1 / 8

Chapter 5 Network Design Elements and Network Threats Activity

Chapter 5 Network Design Elements and Network Threats Activity. A central connecting device used in a physical star topology is A. Switch B. Hub C. Router D. IPS. What device takes the place of hubs and improves data transfer? A. Switch B. Hub C. Router D. IPS.

rianne
Download Presentation

Chapter 5 Network Design Elements and Network Threats Activity

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 5 Network Design Elements and Network Threats Activity

  2. A central connecting device used in a physical star topology is A. Switch B. Hub C. Router D. IPS

  3. What device takes the place of hubs and improves data transfer? A. Switch B. Hub C. Router D. IPS

  4. Connects two or more networks to form an internetwork? This device directs data from one location to another, usually by way of the IP address and IP network numbers. A. Switch B. Hub C. Router D. IPS

  5. A program or device that acts as a “barrier” to keep destructive elements out of a network or specific computer? A. MAC Address B. Ping Device C. Pro Messer Program D. Firewall

  6. The process of changing an IP address while it is in transit across a router. A. LAN Translation B. Network Address Translation C. Content Filtering D. Intrusion Prevention System

  7. Sometimes referred to as a perimeter network this is a physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet. A. LAN Translation B. Demilitarized Zone (DMZ) C. Content Filtering D. Firewall

  8. ______are implemented so that a company (or companies) can share its data using all the features and benefits of the Internet, while keeping that data secure within the organization. A. Firewalls B. Network Address Translation Tables C. Demilitarized Zones D. Intranets and Extranets

More Related