rianne
Uploaded by
8 SLIDES
218 VUES
80LIKES

Understanding Network Design: Core Devices, Threats, and Security Mechanisms

DESCRIPTION

This activity explores fundamental elements of network design, focusing on key devices utilized in various topologies and their roles in data transfer. Learn how switches replace hubs for improved data transfer, how routers connect networks, and the importance of firewalls in securing networks. Additionally, discover concepts like Network Address Translation and Demilitarized Zones that enhance data sharing while maintaining security. Test your knowledge of these concepts to ensure a thorough understanding of modern network infrastructure and its threats.

1 / 8

Télécharger la présentation

Understanding Network Design: Core Devices, Threats, and Security Mechanisms

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 5 Network Design Elements and Network Threats Activity

  2. A central connecting device used in a physical star topology is A. Switch B. Hub C. Router D. IPS

  3. What device takes the place of hubs and improves data transfer? A. Switch B. Hub C. Router D. IPS

  4. Connects two or more networks to form an internetwork? This device directs data from one location to another, usually by way of the IP address and IP network numbers. A. Switch B. Hub C. Router D. IPS

  5. A program or device that acts as a “barrier” to keep destructive elements out of a network or specific computer? A. MAC Address B. Ping Device C. Pro Messer Program D. Firewall

  6. The process of changing an IP address while it is in transit across a router. A. LAN Translation B. Network Address Translation C. Content Filtering D. Intrusion Prevention System

  7. Sometimes referred to as a perimeter network this is a physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet. A. LAN Translation B. Demilitarized Zone (DMZ) C. Content Filtering D. Firewall

  8. ______are implemented so that a company (or companies) can share its data using all the features and benefits of the Internet, while keeping that data secure within the organization. A. Firewalls B. Network Address Translation Tables C. Demilitarized Zones D. Intranets and Extranets

More Related