EXAM LIST TOPIC QUESTIONS Flashcards
Three components of information security?
Confidentiality - Only authorized individuals, entities, or processes can access sensitive information.
Integrity – This refers to the protection of data from unauthorized alteration. Availability - Authorized users must have uninterrupted access to the network resources and data that they require.
Network data can be encrypted (made unreadable to unauthorized users) using various cryptography applications. The conversation between two IP phone users can be encrypted. The files on a computer can also be encrypted. These are just a few examples. Cryptography can be used almost anywhere that there is data communication. In fact, the trend is toward all communication being encrypted.
Network Interface Card (NIC)
A NIC physically connects the end device to the network.
Physical Port
A connector or outlet on a networking device where the media connects to an end device or another networking device.
Interface
Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.
Topology diagrams
Mandatory documentation for anyone working with a network. They provide a visual map of how the network is connected. There are two types of topology diagrams: physical and logical.
Physical Topology Diagrams
Illustrate the physical location of intermediary devices and cable installation. You can see that the rooms in which these devices are located are labeled in this physical topology.
Logical Topology Diagrams
illustrate devices, ports, and the addressing scheme of the network.
Small office and home office (SOHO) networks
allow people to work from home, or a remote office. Many self-employed workers use these types of networks to advertise and sell products, order supplies, and communicate with customers.
Small Home Networks
Small home networks connect a few computers to each other and to the internet.
Medium to Large Networks
Medium to large networks, such as those used by corporations and schools, can have many locations with hundreds or thousands of interconnected hosts.
World Wide Networks
The internet is a network of networks that connects hundreds of millions of computers world-wide.
The two most common types of network infrastructures?
Local Area Networks (LANs), and Wide Area Networks (WANs).
A LAN is a network infrastructure that provides access to users and end devices in a small geographical area.
A WAN is a network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a larger corporation or a telecommunications service provider.
A hierarchical LAN design includes?
Access, distribution, and core layers
Access layer provides endpoints and users direct access to the network.
Distribution layer aggregates access layers and provides connectivity to services.
Core layer provides connectivity between distribution layers for large LAN environments.
Traffic originating from the private network
Inspected as it travels toward the public or DMZ network. This traffic is permitted with little or no restriction.
Inspected traffic returning from the DMZ or public network to the private network is
Permitted.
A demilitarized zone (DMZ) is a
Firewall design where there is typically one inside interface connected to the private network, one outside interface connected to the public network, and one DMZ interface.
Traffic originating from the DMZ network and traveling to the private network
usually blocked.
Traffic originating from the DMZ network and traveling to the public network
is selectively permitted based on service requirements.
Traffic originating from the public network and traveling toward the DMZ
is selectively permitted and inspected. This type of traffic is typically email, DNS, HTTP, or HTTPS traffic.
Return traffic from the DMZ to the public network
is dynamically permitted.
Traffic originating from the public network and traveling to the private network
is blocked.
Zone-based policy firewalls (ZPFs)
use the concept of zones to provide additional flexibility.