Networking Flashcards

1
Q

A collection of two or more computers connected together to share resources.

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Usually require simple hardware and can rely on the operating system’s features to connect to other devices on the network, while larger networks typically require more sophisticated hardware and software

A

Smaller networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Devices on a network, also called

A

nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A device that provides a central point for cables in a network, and transfers all data to all devices.

A

hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is similar to a hub in that it provides a central point for cables in a network; however, it transfers data only to the intended recipient.

A

A switch

Switches are used more frequently today than hubs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is a device that connects two or more networks and directs, or routes, the flow of information along the networks. Can also be used to connect computers to the Internet, so that multiple users can share a connection

A

A router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

router is typically connected with a wire or cable to a device called

A

a modem

which provides the Internet connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is a communications device that connects a communications channel such as the Internet to a sending or receiving device such as a computer.

A

A modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The modem connects your network to the Internet through a telecommunications company that sells Internet access, known as

A

an Internet Service Provider (ISP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Multiple users can share a single Internet connection, files on each computer, such as photos, can be shared, and multiple computers can share a single hardware resource such as a printer

A

Cababilities Home networks provide for home users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Game consoles can connect to the Internet to facilitate online gaming, voice
  2. IP (VoIP) phone service provides voice communication without the need for traditional copper telephone lines
  3. Smart home devices such as thermostats, light switches, smart speakers, and personal assistants can connect to the Internet and apps on your smartphone
A

Cababilities Home networks provide for home users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Facilitate communication among employees, share hardware such as printers and scanners, share data, information, and software with one another, and centrally store and back up critical information

A

Advantages networks provide for small or large business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is a circuit board that connects a computer to a wired or wireless network. They often are internal to the devic

A

A network interface card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

can connect a computer to a wired network, while other NICs can connect a computer to a wireless network.

A

Some NICs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

have a visible antenna that is used to better communicate with the wireless network

A

Some wireless network interface cards (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

are two common types of digital modems

A

Cable and DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

sends and receives digital data over a cable TV connection

A

A cable modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

uses existing standard copper telephone wiring to send and receive digital data

A

A DSL modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

you might also be able to connect multiple wired and wireless devices if

A

the cable modem also functions as a router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The method by which computers and devices are physically arranged on a network is referred to as the

A

network topology

defines the physical arrangement of devices on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Common network topologies include

A

bus network, ring network, star network, and mesh network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

All devices attach to a central cable, called a bus, which carries the data. If the bus fails, the devices on the network will no longer be able to communicate.

A

Bus network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Data travels from one device to the next in a sequential fashion. If one device on the network fails, communication on the network could cease to function.

A

Ring network

Ring networks are no longer common.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Each device on the network is attached to a central device such as a server or switch. If the central device fails, the other devices will be unable to communicate. If a connected device fails, all other devices will still be able to communicate.

A

star network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Two or more star networks may be joined together using a bus to form

A

Tree topologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Tree topologies often are used in

A

schools and businesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

All devices interconnect with each other. If a single device on the network fails, the rest of the network will continue to function by communicating via an alternate route.

A

Mesh network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Two types of mesh topologies are a

A

full mesh topology and a partial mesh technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

each device may or may not be connected to all other devices on the network

A

partial mesh technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

each device on the network is connected to every other device on the network

A

full mesh technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

determines the logical design of all devices on a network

A

the network architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Two common network architectures are

A

client/server and peer-to-peer (P2P)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

one or more computers act as a server and the other computers on the network request resources from the server

A

client/server network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

is a computer on the network that controls access to hardware, software, and other resources

A

A server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

is a computer or mobile device on the network that relies on the server for its resources

A

A client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

often do not have equal permissions; that is, one may be able to access certain files or resources on the server, while others may not have access to those same resources

A

Clients on a client/server network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Client/server networks often are controlled by a

A

network administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

is a network architecture that typically connects a small number of computers (often fewer than 10)

A

A peer-to-peer (P2P) network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A type of network where computers communicate directly with one another and can share each other’s resources.

A

A peer-to-peer (P2P) network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Does not need network administrator because it treats all computers are treated equally

A

a peer-to-peer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

is a type of P2P network where users share files with each other over the Internet

A

An Internet peer-to-peer (Internet P2P) network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The files in ………. transfer directly from one user’s computer to the other, without first being stored on a server. While it is legal, it is illegal to share files or other resources that are protected by copyright.

A

an Internet peer-to-peer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

is Internet-based delivery of computing services, including data storage and apps.

A

Cloud computing or “in the cloud.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q
  • Files can be stored and accessed from any computer or mobile device with an Internet connection
  • Files are stored on remote servers and will remain intact should anything happen to your computer or mobile device
  • Files do not necessarily take up space on your computer or device because they are stored in the cloud
  • You can easily share files with others and control who has access to each file
  • You can configure your computer or mobile device to automatically back up certain files to the cloud
A

Cloud computing advantages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q
  • The potential for unwanted individuals accessing your files if you do not carefully manage who can access them
  • The inability to access your files if you lose your Internet connection
A

Cloud computing disadvantages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

connects computers and devices in a limited area, such as a home, a school, or a small office complex

A

local area network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

is a network that connects devices in a large geographic region, such as a multinational company or national retail chain.

