Module 1 Flashcards

1
Q

End Devices (Host)?

A

All computers that are connected to a network and participate directly in network communication are classified as hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This number identifies the host within a particular network.

A

Internet Protocol Address (IP Address)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Identifies the host and the network to which the host is attached.

A

IP Address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Servers

A

computers with software that allow them to provide information, like email or web pages, to other end devices on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

________ have software for requesting and displaying the information obtained from the server

A

Clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In small businesses and homes, many computers function as the servers and clients on the network. Which type of network does this describe?

A

Peer-to-peer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

USB Acronym.

A

Universal Serial Bus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NIC Acronym.

What does it do?

A

Network Interface Card.

physically connects the end device to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You can differentiate end devices because all end devices have an…

A

Address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

connect the individual end devices to the network.

A

Intermediary devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

5 common intermediary devices…

A
Wireless Router. 
LAN switch
Router. 
Multilayer Switch. 
Firewall Appliance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 main types of network media…

A

Copper
Fiber-Optic
Wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Four Main criteria for choosing network media…

A

Max distance media can carry signal.
Environment which media will be installed.
Amount of data and at what speed transmitted.
Cost of the media and installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When data is encoded as pulses of light, which media is being used to transmit the data?

A

Fiber-optic cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the name for all computers connected to a network that participate directly in network communication?

A

Hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Physical Port

A

A connector or outlet on a networking device where the media connects to an end device or another networking device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Interface

A

Specialized ports on a networking device that connect to individual networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Physical topology diagrams illustrate…

A

the physical location of intermediary devices and cable installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Logical topology diagrams illustrate….

A

devices, ports, and the addressing scheme of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which connections are specialized ports on a networking device that connect to individual networks?

A

Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used?

A

Logical Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which type of network topology lets you see the actual location of intermediary devices and cable installation?

A

Physical Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

a collection of interconnected private and public networks. (Network of Networks)

A

the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Small home networks connect

A

a few computers to each other and to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

allows computers in a home office or a remote office to connect to a corporate network, or access centralized, shared resources.

A

SOHO Network (Small Office Home Office)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

type of network that can have many locations with hundreds or thousands of interconnected hosts.

A

Medium to Large Networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Network infrastructures vary greatly in terms of: (4 ways)

A

Size of the area covered
Number of users connected
Number and types of services available
Area of responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

LAN (Local Area Network)

A

a network infrastructure that provides access to users and end devices in a small geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

WAN (Wide Area Network)

A

a network infrastructure that provides access to other networks over a wide geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

interconnect end devices in a limited area such as a home, school, office building, or campus.

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

administered by a single organization or individual. Administrative control is enforced at the network level and governs the security and access control policies.

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

interconnect LANs over wide geographical areas such as between cities, states, provinces, countries, or continents.

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

term often used to refer to a private connection of LANs and WANs that belongs to an organization

A

Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

designed to be accessible only by the organization’s members, employees, or others with authorization.

A

Intranet

35
Q

A local office of education that is providing budget and personnel information to the schools in its district is an example of an….

A

extranet

36
Q

Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization’s data?

A

extranet

37
Q

Type of connection that provides a high bandwidth, high availability, and an always-on connection to the internet. Transmitted on same connection that transmits television.

A

Cable

38
Q

It provides a high bandwidth, high availability, and an always-on connection to the internet. Runs over a telephone line.

A

DSL ( Digital Subscriber Lines)

39
Q

Type of internet access that uses a cell phone network to connect.

A

Cellular.

40
Q

An inexpensive type of connection option that uses any phone line and a modem.

A

Dial-Up Telephone.

41
Q

reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking

A

Dedicated Leased Line

42
Q

extend LAN access technology into the WAN

A

Metro Ethernet

43
Q

four basic characteristics that network architects must address to meet user expectations:

A

Fault Tolerance
Scalability
Quality of Service (QoS)
Security

44
Q

Fault Tolerance Network

A

Limits the number of affected devices during a failure.

45
Q

splits traffic into packets that are routed over a shared network

A

Packet Switching

46
Q

A scalable network expands quickly to support new users and applications without…

A

degrading the performance of services that are being accessed by existing users

47
Q

Congestion occurs when…

A

the demand for bandwidth exceeds the amount available.

48
Q

QoS prioritizes…

A

time-sensitive traffic.

49
Q

When the volume of traffic is greater than what can be transported across the network devices…

A

will hold the packets in memory until resources become available to transmit them

50
Q

two types of network security concerns

A

network infrastructure security and information security.

51
Q

Securing the network infrastructure includes…

A

physically securing devices that provide network connectivity and preventing unauthorized access to the management software that resides on them

52
Q

Data Confidentiality

A

only the intended and authorized recipients can access and read data.

53
Q

Data Integrity

A

assures users that the information has not been altered in transmission, from origin to destination.

54
Q

Data Availability

A

assures users of timely and reliable access to data services for authorized users.

55
Q

When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved?

A

Scalability

56
Q

Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?

A

Security

57
Q

With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?

A

QoS

58
Q

Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?

A

fault tolerance

59
Q

enables end users the freedom to use personal tools to access information and communicate across a business or campus network

A

BYOD (Bring Your Own Device)

60
Q

allows us to store personal files, even backup an entire drive on servers over the internet

A

Cloud Computing

61
Q

an ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs)

A

Wireless Internet Service Provider (WISP)

62
Q

Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country?

A

Video Communications

63
Q

Which feature describes using personal tools to access information and communicate across a business or campus network?

A

BYOD

64
Q

Which feature contains options such as Public, Private, Custom and Hybrid?

A

Cloud Computing

65
Q

Which feature is being used when connecting a device to the network using an electrical outlet?

A

Powerline

66
Q

Which feature uses the same cellular technology as a smart phone?

A

Wireless Broadband

67
Q

These contain malicious software or code running on a user device

A

Viruses, worms, and Trojan horses

68
Q

These are types of software which are installed on a user’s device. The software then secretly collects information about the user

A

Spyware and adware

69
Q

Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.

A

Zero-day attacks

70
Q

A malicious person attacks user devices or network resources.

A

Threat actor attacks

71
Q

These attacks slow or crash applications and processes on a network device.

A

Denial of service attacks

72
Q

This attack captures private information from an organization’s network.

A

Data interception and theft

73
Q

This attack steals the login credentials of a user in order to access private data.

A

Identity theft

74
Q

These applications help to protect end devices from becoming infected with malicious software.

A

Antivirus and antispyware

75
Q

blocks unauthorized access into and out of the network.

A

Firewall filtering

76
Q

These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.

A

Dedicated firewall systems

77
Q

These further filter access and traffic forwarding based on IP addresses and applications.

A

Access control lists (ACL)

78
Q

These identify fast-spreading threats, such as zero-day or zero-hour attacks.

A

Intrusion prevention systems (IPS)

79
Q

These provide secure access into an organization for remote workers.

A

Virtual private networks (VPN)

80
Q

Which attack slows down or crashes equipment and programs?

A

Denial of Service (DoS)

81
Q

Which option creates a secure connection for remote workers?

A

Virtual Private Network(VPN)

82
Q

Which option blocks unauthorized access to your network?

A

Firewall

83
Q

Which option describes a network attack that occurs on the first day that a vulnerability becomes known?

A

Zero-day to Zero-hour

84
Q

Which option describes malicious code running on user devices?

A

Virus, worm, or Trojan horse.