Module 1 (NetAcad) Flashcards

1
Q

_____ is almost as important to us as our reliance on air, water, food, and shelter. In today’s world, through the use of networks, we are connected like never before.

A

Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Every computer on a network is called a ____ or end device.

A

host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ are computers that send requests to the servers to retrieve information.

A

Clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(T or F) Is it possible to have a device be a client and a server in a Peer-to-Peer Network?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Peer-to-Peer Network is a network design only recommended for _____ networks

A

Very small

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advantages of Peer-to-Peer

A

Easy to set up
Less Complex
Lower Cost
Used for simple tasks: transferring files and sharing printers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Disadvantages of Peer-to-Peer

A

No centralized administration
Not as secure
Not scalable
Slower performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An ____ is where a message originates from or where it is received.

A

end device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ originates with an end device, flows through the network, and arrives at an end device

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An _____ interconnects end devices. Examples include switches, wireless access points, routers, and firewalls

A

intermediary device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the roles of an intermediary device?

A
  • Regenerate and retransmit data signals
  • Maintain information about what pathways exist in the network
  • Notify other devices of errors and communication failures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Communication across a network is carried through a medium which allows a message to
travel from source to destination.

A

Network Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Media Types

A
  1. Metals wires within cables - Uses electrical impulses
  2. Glass or plastic fibers within cable (fiber-optic cable) - Uses pulses of light
  3. Wireless transmission - Uses modulation of specific frequencies of electromagnetic waves.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This uses electrical impulses

A

Metal wires within cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This uses modulation of specific frequencies of electromagnetic waves

A

Wireless transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This uses pulses of light

A

Glass or plastic fibers within cable (fiber-optic-cable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network diagrams, often called ___ diagrams, use symbols to represent devices within the network

A

topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Give some End Devices

A
  • Desktop Computer
  • Laptop
  • Printer
  • IP phone
  • Wireless tablet
  • Telepresence Endpoint
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Give some intermediary devices

A
  • Wireless router
  • LAN switch
  • Router
  • Multilayer switch
  • Firewall appliances
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Give some network media

A
  • Wireless Media
  • LAN Media
  • WAN Media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

___ topology diagrams illustrate the physical location of intermediary devices and cable installation.

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

____ topology diagrams illustrate devices, ports, and the addressing scheme of the network.

A

Logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

_____ – connect a few computers to each other and the Internet

A

Small Home Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

____ – enables computer within a home or remote office to connect to a corporate network

A

Small Office/Home Office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

_____ – many locations with hundreds or thousands of interconnected computers

A

Medium to Large Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

____ – connects hundreds of millions of computers worldwide – such as the internet

A

World Wide Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Network infrastructures vary greatly in
terms of:

A
  • Size of the area covered
  • Number of users connected
  • Number and types of services available
  • Area of responsibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Two most common types of networks:

A
  • Local Area Network (LAN)
  • Wide Area Network (WAN)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A ___ is a network infrastructure that spans a small geographical area.

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A ___ is a network infrastructure that spans a wide geographical area.

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  • Interconnect end devices in a limited area
  • Administered by a single organization or individual
  • Provide high-speed bandwidth to internal devices
A

LAN Network

31
Q
  • Interconnect LANs over wide goegraphical areas
  • Typically administered by one or more service provides
  • Typically provide slower speed links between LANs
A

WAN Network

32
Q

The ___ is a worldwide collection of interconnected LANs and WANs.

33
Q

____may use copper wires, fiber optic cables, and wireless transmissions.

34
Q

____ are connected to each other using WANs.

35
Q

The internet is not owned by any individual or group. The following groups were developed to help maintain structure on the internet

A
  • IETF
  • ICANN
  • IAB
36
Q

An ____ is a private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization.

37
Q

An organization might use an ____ to provide secure access to their network for individuals who work for a different organization that need access to their data on their network.

38
Q

Popular services for home users and small offices include _____

A

broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services.

39
Q

Organizations need faster connections to support____-

A

IP phones, video conferencing and data center storage.

40
Q

Business-class interconnections are usually provided by service providers (SP) and may include:

A

business DSL, leased lines, and Metro Ethernet.

41
Q

What are the connections used in Home and Small Office Internet

A
  1. Cable - high bandwidth, always on, internet offered by cable television service providers
  2. DSL - high bandwidth, always on, internet connection that runs over a telephone line
  3. Cellular - uses a cell phone network to connect to the internet
  4. Satellite - major benefit to rural areas without Internet Service Providers
  5. Dial-up Telephone - an inexpensive, low bandwidth option using a modem
42
Q

Corporate business connections may require:

A
  • Higher bandwidth
  • dedicated connections
  • managed services
43
Q

What are the types of connections used in Businesses Internet

A
  1. Dedicated Leased Line - these are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking
  2. Ethernet WAN - this extend LAN access technology into the WAN
  3. DSL - Business DSL is available in various formats including Symmetric Digital Subscriber Lines (SDSL)
  4. Satellite - This can provide a connection when a wired solution is not available
44
Q

Converged data networks carry multiple services on one link including:

A
  • data
  • voice
  • video
45
Q

____ can deliver data, voice, and video over the same network infrastructure. The network infrastructure uses the same set of rules and standards

A

Converged networks

46
Q

_____ refers to the technologies that support the infrastructure that moves data across the network

A

Network Architecture

47
Q

There are four basic characteristics that the underlying architectures need to address to meet user expectations

A
  • Fault Tolerance
  • Scalability
  • Quality of Service (QoS)
  • Security
48
Q

A _____ network limits the impact of a failure by limiting the number of affected devices. Multiple paths are required for fault tolerance

A

fault tolerant

49
Q

Reliable networks provide ____ by implementing a packet switched network:
* Packet switching splits traffic into packets that are routed over a network.
* Each packet could theoretically take a different path to the destination.

