Networking 1 Flashcards

1
Q

End device examples

A
  • Desktop Computer
  • Laptop
  • Printer
  • IP Phone
  • Wireless Tablet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Client and server software usually run on separate computers, but it is also possible for one computer to be used for both roles at the same time.

A

Peer-to-Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

either the source or destination of a message transmitted over the network

A

end device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

connect the individual end devices to the network

A

Intermediary devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data is encoded into electrical impulses

A

Metal wires within cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data is encoded into pulses of light

A

fiber-optic cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data is encoded via modulation of specific frequencies of electromagnetic waves

A

Wireless transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

All computers that are connected to a network and participate directly in network communication are classified

A

Hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intermediary Devices Example

A
  1. Wireless Router
  2. LAN Switch
  3. Router
  4. Firewall appliance
  5. Multilayer switch
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network Media

A
  1. Wireless Media
  2. LAN Media
  3. WAN Media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

physically connects the end device to the network

A

Network Interface Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A connector or outlet on a networking device where the media connects to an end device or another networking device.

A

Physical Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.

A

Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

illustrate the physical location of intermediary devices and cable installation

A

Physical Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

illustrate devices, ports, and the addressing scheme of the network

A

Logical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

allows computers in a home office or a remote office to connect to a corporate network, or access centralized, shared resources.

A

Small Office and Home Office Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

connect a few computers to each other and to the internet

A

Small Home Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

such as those used by corporations and schools, can have many locations with hundreds or thousands of interconnected hosts.

A

Medium to large networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The internet is a network of networks that connects hundreds of millions of computers world-wide.

A

World Wide Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

a network infrastructure that spans a small geographical area

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

network infrastructure that spans a wide geographical area.

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

worldwide collection of interconnected networks

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

designed to be accessible only by the organization’s members, employees, or others with authorization.

A

intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  • a private network similar to an intranet, but typically open to external parties, such as business partners, suppliers, key customers
  • might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization’s data
A

extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
It provides a high bandwidth, high availability, and an always-on connection to the internet
cable
26
provide high bandwidth, high availability, and an always-on connection to the internet. DSL runs over a telephone line
DSL
27
uses a cell phone network to connect
Cellular
28
The availability of satellite internet access is a benefit in those areas that would otherwise have no internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
satellite
29
An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is not sufficient for large data transfer, although it is useful for mobile access while traveling.
Dial-up Telephone
30
Leased lines are reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate.
Dedicated Leased Line
31
This is sometimes known as Ethernet WAN; Extends LAN access technology into the WAN. Ethernet is a LAN technology you will learn about in a later module.
Metro ethernets
32
A popular choice is Symmetric Digital Subscriber Line (SDSL) which is similar to the consumer version of DSL but provides uploads and downloads at the same high speeds.
Business DSL
33
Each network used different technologies to carry the communication signal. Each network had its own set of rules and standards to ensure successful communication. Multiple services ran on multiple networks
Traditional Separate Networks
34
This network infrastructure uses the same set of rules, agreements, and implementation standards. Converged data networks carry multiple services on one network.
Converged Networks
35
prioritize time-sensitive traffic. The type of traffic, not the content of the traffic, is what is important.
Quality of Service
36
network expands quickly to support new users and applications
Scalability
37
network is one that limits the number of affected devices during a failure
Fault Tolerance
38
physically securing devices that provide network connectivity and preventing unauthorized access to the management software that resides on them,
network security
39
only the intended and authorized recipients can access and read data
data confidentiality
40
assures users that the information has not been altered in transmission, from origin to destination
Integrity
41
assures users of timely and reliable access to data services for authorized users
Availability
42
enables end users the freedom to use personal tools to access information and communicate across a business or campus network
Bring Your Own Device (BYOD)
43
“the act of working with another or others on a joint project.”
Online Collaboration
44
allows us to store personal files, even backup an entire drive on servers over the internet
cloud computing
45
applications and services offered in a public cloud are made available to the general population. Services may be free or are offered on a pay-per-use model, such as paying for online storage.
public cloud
46
applications and services offered in a private cloud are intended for a specific organization or entity, such as a government.
private cloud
47
is made up of two or more clouds (example: part private, part public), where each part remains a distinct object, but both are connected using a single architecture
hybrid cloud
48
are used by multiple organizations that have similar needs and concerns. Community clouds are similar to a public cloud environment, but with set levels of security, privacy, and even regulatory compliance of a private cloud
community cloud
49
home networks uses existing electrical wiring to connect devices
Powerline networking
50
an ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs)
Wireless Internet Service Provider (WISP)
51
hese applications help to protect end devices from becoming infected with malicious software.
Antivirus and antispyware
52
blocks unauthorized access into and out of the network. This may include a host-based firewall system that prevents unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network.
Firewall filtering
53
These contain malicious software or code running on a user device
Viruses, worms, and Trojan horses
54
These are types of software which are installed on a user’s device. The software then secretly collects information about the user.
Spyware and adware
55
these occur on the first day that a vulnerability becomes known
Zero-day attacks
56
A malicious person attacks user devices or network resources
Threat actor attacks
57
These attacks slow or crash applications and processes on a network device.
Denial of service attacks
58
This attack captures private information from an organization’s network.
Data interception and theft
59
This attack steals the login credentials of a user in order to access private data.
Identity theft
60
These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.
Dedicated firewall systemsDedicated firewall systems
61
These further filter access and traffic forwarding based on IP addresses and applications.
Access control lists (ACL)
62
These identify fast-spreading threats, such as zero-day or zero-hour attacks.
Intrusion prevention systems (IPS)