and CORRECT Answers
1. Vulnerability Testers Vulnerability testers (pen tester) ethically hacks systems to identify vulnera-
bilities before attackers can exploit them.
2. Star Star devices connect to central switch/hub where data passes through be-
fore being transferred to all devices that check for the destination address,
if it matches, the data is processed, otherwise, it's discarded.
-Most used topology.
-Used in contemporary Ethernet LANs.
-Twisted-pair cable.
-Devices access network without waiting their turn.
-Removing a device from the switch/hub doesn't attect other devices from
connecting to the network.
-Single point of failure meaning devices connected to broken switch/hub
won't connect to the network.
3. Network Network connects multiple devices to share resources/information.
-Wired/wireless with size range from small home, enterprise, or global
internet.
-Wired is faster and more secure. Used by companies to protect information.
4. Internet
, Internet a collection of networks. A large public WAN
- Internet, with a capital I, is WWW.
5. Router Router connects to modem, which receives the internet signal from ISP to
connect to the internet. Connects multiple computer networks and manages
the flow of data between them. Forwards data packets to other networks (at
least two, such as LAN/LAN, LAN/ISP, or WAN/LAN
-Wired (Ethernet)/wireless (Wi-Fi).
-Known as a Gateway Device
-Broadband or Wireless routers available
Layer 3
6. Firewall Firewall monitors incoming/outgoing traflc, using rules to filter threats
between an internal and a public network (Internet). Protects from intrusion
and attacks, but does not protect against virus or malware.
Types of Firewalls
Packet Filtering
Stateful Inspection
Application Proxy
Circuit-Level Gateway
Software vs Hardware Firewalls
Software (host-based) runs as configurable software on a host PC or server.
Network-Based designed to protect the entire network.
Hardware a dedicated device, usually router.
Gateways
Application Gateway: filters applications.
Circuit-Level Gateway: connection validation.
, Proxy Server acts as a gateway between a client and server.
Ingress = inbound traflc
Egress = outbound traflc
Which network device is usually placed in-line between a trusted network
and an untrusted network?
7. Modem Modem translates data between home and ISPs networks over physical
connections to access Internet. It provides the access point to the internet.
Types
Cable (cable TV lines)
DSL (telephone lines)
Fiber Optic (High speed)
Layer 1
8. Switch Switch (switching device) multiple port device used on a computer network
to connect devices and manage data flow. Extends the network by using
packet switching to forward data to the intended hard-wired devices.
-Maintains a learning table that maps MAC addresses to their corresponding
ports.
Layer 2
9. Server Server program/device that provides services/resources to other devices on
network.
-Ex. storing/sharing files, running apps, managing email, or delivering web
content.
10. VPN
, VPN (Virtual Private Network) service that encrypts internet traflc and routes
it through a remote server operated by VPN provider. It extends a connection
from one trusted network to another trusted network over an untrusted
network, like the Internet.
11. Protocol Protocol set of rules that govern how data is transmitted and received
between devices.
-Common language devices use to communicate.
12. Gateway Gateway acts as a passage between ditterent networks.
-Connects multiple networks.
-Data translation.
-Routing capabilities.
-Security.
13. WAP WAP (Wireless Access Points), set of protocols that allows mobile devices to
access the internet and other information services.
14. Wireless Range Ex- Wireless range extender improves signal strength/coverage area of existing
tender Wi-Fi network by using radio frequencies to transmit/receive Wi-Fi signals.
Layer 1
15. Access Point Access point (AP) networking device that allows wireless-enabled devices to
connect to a wired network, creating a Wi-Fi hotspot.
- Creates WLANs
Layer 2