Les 1 Flashcards

1
Q

6 x 2

A

mac adres

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IPv6

A

128 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

LAN

VLAN Virtual

A

WAN

local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

port forwarding

A

Port forwarding of port mapping is het doorsturen van een TCP- of UDP-pakket(User Datagram Protocol) in een
NAT-gateway om een intern netwerk aan een extern netwerk te koppelen door middel van poortnummers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ISP

A

Internet Service Provider which is a company providing Internet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

23

A

telnet is open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

22

A

SSH Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

25

A

SMTP

simple mail transfer protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

53

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

80

A

http

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

110

A

pop3 email ontvanger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

443

A

https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

143

A

imap mail synchronisatie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCP

A

Transmission Control Protocol (TCP) – a connection-oriented communications protocol that facilitates the exchange of messages between computing devices in a network. It is the most common protocol in networks that use the Internet Protocol (IP); together they are sometimes referred to as TCP/IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

UDP

A

User Datagram Protocol

In computer networking, the User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NAT

A

Network address translation (NAT) is a method of remapping an IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.

17
Q

MAN

A

Metropolitan Area Network (MAN) - A network infrastructure that spans a physical area larger than a LAN but smaller than a WAN (a city). MANs are typically operated by a single entity such as a large organization.

18
Q

SAN

A

Storage area network

A network infrastructure designed to support file servers and provide data storage, retrieval, and replication.

19
Q

The Internet Engineering Task Force (IETF)
Internet Corporation for Assigned Names and Numbers (ICANN)
The Internet Architecture Board (IAB)

A

internet

20
Q

Intranet

A

Company only

21
Q

Extranet

A

Customers

22
Q

Internet

A

The world

23
Q

DSL

A

Digital subscriber line
A system for sending and receiving information at high speeds over ordinary telephone lines
In some respects, DSL is superior to cable for Internet access.

24
Q

Common conections HOHO

A
Cabel
DSL
Cellular (Phone)
Satellite 
Dial-up-phone
25
Q

Businesses Internet Connections

A

Dedicated Leased Line
Ethernet WAN
DSL
Satelite

26
Q

Dedicated Lease Line

A

Leased lines are actually reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.

27
Q

Network Architecture

A

Fault Tolerance
Scalability
Quality of Service (QoS)
Security

28
Q

Fault Tolerance

A

Use a packet-switched network

Having multiple paths to a destination is known as redundancy.

29
Q

circuit-switched networks

A

A circuit-switched network is one that establishes a dedicated circuit between the source and destination before the users may communicate

30
Q

QoS

A

Quality of Service
Congestion occurs when the demand for bandwidth exceeds the amount available. Network bandwidth is measured in the number of bits that can be transmitted in a single second, or bits per second (bps).
When simultaneous communications are attempted across the network, the demand for network bandwidth can exceed its availability, creating network congestion.

When the volume of traffic is greater than what can be transported across the network, devices queue, or hold, the packets in memory until resources become available to transmit them. In the figure, one user is requesting a web page and another is on a phone call. With a QoS policy in place, the router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion.

31
Q

Security

A

Confidentiality - Data confidentiality means that only the intended and authorized recipients can access and read data.
Integrity - Data integrity means having the assurance that the information has not been altered in transmission, from origin to destination.
Availability - Data availability means having the assurance of timely and reliable access to data services for authorized users.

32
Q

BYOD

A

Bring your own device

33
Q

Cloud Computing

A
Public Clouds 
for the general public like iCloud
Private Clouds
goverment
expensive
Hybrid Clouds
both private and public
Custom Clouds
for health care/media for special needs
34
Q

Powerline Networking

A

That uses existing electrical wiring to connect devices. The concept of “no new wires” means the ability to connect a device to the network
PLC
data communicate using the electricitynet.

35
Q

Wireless Broadband

A

Wireless Internet Service Provider (WISP)

36
Q

Security Threads

A

Viruses, worms Trojan horses
malicious software and arbitrary code running on a user device
Spyware and adware
software installed on a user device that secretly collects information about the user
Zero-day attacks also called zero-hour attacks - an attack that occurs on the first day that vulnerability becomes known
Hacker attacks
an attack by a knowledgeable person to user devices or network resources
Denial of service attacks
attacks designed to slow or crash applications and processes on a network device
Data interception and theft
an attack to capture private information from an organization’s network
Identity theft
an attack to steal the login credentials of a user in order to access private data

37
Q

Security Solutions

A

Antivirus and antispyware
Are used to protect end devices from becoming infected with malicious software.
Firewall filtering
This is used to block unauthorized access to the network. This may include a host-based firewall system that is implemented to prevent unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world.
Dedicated firewall systems
Are used to provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.
Access control lists (ACL)
Are used to further filter access and traffic forwarding.
Intrusion prevention systems (IPS)
Are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
Virtual private networks (VPN)
Are used to provide secure access to remote workers.

38
Q

WLAN

A

Wireless LAN