WGU - Network & Security Foundations - Section 1: Intro to Networking Concepts latest updated release ( SOLVED & UPDATED )

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/374

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

375 Terms

1
New cards

This device is a portable personal computer with a folding design. It includes an integrated flat screen, a keyboard with a mouse, and usually, a battery. It can also contain a CDROM, DVD-ROM, as well as various other devices such as SD card readers, Wi-Fi, Bluetooth, etcetera. Such devices typically connect to networks via Wi-Fi or Ethernet.

Laptop (1.2)

2
New cards

These devices are special-purpose computers that forward messages to and from the machines on their network. They use their forwarding table to match up the private IP address with the internet IP address and send the message to the correct machine.

Router (1.2)

3
New cards

These devices can reside on networks through the router or a switch, making them accessible to all the other network devices. Such devices typically connect to networks via Ethernet but can also use Wi-Fi.

Printer (1.2)

4
New cards

This device monitors network traffic and blocks traffic that triggers its safety rules, providing a barrier between a trusted private network and an untrusted network like the internet.

Firewall (1.2)

5
New cards

This device bridges between the customer network and the ISP, converting the incoming analog data into digital, and the outgoing digital data into analog. It provides the access point to the internet.

Modem (1.2)

6
New cards

When capitalized, this device generally refers to the worldwide network and is most often what non-technical people are referring to when they speak of this. However, an when lowercase, it is simply a network of networks. Often, when IT professionals refer to the this term, they are referring to a network of networks.

Internet (1.2)

7
New cards

This device is a portable computer typically with touchscreen display and a rechargeable battery in a thin and flat design. Typically, it connects to a network via Wi-Fi.

Tablet Computer (1.2)

8
New cards

This device is a cellular phone with an operating system and the ability to run third-party applications. Typically, these devices connect to networks using cellular wireless frequencies or Wi-Fi on local networks.

Smartphone (1.2)

9
New cards

This device extends the network by using packet switching to forward data to the intended hard-wired devices.

Network switch (1.2)

10
New cards

Typically, a tower chassis enclosure which contains the internal components of the computer system, an external display that provides output, and a keyboard and mouse to provide input. These devices typically connect to a network via Ethernet but can also utilize Wi-Fi.

Desktop Computer (1.2)

11
New cards

This device is a computer that provides services, such as website hosting and routing, for other devices.

Server (1.2)

12
New cards

A user connects their laptop to a Wi-Fi network in a coffee shop. Which network component is responsible for managing the wireless connection?

Ethernet switch, Router, Modem, or an Access point?

Access point (1.2)

13
New cards

Define access points:

They manage wireless connections by providing connectivity between wireless devices and the wired network. (1.2)

14
New cards

A university campus has multiple buildings connected by underground fiber-optic cables. Which network component manages the flow of data between these buildings?

Bridge, Gateway, Repeater, or a Router?

Router (1.2)

15
New cards

What are the purpose of routers?

They direct data between different networks, such as those in separate buildings, by determining the best path for transmission. (1.2)

16
New cards

What 3 main parts does a typical corporate network have?

An external network, perimeter network, and the intranet. (1.3)

17
New cards

In a typical corporate network, what are the 3 main parts of an external network?

(1) Cloud services, (2) the internet, and (3) branch offices & business partners (1.3)

18
New cards

In a typical corporate network, what are the 4 main parts of an perimeter network?

(1) Application servers (i.e e-mail, web), (2) access servers, (3) proxy servers, and (4) security (i.e IDS, firewall) (1.3)

19
New cards

In a typical corporate network, what are the 6 main parts of an intranet network?o

(1) Desktop clients, (2) Mobile clients, (3) File & storage, (4) Communication servers, (5) Infrastructure & management servers, and (6) Application servers (i.e e-mail, web, database) (1.3)

20
New cards

In the intranet, what are the 2 parts of the infrastructure & management servers:

(1) DNS server and (2) Domain controller (1.3)

21
New cards

In the intranet, what are the 3 parts of the application servers (i.e e-mail, web, databases):

(1) DB server, (2) Web server, and (3) Sharepoint server (1.3)

22
New cards

In VPN networks, there is (local (intranet))/remote) access, data encryption is (always available/optional), has (good, fast, &/or slow) speed, and uses which protocols?

Remote; Always; Good; Protocols: Authentication, encryption, hash algorithm, network (1.3)

23
New cards

In Dial-up networks, there is (local (intranet))/remote) access, data encryption is (always available/optional), has (good, fast, &/or slow) speed, and uses which protocols?

