Basics
Network Scales
Topologies
Little Bit of This, Little Bit of That
Network Security
100
It consists of two or more computers that are linked together.
 Computer Network?
100
What are the 3 most common network scales?
LAN, MAN, WAN.
100
Which network topology is the most commonly used?
Star Network.
100
The Hard drive of a computer is usually labeled with which drive letter?
 C.
100
Consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.


Network Security.
200
Name one way in which networks are linked together?
Cables, Telephone lines, Radio waves, Satellites, and Infrared light beams
200
Wireless Local Area Network is also known as what?
WiFi.
200
List the four network topologies?
Star, Ring, Bus, Mesh.
200
Multitier Architecture is a type of this network.
Client-Server.
200
Viruses, worms, and Trojan horses are all examples of what?
Malware.
300
Client-Server and Peer to Peer are listed under which classification?
 Functional Relationship.
300
Which network can connect users nationally or internationally?
WAN.
300
Which network topology is most used in WANs?
Mesh.
300
A set of standards that governs communications among computing systems.
Networking Protocol.
300
Computer system or network that is designed to block unauthorized access
Firewall.
400
Scale, Topology, Functional Relationship, and Protocol are all ways that a network is what?
classified.
400
List the following network scales in order from smallest to largest. LAN, PAN, WAN, MAN, CAN
 PAN, LAN, CAN, MAN, WAN.
400
If there is a break in the cable and the network goes down. You are using this type of network topology.
Bus.
400
Directories and subdirectories are two forms of this.
network file structures.
400
Computer program that replicates itself in order to spread to other computers.
 Computer Worm.
500
List 2 of the 5 things a computer can do when it is hooked to a network.
Share resources, Exchange files, Allow User Communication and Collaboration, Remote access Data protection.
500
What kind of transmission media type does MAN use?
 twisted cable or fiber optics.
500
It is wired like a star, but passes control from one device to the next in a continuous fashion.
 Ring topology.
500
IP, HTTP, TCP, and FTP are all examples of this.
protocols.
500
List 2 of the 5 types of defenses for network security.
Anti-Virus and Anti-Spyware, Firewalls, Encryption Intrusion Prevention Systems, Virtual Private Networks.