definitions Flashcards

1
Q

All computers that are connected to a network and participate directly in network communication are classified as

A

hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

can be called end devices. Some are also called clients.

A

hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

specifically refers to devices on the network that are assigned a number for communication purposes

A

hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This number identifies the host within a particular network.

A

Internet Protocol (IP) address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

identifies the host and the network to which the host is attached

A

Internet Protocol (IP) address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

are computers with software that allow them to provide information, like email or web pages, to other end devices on the network

A

Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In small businesses and homes, many computers function as the servers and clients on the network.

A

Peer-to-peer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is either the source or destination of a message transmitted over the network

A

end device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

connect the individual end devices to the network

A

intermediary devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

provide connectivity and ensure that data flows across the network

A

intermediary devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

physically connects the end device to the network

A

Network Interface Card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A connector or outlet on a networking device where the media connects to an end device or another networking device

A

Physical Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Specialized ports on a networking device that connect to individual networks.

A

Interface/Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

illustrate the physical location of intermediary devices and cable installation

You can see that the rooms in which these devices are located

A

physical topology diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

illustrate devices, ports, and the addressing scheme of the network

You can see which end devices are connected to which intermediary devices and what media is being used

A

logical topology diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

means a “network of networks”

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

the largest network in existence

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

collection of interconnected private and public networks

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

connect a few computers to each other and to the internet.

A

small home networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

allows computers in a home office or a remote office to connect to a corporate network, or access centralized, shared resources

A

Small Office and Home Office (SOHO) Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

such as those used by corporations and schools, can have many locations with hundreds or thousands of interconnected hosts

A

medium to large networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The internet is a network of networks that connects hundreds of millions of computers world-wide.

A

World Wide Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is a network infrastructure that provides access to users and end devices in a small geographical area

A

LAN (local area networks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

is a network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a larger corporation or a telecommunications service provider

A

WAN (wide area networks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

is a term often used to refer to a private connection of LANs and WANs that belongs to an organization

A

intranet

26
Q

to provide secure and safe access to individuals who work for a different organization but require access to the organization’s data

A

extranet

27
Q

Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.

A

cable

28
Q

also provide high bandwidth, high availability, and an always-on connection to the internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.

A

DSL (digital subscriber lines)

29
Q

Cellular internet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected.

A

cellular

30
Q

The availability of satellite internet access is a benefit in those areas that would otherwise have no internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.

A

satellite

31
Q

An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is not sufficient for large data transfer, although it is useful for mobile access while traveling.

A

dial-up telephone

32
Q

are reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate.

A

dedicated leased line

33
Q

This is sometimes known as Ethernet WAN.

extend LAN access technology into the WAN.

A

metro ethernet

34
Q

can provide a connection when a wired solution is not available.

A

satellite service

35
Q

is one that limits the number of affected devices during a failure

A

fault tolerant network

36
Q

Having multiple paths to a destination is known as

A

redundancy

37
Q

occurs when the demand for bandwidth exceeds the amount available

A

congestion

38
Q

is measured in the number of bits that can be transmitted in a single second, or bits per second (bps)

A

network bandwidth

39
Q

means that only the intended and authorized recipients can access and read data.

A

data confidentiality

40
Q

assures users that the information has not been altered in transmission, from origin to destination.

A

data integrity

41
Q

assures users of timely and reliable access to data services for authorized users

A

data availability

42
Q

is an ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs).

A

Wireless Internet Service Provider (WISP)

43
Q

Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country?

A

video communications

44
Q

These contain malicious software or code running on a user device

A

viruses, worms, trojan horses

45
Q

These are types of software which are installed on a user’s device. The software then secretly collects information about the user.

A

spyware, adware

46
Q

Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.

A

zero-day attacks

47
Q

A malicious person attacks user devices or network resources.

A

threat actor attacks

48
Q

These attacks slow or crash applications and processes on a network device.

A

denial of service attacks

49
Q

This attack captures private information from an organization’s network.

A

Data interception and theft

50
Q

This attack steals the login credentials of a user in order to access private data.

A

identity theft

51
Q

These applications help to protect end devices from becoming infected with malicious software.

A

antivirus and antispyware

52
Q

blocks unauthorized access into and out of the network. This may include a host-based firewall system that prevents unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network.

A

firewall filtering

53
Q

These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.

A

dedicated firewall systems

54
Q

These further filter access and traffic forwarding based on IP addresses and applications.

A

Access control lists (ACL)

55
Q

These identify fast-spreading threats, such as zero-day or zero-hour attacks.

A

Intrusion prevention systems (IPS)

56
Q

These provide secure access into an organization for remote workers.

A

Virtual private networks (VPN)

57
Q

Used to configure console, SSH, Telnet, or AUX access.

A

line configuration mode

58
Q

Used to configure a switch port or router network interface.

A

interface configuration mode

59
Q

Cisco IOS software separates management access into the following two command modes:

A

User EXEC and Privileged EXEC mode

60
Q
A