Chapter One Flashcards

1
Q

Server

A

computer hardware or software that is used by multiple concurrent issuers or provides services to many users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Client

A

a network device that remotely accesses a service on another computer through a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

End Device

A

either the source or destination of a message transmitted over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Intermediary Device

A

a device that connects end devices to the network and can connect multiple individual networks to form an internetwork.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Topology

A

the arrangement networking components or nodes. Examples include star, extended star, ring, and mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Local-Area Networks (LAN’s)

A

a network infrastructure that provides access to users and end devices in a small geographic area, which is typically an enterprise, a home, or a small business network owned and managed by an individual or an IT department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Small Office and Home Office (SOHO) Networks

A

a network in which computers can connect to a corporate network or access centralized, shared resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wide-Area Networks (WAN’s)

A

a network infrastructure that provides access to other networks over a wide geographic area, which is typically owned and managed by a telecommunications service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Internet

A

a network that combines enterprise networks, individual users, and ISP’s into a single global network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Intranet

A

a private connection of LANs and WANs that belongs to an organization and that is designed to be accessible only by the organization’s members, employees, or others with authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Extranet

A

part of a network that provides secure and safe access to individuals who work for a different organization but require access to the organization’s data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet Service Provider (ISP)

A

a company that helps create the internet by providing connectivity to enterprises and individuals as well as interconnecting to other ISPs to create connectivity to all other ISPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Digital Subscriber Line (DSL)

A

an always-on internet service that provides high bandwidth and high availability. Voice and data signals are carried on different frequencies on the copper telephone wires. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cellular Connection

A

cellular internet access uses a cell phone network to connect. Wherever a user can get a cellular signal, the user can get cellular internet access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Satellite Connection

A

internet access is provided using satellites and satellite dishes to serve areas that would otherwise have no Internet connectivity at all. A satellite dish requires a clear line of sight to the satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dialup Telephone Connection

A

an inexpensive communications option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is not sufficient for large data transfer, although it is useful for mobile access while traveling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fault Tolerant Network

A

a term for limiting the impact of a failure so that the fewest number of devices are affected and for the shortest time

18
Q

Converged Data Network

A

a network that aggregates various forms of traffic, such as voice, video, and data, on the same network infrastructure

19
Q

Scalable Network

A

a network that can expand quickly to support new users and applications

20
Q

Confidentiality

A

the state of ensuring that only intended and authorized recipients – individuals, processes, or devices – can access and read data. Confidentiality is accomplished by having a strong system for user authentication, enforcing passwords that are difficult to guess, and requiring users to change passwords frequently. Encrypting data so that only the intended recipient can read is also part of confidentiality

21
Q

Quality of Service (QoS)

A

a control mechanism that can provide different priorities to different users or data flows or guarantee a certain level of performance to a data flow in accordance with requests from the application program

22
Q

Integrity

A

the assurance that information has not been altered in transmission from origin to destination. Data integrity can be compromised when information has been corrupted – willfully or accidentally. Data integrity is made possible by requiring validation of the sender as well as using mechanisms to validate that the packet has not changed during transmission

23
Q

Availability

A

the assurance of timely and reliable access to data services for authorized users. Network firewall devices, along with desktop and server anti-virus software, can ensure system reliability and robustness in detecting, repelling, and coping with breaches of network security. Building fully redundant network infrastructures with few single points of failure can reduce the impact of these threats

24
Q

Bring Your Own Device (BYOD)

A

a policy that allows end users to use personal tools to access information and communicate within the network or on another network

25
Q

Cloud Computing

A

computing resources (hardware and software) delivered as a service over a network. A company uses the hardware and software in the cloud, and a service fee is charged

26
Q

Powerline Networking

A

an emerging trend for home networking that uses existing electrical wiring to connect devices

27
Q

Wireless Internet Service Provider

A

an ISP that connects subscribers to a designated access point or hotspot using wireless technologies similar to those found in home wireless local-area networks.

