What type of network is a private network that can also be accessed by authorized external customers vendors and partners?

An intranet functions as a company’s private communication network. It’s a private website for employees with company news, information, documents, and business process tools that are critical for completing work. The intranet can be cloud-based, hosted on-site, or on off-site servers.

Show

The first intranets came into use during the 1990s. At that time, companies realized they could adopt the same type of technology from the newly created World Wide Web and apply it for their own use to improve internal communication collaboration.

Companies were still relying on paper records at that time. If they were using electronic files, they were challenging for employees to use. A company intranet made it much easier for employees to locate the information they needed. Files could be found through rudimentary search engines for the first time. Some companies added resources like IT support tickets.

Over time, however, intranets did not keep up with developing technology. They were challenging to build and maintain. Many of them were thought of as online filing cabinets for documents as opposed to a valuable tool for internal communications and employee engagement. Technology has now caught up, and a modern intranet offers many valuable benefits to digital workplaces of all sizes.

What are the Benefits of an Intranet?

An intranet offers multiple advantages to a company. Some examples are listed below.

1. Boosts Employee Productivity

The intranet software suite of knowledge sharing and collaboration tools makes it easier and more convenient for employees to accomplish tasks. There is less time wasted looking for “how” to get things done and more time spent productively.

2. Creates a Transparent Company Culture

It is more important than ever that employees feel comfortable at work. When they can share their ideas and opinions, they have better, more positive relationships with their co-workers and managers. Employees then contribute more and have longer tenures.

3. Streamlines Employee Onboarding

New employee forms and onboarding material can be presented to the new team member in a neat package through the company intranet. Digital documents can be forwarded automatically to Human Resources when completed.

4. Connects the Company Across Multiple Locations

The company intranet is the central hub for the business. It connects employees working in the home office, as well as those who work from satellite offices, their own homes, and from the road. No matter where the employees are based, the intranet keeps them connected to the company and each other.

5. Helps Employees Find Information Quickly

A global search feature makes finding information using the intranet a quick and easy process. Employees can use the intranet platform to search through intranet content and other platforms such as Office 365 applications or Google Workspace documents. This eliminates the need to open multiple tabs or open several apps to search for something, and allows the intranet to be a central tool for information.

What are the Business Use Cases of an Intranet?

An intranet has several business use cases. The following are some common examples:

1. Job Board

Let employees know about openings within the company by posting them on a dedicated job board or through the employee social advocacy feature. Encourage current employees to share this information with their friends, family members, and personal social networks to get positions filled quickly.

2. Employee Recognition Center

It’s important to celebrate and congratulate employee milestones, the company social intranet is an ideal way to do so. Employees who go above and beyond can be recognized for their efforts.

3. Video Center

Provide employees with access to all the company videos in one convenient location. They can search for the training materials, marketing tools, onboarding resources, and more. The intranet will give employees access to internally hosted video material and have links to external video content.

4. Communities of Practice

Create a specialized community around a specific area of interest. Allow expert employees to share their knowledge by writing content, providing analysis and sharing their work.

5. Town Hall

A town hall gives employees a central location to hear company news and updates. Workers can ask questions or provide feedback through real-time chat.

Question # 01Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.a. True b. False

Question # 02An intranet is a separate open network that anyone can access with out prior authorization.a. True b. False

Question # 03One use of data loss prevention (DLP) is blocking the copying of files to a USB flash drive.a. True b. False

Question # 04Anomaly monitoring is designed for detecting statistical anomalies.a. True b. False

Question # 05What data unit is associated with the Open Systems Interconnection layer four?a. segmentb. packetc. framed. bit

Question # 06What kind of networking device forwards packets across different computer networks by reading destination addresses?a. switchb. routerc. bridged. firewall

Question # 07An administrator has two servers that host the same web content, but only one server is utilized at a given time. What can be configured that can help to evenly distribute work across the network, and make use of both servers in a manner that is transparent to the end users?a. stateful packet filteringb. Load balancingc. failover serversd. proxy servers

Question # 08A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?a. Stateful frame filteringb. Stateless frame filteringc. Stateful packet filteringd. Stateless packet filtering

c. Stateful packet filtering

Question # 09What is the name of a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?a. forward proxy serverb. DNS serverc. VPN serverd. telnet server

Question # 10Which of the following is a server that routes incoming requests coming from an external network to the correct internal server?a. forward proxyb. application proxyc. system proxyd. reverse proxy

Question # 11What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?a. application-basedb. protocol-basedc. behavioral-basedd. signature-based

Question # 12What is the name of an instruction that interrupts a program being executed and requests a service from the operating system?a. system callb. unit callc. hardware instructiond. system exception

Question # 13When a private network uses a single public IP address, and each outgoing TCP packet uses a different port to allow for proper translation, what networking technology is in use?a. PATb. PNATc. NAPTd. NAT

Question # 14Which network address below is not a private IP address network?a. 10.4.5.0b. 172.63.255.0c. 192.168.255.0d. 172.17.16.0

Question # 15What vendor neutral protocol implements support for VLAN tagging?a. ISLb. VTPc. 802.1Qd. VSTP

Question # 16The management in your corporate office needs to group users on the network together logically even though they are attached to separate network switches. How can this be done?a. Create a subnet for each network switch in useb. Create additional subnets for the separate groupsc. Add all users to a single network segmentd. Create a VLAN and add the users’ computers / ports to the correct VLAN

d. Create a VLAN and add the users’ computers / ports to the correct VLAN

Question # 17What type of dedicated cryptographic processor that provides protection for cryptographic keys?a. SSL/TLS acceleratorb. media gatewayc. SSL decryptord. hardware security module

d. hardware security module

Question # 18Which of the following is a software-based application that runs on a local host computer that can detect an attack as it occurs? a. local-based intrusion detection systemb. host-based intrusion detection systemc. host-based application protectiond. local-based application protection (adsbygoogle = window.adsbygoogle || []).push({});

b. host-based intrusion detection system

Question # 19When VPN network traffic is routing only some traffic over the secure VPN while other traffic directly accesses the Internet, what technology is being used?a. priority tunnelb. split tunnelingc. full tunneld. shared tunneling

Question # 20What type of network is a private network that can also be accessed by authorized external customers, vendors, and partners?a. extranetb. intranetc. enterprise networkd. guest network

Question # 21If a network is completely isolated by an air gap from all other outside networks it is using what type of configuration?a. physical network segregationb. complete network segregationc. network isolationd. logical network segregation

a. physical network segregation

Question # 22What term is used to describe the software agents that are used by NAC and installed on devices to gather information?a. NAC check agentsb. server health agentsc. host agent health checksd. network health agents

c. host agent health checks

Question # 23Describe how Network Access Control (NAC) works.Network Access Control assesses the condition of a device before allowing connection to a network. Any system not meeting the minimum security requirements is placed in quarantine and allowed to correct deficiencies before retesting against the NAC for access.

NAC examines the current state of a system or network device before it is allowed to connect to the network. Any device that does not meet a specified set of criteria, such as having the most current anti-virus signature or the software firewall properly enabled, is only allowed to connect to a "quarantine" network where the security deficiencies are corrected. After the problems are solved, the device is connected to the normal network. The goal of NAC is to prevent computers with suboptimal security from potentially infecting other computers through the network.