A

wide area network (WAN)

48
Q

is a type of wide area network that is operated by a city or county

A

metropolitan area network (MAN)

49
Q

connects personal digital devices within a range of approximately 30 feet, such as a smartwatch that connects to your cell phone

A

personal area network (PAN)

50
Q

Devices on a personal area network typically are connected

A

via Bluetooth

51
Q

is a short-range wireless technology, often used to facilitate communication at a range of 30 feet/9 meters or less

A

Bluetooth

52
Q

is a form of personal area network that consists of small, lightweight biosensors implanted in the body

A

body area network (BAN)

53
Q

can monitor an individual’s health or activity, and report statistics and results to a medical professional

A

biosensors

54
Q
  • Sends signals and data through cables, which may have to travel through floors and walls to connect to other network devices.
  • tend to be more secure and transmit data faster than wireless networks.
A

Wired network

55
Q
  • Sends signals through airwaves, and usually do not require cables.
  • tend to be more convenient and easier to set up than wired networks, but can be less secure.
  • make it possible to connect devices in locations where physical wiring is not possible or is difficult.
A

Wireless network

56
Q
  • A private network for use by authorized individuals.
  • Organizations use it to communicate internally and can allow users to use a web browser to access data posted on webpages.
  • are preferable when data being transferred should not necessarily reach the Internet.
A

Intranet

57
Q

Allows outsiders (such as customers, vendors, and suppliers) to access an organization’s intranet. For example, it might be used if a supplier needs to check a customer’s inventory levels before deciding whether to ship additional product.

A

Extranet

58
Q
  • A private, secure path across a public network that allows authorized users secure access to a company or other network.
  • can allow an individual to access an organization’s network by using encryption and other technologies to secure the data transmitted along the path.
A

Virtual private network (VPN)

59
Q

Displays unwanted advertisements on your computer

A

Adware

60
Q

Tracks and transmits personal information from your computer or device without your knowledge

A

Spyware

61
Q

Damages data on your computer or device or changes system settings

A

Virus

62
Q

Spreads throughout a computer and/or network without requiring user interaction

A

Worm

63
Q

Disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened

A

Trojan

64
Q

Locks you out of programs and data on your computer until you pay a ransom to regain access

A

Ransomware

65
Q

Gains administrator-level, or root-level, access to a computer or network without the system or users detecting its presence

A

Rootkit

66
Q

is a type of email scam that tries to trick you into revealing personal or financial information. it typically disguise themselves as email messages from legitimate sources, but may encourage you to click a link within the email or open an attached file.

If you are not expecting a file attachment, first **verify **with the email’s sender that they have sent you an attachment or an email with a link to click.

A

Phishing

67
Q

is an attempt to exploit human weaknesses by building relationships with victims for the purpose of stealing confidential information.

never disclose personal information such as passwords or bank account information to unknown individuals electronically, on the phone, or in person.

A

Social engineering

68
Q

is a type of attack, usually on a server, that is meant to overload the server with network traffic so that it cannot provide necessary services.
If a server responsible for hosting websites is the recipient of a denial of service attack, it might be unable to display websites for visitors attempting to view them. These attacks can originate from one source, or they can originate from multiple sources

A

A denial of service (DoS) attack

69
Q

is when an attacker uses multiple computers to attack a server or other network resource

A

A distributed denial of service (DDos) attack

70
Q

attacking without the owner’s knowledge, because they are under the control of malware or another attacker

A

DDoS attack

71
Q

A device infected with malware that an attacker uses to control the device remotely is called

A

zombie

72
Q

If you have a network set up at your home or place of employment, you should make sure to send and receive personal information only if

A

the network is secure

73
Q

is a normal-looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it. For example, you might connect to a network at an airport called “Free Airport WiFi” without realizing it is an

A

evil twin

can be impossible to identify

74
Q

is the process of identifying a user to the network. The most common form of authentication is providing a user name and password.

A

Authentication

75
Q

using biometric devices to scan physical characteristics is a form of

A

Authentication

76
Q

should be changed frequently, and never written in places where they can easily be obtained and identified by others

A

Passwords

77
Q

is a protective barrier between a computer or network and others on the Internet that inspects data being transmitted to or from a network to prevent unsolicited data exchanges.

A

A firewall

78
Q

are physical devices, often used on larger, corporate networks, that block unauthorized traffic and intruders from accessing the network

A

Hardware firewalls

79
Q

are installed on your computer or device and block unauthorized communication to or from the network. They are often built into the computer’s operating system

A

Software firewalls, also called local firewalls

80
Q

devices are one or more hard drives that connect directly to a network and provide a centralized location for storing programs and data on large and small networks.
On a home network, you might store family photos and videos so that they are accessible to all members of your family.
On a larger, more complex network, you might store important company files that require accessibility by multiple employees

A

Network attached storage (NAS)

81
Q

When you store files on a network, you might have the ability to specify users who can view the files, as well as users who can view and make changes to the files. True or false

A

True

82
Q

Not only should you secure data stored on a network, but you also should turn on network encryption so that information

A

cannot be intercepted by others

83
Q

is the process of converting data so that it is unrecognizable when it is transmitted on a network or stored on a storage device, except to users who enter the correct password.

