Podcast
Questions and Answers
What type of network connects hundreds of millions of computers worldwide?
What type of network connects hundreds of millions of computers worldwide?
A client computer can function as a server in a peer-to-peer network.
A client computer can function as a server in a peer-to-peer network.
True
What are the two main types of computers in a network?
What are the two main types of computers in a network?
Clients and servers
In a network, ________ are computers that provide information to end devices.
In a network, ________ are computers that provide information to end devices.
Signup and view all the answers
Match the following types of networks with their descriptions:
Match the following types of networks with their descriptions:
Signup and view all the answers
Which is NOT an advantage of peer-to-peer networks?
Which is NOT an advantage of peer-to-peer networks?
Signup and view all the answers
Medium to large networks typically consist of a few interconnected computers.
Medium to large networks typically consist of a few interconnected computers.
Signup and view all the answers
What is one disadvantage of a peer-to-peer network?
What is one disadvantage of a peer-to-peer network?
Signup and view all the answers
What are the two main types of network security?
What are the two main types of network security?
Signup and view all the answers
The three goals of network security are confidentiality, usability, and integrity.
The three goals of network security are confidentiality, usability, and integrity.
Signup and view all the answers
What does BYOD stand for in the context of networking?
What does BYOD stand for in the context of networking?
Signup and view all the answers
The assurance that only intended recipients can read the data is known as __________.
The assurance that only intended recipients can read the data is known as __________.
Signup and view all the answers
Which of the following is NOT one of the new networking trends affecting organizations?
Which of the following is NOT one of the new networking trends affecting organizations?
Signup and view all the answers
Availability in network security guarantees timely access to data for all users.
Availability in network security guarantees timely access to data for all users.
Signup and view all the answers
List one main component of network infrastructure security.
List one main component of network infrastructure security.
Signup and view all the answers
Match the following network security goals with their meanings:
Match the following network security goals with their meanings:
Signup and view all the answers
What is an intranet?
What is an intranet?
Signup and view all the answers
An extranet allows access to an organization's network for users from different organizations.
An extranet allows access to an organization's network for users from different organizations.
Signup and view all the answers
Name two popular services for home users and small offices to connect to the Internet.
Name two popular services for home users and small offices to connect to the Internet.
Signup and view all the answers
A high bandwidth, always on, Internet connection offered by cable television service providers is known as _____ .
A high bandwidth, always on, Internet connection offered by cable television service providers is known as _____ .
Signup and view all the answers
Which of the following is NOT a common method of Internet connection for organizations?
Which of the following is NOT a common method of Internet connection for organizations?
Signup and view all the answers
DSL connections run over power lines.
DSL connections run over power lines.
Signup and view all the answers
Match the following Internet connection types with their descriptions:
Match the following Internet connection types with their descriptions:
Signup and view all the answers
Business-class interconnections may include business DSL, _____, and Metro Ethernet.
Business-class interconnections may include business DSL, _____, and Metro Ethernet.
Signup and view all the answers
What does BYOD stand for?
What does BYOD stand for?
Signup and view all the answers
Collaboration tools like Cisco WebEx are only important for businesses and not for education.
Collaboration tools like Cisco WebEx are only important for businesses and not for education.
Signup and view all the answers
Name one benefit of cloud computing for businesses.
Name one benefit of cloud computing for businesses.
Signup and view all the answers
Cloud computing allows users to access applications such as word processing and ____ editing.
Cloud computing allows users to access applications such as word processing and ____ editing.
Signup and view all the answers
Which of the following is NOT a type of device enabled by BYOD?
Which of the following is NOT a type of device enabled by BYOD?
Signup and view all the answers
Public Clouds offer services to specific organizations only.
Public Clouds offer services to specific organizations only.
Signup and view all the answers
Match the following types of Clouds with their descriptions:
Match the following types of Clouds with their descriptions:
Signup and view all the answers
What is one way smaller companies can benefit from cloud computing?
What is one way smaller companies can benefit from cloud computing?
Signup and view all the answers
Which of the following is considered an external threat to network security?
Which of the following is considered an external threat to network security?
Signup and view all the answers
Internal users cause the majority of security breaches in a network.
Internal users cause the majority of security breaches in a network.
Signup and view all the answers
Name two types of external threats to network security.
Name two types of external threats to network security.
Signup and view all the answers
A __________ attack is also known as a zero-hour attack.
A __________ attack is also known as a zero-hour attack.
Signup and view all the answers
What is a recommended solution for securing network devices?