A

redundancy

50
Q

A ____ network can expand quickly and easily to support new users and applications without impacting the performance of services to existing users.

51
Q

Network designers follow accepted standards and
protocols in order to make the networks _____.

52
Q

Voice and live video transmissions require _____ for those services being delivered.

A

higher expectations

53
Q

Have you ever watched a live video with constant breaks and pauses? This is caused when there is a ____ for bandwidth than available – and QoS isn’t configured

A

higher demand

54
Q

____ is the primary mechanism used to ensure reliable delivery of content for all users.

A

Quality of Service (QoS)

55
Q

There are two main types of network security that must be addressed:

A
  1. Network infrastructure security
    - Physical security of network devices
    - Preventing unauthorized access to the device
  2. Information Security
    - Protection of the information or data transmitted over the network
56
Q

What are the three goals of network security:

A
  • Confidentiality – only intended recipients can read the data
  • Integrity – assurance that the data has not be altered with during transmission
  • Availability – assurance of timely and reliable access to data for authorized users
57
Q

allows users to use their own devices giving them more opportunities and greater flexibility.

A

Bring Your Own Device (BYOD)

58
Q

___ means any device, with any ownership, used anywhere.

59
Q
  • Collaborate and work with others over the network on joint projects.
  • Collaboration tools including Cisco WebEx (shown in the figure) gives users a way to instantly connect and interact.
  • Collaboration is a very high priority for businesses and in education.
  • Cisco Webex Teams is a multifunctional collaboration tool.
A

Online Collaboration

60
Q
  • Video calls are made to anyone, regardless of where they are located.
  • Video conferencing is a powerful tool for communicating with others.
  • Video is becoming a critical requirement for effective collaboration.
  • Cisco TelePresence powers is one way of working where everyone, everywhere.
A

Video Communication

61
Q

_____ allows us to store personal files or backup our data on servers over the internet.
* Applications can also be accessed using the Cloud.
* Allows businesses to deliver to any device anywhere in the world

A

Cloud computing

62
Q

Four types of Clouds

A
  1. Public Clouds
    * Available to the general public through a pay per-use model or for free.
  2. Private Clouds
    * Intended for a specific organization or entity such as the government.
  3. Hybrid Clouds
    * Made up of two or more Cloud types – for example, part custom and part public.
    * Each part remains a distinctive object but both are connected using the same architecture.
  4. Custom Clouds
    * Built to meet the needs of a specific industry, such as healthcare or media.
    * Can be private or public
63
Q

_____ is a growing trend that allows
technology to be integrated into every-day appliances which allows them to interconnect with other devices

A

Smart home technology

64
Q

____ can allow devices to connect to a LAN where data network cables or wireless communications are not a viable option.

_____ is especially useful when wireless access points cannot reach all the devices in the home.

A

Powerline networking

65
Q

More commonly found in rural environments, a ____ is an ISP that connects subscribers to designated access points or hotspots.

A

Wireless Internet Service Provider (WISP)

66
Q

____ is another solution for the home and small businesses

A

Wireless broadband

67
Q

An ____ is installed outside the house providing wireless or wired connectivity for devices in the home.

68
Q
  • Network security is an integral part of networking regardless of the size of the network.
  • The network security that is implemented must take into account the environment while securing the data, but still allowing for quality of service that is expected of the network.
  • Securing a network involves many protocols, technologies, devices, tools, and techniques in order to secure data and mitigate threats.
  • Threat vectors might be external or internal
A

Security Threats

69
Q

What are some External Threats

A
  • Viruses, worms, and Trojan horses
  • Spyware and adware
  • Zero-day attacks
  • Threat Actor attacks
  • Denial of service attacks
  • Data interception and theft
  • Identity theft
70
Q

What are some Internal Threats

A
  • lost or stolen devices
  • accidental misuse by employees
  • malicious employees
71
Q

____must be implemented in multiple layers using more than one security solution

72
Q

Network security components for home or small office network

A
  • Antivirus and antispyware software should be installed on end devices.
  • Firewall filtering used to block unauthorized access to the network.
73
Q

Larger networks have additional security requirements:

A
  • Dedicated firewall system
  • Access control lists (ACL)
  • Intrusion prevention systems (IPS)
  • Virtual private networks (VPN)
74
Q

A ____ provides an easy way to understand how devices connect in a large network.

75
Q

All computers that are connected to a network and participate directly in network communication are classified as ___.