Explore the Network Flashcards

1
Q

A connection between a computer or a network that allows external devices to communicate with the computer.

A

Physical Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network that is easy to set up, less complex, lower cost, and used for simple tasks.

A

Peer-to-Peer Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Connecting to the internet using ____. Greatly beneficial to rural places without Internet Service Provider.

A

Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In this network it prioritizes real time data such as voice or video communication.

A

Converge Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It refers to the technologies that support the infrastructure that moves data across the network.

A

Network Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a network infrastructure that spans a wide geographical area.

A

Wide Area Network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Uses modulation of specific frequencies of electromagnetic waves.

A

Wireless Transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It enables computer within a home or remote office to connect to a corporate network

A

Small Office/Home Office (SOHO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It is a growing trend that allows technology to be integrated into every-day appliances which allows them to interconnect with other devices.

A

Smart home technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The following are example of what threat?
● Viruses, worms, and Trojan horses
● Spyware and adware
● Zero-day attacks
● Threat Actor attacks
● Denial of service attacks
● Data interception and theft
● Identity theft

A

External Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The groups that are developed to help maintain structure on the internet.

A

Internet Engineering Task Force (IETF)
Internet Corporation for Assigned Names and Numbers (ICANN)
Internet Architecture Board (IAB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It has many locations with hundreds or thousands of interconnected computers

A

Medium to Large Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Home and Small Office Internet Connections

A

Cable, DSL, Cellular, Satellite, Dial-up Telephone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It provide redundancy by implementing a packet switched network.

A

Reliable networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is where a message originates from or where it is received

A

End Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A type of cloud made up of two or more Cloud types, and each part remains a distinctive object but both are connected using the same architecture.

A

Hybrid Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the Security Solution for Larger Network?

A

● Firewall
● Access control lists (ACL)
● Intrusion prevention systems (IPS)
● Virtual private networks (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The following are example of what threat?
● lost or stolen devices
● accidental misuse by employees
● malicious employees

A

Internal Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It lets you collaborate and work with others over the network on joint projects using platforms such as zoom, ms teams and google meet.

A

Online Collaboration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

It is a private connection that is meant to be accessible only to an organization and its members and people who have authority within it.

A

Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Every computer on a network is called?

A

Host or End Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Two types of Network Threats

A

Internal & External Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

True or False:
The study of network security shouldn’t start with a clear understanding of the underlying switching and routing infrastructure.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An Inexpensive low-bandwidth option with the use of a modem.

A

Dial-up Telephone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A high bandwidth Internet data that is provided by a
cable television service provider.

A

Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

It is the physical security of network devices and preventing unauthorized access to the devices

A

Network infrastructure security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A type of cloud built to meet the needs of a specific
industry, such as healthcare or media. It can be private or public.

A

Custom Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

a worldwide collection of interconnected LANs and WANs.

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Diagrams illustrate devices, ports, and the addressing scheme of the network.

A

Logical Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

This Network Infrastructure uses the same set of rules
and standards.

A

Converge Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Communication across a network is carried through a ____ which allows a message to travel from source to destination.

A

Medium or Network Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

It allows us to store personal files or
backup our data on servers over the internet.

A

Cloud Computing

33
Q

Reserved circuits within the service provider’s that
connect distance offices to private data networking.

A

Dedicated Leased Line

34
Q

It is useful when wireless access points cannot reach all the devices in the home. In other words, it is like an extender.

A

Powerline networking

35
Q

assurance of timely and reliable access
to data for authorized users.

A

Availability

36
Q

A network that carries data to multiple devices over the same network infrastructure.

A

Converge Network

37
Q

It splits traffic into packets that are routed over a network, and each packet could theoretically take a different path to the destination.

A

Packet switching

38
Q

What are the computers that provide information to end devices?

A

Server

39
Q

It interconnects end devices. Examples include switches, wireless access points, routers, and firewalls.

