0% found this document useful (0 votes)
272 views

Introduction To Networks - Module Practice and Quiz

This document provides an introduction to networks, including: - Networks connect people and allow ideas to spread globally, increasing productivity. - Common network components include hosts, clients, servers, and intermediary devices that connect individual networks. - Network diagrams represent connections and topology through symbols. Physical and logical diagrams show different aspects. - Popular network types include home, SOHO, corporate, campus, and internet networks of varying sizes. - Reliable networks aim for fault tolerance, scalability, quality of service, and security through redundancy, standards, traffic management, and confidentiality. - Current trends include BYOD, video communication, collaboration tools, and cloud-based storage and applications

Uploaded by

Faical Bitam
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
272 views

Introduction To Networks - Module Practice and Quiz

This document provides an introduction to networks, including: - Networks connect people and allow ideas to spread globally, increasing productivity. - Common network components include hosts, clients, servers, and intermediary devices that connect individual networks. - Network diagrams represent connections and topology through symbols. Physical and logical diagrams show different aspects. - Popular network types include home, SOHO, corporate, campus, and internet networks of varying sizes. - Reliable networks aim for fault tolerance, scalability, quality of service, and security through redundancy, standards, traffic management, and confidentiality. - Current trends include BYOD, video communication, collaboration tools, and cloud-based storage and applications

Uploaded by

Faical Bitam
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

4/11/2020 Introduction to Networks -Module Practice and Quiz

 Introduction to Networks /  1 - Networking Today /  1.10 - Module Practice and Quiz

Module Practice and Quiz

1.10.1

What did I learn in this module? 

Networks Aect our Lives

In today’s world, through the use of networks, we are connected like never before. People with ideas can communicate instantly with others to make those
ideas a reality. The creation of online communities for the exchange of ideas and information has the potential to increase productivity opportunities across the
globe. The creation of the cloud lets us store documents and pictures and access them anywhere, anytime.

Network Components

All computers that are connected to a network and participate directly in network communication are classied as hosts. Hosts can be called end devices.
Some hosts are also called clients. Many computers function as the servers and clients on the network. This type of network is called a peer-to-peer network.
An end device is either the source or destination of a message transmitted over the network. Intermediary devices connect the individual end devices to the
network and can connect multiple individual networks to form an internetwork. Intermediary devices use the destination end device address, in conjunction
with information about the network interconnections, to determine the path that messages should take through the network. The media provides the channel
over which the message travels from source to destination.

Network Representations and Topologies

Diagrams of networks often use symbols to represent the dierent devices and connections that make up a network. A diagram provides an easy way to
understand how devices connect in a large network. This type of “picture” of a network is known as a topology diagram. Physical topology diagrams illustrate
the physical location of intermediary devices and cable installation. Logical topology diagrams illustrate devices, ports, and the addressing scheme of the
network.

Common Types of Networks

Small home networks connect a few computers to each other and to the internet. The small oce/home oce (SOHO) network allows computers in a home
oce or a remote oce to connect to a corporate network, or access centralized, shared resources. Medium to large networks, such as those used by
corporations and schools, can have many locations with hundreds or thousands of interconnected hosts. The internet is a network of networks that connects
hundreds of millions of computers world-wide. The two most common types of network infrastructures are Local Area Networks (LANs), and Wide Area
Networks (WANs). A LAN is a network infrastructure that spans a small geographical area. A WAN is a network infrastructure that spans a wide geographical
area. Intranet refers to a private connection of LANs and WANs that belongs to an organization. An organization may use an extranet to provide secure and
safe access to individuals who work for a dierent organization but require access to the organization’s data.

Internet Connections

SOHO internet connections include cable, DSL, Cellular, Satellite, and Dial-up telephone. Business internet connections include Dedicated Leased Line, Metro
Ethernet, Business DSL, and Satellite. The choice of connection varies depending on geographical location and service provider availability. Traditional
separate networks used dierent technologies, rules, and standards. Converged networks deliver data, voice, and video between many dierent types of
devices over the same network infrastructure. This network infrastructure uses the same set of rules, agreements, and implementation standards. Packet
Tracer is a exible software program that lets you use network representations and theories to build network models and explore relatively complex LANs and
WANs.

Reliable Networks

The term network architecture refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data
across the network. As networks evolve, we have learned that there are four basic characteristics that network architects must address to meet user
expectations: Fault Tolerance, Scalability, Quality of Service (QoS), and Security. A fault tolerant network is one that limits the number of aected devices
during a failure. Having multiple paths to a destination is known as redundancy. A scalable network expands quickly to support new users and applications.
Networks are scalable because the designers follow accepted standards and protocols. QoS is a primary mechanism for managing congestion and ensuring
reliable delivery of content to all users. Network administrators must address two types of network security concerns: network infrastructure security and
information security. To achieve the goals of network security, there are three primary requirements: Condentiality, Integrity, and Availability.

