrestrial competition, which makes it less attractive than other alternatives.

39
Q

What is a converged network?

A

Unlike dedicated networks, these networks are capable of delivering voice, video streams, text, and graphics between many different types of devices over the same communication channel and network structure.

40
Q

What are the four basic characteristics that underlying network architectures need to address in order to meet user expectations?

A
  • fault tolerance
  • scalability
  • Quality of service
  • security
41
Q

Explain how a network architecture is built to be fault-tolerant.

A

This type of network is one that limits the impact of a failure, so that the fewest number of devices are affected by it. It is also built in a way that allows quick recovery when such a failure occurs. These networks depend on multiple paths between the source and destination of the message. If one path fails, the messages can be instantly sent over a different link.

42
Q

What is redundancy?

A

Having multiple paths to a destination

43
Q

How does a circuit-switched connection work?

A

To understand the need for redundancy, we can look at how early telephone systems worked. When a person me to call using a traditional telephone set, the call first went through a set up process. This process identified the telephone switching locations between the person making the call (the source) and the phone set receiving the call (the destination). A temporary path, or circuit, was created for the duration of the telephone call. If any link or device in the circuit failed, The call was dropped. To reconnect, a new call had to be made, with the new circuit.

These types of networks give priority to existing circuit connections at the expense of new circuit requests. After circuit is established, even if no communication is occurring between the persons on either end of the call, the circuit remains connected and resources used until one of the parties disconnects the call. Because they are only so many circuits that can be created, it is possible to get a message that all circuits are busy in a call cannot be placed. The cost to create many alternate paths with enough capacity to support a large number of simultaneous circuits, and the technologies necessary to dynamically re-create dropped circuits in the event of a failure, is why this type of technology was not optimal for the Internet.

44
Q

How does a packet-switched connection work?

A

In the search for a network that was more fault-tolerant, the early Internet designers researched this type of network. The premise for this type of network is that a single message can be broken into multiple message box, with each message block containing addressing information to indicate the origin nation point and final destination. Using this embedded information, these messages blocks, called packets, can be sent to the network along various pass, and can be reassembled into the original message when reaching their destination.

45
Q

What is scalability within a network infrastructure?

A

This type of network can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users. Also refers to the ability to except new products and applications.

46
Q

What is the border?

A

The point where ISPs interconnect.

47
Q

What is the purpose of ISP tier 1?

A

This level provides national and international connections and treat each other as equals.

48
Q

What is the purpose of ISP tier 2?

A

This level is smaller and often provides regional service. This level usually pays tier 1 ISPs for connectivity to the rest of the Internet.

49
Q

What is the purpose of ISP tier 3?

A

the local providers of services directly to end users. They are usually connected to tier 2 ISPs and pay tier 2 providers for Internet access.

50
Q

What is Quality of Service?

A

Ensures predictable, measurable, and at times, guaranteed services. The packet-switched network architecture does not guarantee that all packets that compromise a particular message will arrive on time, in their correct order, or even that they will arrive at all.

Networks also need mechanisms to manage congested network traffic.

In most cases, when the volume of packets is greater than what can be transported across the network, devices Que, or hold, the packets in memory until resources become available to transmit them.

51
Q

What are the two types of network security concerns that must be addressed?

A

Network infrastructure security and information security

52
Q

What is network infrastructure security?

A

This includes the physical securing of devices that provide network connectivity, and preventing unauthorized access to the management software that resides on them.

53
Q

What is information security?

A

This refers to protecting the information contained with in the packets being transmitted over the network and the information stored on network attached devices. Security measures taken in the network should:

  • prevent unauthorized disclosure
  • prevent theft of information
  • prevent unauthorized modification of information
  • prevent denial of service
54
Q

What are the three primary requirements to achieve the goals of the network security?

A
  • ensuring confidentiality
  • maintaining communication integrity
  • ensuring availability
55
Q

What is ensuring confidentiality mean?

A

This means that only the intended an authorized recipient’s – individuals, processes, or devices – in excess and read data.this is accomplished by having a strong system for user authentication, enforcing passwords that are difficult to guess, and require users to change them frequently. Encrypt the data, so that only the intended recipient can read it, is also part of it.

56
Q

What does it mean to maintain communication integrity?

