Understanding Network Design: Core Devices, Threats, and Security Mechanisms
This activity explores fundamental elements of network design, focusing on key devices utilized in various topologies and their roles in data transfer. Learn how switches replace hubs for improved data transfer, how routers connect networks, and the importance of firewalls in securing networks. Additionally, discover concepts like Network Address Translation and Demilitarized Zones that enhance data sharing while maintaining security. Test your knowledge of these concepts to ensure a thorough understanding of modern network infrastructure and its threats.
Understanding Network Design: Core Devices, Threats, and Security Mechanisms
E N D
Presentation Transcript
Chapter 5 Network Design Elements and Network Threats Activity
A central connecting device used in a physical star topology is A. Switch B. Hub C. Router D. IPS
What device takes the place of hubs and improves data transfer? A. Switch B. Hub C. Router D. IPS
Connects two or more networks to form an internetwork? This device directs data from one location to another, usually by way of the IP address and IP network numbers. A. Switch B. Hub C. Router D. IPS
A program or device that acts as a “barrier” to keep destructive elements out of a network or specific computer? A. MAC Address B. Ping Device C. Pro Messer Program D. Firewall
The process of changing an IP address while it is in transit across a router. A. LAN Translation B. Network Address Translation C. Content Filtering D. Intrusion Prevention System
Sometimes referred to as a perimeter network this is a physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet. A. LAN Translation B. Demilitarized Zone (DMZ) C. Content Filtering D. Firewall
______are implemented so that a company (or companies) can share its data using all the features and benefits of the Internet, while keeping that data secure within the organization. A. Firewalls B. Network Address Translation Tables C. Demilitarized Zones D. Intranets and Extranets