Network Trends

There are several recent networking trends that aect organizations and consumers: Bring Your Own Device (BYOD), online collaboration, video
communications, and cloud computing. BYOD means any device, with any ownership, used anywhere. Collaboration tools, like Cisco WebEx give employees,
students, teachers, customers, and partners a way to instantly connect, interact, and achieve their objectives. Video is used for communications, collaboration,
and entertainment. Video calls are made to and from anyone with an internet connection, regardless of where they are located. Cloud computing allows us to
store personal les, even backup an entire drive on servers over the internet. Applications such as word processing and photo editing can be accessed using
the cloud. There are four primary types of Clouds: Public Clouds, Private Clouds, Hybrid Clouds, and Custom Clouds. Smart home technology is currently
being developed for all rooms within a house. Smart home technology will become more common as home networking and high-speed internet technology
expands. Using the same wiring that delivers electricity, powerline networking sends information by sending data on certain frequencies. A Wireless Internet

https://contenthub.netacad.com/itn/1.10.2 1/4
4/11/2020 Introduction to Networks -Module Practice and Quiz
Service Provider (WISP) is an ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home
wireless local area networks (WLANs).

Network Security

There are several common external threats to networks:

Viruses, worms, and Trojan horses


Spyware and adware
Zero-day attacks
Threat Actor attacks
Denial of service attacks
Data interception and theft
Identity theft

These are the basic security components for a home or small oce network:

Antivirus and antispyware


Firewall ltering

Larger networks and corporate networks use antivirus, antispyware, and rewall ltering, but they also have other security requirements:

Dedicated rewall systems


Access control lists (ACL)
Intrusion prevention systems (IPS)
Virtual private networks (VPN)

The IT Professional

The Cisco Certied Network Associate (CCNA) certication demonstrates that you have a knowledge of foundational technologies and ensures you stay
relevant with skill sets needed for the adoption of next-generation technologies. Your CCNA certication will prepare you for a variety of jobs in today’s
market. At www.netacad.com you can click the Careers menu and then select Employment opportunities. You can nd employment opportunities where you
live by using the Talent Bridge Matching Engine. Search for jobs with Cisco as well as Cisco partners and distributors seeking Cisco Networking Academy
students and alumni.

1.10.2

Module Quiz - Networking Today 

1. During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that
were visited by users of the computer. Which type of threat is aecting this computer?

DoS attack

identity theft

spyware

zero-day attack

2. Which term refers to a network that provides secure access to the corporate oces by suppliers, customers and collaborators?

Internet

intranet

extranet

extendednet

3. A large corporation has modied its network to allow users to access network resources from their personal laptops and smart phones. Which
networking trend does this describe?

cloud computing

online collaboration

bring your own device

video conferencing

4. What is an ISP?

It is a standards body that develops cabling and wiring standards for networking.

It is a protocol that establishes how computers within a local network communicate.

It is an organization that enables individuals and businesses to connect to the Internet.

https://contenthub.netacad.com/itn/1.10.2 2/4
4/11/2020 Introduction to Networks -Module Practice and Quiz
It is a networking device that combines the functionality of several dierent networking devices in one.

5. In which scenario would the use of a WISP be recommended?

an Internet cafe in a city

a farm in a rural area without wired broadband access

any home with multiple wireless devices

an apartment in a building with cable access to the Internet

6. What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service
being delivered to existing users?

reliability

scalability

quality of service

accessibility

7. A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker
accidentally damages a ber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut,
students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

quality of service (QoS)

scalability

security

fault tolerance

integrity

8. What are two characteristics of a scalable network? (Choose two.)

easily overloaded with increased trac

grows in size without impacting existing users

is not as reliable as a small network

suitable for modular devices that allow for expansion

oers limited number of applications

9. Which device performs the function of determining the path that messages should take through internetworks?

a router

a rewall

a web server

a DSL modem

10. Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)

DSL

cellular

satellite

dialup

dedicated leased line

11. What type of network must a home user access in order to do online shopping?

an intranet

the Internet

an extranet

a local area network

12. How does BYOD change the way in which businesses implement networks?

BYOD requires organizations to purchase laptops rather than desktops.

BYOD users are responsible for their own network security, thus reducing the need for organizational security policies.

BYOD devices are more expensive than devices that are purchased by an organization.

https://contenthub.netacad.com/itn/1.10.2 3/4
4/11/2020 Introduction to Networks -Module Practice and Quiz
BYOD provides exibility in where and how users can access network resources.

13. An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to
gain secure remote access to a company network?

ACL

IPS

VPN

BYOD

14. What is the Internet?

It is a network based on Ethernet technology.



 Introduction to Networks
It provides network access for mobile devices.
v7.0

It provides connections through interconnected global networks.

It is a private network for an organization with LAN and WAN connections.

15. What are two functions of end devices on a network? (Choose two.)

They originate the data that ows through the network.

They direct data over alternate paths in the event of link failures.

They lter the ow of data to enhance security.

They are the interface between humans and the communication network.

They provide the channel over which the network message travels.

Check Show Me
Reset

 
1.9 2.0
The IT Professional Introduction

https://contenthub.netacad.com/itn/1.10.2 4/4

You might also like