Networks Overview Quiz
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of network connects hundreds of millions of computers worldwide?

  • Small Office/Home Office
  • World Wide Networks (correct)
  • Small Home Networks
  • Medium to Large Networks
  • A client computer can function as a server in a peer-to-peer network.

    True

    What are the two main types of computers in a network?

    Clients and servers

    In a network, ________ are computers that provide information to end devices.

    <p>servers</p> Signup and view all the answers

    Match the following types of networks with their descriptions:

    <p>Small Home Networks = Connect a few computers to the Internet Peer-to-Peer Networks = Clients can also act as servers Medium to Large Networks = Interconnected computers across many locations World Wide Networks = Connects millions of computers globally</p> Signup and view all the answers

    Which is NOT an advantage of peer-to-peer networks?

    <p>Centralized administration</p> Signup and view all the answers

    Medium to large networks typically consist of a few interconnected computers.

    <p>False</p> Signup and view all the answers

    What is one disadvantage of a peer-to-peer network?

    <p>Not as secure</p> Signup and view all the answers

    What are the two main types of network security?

    <p>Network infrastructure security and Information Security</p> Signup and view all the answers

    The three goals of network security are confidentiality, usability, and integrity.

    <p>False</p> Signup and view all the answers

    What does BYOD stand for in the context of networking?

    <p>Bring Your Own Device</p> Signup and view all the answers

    The assurance that only intended recipients can read the data is known as __________.

    <p>confidentiality</p> Signup and view all the answers

    Which of the following is NOT one of the new networking trends affecting organizations?

    <p>Artificial Intelligence</p> Signup and view all the answers

    Availability in network security guarantees timely access to data for all users.

    <p>False</p> Signup and view all the answers

    List one main component of network infrastructure security.

    <p>Physical security of network devices</p> Signup and view all the answers

    Match the following network security goals with their meanings:

    <p>Confidentiality = Only intended recipients can read the data Integrity = Assurance that data has not been altered Availability = Timely access to data for authorized users</p> Signup and view all the answers

    What is an intranet?

    <p>A private network only for authorized members of an organization</p> Signup and view all the answers

    An extranet allows access to an organization's network for users from different organizations.

    <p>True</p> Signup and view all the answers

    Name two popular services for home users and small offices to connect to the Internet.

    <p>Broadband cable, DSL</p> Signup and view all the answers

    A high bandwidth, always on, Internet connection offered by cable television service providers is known as _____ .

    <p>cable</p> Signup and view all the answers

    Which of the following is NOT a common method of Internet connection for organizations?

    <p>Wi-Fi Tethering</p> Signup and view all the answers

    DSL connections run over power lines.

    <p>False</p> Signup and view all the answers

    Match the following Internet connection types with their descriptions:

    <p>Cable = Runs over cable television lines and provides high bandwidth DSL = Runs over telephone lines and offers high bandwidth Wireless WAN = Connects users wirelessly over a wide area Leased Lines = Dedicated point-to-point traditional lines</p> Signup and view all the answers

    Business-class interconnections may include business DSL, _____, and Metro Ethernet.

    <p>leased lines</p> Signup and view all the answers

    What does BYOD stand for?

    <p>Bring Your Own Device</p> Signup and view all the answers

    Collaboration tools like Cisco WebEx are only important for businesses and not for education.

    <p>False</p> Signup and view all the answers

    Name one benefit of cloud computing for businesses.

    <p>It allows businesses to extend their capabilities on demand.</p> Signup and view all the answers

    Cloud computing allows users to access applications such as word processing and ____ editing.

    <p>photo</p> Signup and view all the answers

    Which of the following is NOT a type of device enabled by BYOD?

    <p>Desktop Computers</p> Signup and view all the answers

    Public Clouds offer services to specific organizations only.

    <p>False</p> Signup and view all the answers

    Match the following types of Clouds with their descriptions:

    <p>Public Clouds = Services for the general public Private Clouds = Services for specific organizations Hybrid Clouds = Combination of public and private services Community Clouds = Services for specific community groups</p> Signup and view all the answers

    What is one way smaller companies can benefit from cloud computing?

    <p>They can lease server and storage services from larger data center organizations.</p> Signup and view all the answers

    Which of the following is considered an external threat to network security?

    <p>Hacker attacks</p> Signup and view all the answers

    Internal users cause the majority of security breaches in a network.

    <p>True</p> Signup and view all the answers

    Name two types of external threats to network security.

    <p>Viruses and Denial of Service attacks.</p> Signup and view all the answers

    A __________ attack is also known as a zero-hour attack.

    <p>zero-day</p> Signup and view all the answers

    What is a recommended solution for securing network devices?

    <p>Installing antivirus and antispyware software</p> Signup and view all the answers

    Match the following security solutions to their purposes:

    <p>Antivirus software = Protection against malware Firewall filtering = Blocking unauthorized access IDS = Monitoring network traffic Encryption = Securing data transmission</p> Signup and view all the answers

    Quality of service is not affected by the implementation of security measures.

