EXAM LIST TOPIC QUESTIONS Flashcards
Three components of information security?
Confidentiality - Only authorized individuals, entities, or processes can access sensitive information.
Integrity – This refers to the protection of data from unauthorized alteration. Availability - Authorized users must have uninterrupted access to the network resources and data that they require.
Network data can be encrypted (made unreadable to unauthorized users) using various cryptography applications. The conversation between two IP phone users can be encrypted. The files on a computer can also be encrypted. These are just a few examples. Cryptography can be used almost anywhere that there is data communication. In fact, the trend is toward all communication being encrypted.
Network Interface Card (NIC)
A NIC physically connects the end device to the network.
Physical Port
A connector or outlet on a networking device where the media connects to an end device or another networking device.
Interface
Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.
Topology diagrams
Mandatory documentation for anyone working with a network. They provide a visual map of how the network is connected. There are two types of topology diagrams: physical and logical.
Physical Topology Diagrams
Illustrate the physical location of intermediary devices and cable installation. You can see that the rooms in which these devices are located are labeled in this physical topology.
Logical Topology Diagrams
illustrate devices, ports, and the addressing scheme of the network.
Small office and home office (SOHO) networks
allow people to work from home, or a remote office. Many self-employed workers use these types of networks to advertise and sell products, order supplies, and communicate with customers.
Small Home Networks
Small home networks connect a few computers to each other and to the internet.
Medium to Large Networks
Medium to large networks, such as those used by corporations and schools, can have many locations with hundreds or thousands of interconnected hosts.
World Wide Networks
The internet is a network of networks that connects hundreds of millions of computers world-wide.
The two most common types of network infrastructures?
Local Area Networks (LANs), and Wide Area Networks (WANs).
A LAN is a network infrastructure that provides access to users and end devices in a small geographical area.
A WAN is a network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a larger corporation or a telecommunications service provider.
A hierarchical LAN design includes?
Access, distribution, and core layers
Access layer provides endpoints and users direct access to the network.
Distribution layer aggregates access layers and provides connectivity to services.
Core layer provides connectivity between distribution layers for large LAN environments.
Traffic originating from the private network
Inspected as it travels toward the public or DMZ network. This traffic is permitted with little or no restriction.
Inspected traffic returning from the DMZ or public network to the private network is
Permitted.