Remote; Optional; Slow; Protocols: Authentication (1.3)

24
New cards

In wireless networks, there is (local (intranet))/remote) access, data encryption is (always available/optional), has (good, fast, &/or slow) speed, and uses which protocols?

Local (intranet); Always; Good; Protocols: Authentication, encryption, hash algorithm, network (1.3)

25
New cards

In WWAN networks, there is (local (intranet))/remote) access, data encryption is (always available/optional), has (good, fast, &/or slow) speed, and uses which protocols?

Remote; Always; Good/Fast ($$); Protocols: 3rd party (1.3)

26
New cards

In Wired networks, there is (local (intranet))/remote) access, data encryption is (always available/optional), has (good, fast, &/or slow) speed, and uses which protocols?

Local (intranet); Optional; Fast; Protocols: Authentication, network (1.3)

27
New cards

These devices are special purpose communication devices for wireless LANs (WLANs).

Wireless routers (1.4)

28
New cards

These devices are used to provide a hotspot for wireless clients in the vicinity.

Access points (1.4)

29
New cards

These devices act as a bridge between wired and wireless networks.

Wireless access points (1.4)

30
New cards

Wireless access points are often multifunction devices, but ___________ can be more efficient in large networks.

Single purpose devices (1.4)

31
New cards

Access points can be used for which 2 purposes:

(1) Strengthen security and (2) Extend wireless range of service (1.4)

32
New cards

What is a name for the network?

SSID (1.4)

33
New cards

Typically this is broadcasted so users can connect to the network.

SSID (1.4)

34
New cards

For security reasons reasons the _____ may be hidden from general public. There is software available that can easily uncover hidden _____.

SSID

35
New cards

What is a rogue access point?

An unauthorized access point connected to a company network. It can provide attackers with access to a company LAN over Wi-Fi.

36
New cards

What is an Evil Twin when discussing rogue access points?

It is used for phishing. The attacker sets up a legitimate-looking access point, possibly using a portable hotspot, and harvests data. (1.4)

37
New cards

What are modems?

These are hardware devices used to connect to a remote network, or the Internet. (1.4)

38
New cards

The term this is a contradiction of "modulate" and "demodulate" which refers to a device that sends and receives data using telephone lines and cable lines.

Modems (1.4)

39
New cards

This device creates an internet connection along with a standard telephone line.

Dial-up modems (1.4)

40
New cards

Modems dial into this group to establish an Internet connection.

Internet Service Provider (ISP) (1.4)

41
New cards

Dial-up modems experience slow speeds (i.e a maximum speed of ____ Kbps)

56 (1.4)

42
New cards

This is a popular method for transferring digital signals over standard telephone lines.

Digital Subscriber Line (DSL) (1.4)

43
New cards

This device are used to connect to a DSL Internet Service Provider which has superseded dial-up modems.

Digital Subscriber Line (DSL) (1.4)

44
New cards

Certain models have built-in _____ capabilities.

Wi-Fi (1.4)

45
New cards

These are hardware devices that use coax cable TV lines to provide high-speed internet access.

Cable modems

46
New cards

Cable modems have an always-on connection and (fast/slow) data transfer rates.

Fast (1.4)

47
New cards

A router is a (Layer 1/Layer 2/Layer 3) device.

Layer 3 (1.4)

48
New cards

These are gateway devices used to forward data packets to other networks.

Routers (1.4)

49
New cards

Routers connect at least two networks. List three network pair types here:

(1) LAN/WAN, (2) LAN/LAN, and (3) LAN/ISP (1.4)

50
New cards

Routers are special purpose devices and do not require a keyboard or display. They can contain which 3 types of devices?

(1) Processor, (2) Memory, and (3) Input/output (I/O) interfaces (1.4)

51
New cards

List the 6 types of routers:

(1) Broadband, (2) Wireless, (3) Edge, (4) Subscriber edge, (5) Inter-provider border, and (6) Core (1.4)

52
New cards

This type of router is used to connect both computers and to the Internet.

Broadband router (1.4)

53
New cards

This type of router creates a wireless signal in a home or office environment.

Wireless router (1.4)

54
New cards

This device is used to extend the radio frequency range, it's function is at Layer 1 of OSI model (that extends Ethernet network segment), but lacks intelligence (meaning that it simply passes data traffic across itself).

