VPN
Network Architecture
Protocols
Data Transmission
Network Security
100

The two fundamental VPN technologies

What are Encryption and Tunneling?

100

This network covers a large area of land, (larger than a LAN), like a city. It can be either wired or wireless.

What is a WAN?

100

Set of rules for data communication over a network.

What is a protocol?

100

This is the faster type of data transmission?

What are Fiber Optic Cables?

100

This is a layer of security that block malicious data packets.

What is a firewall?

200

This practice relies on a VPN to access the internet and gave rise to home offices.

What is telecommuting?

200

This network is a logical group of workstations that are connected to the same LAN despite their geographical distribution.

What is a VLAN?

200
This technique detects noise or other impairments introduced into data while being transmitted.

What is error checking?

200

This is used to send data across a network (contains header, payload, and checksum)

What is a data packet?

200
This type of data transmission is the easiest to hack.

What is wireless?

300

This technology establishes and maintains a logical netword connection and encapsulates packets.

What is tunneling?

300

The hardware and infrastructure that connects all networks.

What is the internet?

300

Managing data integrity, flow control, deadlock, congestion, and error all fall under this category.

What are functions of protocols?

300

This is the slowest type of data transmission.

What is twisted pair?

300

This factor of authentication uses biometric data.

What is three factor authentication?

400

The process of encoding data so that only a computer with the right decoder and read it.

What is encryption?

400

This private controlled network is used by employees, partners, and customers of a company.

What is the extranet?

400

This contains seven layers of protocols to manage computers.

What is the OSI Model?

400

This is the process of using multiple routes to transfer data to its destination.

What is packet switching?

400

This layer of security grants specific access rights to users and creates user groups.

What is UserID?

500

One key advantage of using a VPN is the ability to bypass this type of restriction, often used by streaming services or governments to block access to certain content based on a user's location?

What is a geographical restriction?

500

This network is controlled, private, and used by organizations for internal use and employees.

What is the intranet?

500
This tool uses bits at the end of a packet to detect error.

What are parity bits?

500

This method of reducing data packet size results in permanent data loss.

What is lossy compression?

500

This form of security protects users from malicious attacks aside from computers.

What is physical security?
M
e
n
u