A

This means having the assurance that the information has not been altered and transmission, from origin to destination. Data integrity can be compromised when information has been corrupted – willfully or accidentally. Data integrity is made possible by requiring validation of the sender as well as used his mechanisms to validate that the packet has not changed during transmission.

57
Q

What is it mean to ensure availability?

A

This means having the assurance of tightly and reliable access to data services for authorized users. Network firewall devices, along with desktop and server antivirus software can access system reliability and the robustness to detect, repel, and cope with such attacks. Building fully redundant network infrastructure is, with few single point of failure, can reduce the impact of these threats.

58
Q

What is Bring Your Own Device (BYOD)?

A

The concept of any device, to any content, in anyway. It’s about end-users having the freedom to use personal tools to access information and communication across a business or campus network. This means any device, with any ownership, used anywhere.

59
Q

What is cloud computing?

A

The use of computing resources (hardware and software) that are delivered as a service over a network. A company can use this service for a fee. Local computers no longer have to do all the heavy lifting when it comes to running network applications. It is a global trend changing the way we access and store data.

60
Q

What are the four primary types of clouds?

A

A. Hybrid - made up of two or more clouds were each part remains a distinctive object, but both are connected using a single architecture

B. Private- intended for a specific organization or entity, such as the government. A private cloud can be set up using the organizations private network, this can be expensive to build and maintain

C. Custom- these are clouds build to meet the needs of the specific industry, such as healthcare or media. Custom clouds can be private or public

61
Q

What is a data center used for?

A

Cloud computing as possible because of these. It’s a facility used to house computer systems and associated components including:
-redundant data communication’s connections
-high-speed virtual servers (sometimes referred to as server farms or server clusters)
-redundant storage systems ( typically uses SAN technology)
-Redundant or backup power supplies
– Environment controls (e.g., air conditioning, fire suppression)
-security devices

Can occupy one room of the building, one or more floors, or an entire building

62
Q

What is powerline networking?

A

Emerging trend for home networking that uses existing electrical wiring to connect devices. The concept of no new wires means the ability to connect the device to the network where ever there is an electrical outlet. This saves the cost of installing data cables and without any additional cost to the electrical bill. using the same wiring that delivers electricity, this type of networking sends information by sending data on certain frequencies similar to the same technology used for DSL.

63
Q

What is a wireless Internet service provider ( WISP)?

A

This is an ISP that connects subscribers to a designated access point or hotspot using similar wireless technologies found in home wireless local area networks (WLANs).

64
Q

Where are WISPs most commonly found?

A

Rural environments where DSL or cable services are not available

65
Q

Another wireless solution for the home and small business is wireless broadband. Explain this technology.

A

Use the same cellular technology used to access the Internet with a smart phone or tablet. An antenna is installed outside the house providing either wireless or wired connectivity for devices in the home.

66
Q

Why should network security be implemented in multiple layers?

A

No single solution can protect the network from the variety of threats that exist. For this reason, security should be implemented in multiple layers, using more than one security solution. If one security component fails to identify and protect the network, others still stand.

67
Q

At a minimum, home or small office network security should include what options?

A

A. Antivirus and anti-spyware – to protect users devices for malicious software

B. Firewall filtering – to block unauthorized access to the network. This may include a host based firewall system that is implemented to prevent unauthorized access to the host device, or A basic filtering service on the home router to prevent unauthorized access from the outside world into the network.

68
Q

What other security options should larger networks include?

A

A. Dedicated firewall systems – to provide more advanced firewall capability that can filter large amounts of traffic with more granularity.

B. Access control lists (ACL)– to further filter access and traffic forwarding

C. Intrusion prevention system (IPS) – to identify fast spreading threats, such a zero day or zero our attacks.

D. Virtual private network’s (VPN) – to provide secure access to remote workers

69
Q

What is denial of service?

A

An attack which slows down or crashes equipment and programs.

70
Q

What is access control list (ACL)?

A

Filters network access and data traffic.

71
Q

What is a firewall?

A

Blocks unauthorized access to your network

72
Q

What is Zero-day (-hour)?

A

A network attack that occurs on the first day that a vulnerability becomes known.

73
Q

What is a virus, warm, or Trojan horse?

A

Arbitrary code running on users devices.

74
Q

What is the IoE ( Internet of Everything )?

A

Brings together people, process, data, and things to make networked connections more relevant and valuable.