Network Security Basics

IntelligentJasper852 avatar
IntelligentJasper852
·
·
Download

Start Quiz

Study Flashcards

30 Questions

Businesses may require higher ______ for corporate internet connections.

bandwidth

Dedicated Leased Line connects distant offices with private ______ and/or data networking.

voice

Ethernet WAN extends LAN access technology into the ______.

WAN

DSL Business DSL is available in various formats including Symmetric Digital Subscriber Lines (SDSL) and ______.

asymmetric

Satellite connections can provide a connection when a wired solution is not ______.

available

Converged data networks carry multiple services on one link including: data, ______, and video.

voice

With a QoS policy in place, the router can more easily manage the flow of ______ and voice traffic.

data

There are two main types of network security that must be addressed: Network infrastructure security and physical security of network ______.

devices

Preventing unauthorized access to the ______.

devices

Protection of the information transmitted over the network or ______.

data

Three goals of network security: Confidentiality, Integrity, and ______.

Availability

Bring Your Own Device (BYOD) allows users to use their own devices giving them more opportunities and greater ______.

flexibility

Online Collaboration allows users to collaborate and work with others over the ______ on joint projects.

network

Collaboration tools like Cisco WebEx provide users a way to instantly connect and interact, making collaboration a high priority for businesses and in ______.

education

Cisco Webex Team is a multifunctional collaboration tool that enables users to send instant messages, post images, videos, and ______.

links

Video calls can be made to anyone, regardless of their ______.

location

Cloud computing allows us to store personal files or backup our data on servers over the ______.

internet

Data centers are facilities used to house computer systems and associated components, and are typically very expensive to build and ______.

maintain

Servers are computers that provide information to end devices: email servers, web servers, ______ server

file

Clients are computers that send requests to the servers to retrieve information: Server Type Description Email Email server runs email server software. Clients use client software to access email. Web Web server runs web server software. Clients use browser software to access web pages. File ______ stores corporate and user files. The client devices access these files.

server

It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of network design is only recommended for very small networks. Advantages Disadvantages Easy to set up No centralized administration Less complex Not as secure Lower cost Not scalable Used for simple tasks: transferring files and sharing ______. Slower performance

printers

An end device is where a message originates from or where it is received. Data originates with an end device, flows through the network, and arrives at an end ______.

device

An intermediary device interconnects end devices. Examples include switches, wireless access points, ______, and firewalls.

routers

Every computer on a network is called a host or end device. Servers are computers that provide information to end devices: email servers, web servers, ______.

file server

Threat vectors might be ______ or internal.

external

Network security components for home or small office network: Antivirus and antispyware software should be installed on end ______.

devices

Firewall filtering used to block unauthorized access to the ______.

network

Larger networks requirements: have additional Dedicated firewall ______.

system

The study of network security starts with a clear understanding of the underlying switching and routing ______.

infrastructure

Threat Actor ______.

attacks

Learn about the basics of network security, including infrastructure security, physical security of devices, preventing unauthorized access, and protecting transmitted information. Explore the goals of network security such as confidentiality and data integrity.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser