Professional Documents
Culture Documents
ACCS-chapter 1-Part2
ACCS-chapter 1-Part2
Instructor Materials
Network Trends Explain how trends such as BYOD, online collaboration, video, and cloud
computing are changing the way we interact.
Network Security Identify some basic security threats and solution for all networks.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Network Security
Security Threats • Network security is an integral
part of networking regardless of
the size of the network.
• The network security that is
implemented must take into
account the environment while
securing the data, but still
allowing for quality of service that
is expected of the network.
• Securing a network involves
many protocols, technologies,
devices, tools, and techniques in
order to secure data and mitigate
threats.
• Threat vectors might be external
or internal.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Network Security External Threats:
التهديدات
Security Threats (Cont.) • Viruses, worms, and Trojan
horses
المفقودة أو المسروقة • Spyware and adware
• Zero-day attacks
• Threat Actor attacks
• Denial of service attacks
• Data interception and theft
• Identity theft
Internal Threats:
• lost or stolen devices
• accidental misuse by
employees
الموظفين
• malicious employees
الخبثاء
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Network Security
Security Solutions
Security must be implemented in multiple
layers using more than one security solution.
Network security components for home or
small office network:
• Antivirus and antispyware software
should be installed on end devices.
• Firewall filtering used to block
unauthorized access to the network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Network Security
Security Solutions (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
1.9 The IT Professional
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Exercices-Chapter -1
At which layer of the OSI model would a Which PDU format is used when bits
1- What is a WAN? logical address be added during are received from the network medium
• a network infrastructure designed to provide data storage, encapsulation? by the NIC of a host?
retrieval, and replication • physical layer • file
• a network infrastructure that provides access to other • frame
networks over a large geographic area • data link layer
• a network infrastructure that spans a limited physical area • network layer • packet
such as a city • transport layer • segment
• a network infrastructure that provides access in a small
geographic area
What type of communication will send a What process is used to place one message inside
message to all devices on a local area another message for transfer from the source to
network? the destination?
• broadcast • access control
• multicast • decoding
• unicast • encapsulation
• allcast • flow control
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
What command can be used on a
What are the two characteristics of RAM on a What are two types of router interfaces?
3- What is an ISP? Cisco device? (Choose two.)
• It is a standards body that develops cabling and • During a power cycle, the contents of RAM are • SVI
wiring standards for networking. erased. • LAN
• It is a protocol that establishes how computers • RAM is used for non-volatile storage.RAM stores • DHCP
within a local network communicate. the configuration that is currently active on the • Telnet
• It is an organization that enables individuals and device. • WAN
businesses to connect to the Internet. • Storage for a limited period of time
• It is a networking device that combines the • RAM is used in Cisco switches but not Cisco
functionality of several different networking routers. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
devices in one. • RAM can store multiple versions of IOS as well as
configuration files.
What command can be used on a
What are the two characteristics of RAM on a What are two types of router interfaces?
3- What is an ISP? Cisco device? (Choose two.)
• It is a standards body that develops cabling and • During a power cycle, the contents of RAM are • SVI
wiring standards for networking. erased. • LAN
• It is a protocol that establishes how computers • RAM is used for non-volatile storage.RAM stores • DHCP
within a local network communicate. the configuration that is currently active on the • Telnet
• It is an organization that enables individuals and device. • WAN
businesses to connect to the Internet. • Storage for a limited period of time
• It is a networking device that combines the • RAM is used in Cisco switches but not Cisco
functionality of several different networking routers. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
devices in one. • RAM can store multiple versions of IOS as well as
configuration files.
The IT Professional
Networking Jobs
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Skills
a. All computers that are connected to a network and participate directly in network
communication are classified as hosts.
b. Diagrams of networks often use symbols to represent the different devices and
connections that make up a network.
c. A diagram provides an easy way to understand how devices connect in a large
network.
d. The two types of network infrastructures are Local Area Networks (LANs), and
Wide Area Networks (WANs).
e. SOHO internet connections include cable, DSL, Cellular, Satellite, and Dial-up
telephone.
f. Business internet connections include Dedicated Leased Line, Metro Ethernet,
Business DSL, and Satellite. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
1.10 Module Practice and
Quiz
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14