Explore the Network Flashcards
A connection between a computer or a network that allows external devices to communicate with the computer.
Physical Port
A network that is easy to set up, less complex, lower cost, and used for simple tasks.
Peer-to-Peer Network
Connecting to the internet using ____. Greatly beneficial to rural places without Internet Service Provider.
Satellite
In this network it prioritizes real time data such as voice or video communication.
Converge Network
It refers to the technologies that support the infrastructure that moves data across the network.
Network Architecture
a network infrastructure that spans a wide geographical area.
Wide Area Network (WAN)
Uses modulation of specific frequencies of electromagnetic waves.
Wireless Transmission
It enables computer within a home or remote office to connect to a corporate network
Small Office/Home Office (SOHO)
It is a growing trend that allows technology to be integrated into every-day appliances which allows them to interconnect with other devices.
Smart home technology
The following are example of what threat?
● Viruses, worms, and Trojan horses
● Spyware and adware
● Zero-day attacks
● Threat Actor attacks
● Denial of service attacks
● Data interception and theft
● Identity theft
External Threats
The groups that are developed to help maintain structure on the internet.
Internet Engineering Task Force (IETF)
Internet Corporation for Assigned Names and Numbers (ICANN)
Internet Architecture Board (IAB)
It has many locations with hundreds or thousands of interconnected computers
Medium to Large Networks
Home and Small Office Internet Connections
Cable, DSL, Cellular, Satellite, Dial-up Telephone
It provide redundancy by implementing a packet switched network.
Reliable networks
It is where a message originates from or where it is received
End Device
A type of cloud made up of two or more Cloud types, and each part remains a distinctive object but both are connected using the same architecture.
Hybrid Cloud
What are the Security Solution for Larger Network?
● Firewall
● Access control lists (ACL)
● Intrusion prevention systems (IPS)
● Virtual private networks (VPN)
The following are example of what threat?
● lost or stolen devices
● accidental misuse by employees
● malicious employees
Internal Threats
It lets you collaborate and work with others over the network on joint projects using platforms such as zoom, ms teams and google meet.
Online Collaboration
It is a private connection that is meant to be accessible only to an organization and its members and people who have authority within it.
Intranet
Every computer on a network is called?
Host or End Device
Two types of Network Threats
Internal & External Threats
True or False:
The study of network security shouldn’t start with a clear understanding of the underlying switching and routing infrastructure.
False
An Inexpensive low-bandwidth option with the use of a modem.
Dial-up Telephone
A high bandwidth Internet data that is provided by a
cable television service provider.
Cable
It is the physical security of network devices and preventing unauthorized access to the devices
Network infrastructure security
A type of cloud built to meet the needs of a specific
industry, such as healthcare or media. It can be private or public.
Custom Cloud
a worldwide collection of interconnected LANs and WANs.
Internet
Diagrams illustrate devices, ports, and the addressing scheme of the network.
Logical Topology
This Network Infrastructure uses the same set of rules
and standards.
Converge Network
Communication across a network is carried through a ____ which allows a message to travel from source to destination.
Medium or Network Media