Through the use of ______, we are connected like never before.
a. Networks
b. Routers
c. Databases
d. Servers
Diagrams of networks often use ______ to represent the different devices and connections
that make up a network.
a. Indicators
b. Cables
c. Symbols
d. Nodes
A ______ provides an easy way to understand how devices connect in a large network.
a. Connection chart
b. Diagram
c. Cables
d. Network Map
_________ refers to the technologies that support the infrastructure and the
programmed services and rules, or protocols, that move data across the network.
a. Network Architecture
b. Network Protocol
c. Network Framework
d. Network Model
All computers that are connected to a network and participate directly in network
communication are classified as _______.
a. Nodes
b. Clients
c. End devices
d. Hosts
The two types of network infrastructures are ________.
a. Wired and wireless
b. Local Area Networks (LAN) and Wide area networks (WAN)
c. Public and Private networks
d. Peer-to-Peer and Client-Server
_______ internet connections include cable, DSL, Cellular, Satellite, and Dial-up telephone.
A. Corporate
B. Metropolitan
C. SOHO
D. Data center
There are several common external and internal ______ to ______.
A. risks to data
B. attacks to servers
C. threats to networks
D. vulnerabilities to systems
Business internet connections include: Dedicated Leased Line, Metro Ethernet, Business DSL, and ______
Satellite
The Cisco Certified ______ Associate certification demonstrates your knowledge of
foundational technologies.
Network
The four basic characteristics of network architecture are Fault Tolerance, Scalability, Quality of Service (QoS), and ______.
Security
The recent networking trends that affect organizations and consumers are: Bring Your Own Device (BYOD), online collaboration, video communications, and ________.
cloud computing
Larger networks and corporate networks use antivirus, antispyware, and firewall filtering, but they also have other security requirements. Give two security requirements.
Dedicated firewall systems, access control lists (ACL), intrusion prevention systems (IPS), and virtual private networks (VPN)
(Any of two from the four)