Concepts Flashcards

1
Q

3 categories of network components

A

Devices: hardware such as PCs, routers, switches.
Media: cabling or wireless
Services: Includes applications such as email as well as the processes that directs and move messages through the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 types of Home & Small office internet connections

A

Cable - Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television.
DSL - Digital Subscriber Lines runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed
Cellular - Cellular Internet access uses a cell phone network to connect.
Satellite - Satellite dishes require a clear line of sight to the satellite.
Dial-up Telephone - An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4 types of Business Internet Connections

A

Dedicated Leased Line - Leased lines are actually reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking
Ethernet WAN - Ethernet WANs extend LAN access technology into the WAN.
DSL - Business DSL is available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds
Satellite - Similar to small office and home office users, satellite service can provide a connection when a wired solution is not available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4 characteristics the network infrastructure needs to address

A

Fault tolerance - A fault tolerant network is one that limits the impact of a failure by having multiple paths to a destination (redundancy)
Scalability - A scalable network can expand quickly.
QoS - Managed by the router; ensures priority for certain traffic.
Security - Includes physical securing of devices that provide network connectivity and preventing unauthorized access to the software that resides on them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3 primary requirements of information security

A

Confidentiality - Only the intended and authorized recipients can access and read data.
Integrity - Having the assurance that the information hasn’t been altered in transmission from origin to destination.
Availability - Have the assurance of timely and reliable access to data services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

4 types of cloud computing

A

Public clouds - Uses the internet to provide services made available to the general population on a pay-per-use model or for free.
Private clouds - Services offered in this type of cloud are specific to an organization
Hybrid clouds - Made up of two or more clouds where each part remains distinctive objects but both are connected using a single architecture.
Custom clouds - Built to meet the needs of a specific industry such as healthcare or media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

7 types of security threats

A

Viruses, worms and trojan horses - Malicious software running on a user device.
Spy/adware - Secretly collects information about the user.
Zero-Day Attacks - Occurs on the first day a vulnerability becomes known.
Hacker attacks - An attack by a knowledgeable user.
Denial of Service - Attacks designed to slow or crash a network.
Data interception and theft - An attack to capture private information from an organization’s network.
Identity Theft - Steal login credentials of a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of security solutions

A

Security components for a SOHO: antivirus, antispyware and firewall filtering.
In addition to the above, network security components for a corporate network should include: Dedicated firewall, ACL, IPS, VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 Types of access methods

A

Console - out-of-band access
SSH - Secure method
Telnet - Insecure method; user authentication, passwords and commands are sent in plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Limiting Device Access

A

Secure privileged EXEC access with a password.
Secure user EXEC access with a password.
Secure remote Telnet access with a password.
Encrypt all passwords.
Provide legal notification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hostname Requirements

A

Start with a letter
Contain no spaces
End with a letter or digit
Be less than 64 characters in length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Password guidelines

A

Greater than 8 characters
Combination of upper and lowercase letters, numbers, special characters and/or numeric sequences.
Avoid using the same password for all devices.
Don’t use common words.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3 Communication Fundamentals

A

Source.
Destination.
The channel or media the message travels over.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

5 Protocol requirements

A
Message encoding
Message formatting and encapsulation
Message size
Message timing
Message delivery options
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

2 Primary functions of ethernet

A

Communication over a data link.

The physical transmission of data on the network media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

3 functions of the physical layer

A

Physical components
Encoding
Signaling

17
Q

6 Frame fields

A

Preamble(7 bytes) & Start Frame Delimiter (SFD) (1 byte): Provides synchronization. Tells the receiver to get ready to receive a new frame.
Destination MAC: 6 byte. Can be uni, multi or broadcast.
Source MAC address: 6 byte. Must be unicast.
EtherType:2 bytes. Identifies the layer 3 protocol in the data field. 0x800 for IPv4, 0x86DD for IPv6, 0x806 for ARP.
Data: 46-1500 bytes. Commonly an IPv4 packet. All frames must be at least 64 bytes long.
FCS: 4 bytes. Uses CRC for error detection. Included after the data to form the trailer.

18
Q

3 primary functions of data encapsulation

A

Frame delimiting - These delimiting bits provide synchronization between the transmitting and receiving nodes.
Addressing – Encapsulation provides for data link layer addressing
Error detection – Each frame contains a trailer used to detect errors in transmission.

19
Q

Primary function of Media Access Control

A

Media access control is responsible for the placement and removal of frames from the media. This ethernet sublayer communicates directly with the physical layer.

20
Q

Media Access Control Methods

A

Contention-based: All nodes operating in half-duplex will compete for the use of the medium but only one device can send at a time.
Controlled Access: Each node has its own time to use the medium.(inefficient)