The two fundamental VPN technologies
What are Encryption and Tunneling?
This network covers a large area of land, (larger than a LAN), like a city. It can be either wired or wireless.
What is a WAN?
Set of rules for data communication over a network.
What is a protocol?
This is the faster type of data transmission?
What are Fiber Optic Cables?
This is a layer of security that block malicious data packets.
What is a firewall?
This practice relies on a VPN to access the internet and gave rise to home offices.
What is telecommuting?
This network is a logical group of workstations that are connected to the same LAN despite their geographical distribution.
What is a VLAN?
What is error checking?
This is used to send data across a network (contains header, payload, and checksum)
What is a data packet?
What is wireless?
This technology establishes and maintains a logical netword connection and encapsulates packets.
What is tunneling?
The hardware and infrastructure that connects all networks.
What is the internet?
Managing data integrity, flow control, deadlock, congestion, and error all fall under this category.
What are functions of protocols?
This is the slowest type of data transmission.
What is twisted pair?
This factor of authentication uses biometric data.
What is three factor authentication?
The process of encoding data so that only a computer with the right decoder and read it.
What is encryption?
This private controlled network is used by employees, partners, and customers of a company.
What is the extranet?
This contains seven layers of protocols to manage computers.
What is the OSI Model?
This is the process of using multiple routes to transfer data to its destination.
What is packet switching?
This layer of security grants specific access rights to users and creates user groups.
What is UserID?
One key advantage of using a VPN is the ability to bypass this type of restriction, often used by streaming services or governments to block access to certain content based on a user's location?
What is a geographical restriction?
This network is controlled, private, and used by organizations for internal use and employees.
What is the intranet?
What are parity bits?
This method of reducing data packet size results in permanent data loss.
What is lossy compression?
This form of security protects users from malicious attacks aside from computers.