A

Encryption

84
Q

Encrypted wireless networks often use a

A

wireless network key

85
Q

a series of numbers and/or letters sometimes also referred to as a network security key, to encrypt data sent between devices

A

wireless network key

86
Q

If you connect to a wireless network that does not require a wireless network key, that often means the network is

A

unsecure

87
Q

One common type of encryption on home routers is

A

WPA2 (Wi-Fi Protected Access version 2)

88
Q

You can specify the type of encryption, as well as the desired wireless network key, through the

A

wireless router’s configuration utility

89
Q

is that one website has the same value or priority as other websites, resulting in equal, unrestricted access to each site. When it is enforced, ISPs must provide the same level of service to all websites, regardless of their content or purpose. It supports the concept that the Internet should be neutral and all traffic should be treated equally

A

net neutrality

90
Q

is a common term used to describe the capacity of a communication channel. When a communication medium or connection supports transferring a large amount of data at one time, it is said to be a

A

bandwidth / high-bandwidth connection

91
Q

support capacity for transferring content such as videos, music, and other large files, and can support online gaming.

A

High-bandwidth connections (also called broadband connections)

92
Q

support only slower transfer speeds as they have less capacity. These connections are suitable for performing functions such as sending and receiving email, transferring small files, and viewing basic websites.

A

Low-bandwidth connections (also called narrowband connections)

93
Q

Supporters of net neutrality like the fact that access to websites and other Internet services cannot be restricted based on factors such as

A

content or bandwidth requirements

94
Q

hose who oppose net neutrality argue that the ability for users to access certain types of high-bandwidth content such as music and movies might result in slower Internet speeds for others who are also connecting to the Internet using the same ISPs. True or false

A

True

95
Q

Without net neutrality, Internet Service Providers could charge more money for those wanting access to content requiring more resources (such as streaming music and movies) and charge less money to those who require access to less resource-intensive services. True of false

A

True

96
Q

specify the way computers access a network, the type(s) of hardware used, data transmission speeds, and the types of cable and wireless technology used. For computers and devices to successfully communicate on a network, they must support the same

A

Network standards

97
Q

controls how network interface cards (NICs), routers, and modems share access to cables and phone lines, as well as dictates how to transmit data. Also, it continues to evolve, with new standards supporting faster data transfer rates.

A

The Ethernet standard

98
Q

Most wired networks

A

Ethernet

99
Q

Devices requiring network connectivity and power to be supplied by the network

A

Power over Ethernet (PoE)

100
Q

Networks using telephone lines to connect computers and devices

A

Phoneline/HomePNA and Powerline

101
Q

Home and small business networks

A

Wi-Fi

102
Q

Voice and data transmission on cellular networks

A

LTE

103
Q

A standardized procedure used by computers to exchange information

A

protocol

104
Q

a set of protocols that is used by all computers and devices on the Internet. …… defines how data is routed through a network, and …….. specifies that all computers and devices connected to a network have a unique IP address.

A

TCP/IP (Transmission Control Protocol/Internet Protocol)

105
Q

was the standard Internet protocol in use for many years, but the vastly growing number of computers and devices connected to the Internet demanded support for more IP addresses. It supports nearly 4.3 billion unique IP addresses

A

IPv4

a type of IP address

106
Q

protocol supports more than 340 undecillion addresses

A

IPv6

a type of IP address

107
Q

Devices communicating with each other over a short range (usually less than 30 feet/9 meters)

A

Bluetooth

108
Q

Radio signals transmitted through antennas, often found in tollbooth transponders or embedded chips in animals

A

RFID (radio frequency identification)

109
Q

Used in credit cards, smartphones, and tickets to facilitate close-range communication

A

NFC (near field communication)

110
Q

Remote controls or other data transmission within close proximity

A

IrDA

111
Q

a cellular networks that can provide Internet services in most locations where cellular service is offered

A

3G (third generation)

112
Q

networks provide higher speed data transmission, making them more appealing to those requiring access to high-bandwidth content.

A

4G and 5G

113
Q

ISPs use hardware such as

A

cables, satellites, and fiber-optic lines

114
Q

Because of the risks associated with constant Internet connectivity, you should……..when you are not using them for extended periods of time

A

turn off computers and devices on your network

115
Q

Wireless networks that are available in public places such as hotels, restaurants, and coffee shops are known as

A

Wi-Fi hotspots

116
Q

enables you to connect a phone, computer or other device to the Internet through the cellular network.

A

A mobile hotspot

117
Q

a unique hardware address identified for your computer or device
It control feature specifies it of computers and devices that can (or cannot) connect to your network

A

MAC address