Explore the Network Flashcards
A connection between a computer or a network that allows external devices to communicate with the computer.
Physical Port
A network that is easy to set up, less complex, lower cost, and used for simple tasks.
Peer-to-Peer Network
Connecting to the internet using ____. Greatly beneficial to rural places without Internet Service Provider.
Satellite
In this network it prioritizes real time data such as voice or video communication.
Converge Network
It refers to the technologies that support the infrastructure that moves data across the network.
Network Architecture
a network infrastructure that spans a wide geographical area.
Wide Area Network (WAN)
Uses modulation of specific frequencies of electromagnetic waves.
Wireless Transmission
It enables computer within a home or remote office to connect to a corporate network
Small Office/Home Office (SOHO)
It is a growing trend that allows technology to be integrated into every-day appliances which allows them to interconnect with other devices.
Smart home technology
The following are example of what threat?
● Viruses, worms, and Trojan horses
● Spyware and adware
● Zero-day attacks
● Threat Actor attacks
● Denial of service attacks
● Data interception and theft
● Identity theft
External Threats
The groups that are developed to help maintain structure on the internet.
Internet Engineering Task Force (IETF)
Internet Corporation for Assigned Names and Numbers (ICANN)
Internet Architecture Board (IAB)
It has many locations with hundreds or thousands of interconnected computers
Medium to Large Networks
Home and Small Office Internet Connections
Cable, DSL, Cellular, Satellite, Dial-up Telephone
It provide redundancy by implementing a packet switched network.
Reliable networks
It is where a message originates from or where it is received
End Device
A type of cloud made up of two or more Cloud types, and each part remains a distinctive object but both are connected using the same architecture.
Hybrid Cloud
What are the Security Solution for Larger Network?
● Firewall
● Access control lists (ACL)
● Intrusion prevention systems (IPS)
● Virtual private networks (VPN)
The following are example of what threat?
● lost or stolen devices
● accidental misuse by employees
● malicious employees
Internal Threats
It lets you collaborate and work with others over the network on joint projects using platforms such as zoom, ms teams and google meet.
Online Collaboration
It is a private connection that is meant to be accessible only to an organization and its members and people who have authority within it.
Intranet
Every computer on a network is called?
Host or End Device
Two types of Network Threats
Internal & External Threats
True or False:
The study of network security shouldn’t start with a clear understanding of the underlying switching and routing infrastructure.
False
An Inexpensive low-bandwidth option with the use of a modem.
Dial-up Telephone
A high bandwidth Internet data that is provided by a
cable television service provider.
Cable
It is the physical security of network devices and preventing unauthorized access to the devices
Network infrastructure security
A type of cloud built to meet the needs of a specific
industry, such as healthcare or media. It can be private or public.
Custom Cloud
a worldwide collection of interconnected LANs and WANs.
Internet
Diagrams illustrate devices, ports, and the addressing scheme of the network.
Logical Topology
This Network Infrastructure uses the same set of rules
and standards.
Converge Network
Communication across a network is carried through a ____ which allows a message to travel from source to destination.
Medium or Network Media
It allows us to store personal files or
backup our data on servers over the internet.
Cloud Computing
Reserved circuits within the service provider’s that
connect distance offices to private data networking.
Dedicated Leased Line
It is useful when wireless access points cannot reach all the devices in the home. In other words, it is like an extender.
Powerline networking
assurance of timely and reliable access
to data for authorized users.
Availability
A network that carries data to multiple devices over the same network infrastructure.
Converge Network
It splits traffic into packets that are routed over a network, and each packet could theoretically take a different path to the destination.
Packet switching
What are the computers that provide information to end devices?
Server
It interconnects end devices. Examples include switches, wireless access points, routers, and firewalls.
Intermediary Devices
Businesses Internet Connections
Dedicated Leased Line, Ethernet WAN, Business DSL (SDSL), Satellite
assurance that the data has not been
altered during transmission.
Integrity
What are the Security Solution for Small Office Network?
● Anti virus and anti spyware soft ware
● Firewall
What are the four basic characteristics of Network Architecture?
Fault Tolerance, Scalability, Quality of Service (QoS), Security
Connecting to the internet using a cellular phone with sim cards.
Cellular
It is the protection of the information or data transmitted over the network
Information Security
It prioritizes the bandwidth of live transmissions such as voice or live video which means other devices that are connected to the network will receive much lesser bandwidth causing it to be slow.
Quality of Service (QoS)
It allows users to use their own devices giving
them more opportunities and greater flexibility.
Bring your own device (BYOD)
It manages data as it flows through a network
Intermediary Devices
A network that lets one computer run both server
and client soft ware at the same time.
Peer-to-Peer Network
a network infrastructure that spans a small geographical area.
Local Area Network (LAN)
A type o f cloud Intended for a specific organization or
entity such as the government.
Private Cloud
It is the point where
two pieces of network equipment or protocol layers connect.
Interface or Network interface
Uses electrical impulses
Copper cable
A Computer hardware device that sends and
receives data packets over the network.
NIC (Network Interface Card)
diagrams illustrate the physical location of intermediary devices and cable installation
Physical Topology
Uses pulses of light.
Fiber-optic cable
It use symbols to represent devices within the network.
Network Diagram or Topology
Same as a Normal DSL but dedicated to more of a Business approach. It also uses various formats
such as Symmetric Digital Subscriber Line (SDSL).
Business DSL
What are the 3 goals in Network Security?
Confidentiality, Integrity, Availability
Provide a secure access network for individuals who work for different organizations that need access to their data on their network.
Extranet
What are the computers that send requests to the servers to retrieve information?
Client
A type o f cloud available to the general public through a pay-per-use model or for free.
Public Cloud
Keeping your network secure
Network Security
A high bandwidth internet connection that runs over a telephone line.
Digital Subscriber Line (DSL)
Just like in Home office connection it can also use ________ but only if wired solution is not available.
Satellite
It can allow devices to connect to a LAN where data network cables or wireless communications are not a viable option.
Powerline networking
True or False:
The internet is not owned by any individual or group
True
It is when a network can expand quickly and easily to support new users and applications without
impacting the performance of services to existing users.
Scalability
only intended recipients can read the data.
Confidentiality
It limits the impact of a failure by simply limiting the number of affected devices.
Fault Tolerance
It extends LAN access technology into the WAN
connection.
Ethernet WAN
Unlike DSL and cable, ________ is also a type of connection that lets you connect to wireless.
Wireless Broadband
It connects hundreds of millions of computers world-wide – such as the internet
World Wide Networks
Lets you Communicate with one another face to face using video platforms such as messenger.
Video Communication
What are the two main types of network security that must be addressed?
Network infrastructure security and Information Security
Three types of server
Email, Web, File Server
It is the primary mechanism used to ensure reliable delivery of content for all users.
Quality of Service (QoS)
It connect a few computers to each other and the Internet
Small Home Networks