Networking 1 Flashcards

1
Q

End device examples

A
  • Desktop Computer
  • Laptop
  • Printer
  • IP Phone
  • Wireless Tablet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Client and server software usually run on separate computers, but it is also possible for one computer to be used for both roles at the same time.

A

Peer-to-Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

either the source or destination of a message transmitted over the network

A

end device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

connect the individual end devices to the network

A

Intermediary devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data is encoded into electrical impulses

A

Metal wires within cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data is encoded into pulses of light

A

fiber-optic cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data is encoded via modulation of specific frequencies of electromagnetic waves

A

Wireless transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

All computers that are connected to a network and participate directly in network communication are classified

A

Hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intermediary Devices Example

A
  1. Wireless Router
  2. LAN Switch
  3. Router
  4. Firewall appliance
  5. Multilayer switch
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network Media

A
  1. Wireless Media
  2. LAN Media
  3. WAN Media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

physically connects the end device to the network

A

Network Interface Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A connector or outlet on a networking device where the media connects to an end device or another networking device.

A

Physical Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.

A

Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

illustrate the physical location of intermediary devices and cable installation

A

Physical Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

illustrate devices, ports, and the addressing scheme of the network

A

Logical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

allows computers in a home office or a remote office to connect to a corporate network, or access centralized, shared resources.

A

Small Office and Home Office Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

connect a few computers to each other and to the internet

A

Small Home Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

such as those used by corporations and schools, can have many locations with hundreds or thousands of interconnected hosts.

A

Medium to large networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The internet is a network of networks that connects hundreds of millions of computers world-wide.

A

World Wide Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

a network infrastructure that spans a small geographical area

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

network infrastructure that spans a wide geographical area.

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

worldwide collection of interconnected networks

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

designed to be accessible only by the organization’s members, employees, or others with authorization.

A

intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  • a private network similar to an intranet, but typically open to external parties, such as business partners, suppliers, key customers
  • might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization’s data
A

extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

It provides a high bandwidth, high availability, and an always-on connection to the internet

A

cable

26
Q

provide high bandwidth, high availability, and an always-on connection to the internet. DSL runs over a telephone line

A

DSL

27
Q

uses a cell phone network to connect

A

Cellular

28
Q

The availability of satellite internet access is a benefit in those areas that would otherwise have no internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.

A

satellite

29
Q

An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is not sufficient for large data transfer, although it is useful for mobile access while traveling.

A

Dial-up Telephone

30
Q

Leased lines are reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate.

A

Dedicated Leased Line

31
Q

This is sometimes known as Ethernet WAN; Extends LAN access technology into the WAN. Ethernet is a LAN technology you will learn about in a later module.

A

Metro ethernets

32
Q

A popular choice is Symmetric Digital Subscriber Line (SDSL) which is similar to the consumer version of DSL but provides uploads and downloads at the same high speeds.

A

Business DSL

33
Q

Each network used different technologies to carry the communication signal. Each network had its own set of rules and standards to ensure successful communication. Multiple services ran on multiple networks

A

Traditional Separate Networks

34
Q

This network infrastructure uses the same set of rules, agreements, and implementation standards. Converged data networks carry multiple services on one network.

A

Converged Networks

35
Q

prioritize time-sensitive traffic. The type of traffic, not the content of the traffic, is what is important.

A

Quality of Service

36
Q

network expands quickly to support new users and applications

A

Scalability

37
Q

network is one that limits the number of affected devices during a failure

A

Fault Tolerance

38
Q

physically securing devices that provide network connectivity and preventing unauthorized access to the management software that resides on them,

A

network security

39
Q

only the intended and authorized recipients can access and read data

A

data confidentiality

40
Q

assures users that the information has not been altered in transmission, from origin to destination

A

Integrity

41
Q

assures users of timely and reliable access to data services for authorized users

A

Availability

42
Q

enables end users the freedom to use personal tools to access information and communicate across a business or campus network

A

Bring Your Own Device (BYOD)

43
Q

“the act of working with another or others on a joint project.”

A

Online Collaboration

44
Q

allows us to store personal files, even backup an entire drive on servers over the internet

A

cloud computing

45
Q

applications and services offered in a public cloud are made available to the general population. Services may be free or are offered on a pay-per-use model, such as paying for online storage.

A

public cloud

46
Q

applications and services offered in a private cloud are intended for a specific organization or entity, such as a government.

A

private cloud

47
Q

is made up of two or more clouds (example: part private, part public), where each part remains a distinct object, but both are connected using a single architecture

A

hybrid cloud

48
Q

are used by multiple organizations that have similar needs and concerns. Community clouds are similar to a public cloud environment, but with set levels of security, privacy, and even regulatory compliance of a private cloud

A

community cloud

49
Q

home networks uses existing electrical wiring to connect devices

A

Powerline networking

50
Q

an ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs)

A

Wireless Internet Service Provider (WISP)

51
Q

hese applications help to protect end devices from becoming infected with malicious software.

A

Antivirus and antispyware

52
Q

blocks unauthorized access into and out of the network. This may include a host-based firewall system that prevents unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network.

A

Firewall filtering

53
Q

These contain malicious software or code running on a user device

A

Viruses, worms, and Trojan horses

54
Q

These are types of software which are installed on a user’s device. The software then secretly collects information about the user.

A

Spyware and adware

55
Q

these occur on the first day that a vulnerability becomes known

A

Zero-day attacks

56
Q

A malicious person attacks user devices or network resources

A

Threat actor attacks

57
Q

These attacks slow or crash applications and processes on a network device.

A

Denial of service attacks

58
Q

This attack captures private information from an organization’s network.

A

Data interception and theft

59
Q

This attack steals the login credentials of a user in order to access private data.

A

Identity theft

60
Q

These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.

A

Dedicated firewall systemsDedicated firewall systems

61
Q

These further filter access and traffic forwarding based on IP addresses and applications.

A

Access control lists (ACL)

62
Q

These identify fast-spreading threats, such as zero-day or zero-hour attacks.

A

Intrusion prevention systems (IPS)