30 Questions
Businesses may require higher ______ for corporate internet connections.
bandwidth
Dedicated Leased Line connects distant offices with private ______ and/or data networking.
voice
Ethernet WAN extends LAN access technology into the ______.
WAN
DSL Business DSL is available in various formats including Symmetric Digital Subscriber Lines (SDSL) and ______.
asymmetric
Satellite connections can provide a connection when a wired solution is not ______.
available
Converged data networks carry multiple services on one link including: data, ______, and video.
voice
With a QoS policy in place, the router can more easily manage the flow of ______ and voice traffic.
data
There are two main types of network security that must be addressed: Network infrastructure security and physical security of network ______.
devices
Preventing unauthorized access to the ______.
devices
Protection of the information transmitted over the network or ______.
data
Three goals of network security: Confidentiality, Integrity, and ______.
Availability
Bring Your Own Device (BYOD) allows users to use their own devices giving them more opportunities and greater ______.
flexibility
Online Collaboration allows users to collaborate and work with others over the ______ on joint projects.
network
Collaboration tools like Cisco WebEx provide users a way to instantly connect and interact, making collaboration a high priority for businesses and in ______.
education
Cisco Webex Team is a multifunctional collaboration tool that enables users to send instant messages, post images, videos, and ______.
links
Video calls can be made to anyone, regardless of their ______.
location
Cloud computing allows us to store personal files or backup our data on servers over the ______.
internet
Data centers are facilities used to house computer systems and associated components, and are typically very expensive to build and ______.
maintain
Servers are computers that provide information to end devices: email servers, web servers, ______ server
file
Clients are computers that send requests to the servers to retrieve information: Server Type Description Email Email server runs email server software. Clients use client software to access email. Web Web server runs web server software. Clients use browser software to access web pages. File ______ stores corporate and user files. The client devices access these files.
server
It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of network design is only recommended for very small networks. Advantages Disadvantages Easy to set up No centralized administration Less complex Not as secure Lower cost Not scalable Used for simple tasks: transferring files and sharing ______. Slower performance
printers
An end device is where a message originates from or where it is received. Data originates with an end device, flows through the network, and arrives at an end ______.
device
An intermediary device interconnects end devices. Examples include switches, wireless access points, ______, and firewalls.
routers
Every computer on a network is called a host or end device. Servers are computers that provide information to end devices: email servers, web servers, ______.
file server
Threat vectors might be ______ or internal.
external
Network security components for home or small office network: Antivirus and antispyware software should be installed on end ______.
devices
Firewall filtering used to block unauthorized access to the ______.
network
Larger networks requirements: have additional Dedicated firewall ______.
system
The study of network security starts with a clear understanding of the underlying switching and routing ______.
infrastructure
Threat Actor ______.
attacks
Learn about the basics of network security, including infrastructure security, physical security of devices, preventing unauthorized access, and protecting transmitted information. Explore the goals of network security such as confidentiality and data integrity.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free