Podcast
Questions and Answers
Businesses may require higher ______ for corporate internet connections.
Businesses may require higher ______ for corporate internet connections.
bandwidth
Dedicated Leased Line connects distant offices with private ______ and/or data networking.
Dedicated Leased Line connects distant offices with private ______ and/or data networking.
voice
Ethernet WAN extends LAN access technology into the ______.
Ethernet WAN extends LAN access technology into the ______.
WAN
DSL Business DSL is available in various formats including Symmetric Digital Subscriber Lines (SDSL) and ______.
DSL Business DSL is available in various formats including Symmetric Digital Subscriber Lines (SDSL) and ______.
Satellite connections can provide a connection when a wired solution is not ______.
Satellite connections can provide a connection when a wired solution is not ______.
Converged data networks carry multiple services on one link including: data, ______, and video.
Converged data networks carry multiple services on one link including: data, ______, and video.
With a QoS policy in place, the router can more easily manage the flow of ______ and voice traffic.
With a QoS policy in place, the router can more easily manage the flow of ______ and voice traffic.
There are two main types of network security that must be addressed: Network infrastructure security and physical security of network ______.
There are two main types of network security that must be addressed: Network infrastructure security and physical security of network ______.
Preventing unauthorized access to the ______.
Preventing unauthorized access to the ______.
Protection of the information transmitted over the network or ______.
Protection of the information transmitted over the network or ______.
Three goals of network security: Confidentiality, Integrity, and ______.
Three goals of network security: Confidentiality, Integrity, and ______.
Bring Your Own Device (BYOD) allows users to use their own devices giving them more opportunities and greater ______.
Bring Your Own Device (BYOD) allows users to use their own devices giving them more opportunities and greater ______.
Online Collaboration allows users to collaborate and work with others over the ______ on joint projects.
Online Collaboration allows users to collaborate and work with others over the ______ on joint projects.
Collaboration tools like Cisco WebEx provide users a way to instantly connect and interact, making collaboration a high priority for businesses and in ______.
Collaboration tools like Cisco WebEx provide users a way to instantly connect and interact, making collaboration a high priority for businesses and in ______.
Cisco Webex Team is a multifunctional collaboration tool that enables users to send instant messages, post images, videos, and ______.
Cisco Webex Team is a multifunctional collaboration tool that enables users to send instant messages, post images, videos, and ______.
Video calls can be made to anyone, regardless of their ______.
Video calls can be made to anyone, regardless of their ______.
Cloud computing allows us to store personal files or backup our data on servers over the ______.
Cloud computing allows us to store personal files or backup our data on servers over the ______.
Data centers are facilities used to house computer systems and associated components, and are typically very expensive to build and ______.
Data centers are facilities used to house computer systems and associated components, and are typically very expensive to build and ______.
Servers are computers that provide information to end devices: email servers, web servers, ______ server
Servers are computers that provide information to end devices: email servers, web servers, ______ server
Clients are computers that send requests to the servers to retrieve information: Server Type Description Email Email server runs email server software. Clients use client software to access email. Web Web server runs web server software. Clients use browser software to access web pages. File ______ stores corporate and user files. The client devices access these files.
Clients are computers that send requests to the servers to retrieve information: Server Type Description Email Email server runs email server software. Clients use client software to access email. Web Web server runs web server software. Clients use browser software to access web pages. File ______ stores corporate and user files. The client devices access these files.
It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of network design is only recommended for very small networks. Advantages Disadvantages Easy to set up No centralized administration Less complex Not as secure Lower cost Not scalable Used for simple tasks: transferring files and sharing ______. Slower performance
It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of network design is only recommended for very small networks. Advantages Disadvantages Easy to set up No centralized administration Less complex Not as secure Lower cost Not scalable Used for simple tasks: transferring files and sharing ______. Slower performance
An end device is where a message originates from or where it is received. Data originates with an end device, flows through the network, and arrives at an end ______.
An end device is where a message originates from or where it is received. Data originates with an end device, flows through the network, and arrives at an end ______.
An intermediary device interconnects end devices. Examples include switches, wireless access points, ______, and firewalls.
An intermediary device interconnects end devices. Examples include switches, wireless access points, ______, and firewalls.
Every computer on a network is called a host or end device. Servers are computers that provide information to end devices: email servers, web servers, ______.
Every computer on a network is called a host or end device. Servers are computers that provide information to end devices: email servers, web servers, ______.
Threat vectors might be ______ or internal.
Threat vectors might be ______ or internal.
Network security components for home or small office network: Antivirus and antispyware software should be installed on end ______.
Network security components for home or small office network: Antivirus and antispyware software should be installed on end ______.
Firewall filtering used to block unauthorized access to the ______.
Firewall filtering used to block unauthorized access to the ______.
Larger networks requirements: have additional Dedicated firewall ______.
Larger networks requirements: have additional Dedicated firewall ______.
The study of network security starts with a clear understanding of the underlying switching and routing ______.
The study of network security starts with a clear understanding of the underlying switching and routing ______.
Threat Actor ______.
Threat Actor ______.