What is a recommended solution for securing network devices?
Signup and view all the answers
Match the following security solutions to their purposes:
Match the following security solutions to their purposes:
Signup and view all the answers
Quality of service is not affected by the implementation of security measures.
Quality of service is not affected by the implementation of security measures.
Signup and view all the answers
What does BYOD stand for, and why is it a concern for network security?
What does BYOD stand for, and why is it a concern for network security?
Signup and view all the answers
Study Notes
Networks of Many Sizes
- Small Home Networks connect a few computers to each other and the Internet.
- Small Office/Home Office networks enable computers in a home or a remote office to connect to a corporate network.
- Medium to Large Networks have many locations with hundreds or thousands of interconnected computers.
- World Wide Networks connect hundreds of millions of computers worldwide, like the Internet.
Clients and Servers
- Every computer connected to a network is called a host or end device.
- Servers are computers that provide information to end devices on the network.
- Clients are computers that send requests to servers to retrieve information, such as a web page from a web server or email from an email server.
Peer-to-Peer
- Client and server software typically run on separate computers.
- Peer-to-peer networks allow clients to also function as servers.
- Advantages of peer-to-peer networks include easy setup, less complexity, and lower cost.
- Disadvantages of peer-to-peer networks include no centralized administration, less security, not being scalable, and slower performance.
Intranets and Extranets
- Intranets are private collections of LANs and WANs internal to an organization, accessible only to authorized members.
- Extranets provide secure access to an organization's network for individuals outside of the organization who require access.
Internet Access Technologies
- Internet access technologies include broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services, popular for home users & small offices.
- Businesses often utilize business DSL, leased lines, and Metro Ethernet for faster connections to support IP phones, video conferencing, and data center storage.
Home and Small Office Internet Connections
- Cable provides high bandwidth, always-on Internet connection offered by cable television providers.
- DSL also provides high bandwidth, always-on Internet connection that runs over a telephone line.
Reliable Network Security
- Network security addresses two main types: network infrastructure security and information security.
- Network Infrastructure Security focuses on physical security of network devices and preventing unauthorized access to device management software.
- Information Security aims to protect data transmitted over the network.
- Network security has three goals: confidentiality, integrity, and availability.
- Confidentiality ensures only intended recipients can access the data.
- Integrity guarantees data remains unaltered during transmission.
- Availability ensures timely and reliable data access for authorized users.
Network Trends
- Networks must adapt to keep up with new technologies and end-user devices.
- Major trends include Bring Your Own Device (BYOD), online collaboration, video communications, and cloud computing.
Bring Your Own Device (BYOD)
- BYOD allows users to utilize their own devices, increasing opportunities and flexibility.
- End users can access information and communicate using personal devices such as laptops, netbooks, tablets, smartphones, and e-readers.
Online Collaboration
- Users seek to collaborate and work on joint projects over the network.
- Collaboration tools like Cisco WebEx enable instant connection, interaction, and achievement of objectives.
Cloud Computing
- Cloud computing allows storing personal files or backing up data on servers over the Internet.
- Cloud access provides access to applications like word processing and photo editing.
- Businesses use cloud computing to extend capabilities on demand and deliver services automatically to any device globally.
- Data centers enable cloud computing, especially for smaller companies that lease server and storage services.
Cloud Computing Types
- Public Clouds offer services and applications to the general public through pay-per-use models or for free.
- Private Clouds are intended for a specific organization or entity like the government.
Network Security Threats
- Network security is crucial, regardless of network size.
- Network security implemented should consider the particular environment while securing data, but still enabling the expected Quality of Service.
- Network security involves numerous protocols, technologies, devices, tools, and techniques to protect data and combat threats.
- Threat vectors can originate from external or internal sources.
External Threats
- External threats include viruses, worms, Trojan horses, spyware, adware, zero-day attacks, hacker attacks, denial of service attacks, data interception and theft, and identity theft.
Internal Threats
- Intentional or unintentional, studies indicate that internal network users cause the most security breaches.
- BYOD strategies increase vulnerabilities for corporate data.
Network Security Solutions
- Security implementation should utilize multiple layers with various solutions.
- Network security components for home or small office networks include:
- Antivirus and antispyware software on end devices.
- Firewall filtering to block unauthorized access to the network.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on different types of networks, including small home networks, medium to large networks, and the World Wide Web. Learn about the roles of clients and servers, as well as the advantages of peer-to-peer networking. This quiz covers essential concepts in networking.