Module 1 - Networks Today Flashcards

1
Q

What is an end device?

A

An end device is either the source or destination of a message transmitted over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Peer-to-Peer Network Advantages

A

Easy to set up, less complex, lower cost, simple tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Peer-to-Peer Network Disadvantages

A

No centralized administration
Not as secure
Not scalable
All devices may act as both client and server, slowing performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Intermediary Devices?

A

Intermediary devices connect the individual end devices to the network. They can connect multiple individual networks to form an internetwork. These intermediary devices provide connectivity and ensure that data flows across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Criteria for Choosing Media

A

Maximum distance media can carry signal
Environmental requirements for media install
How much data and at what speed will it be transmitted
What is the cost of the media and installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is the name for all computers connected to a network that participate directly in network communication?

A

Hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When data is encoded as pulses of light, which media is being used to transmit the data?

A

Fiber Optic Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name two intermediary devices

A

Routers, Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network Interface Card (NIC)

A

A NIC physically connects the end device to the network. It is a specialized port on a networking device that connects to individual networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Physical Port

A

A connector or outlet on a networking device where the media connects to an end device or another networking device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Interface

A

Specialized Ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Physical Topology Diagrams

A

Physical topology diagrams illustrate the physical location of intermediary devices and cable installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Logical Topology Diagrams

A

Logical topology diagrams illustrate devices, ports, and the addressing scheme of the network, They show which devices connect by which media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a WAN

A

A WAN is a network infrastructure that spans a wide geographical area. WANs are typically managed by service providers (SPs) or Internet Service Providers (ISPs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an intranet?

A

Company only network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an extranet?

A

Network allowing access for company, but also suppliers, customers, and collaborators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cable

A

Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.

18
Q

DSL

A

Digital Subscriber Lines providing high bandwidth, high availability, always-on connection. Asymmetrical DSL has higher download than upload. Symmetrical DSL has equal speeds up and down, but is more expensive generally and used primarily by businesses.

19
Q

Cellular

A

Performance is limited by capabilities of phone and tower. Allows connection where there is signal.

20
Q

Satellite

A

Depends on line of sight and provides connection to places where there would otherwise be no connection. Rural areas are a good example.

21
Q

Dial-up Telephone

A

Inexpensive low bandwidth internet. Not usually used for large transfers, but can allow access while traveling.

22
Q

Dedicated Leased Line

A

Leased lines are reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate.

23
Q

Metro Ethernet

A

This is sometimes known as Ethernet WAN. In this module, we will refer to it as Metro Ethernet. Metro ethernets extend LAN access technology into the WAN.

24
Q

Four characteristics of networks that an architect must address

A

FAult tolerance, Scalability, Quality of Service, Security

25
Q

Fault Tolerance

A

A fault tolerant network is one that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs. These networks depend on multiple paths between the source and destination of a message. If one path fails, the messages are instantly sent over a different link. Having multiple paths to a destination is known as redundancy.

26
Q

Scalability

A

A scalable network expands quickly to support new users and applications. It does this without degrading the performance of services that are being accessed by existing users.

27
Q

QoS

A

Quality of Service. With a QoS policy in place, the router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion.The focus of QoS is to prioritize time-sensitive traffic. The type of traffic, not the content of the traffic, is what is important.

28
Q

Network Security

A

Confidentiality - Data confidentiality means that only the intended and authorized recipients can access and read data.
Integrity - Data integrity assures users that the information has not been altered in transmission, from origin to destination.
Availability - Data availability assures users of timely and reliable access to data services for authorized users.

29
Q

Cloud Types

A

Public Clouds, Private Clouds, Hybrid Clouds, Community Clouds

30
Q

Public Clouds

A

Cloud-based applications and services offered in a public cloud are made available to the general population. Services may be free or are offered on a pay-per-use model, such as paying for online storage. The public cloud uses the internet to provide services.

31
Q

Private clouds

A

Cloud-based applications and services offered in a private cloud are intended for a specific organization or entity, such as a government. A private cloud can be set up using the organization’s private network, though this can be expensive to build and maintain. A private cloud can also be managed by an outside organization with strict access security.

32
Q

Hybrid clouds

A

A hybrid cloud is made up of two or more clouds (example: part private, part public), where each part remains a distinct object, but both are connected using a single architecture. Individuals on a hybrid cloud would be able to have degrees of access to various services based on user access rights.

33
Q

Community clouds

A

A community cloud is created for exclusive use by specific entities or organizations. The differences between public clouds and community clouds are the functional needs that have been customized for the community. For example, healthcare organizations must remain compliant with policies and laws (e.g., HIPAA) that require special authentication and confidentiality. Community clouds are used by multiple organizations that have similar needs and concerns. Community clouds are similar to a public cloud environment, but with set levels of security, privacy, and even regulatory compliance of a private cloud.

34
Q

Powerline Network

A

Using a standard powerline adapter, devices can connect to the LAN wherever there is an electrical outlet. No data cables need to be installed, and there is little to no additional electricity used. Using the same wiring that delivers electricity, powerline networking sends information by sending data on certain frequencies.

35
Q

Types of Security Threats

A

Viruses, Worms, Trojan Horses; Spyware and adware; zero-day attacks; threat actor attacks; denial of service attacks; data interception and theft; identity theft.

36
Q

Zero-Day Attacks

A

Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.

37
Q

Spyware and adware

A

Types of software which are installed on a user’s device. Secretly collects information about the user.

38
Q

Denial of Service Attacks

A

These attacks slow or crash applications and processes on a network device.

39
Q

Access Control Lists

A

Provide additional filtering and traffic forwarding base don IP addresses and applications

40
Q

Intrusion Prevention Systems

A

Identify fast-spreading threats such as zero-day or zero-hour attacks.