28
Q

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. What type of threat is affecting this computer?
A. DoS Attack
B. identity theft
C. Spyware
D. zero-day attack

A

C. Spyware is a type of software that is installed on a user’s device to collect information about the user.

29
Q

Which term refers to a network that provides secure access to the corporate offices for suppliers, customes, and collaborators?
A. internet
B. intranet
C. extranet
D. extended net

A

C. An organization may use an extranet to provide secure and safe access to individuals who work for a different organization but require access to the organization’s data.

30
Q

A large corporation has modified its network to allow users to access network resources from their personal laptops and smatphones. Which networking trend does this describe?
A. cloud computing
B. online collaboration
C. BYOD
D. video conferencing

A

C. BYOD gives end users the freedom to use personal devices to access information and communicate across a business or campus network.

31
Q

What is an ISP?
a. it is a standards body that develops cabling and wireing standards for networking
b. it is a protocol that establishes how computers in a local network communicate
c. it is an organization that enables individuals and businesses to connect to the internet
d. it is a networking device that combines the functionality of several different networking devices into one

A

C. home users, remote workers, and small offices typically require a connection to an ISP (internet service provider) to access the internet

32
Q

For which of the following would the user of a WISP be reccomended?
a. an internet cafe in a city
b. a farm in a rural area without wired broadband access
c. any home with multiple wireless devices
d. an apartment in a building with cable access to the internet

A

B. a wireless internet service provider (WISP) id an ISP that connects subscribers to a designated access point or hotspot using wireless technologies similar to those in home wireless local-area networks (WLAN’s). WISPs are most commonly found in rural environments where DSL or cable services are not available.

33
Q

What characteristics of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?
a. reliability
b. scalability
c. quality of service
d. accessibility

A

B. a scalable network expands quickly to support new users and applications

34
Q

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber-optic cable that connects two of the existing dormitories to the campus data-center. Although the cable has been cut, students in the dormitories experience only a very short interruption of network services. What characteristic of the network is described here?
a. quality of service
b. scalability
c. security
d. fault tolerance
e. integrity

A

D. a fault-tolerant network limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs.

35
Q

What are two-characteristics of a scalable network? (choose two)
a. easily overloaded with increased traffic
b. grows in size without impacting existing users
c. is not as reliable as a small network
d. suitable for modular devices that allow for expansion
e. offers limited number of applications

A

B and D. A scalable network expands quickly to support new users and applications. It does this without degrading the performance of services that are being accessed by existing users. Scalability is typically required in networks with wireless and mobile devices.

36
Q

Which device performs the function of determining the path that messages should take through internetworks?
a. a router
b. a firewall
c. a web server
d. a DSL modem

A

A. a router is a device that interconnects multiple networks and is responsible for forwarding messages between them

37
Q

What type of network must a home user access in order to do online shopping?
a. an intranet
b. the internet
c. an extranet
d. a local area network

A

D. BYOD gives end users the freedom to use personal devices to access information and communicate across a business or campus network. The trend has been to allow employees access to internal network services and information from personal devices

38
Q

Which two internet connection options do not require that physical cables be run to a building? (choose two)
a. DSL
b. cellular
c. satellite
d. dialup
e. dedicated leased line

A

B and C. Cellular and satellite communications are wireless technologies that do not require physical cables.

39
Q

An employee wants to access the network of an organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?
a. ACL
b. IPS
C. VPN
D. BYOD

A

C. A virtual private network (VPN) provides secure access to an organization’s network for remote workers

40
Q

What is the internet?
a. it is a network based on Ethernet techonology.
b. it provides network access for mobile devices
c. it provides connections through interconnected global networks
d. it is a private network for an organization with LAN and WAN connections

A

C. the internet is a worldwide collection of interconnected networks (internetworks, or internet for short)

41
Q

What are two functions of end devices on a network? (choose two)
a. they originate the data that flows through the network
b. they direct data over alternate paths in the event of a link failure
c. they filter the flow of data to enhance security
d. they are the interface between humans and the communications network
e. they provide the channel over which the network message travels

A

A and D. Users interface with a network using an end device. An end device is wither the source or destination of a message transmitted over the network.