EXAM LIST TOPIC QUESTIONS Flashcards

1
Q

Three components of information security?

A

Confidentiality - Only authorized individuals, entities, or processes can access sensitive information.

Integrity – This refers to the protection of data from unauthorized alteration.

Availability - Authorized users must have uninterrupted access to the network resources and data that they require.

Network data can be encrypted (made unreadable to unauthorized users) using various cryptography applications. The conversation between two IP phone users can be encrypted. The files on a computer can also be encrypted. These are just a few examples. Cryptography can be used almost anywhere that there is data communication. In fact, the trend is toward all communication being encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network Interface Card (NIC)

A

A NIC physically connects the end device to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Physical Port

A

A connector or outlet on a networking device where the media connects to an end device or another networking device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Interface

A

Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Topology diagrams

A

Mandatory documentation for anyone working with a network. They provide a visual map of how the network is connected. There are two types of topology diagrams: physical and logical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Physical Topology Diagrams

A

Illustrate the physical location of intermediary devices and cable installation. You can see that the rooms in which these devices are located are labeled in this physical topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Logical Topology Diagrams

A

illustrate devices, ports, and the addressing scheme of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Small office and home office (SOHO) networks

A

allow people to work from home, or a remote office. Many self-employed workers use these types of networks to advertise and sell products, order supplies, and communicate with customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Small Home Networks

A

Small home networks connect a few computers to each other and to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Medium to Large Networks

A

Medium to large networks, such as those used by corporations and schools, can have many locations with hundreds or thousands of interconnected hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

World Wide Networks

A

The internet is a network of networks that connects hundreds of millions of computers world-wide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The two most common types of network infrastructures?

A

Local Area Networks (LANs), and Wide Area Networks (WANs).

A LAN is a network infrastructure that provides access to users and end devices in a small geographical area.

A WAN is a network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a larger corporation or a telecommunications service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A hierarchical LAN design includes?

A

Access, distribution, and core layers

Access layer provides endpoints and users direct access to the network.

Distribution layer aggregates access layers and provides connectivity to services.

Core layer provides connectivity between distribution layers for large LAN environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Traffic originating from the private network

A

Inspected as it travels toward the public or DMZ network. This traffic is permitted with little or no restriction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Inspected traffic returning from the DMZ or public network to the private network is

A

Permitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A demilitarized zone (DMZ) is a

A

Firewall design where there is typically one inside interface connected to the private network, one outside interface connected to the public network, and one DMZ interface.

17
Q

Traffic originating from the DMZ network and traveling to the private network

A

usually blocked.

18
Q

Traffic originating from the DMZ network and traveling to the public network

A

is selectively permitted based on service requirements.

19
Q

Traffic originating from the public network and traveling toward the DMZ

A

is selectively permitted and inspected. This type of traffic is typically email, DNS, HTTP, or HTTPS traffic.

20
Q

Return traffic from the DMZ to the public network

A

is dynamically permitted.

21
Q

Traffic originating from the public network and traveling to the private network

A

is blocked.

22
Q

Zone-based policy firewalls (ZPFs)

A

use the concept of zones to provide additional flexibility.