Wireless range extender (1.4)

55
New cards

The distances that the wireless range extender can access depends on which 2 factors?

The (1) transmit power of the access point and (2) the gain of antenna (1.4)

56
New cards

For wireless range extenders, ______ are also transmitters and receivers.

Clients (1.4)

57
New cards

The wireless range extender allows computers and other devices to connect to which type of network outside if the wireless access point's normal range.

Wireless LAN (WLAN) (1.4)

58
New cards

Effective communication with a wireless range extender requires which 2 things?

(1) Transmitter be able to hear the receiver and (2) that the receiver be able to hear the transmitter (e.g a two-way radio communication) (1.4)

59
New cards

What are the 2 types of twisted pair cabling?

Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP) cables. (1.5)

60
New cards

(STP/UTP) are easier to install as cables are flexible, smaller, and lighter. However, they experience slower data rates.

Unshielded Twisted Pair (UTP) (1.5)

61
New cards

The installation of (STP/UTP) cables can be more challenging compared to its "opposite" form, but it provides higher data rates.

Shielded Twisted Pair (STP) (1.5)

62
New cards

Underground installations of which type of cabling is ideal for outdoor implementations or installs directly in the ground with or without the use of a conduit.

Direct burial rated shielded cabling (1.5)

63
New cards

(STP/UTP) implementations are suitable for both offices and home environments, though ideally, environments where crosstalk is not a concern. This cabling type is commonly used for telephone connections.

Unshielded Twisted Pair (UTP) (1.5)

64
New cards

(STP/UTP) implementations are suitable for environments that are susceptible to electromagnetic interference (EMI) such as airports, industrials, and medical centers.

Shielded Twisted Pair (STP) (1.5)

65
New cards

This type of cabling is characterized by data being transmitted by pulses of light, transmission over great distances, highly secure data transmission, and by not being affected by electrical or radio interference.

Fiber optic cabling (1.5)

66
New cards

List the 3 fiber connector types:

(1) Subscriber connector (SC), (2) Lucent connector (LC), and (3) Straight tip (ST) (1.5)

67
New cards

List the 4 main advantages of optical fiber:

(1) Cost, (2) Capacity, (3) Lifespan, and (4) Speed (1.5)

68
New cards

List the 3 main disadvantages of optical fiber:

(1) Low power, (2) Distance, and (3) Frailty (1.5)

69
New cards

What does STP and UTP have in common?

Both are cables with wires that are twisted together (1.5)

70
New cards

(STP/UTP) cables use a foil or mesh shield to reduce noise and crosstalk. This cable also requires the use of an electrical ground.

Shielded Twisted Pair (STP) (1.5)

71
New cards

(STP/UTP) cables are easier to install than (STP/UTP) because they are more flexible, smaller, and lighter. Though these types of cables have slower data rates.

Unshielded Twisted Pair (UTP); Shielded Twisted Pair (STP) (1.5)

72
New cards

The installation of (STP/UTP) cables can be more challenging compared to (STP/UTP), though they provide higher data rates.

Shielded Twisted Pair (STP); Unshielded Twisted Pair (UTP) (1.5)

73
New cards

These types of networks are smaller and typically confined to a single room, building, or group of buildings. Example: Ethernet.

Local Area Network (LAN) (1.6)

74
New cards

What are the 3 characteristics of Local Area Networks?

(1) Topology (i.e the arrangement of devices on the network), (2) Protocols (i.e rules and enforcing specifications), and (3) Media (i.e cables) (1.6)

75
New cards

Which types of networks enable wireless network communication using wireless signals as opposed to traditional network cabling?

Wireless local area network (WLAN) (1.6)

76
New cards

What are the 3 most common uses of Wireless local area networks (WLAN)?

The home, business, and the public. (1.6)

77
New cards

What are the 3 most common devices of Wireless local area networks (WLAN)?

The mobile phones, laptops, and tablets. (1.6)

78
New cards

These types of networks interconnect devices focused on personal workspace (e.g laptops, mobile phones and tablets, printers and speakers) and are usually wireless (e.g Bluetooth, Near-field communication (NFC)). The keyword for this network is "sync".

Personal Area Network (PAN) (1.6)

79
New cards

This type of data network design is used for a city or town and is formed by connecting multiple LANs making them typically larger than a LAN but smaller than a WAN.

