Podcast
Questions and Answers
Businesses may require higher ______ for corporate internet connections.
Businesses may require higher ______ for corporate internet connections.
bandwidth
Dedicated Leased Line connects distant offices with private ______ and/or data networking.
Dedicated Leased Line connects distant offices with private ______ and/or data networking.
voice
Ethernet WAN extends LAN access technology into the ______.
Ethernet WAN extends LAN access technology into the ______.
WAN
DSL Business DSL is available in various formats including Symmetric Digital Subscriber Lines (SDSL) and ______.
DSL Business DSL is available in various formats including Symmetric Digital Subscriber Lines (SDSL) and ______.
Signup and view all the answers
Satellite connections can provide a connection when a wired solution is not ______.
Satellite connections can provide a connection when a wired solution is not ______.
Signup and view all the answers
Converged data networks carry multiple services on one link including: data, ______, and video.
Converged data networks carry multiple services on one link including: data, ______, and video.
Signup and view all the answers
With a QoS policy in place, the router can more easily manage the flow of ______ and voice traffic.
With a QoS policy in place, the router can more easily manage the flow of ______ and voice traffic.
Signup and view all the answers
There are two main types of network security that must be addressed: Network infrastructure security and physical security of network ______.
There are two main types of network security that must be addressed: Network infrastructure security and physical security of network ______.
Signup and view all the answers
Preventing unauthorized access to the ______.
Preventing unauthorized access to the ______.
Signup and view all the answers
Protection of the information transmitted over the network or ______.
Protection of the information transmitted over the network or ______.
Signup and view all the answers
Three goals of network security: Confidentiality, Integrity, and ______.
Three goals of network security: Confidentiality, Integrity, and ______.
Signup and view all the answers
Bring Your Own Device (BYOD) allows users to use their own devices giving them more opportunities and greater ______.
Bring Your Own Device (BYOD) allows users to use their own devices giving them more opportunities and greater ______.
Signup and view all the answers
Online Collaboration allows users to collaborate and work with others over the ______ on joint projects.
Online Collaboration allows users to collaborate and work with others over the ______ on joint projects.
Signup and view all the answers
Collaboration tools like Cisco WebEx provide users a way to instantly connect and interact, making collaboration a high priority for businesses and in ______.
Collaboration tools like Cisco WebEx provide users a way to instantly connect and interact, making collaboration a high priority for businesses and in ______.
Signup and view all the answers
Cisco Webex Team is a multifunctional collaboration tool that enables users to send instant messages, post images, videos, and ______.
Cisco Webex Team is a multifunctional collaboration tool that enables users to send instant messages, post images, videos, and ______.
Signup and view all the answers
Video calls can be made to anyone, regardless of their ______.
Video calls can be made to anyone, regardless of their ______.
Signup and view all the answers
Cloud computing allows us to store personal files or backup our data on servers over the ______.
Cloud computing allows us to store personal files or backup our data on servers over the ______.
Signup and view all the answers
Data centers are facilities used to house computer systems and associated components, and are typically very expensive to build and ______.
Data centers are facilities used to house computer systems and associated components, and are typically very expensive to build and ______.
Signup and view all the answers
Servers are computers that provide information to end devices: email servers, web servers, ______ server
Servers are computers that provide information to end devices: email servers, web servers, ______ server
Signup and view all the answers
Clients are computers that send requests to the servers to retrieve information: Server Type Description Email Email server runs email server software. Clients use client software to access email. Web Web server runs web server software. Clients use browser software to access web pages. File ______ stores corporate and user files. The client devices access these files.
Clients are computers that send requests to the servers to retrieve information: Server Type Description Email Email server runs email server software. Clients use client software to access email. Web Web server runs web server software. Clients use browser software to access web pages. File ______ stores corporate and user files. The client devices access these files.
Signup and view all the answers
It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of network design is only recommended for very small networks. Advantages Disadvantages Easy to set up No centralized administration Less complex Not as secure Lower cost Not scalable Used for simple tasks: transferring files and sharing ______. Slower performance
It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of network design is only recommended for very small networks. Advantages Disadvantages Easy to set up No centralized administration Less complex Not as secure Lower cost Not scalable Used for simple tasks: transferring files and sharing ______. Slower performance
Signup and view all the answers
An end device is where a message originates from or where it is received. Data originates with an end device, flows through the network, and arrives at an end ______.
An end device is where a message originates from or where it is received. Data originates with an end device, flows through the network, and arrives at an end ______.
Signup and view all the answers
An intermediary device interconnects end devices. Examples include switches, wireless access points, ______, and firewalls.
An intermediary device interconnects end devices. Examples include switches, wireless access points, ______, and firewalls.
Signup and view all the answers
Every computer on a network is called a host or end device. Servers are computers that provide information to end devices: email servers, web servers, ______.
Every computer on a network is called a host or end device. Servers are computers that provide information to end devices: email servers, web servers, ______.
Signup and view all the answers
Threat vectors might be ______ or internal.
Threat vectors might be ______ or internal.
Signup and view all the answers
Network security components for home or small office network: Antivirus and antispyware software should be installed on end ______.
Network security components for home or small office network: Antivirus and antispyware software should be installed on end ______.
Signup and view all the answers
Firewall filtering used to block unauthorized access to the ______.
Firewall filtering used to block unauthorized access to the ______.
Signup and view all the answers
Larger networks requirements: have additional Dedicated firewall ______.
Larger networks requirements: have additional Dedicated firewall ______.
Signup and view all the answers
The study of network security starts with a clear understanding of the underlying switching and routing ______.
The study of network security starts with a clear understanding of the underlying switching and routing ______.
Signup and view all the answers
Threat Actor ______.
Threat Actor ______.
Signup and view all the answers