Network Security Basics
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Businesses may require higher ______ for corporate internet connections.

bandwidth

Dedicated Leased Line connects distant offices with private ______ and/or data networking.

voice

Ethernet WAN extends LAN access technology into the ______.

WAN

DSL Business DSL is available in various formats including Symmetric Digital Subscriber Lines (SDSL) and ______.

<p>asymmetric</p> Signup and view all the answers

Satellite connections can provide a connection when a wired solution is not ______.

<p>available</p> Signup and view all the answers

Converged data networks carry multiple services on one link including: data, ______, and video.

<p>voice</p> Signup and view all the answers

With a QoS policy in place, the router can more easily manage the flow of ______ and voice traffic.

<p>data</p> Signup and view all the answers

There are two main types of network security that must be addressed: Network infrastructure security and physical security of network ______.

<p>devices</p> Signup and view all the answers

Preventing unauthorized access to the ______.

<p>devices</p> Signup and view all the answers

Protection of the information transmitted over the network or ______.

<p>data</p> Signup and view all the answers

Three goals of network security: Confidentiality, Integrity, and ______.

<p>Availability</p> Signup and view all the answers

Bring Your Own Device (BYOD) allows users to use their own devices giving them more opportunities and greater ______.

<p>flexibility</p> Signup and view all the answers

Online Collaboration allows users to collaborate and work with others over the ______ on joint projects.

<p>network</p> Signup and view all the answers

Collaboration tools like Cisco WebEx provide users a way to instantly connect and interact, making collaboration a high priority for businesses and in ______.

<p>education</p> Signup and view all the answers

Cisco Webex Team is a multifunctional collaboration tool that enables users to send instant messages, post images, videos, and ______.

<p>links</p> Signup and view all the answers

Video calls can be made to anyone, regardless of their ______.

<p>location</p> Signup and view all the answers

Cloud computing allows us to store personal files or backup our data on servers over the ______.

<p>internet</p> Signup and view all the answers

Data centers are facilities used to house computer systems and associated components, and are typically very expensive to build and ______.

<p>maintain</p> Signup and view all the answers

Servers are computers that provide information to end devices: email servers, web servers, ______ server

<p>file</p> Signup and view all the answers

Clients are computers that send requests to the servers to retrieve information: Server Type Description Email Email server runs email server software. Clients use client software to access email. Web Web server runs web server software. Clients use browser software to access web pages. File ______ stores corporate and user files. The client devices access these files.

<p>server</p> Signup and view all the answers

It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of network design is only recommended for very small networks. Advantages Disadvantages Easy to set up No centralized administration Less complex Not as secure Lower cost Not scalable Used for simple tasks: transferring files and sharing ______. Slower performance

<p>printers</p> Signup and view all the answers

An end device is where a message originates from or where it is received. Data originates with an end device, flows through the network, and arrives at an end ______.

<p>device</p> Signup and view all the answers

An intermediary device interconnects end devices. Examples include switches, wireless access points, ______, and firewalls.

<p>routers</p> Signup and view all the answers

Every computer on a network is called a host or end device. Servers are computers that provide information to end devices: email servers, web servers, ______.

<p>file server</p> Signup and view all the answers

Threat vectors might be ______ or internal.

<p>external</p> Signup and view all the answers

Network security components for home or small office network: Antivirus and antispyware software should be installed on end ______.

<p>devices</p> Signup and view all the answers

Firewall filtering used to block unauthorized access to the ______.

<p>network</p> Signup and view all the answers

Larger networks requirements: have additional Dedicated firewall ______.

<p>system</p> Signup and view all the answers

The study of network security starts with a clear understanding of the underlying switching and routing ______.

<p>infrastructure</p> Signup and view all the answers

Threat Actor ______.

<p>attacks</p> Signup and view all the answers

Use Quizgecko on...
Browser
Browser