    <p>False</p> Signup and view all the answers

    What does BYOD stand for, and why is it a concern for network security?

    <p>Bring Your Own Device; it increases vulnerability of corporate data.</p> Signup and view all the answers

    Study Notes

    Networks of Many Sizes

    • Small Home Networks connect a few computers to each other and the Internet.
    • Small Office/Home Office networks enable computers in a home or a remote office to connect to a corporate network.
    • Medium to Large Networks have many locations with hundreds or thousands of interconnected computers.
    • World Wide Networks connect hundreds of millions of computers worldwide, like the Internet.

    Clients and Servers

    • Every computer connected to a network is called a host or end device.
    • Servers are computers that provide information to end devices on the network.
    • Clients are computers that send requests to servers to retrieve information, such as a web page from a web server or email from an email server.

    Peer-to-Peer

    • Client and server software typically run on separate computers.
    • Peer-to-peer networks allow clients to also function as servers.
    • Advantages of peer-to-peer networks include easy setup, less complexity, and lower cost.
    • Disadvantages of peer-to-peer networks include no centralized administration, less security, not being scalable, and slower performance.

    Intranets and Extranets

    • Intranets are private collections of LANs and WANs internal to an organization, accessible only to authorized members.
    • Extranets provide secure access to an organization's network for individuals outside of the organization who require access.

    Internet Access Technologies

    • Internet access technologies include broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services, popular for home users & small offices.
    • Businesses often utilize business DSL, leased lines, and Metro Ethernet for faster connections to support IP phones, video conferencing, and data center storage.

    Home and Small Office Internet Connections

    • Cable provides high bandwidth, always-on Internet connection offered by cable television providers.
    • DSL also provides high bandwidth, always-on Internet connection that runs over a telephone line.

    Reliable Network Security

    • Network security addresses two main types: network infrastructure security and information security.
    • Network Infrastructure Security focuses on physical security of network devices and preventing unauthorized access to device management software.
    • Information Security aims to protect data transmitted over the network.
    • Network security has three goals: confidentiality, integrity, and availability.
    • Confidentiality ensures only intended recipients can access the data.
    • Integrity guarantees data remains unaltered during transmission.
    • Availability ensures timely and reliable data access for authorized users.
    • Networks must adapt to keep up with new technologies and end-user devices.
    • Major trends include Bring Your Own Device (BYOD), online collaboration, video communications, and cloud computing.

    Bring Your Own Device (BYOD)

    • BYOD allows users to utilize their own devices, increasing opportunities and flexibility.
    • End users can access information and communicate using personal devices such as laptops, netbooks, tablets, smartphones, and e-readers.

    Online Collaboration

    • Users seek to collaborate and work on joint projects over the network.
    • Collaboration tools like Cisco WebEx enable instant connection, interaction, and achievement of objectives.

    Cloud Computing

    • Cloud computing allows storing personal files or backing up data on servers over the Internet.
    • Cloud access provides access to applications like word processing and photo editing.
    • Businesses use cloud computing to extend capabilities on demand and deliver services automatically to any device globally.
    • Data centers enable cloud computing, especially for smaller companies that lease server and storage services.

    Cloud Computing Types

    • Public Clouds offer services and applications to the general public through pay-per-use models or for free.
    • Private Clouds are intended for a specific organization or entity like the government.

    Network Security Threats

    • Network security is crucial, regardless of network size.
    • Network security implemented should consider the particular environment while securing data, but still enabling the expected Quality of Service.
    • Network security involves numerous protocols, technologies, devices, tools, and techniques to protect data and combat threats.
    • Threat vectors can originate from external or internal sources.

    External Threats

    • External threats include viruses, worms, Trojan horses, spyware, adware, zero-day attacks, hacker attacks, denial of service attacks, data interception and theft, and identity theft.

    Internal Threats

    • Intentional or unintentional, studies indicate that internal network users cause the most security breaches.
    • BYOD strategies increase vulnerabilities for corporate data.

    Network Security Solutions

    • Security implementation should utilize multiple layers with various solutions.
    • Network security components for home or small office networks include:
      • Antivirus and antispyware software on end devices.
      • Firewall filtering to block unauthorized access to the network.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on different types of networks, including small home networks, medium to large networks, and the World Wide Web. Learn about the roles of clients and servers, as well as the advantages of peer-to-peer networking. This quiz covers essential concepts in networking.

    More Like This

    Networking Concepts Overview
    10 questions
    Computer Networking Basics
    10 questions
    Networking Concepts Quiz
    39 questions

    Networking Concepts Quiz

    AttractiveAzurite2094 avatar
    AttractiveAzurite2094
    Use Quizgecko on...
    Browser
    Browser