1/15
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What are the learning outcomes of the chapters on networking and security?
Students should be able to describe client/server networks, explain threats to network security, and connect and secure wireless networks.
What is a client/server network?
A network where two or more computing devices share information and resources.
What is one benefit of business networks?
They enable resource sharing, allowing peripherals like printers to be used by multiple users.
What distinguishes a client/server network from a P2P network?
Client/server networks allow for increased scalability and centralization of tasks.
What is a Virtual Private Network (VPN)?
A VPN keeps information secure by using tunneling and encryption.
What are the key components of a client/server network?
Servers, network topologies, transmission media, network adapters, navigation devices, and network operating systems.
Name two types of network topologies.
Physical topology and logical topology.
What are the advantages of a star topology?
Failure of one computer doesn't affect the rest, easy to add nodes, and maintains acceptable performance with many users.
How does a Firewall protect a client/server network?
It provides protection similar to a personal firewall, offering more sophistication than personal firewalls.
What is piggybacking in the context of wireless networks?
Connecting to a wireless network without permission.
What precautions should be taken to secure a wireless network?
Use encryption, change SSID, disable SSID broadcast, change default password, create a passphrase, limit signal range.
What is the purpose of an authentication server?
To keep track of who logs into the network and the services available to each user.
What distinguishes an intranet from an extranet?
An intranet is a private network used exclusively by a select group, while an extranet has limited access.
What is CSMA/CD?
Carrier Sense Multiple Access with Collision Detection; it helps prevent data collisions in a star network.
How can improper handling of portable storage devices threaten a network's security?
They can facilitate data theft by allowing unauthorized access to sensitive information.
What are the types of networks classified based on topology?
Bus, ring, star, and hybrid topologies.