A

Intermediary Devices

40
Q

Businesses Internet Connections

A

Dedicated Leased Line, Ethernet WAN, Business DSL (SDSL), Satellite

41
Q

assurance that the data has not been
altered during transmission.

A

Integrity

42
Q

What are the Security Solution for Small Office Network?

A

● Anti virus and anti spyware soft ware
● Firewall

43
Q

What are the four basic characteristics of Network Architecture?

A

Fault Tolerance, Scalability, Quality of Service (QoS), Security

44
Q

Connecting to the internet using a cellular phone with sim cards.

A

Cellular

45
Q

It is the protection of the information or data transmitted over the network

A

Information Security

46
Q

It prioritizes the bandwidth of live transmissions such as voice or live video which means other devices that are connected to the network will receive much lesser bandwidth causing it to be slow.

A

Quality of Service (QoS)

47
Q

It allows users to use their own devices giving
them more opportunities and greater flexibility.

A

Bring your own device (BYOD)

48
Q

It manages data as it flows through a network

A

Intermediary Devices

49
Q

A network that lets one computer run both server
and client soft ware at the same time.

A

Peer-to-Peer Network

50
Q

a network infrastructure that spans a small geographical area.

A

Local Area Network (LAN)

51
Q

A type o f cloud Intended for a specific organization or
entity such as the government.

A

Private Cloud

52
Q

It is the point where
two pieces of network equipment or protocol layers connect.

A

Interface or Network interface

53
Q

Uses electrical impulses

A

Copper cable

54
Q

A Computer hardware device that sends and
receives data packets over the network.

A

NIC (Network Interface Card)

55
Q

diagrams illustrate the physical location of intermediary devices and cable installation

A

Physical Topology

56
Q

Uses pulses of light.

A

Fiber-optic cable

57
Q

It use symbols to represent devices within the network.

A

Network Diagram or Topology

58
Q

Same as a Normal DSL but dedicated to more of a Business approach. It also uses various formats
such as Symmetric Digital Subscriber Line (SDSL).

A

Business DSL

59
Q

What are the 3 goals in Network Security?

A

Confidentiality, Integrity, Availability

60
Q

Provide a secure access network for individuals who work for different organizations that need access to their data on their network.

A

Extranet

61
Q

What are the computers that send requests to the servers to retrieve information?

A

Client

62
Q

A type o f cloud available to the general public through a pay-per-use model or for free.

A

Public Cloud

63
Q

Keeping your network secure

A

Network Security

64
Q

A high bandwidth internet connection that runs over a telephone line.

A

Digital Subscriber Line (DSL)

65
Q

Just like in Home office connection it can also use ________ but only if wired solution is not available.

A

Satellite

66
Q

It can allow devices to connect to a LAN where data network cables or wireless communications are not a viable option.

A

Powerline networking

67
Q

True or False:
The internet is not owned by any individual or group

A

True

68
Q

It is when a network can expand quickly and easily to support new users and applications without
impacting the performance of services to existing users.

A

Scalability

69
Q

only intended recipients can read the data.

A

Confidentiality

70
Q

It limits the impact of a failure by simply limiting the number of affected devices.

A

Fault Tolerance

71
Q

It extends LAN access technology into the WAN
connection.

A

Ethernet WAN

72
Q

Unlike DSL and cable, ________ is also a type of connection that lets you connect to wireless.

A

Wireless Broadband

73
Q

It connects hundreds of millions of computers world-wide – such as the internet

A

World Wide Networks

74
Q

Lets you Communicate with one another face to face using video platforms such as messenger.

A

Video Communication

75
Q

What are the two main types of network security that must be addressed?

A

Network infrastructure security and Information Security

76
Q

Three types of server

A

Email, Web, File Server

77
Q

It is the primary mechanism used to ensure reliable delivery of content for all users.

A

Quality of Service (QoS)

78
Q

It connect a few computers to each other and the Internet

A

Small Home Networks