1.3.3 Flashcards

1
Q

What is a protocol?

A

A set of rules to govern communication across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some examples of protocols?

A

TCP
IP
POP
SMTP
IMAP
FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the benefits of protocols?

A

Allow networks to communicate by ensuring all devices follow the same rules

This means devices interpret data in the same way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define and give examples of a standard.

A

An agreed way of doing things like USB, HTML, MP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the benefit of standards?

A

Standards make it easier for people to build programs and software that work on different systems in different countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a DNS, and what is its purpose?

A

Domain Name System (DNS)

Used to convert a given URL to a corresponding IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the process used by a DNS?

A

URL (www.google.co.uk) is entered and sent to the DNS resolver

DNS servers map this domain to an IP address, by looking up in a lookup table/cache.

If the DNS server cannot find it, it passes the request (recursively) to the top-level domain name server.

If the IP address is found it updates the DNS servers that did not know it.

If it is not found then it will return an error

The original DNS Server sends the IP address to the browser so it can retrieve the website from the server on which it is hosted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an IP address?

A

Uniquely identifies a device on a network.

An IP address is a logical identifier. (e.g. 192.168.0.1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State the four layers of the TCP/IP Stack.

A

Application
Transport
Internet
Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the application layer and give an example of a protocol used at this layer.

A

Sits at the top of the stack.
If a browser is used, then it will use HTTP protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the transport layer and give an example of a protocol used at this layer.

A

Uses the Transmission Control Protocol (TCP) to establish an end-to-end connection

Splits the data into packets

Adds the packet number, total, and port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the internet layer and give an example of a protocol used at this layer.

A

Routers operate on this layer
Adds the IP address to the packet (to/from)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the link layer of the TCP/IP stack.

A

Source and destination MAC addresses added.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the benefits of protocol layering?

A

Allows different layers to be worked on independently.

Allows layers to be upgraded without affecting others.

Allows for layers from different providers to be used interchangeably.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a LAN?

A

LAN – Local Area Network

A group of devices connected over a small geographical area.

The equipment is owned by the network owner.

The range could include a building or campus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a WAN?

A

WAN – Wide Area Network

A group of devices connected over a large geographical area

Often uses third-party communication channels.

Range could include the entire world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define circuit switching and its associated pros and cons.

A

Creates a direct link between two devices for the duration of the communication. The public telephone system is an example.

  • The connection is set up for the entire duration of the message so
    bandwidth is wasted during the periods when no data is being sent.
  • The two devices must transmit and receive data at the same rate

+ Data packets arrive in the same order that they are sent, simplifying the process of reconstructing the message at the recipient end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define packet switching.

A

Data is split into equal-sized packets.

Each packet has a header of information (including the destination address and the place of the packet in the complete message)

Each packet is placed on the network, each may travel by a different route, meaning they may arrive at different times.

At each node on the network, the destination address is read, and the best route is found.

Packets need to be reordered at the destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the three benefits of packet switching?

A

Transmission is safer from interception because it is impossible to intercept all the packets as they use different routes.

Very efficient use of the network as it does not tie up a part of the network.

If there is an error then only a small, identifiable, part of the data is affected, and this can be retransmitted easily.

20
Q

What is unauthorised access?

A

Access to a computer system by users who are not authorised to have access.

This could include users with correct usernames and passwords who are not who they say they are.

21
Q

What is a firewall?

A

A hardware device or piece of software

Monitors traffic going to and from a network.

22
Q

Why would a company use a firewall?

A

Prevent unauthorised access to a network.

To restrict applications that are used internally that have internet access.

To restrict websites that can be accessed from within the company.

To protect the company’s data.

23
Q

What are the three main purposes of a proxy server?

A

To Intercept all packets entering and leaving a network, hiding the true network addresses of the source (enables privacy and anonymous surfing)

Can maintain a cache of websites commonly visited, saving resources and multiple requests

Often used to filter requests providing administrative control over content that users can demand.

24
Q

What is a hacker, and what might they do?

A

A person who gains unauthorized access to systems or networks in order to commit crimes.

A hacker may, for example, steal information to hurt people via identity theft, damage or bring down systems and, often, hold those systems, hostage, to collect a ransom.

25
Q

What is a network?

A

A collection of two or more computers connected in order to exchange information and share resources.

26
Q

Why might someone use a network?

A

File and Data Sharing

Resource Sharing (Printers etc..)

Data Protection and Redundancy

Ease of Administration

Distributing Computing Power

Internal Communications

27
Q

What is phishing?

A

The fraudulent practice of sending emails claiming to be from trustworthy companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

28
Q

What is a DDoS attack?

A

Distributed Denial of Service Attack (DDoS)

Any type of attack where the attackers attempt to prevent legitimate users from accessing the service.

In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses.

This attack can make use of a botnet.

29
Q

What is a botnet?

A

A collection of devices injected with a malicious piece of code.

30
Q

What is SQL injection? Why would it be used?

A

When malicious SQL statements are added to the end of legitimate code.

This could be done using fields on a form.

This could be used to delete, or extract data.

31
Q

What is pharming?

A

The fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc…

32
Q

What is a virus, and how can it be protected against?

A

Code that can self-replicate

Relies on other host files to be opened to spread themselves.

Can be protected against using an up-to-date virus scanner

33
Q

What is spyware, and how can it be protected against?

A

Software that enables a 3rd party to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.

Could be in the form of a key logger

Can be protected against by using an up-to-date anti-spyware program.

34
Q

What is the purpose of a modem?

A

Converts between the digital data of a computer and the analogue signal of a telephone line.

35
Q

What is the purpose of an Ethernet cable?

A

Required to connect the components to a wired network

36
Q

What is a router?

A

A device that passes data between multiple computer networks via either wired or wireless connections.

37
Q

What is a server? What forms can it take?

A

A device which provides a central point of control on a network. Comes in many forms including a file server, email server, and application server.

38
Q

What is a NIC?

A

Network Interface Card

Allows a computer to connect to a network. May be used for both wired and wireless connections.

39
Q

What is a Wireless Access Point?

A

Connects devices wirelessly

Devices connected to the WAP all use the same frequency and are constantly tuned in, listening for signals. Uses an SSID (service set identifier) which is the identifier (the name) for the wireless network.

40
Q

What is a switch? Why is it said to be more efficient than a hub?

A

Connects devices on a LAN using packet switching to receive, process, and forward data to the destination device.

Switches are ‘intelligent’ and will inspect packet headers and send packets to the correct port or the specific computer device.

41
Q

What is a hub and why is it inefficient?

A

Hubs are inefficient as they do not inspect packets and just broadcast the information to each connected device and then the device decides if it is meant for it.

42
Q

What is a client-server network?

A

Client computers connect to and are controlled by a central server

The server provides access to a resource/service (depending on the user)

43
Q

What are the pros and cons of client-server networks?

A

+ Centrally administered in one location, including pushing out S/W updates and security patches.

+ One location to back up (file server)

+ Shared resources such as printers are not tied to a single computer

  • Has a central point of failure (server)
  • Can be expensive to maintain/set up (e.g. cabling costs, specialist staff.)
44
Q

What are the pros and cons of peer-to-peer networks?

A

+ Has no central point of failure

+ Cheap to set up and run.

  • Multiple locations to back up
  • Devices have to maintain their own security.
  • Shared resources are lost when the connected computer is offline
45
Q

What is a peer-to-peer (P2P) network?

A

A network with no central server where all devices have equal status.