Metropolitan Area Network (MAN) (1.6)

80
New cards

List 3 benefits of Metropolitan Area Networks (MANs):

(1) Efficiency, (2) Fast communication, and (3) High-speed carriers (e.g fiber optic cables) (1.6)

81
New cards

This type of computer network spans a large geographical area and typically consists of at least two LANs:

Wide area network (WAN) (1.6)

82
New cards

This type of proprietary local area network is typically used to serve corporations, universities, and government agency.

Campus Area Network (CAN) (1.6)

83
New cards

This type of specialized high-speed network grants block-level network access to storage. The network provides storage that appears locally attached to end user.

Storage Area Network (SAN) (1.6)

84
New cards

List the 4 common uses for a Storage Area Networks (SANs):

(1) Application availability, (2) Application performance (i.e off-load storage functions), (3) Storage utilization, and (4) Data protection and security (1.6)

85
New cards

What is a wireless ad hoc network?

It is a local area network (LAN) that is built as devices are added and connected to each other. There is no need for any infrastructure to be in place because each device an connect to the wireless device and to each other. (1.7)

86
New cards

What are the four advantages of a wireless ad hoc network?

(1) Bypasses the need for a router because devices connect to other devices on the network to access files, (2) Often cheaper than a traditional network, (3) Mobility because the network can be created in the fly and it only requires 2+ devices, and (4) Speed which makes it able to quickly connect multiple computers with no additional hardware. (1.7)

87
New cards

How do devices function in an infrastructure network?

The devices connect to a wired network using physical devices using an access point (AP) which will extend the range of the signal. (1.7)

88
New cards

In infrastructure networks, does the WLAN replace the wired LAN?

Wireless LAN (WLAN) does not replace the wired LAN. Instead it is used to extend functionality to wireless devices. (1.7)

89
New cards

What are the main advantage of infrastructure networks?

Scalable - meaning that it uses multiple APs that can reduce congestion and increase the overall coverage area. Data roams between interlocking access points without losing a connection to the network. (1.7)

90
New cards

What are the two main drawbacks of infrastructure networks?

(1) More complex to set up compared to ad hoc and (2) More expensive to set up, as it requires an access point. (1.7)

91
New cards

Three main types of cloud infrastructure:

(1) Public cloud infrastructure, (2) Private cloud infrastructure, and (3) hybrid cloud. (1.8)

92
New cards

List the 5 key features of hybrid cloud:

(1) The ability to share data and deploying applications, (2) Scalable services, (3) Improved cost efficiencies, (4) Reduced capital expenditures, and (4) Critical data remains behind a firewall that is under the organization's physical control. (1.8)

93
New cards

List the 3 main benefits of hybrid or multi-cloud:

(1) Elasticity, (2) Automation, and (3) Flexibility (1.8)

94
New cards

Describe client/server architectures:

They involve a central server that provides services to clients, which is not the case in this scenario. (1.9)

95
New cards

In a network where all computers communicate through a central server, which type of network architecture is being used?

Mesh, Decentralized, Client/server, or Peer-to-peer?

Client/server (1.9)

96
New cards

In a network where there is a mainframe computer serving terminals across the organization, which type of network architecture is being used?

Decentralized, Peer-to-peer, Client/server, and Hierarchical?

Hierarchical (1.9)

97
New cards

Describe hierarchical networks:

They involve a central mainframe or server providing services to terminals or lower-level devices, creating a hierarchical structure. (1.9)

98
New cards

A network is composed of which three parts:

(1) Devices - end devices connected to the network (e.g computers, desktops, smartphones, or shared resources such as Servers, Printers, and shared devices), (2) Applications that are used to share information (e.g E-mail, instant messaging (IM), and other applications that allow the efficient and effective sharing of information, (3) The networks themselves (e.g Cables to Routers and Switches to the protocols TCP/IP and other protocols that are used to allow the sharing information between the end devices). (1.1)

99
New cards

Briefly describe the progression of information security from the 1950s-1970s:

In the 1950s, computers were just beginning to emerge and they were mainly used by governments and large corporations. In the early 1960s, the US government began to develop security protocols for its computer systems, which were mainly focused on physical security. These included measures such as locked doors, security guards, and restricted access to computer rooms. By the end of the 1960s, the focus on information security had shifted from physical security to network security. (1.1)

100
New cards

In the late 1960s and into the 1970s, the US Department of Defense developed the _____________, the predecessor to the internet, the development of this network, the need for information security group exponentially.

ARPANET (1.1)