1.3.3 network Flashcards

missing network hardware

You may prefer our related Brainscape-certified flashcards:
1
Q

standalone machine

A

computer that is not connected to anything

stopping the spread of a virus on hardwares(unknown memory sticks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

network

A

a group of devices connected to each other and can communicate with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

internet

A

inter connected networks- global network of computers connected together (network of networks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

www

A

collection of webpages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

protocol

A

RULES that govern how devices COMMUNICATION with each other(standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

use of protocol layering

A

DECOMPOSITION-Reducing a complex problem into smaller sub-problems.

ABSTRACTION FOR SPECIFIC FUNCTION-Devices can be manufactured to operate at a particular layer.

COMPATABILITY-Products from different vendors will work together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP/IP Stack

A

used in the routing of packets through networks

how it works:
Data is split into chunks called packets
(1 – AO1.1) which have labels (1 –
AO1.1) including address being sent to
(1 – AO1.1) and order (1 – AO1.1).
Each packet is sent on the most
convenient / avoidable route (1 –
AO1.2) meaning they may arrive in a
different order to which they were sent
(1 – AO1.2). Once packets arrive at
receiver they are reordered (1 –
AO1.2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP

A

Transmission Control Protocol – used with IP to ensure ERROR FREE transmission and package switching

establish an end-to-end connection between the source and recipient computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IP

A

Internet Protocol – used to transfer all packets across the internet between routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DNS

A

use of system: name and organise internet resources

DNS server: that stores a list of domain names and translate them into associated IP addresses (ISP)

TLD: org/uk/com
SLD: google/edgbarrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

LAN

A

size of area: small, one site

ownership of hardware: by the organisation using it

link: UTP cable, fiber optic , wifi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WAN

A

size of area: larger geographical area (>1 sq mile)

ownership of hardware: connect to LANs, telecommunication companies who own and manage it.

link: telephone lines, fiber optics cables, satellite links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

UTP

A

link layer- one less layer of shield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

STP

A

link layer- one more layer of shield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

packet switching

A

Splitting data into packets that can be sends individually across different routes across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

circuit switching

A

Reserving a particular network route to transfer data between two devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SMTP

A

outbound:
simple mail transfer protocol-
FORWARD the mail to the appropriate mail server

(the SMTP server has the database of email address)for the recipient’s email address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IMAP

A

inbound:
internet message access protocol - keep emails on mail server

(allow flagging and searching, can sync devices, less privacy )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

POP

A

inbound:
post office protocol- deletes email from mail server once it is downloaded

(removes the mail from other devices, cannot do complex searches and flagging mail)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

switch

A

Network device that connects multiple devices together, sending the data that it receives to the intended recipient device only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

hub

A

Network device that connects multiple devices together, sending the data that it receives to all connected devices

22
Q

router

A

Network device that directs data from one network to another

23
Q

MAC vs IP

A

MAC: individual device
IP: the location/general area for destination

24
Q

TLD

A

top level domain - e.g. .org, .uk, .com, .edu, .gov

25
Q

SLD

A

second level domain - e.g. google

26
Q

FTP

A

file transmission protocol- handles file uploads and downloads (works at the back end), normally on WAN

27
Q

HTTP, HTTPS

A

for client and server to send and receive requests and deliver HTML web pages

(s): secure - encryption and authentication

28
Q

UDP

A

user datagram protocol- simple connectionless transmission model

29
Q

protocol layering

A

application
transport
network
link

30
Q

the area/purposes of protocol

A

email(SMTP,IMAP,POP)
webpage request(HTTP,HTTPS)
file transfer (FTP)
LAN/WAN (TCP/IP, UDP)

31
Q

client to server model

A

one device (the client) requests services from another device (the server).

32
Q

peer to peer model

A

all terminals have equal status and there is no powerful central server, each computer acts as both a client and a server.

33
Q

switch(vs hub) vs router

A

a switch connects multiple devices to create a network, a router connects multiple switches, and their respective networks, to form an even larger network

34
Q

(links) Fibre Optic Cables

A

newer, faster and high-capacity

35
Q

firewall

A

Security measure that controls incoming and outgoing network traffic using a set of rules (ports)

act as filter

mechanism of firewall:
-proxy
-inspection and packet filtering

36
Q

proxies

A

A proxy ensures there is no direct physical connection between a single user and a remote source.

37
Q

encryption

A

A method of transforming data into an unintelligible way so that it cannot be read by unauthorised individuals.

38
Q

malware

A

malicious software - software that annoys users or damages their data. For example, Worms, Viruses, Trojans and Spyware.

39
Q

worm

A

standalone
copies itself

40
Q

virus

A

copies itself by attaching itself to another program

41
Q

trojan

A

looks innocent but has ill intent
open up back doors

42
Q

social engineering

A

involves with “social” and human interaction

-smishing : fake text messages
-vishing: fake voice call
-pharming : fake websites

43
Q

phishing

A

use of email to take the user to a fake website to take their personal information

44
Q

SQL injections

A

code enter to input text boxes
prevention: sanitisation and by blocking certain characters

45
Q

ransomeware

A

blackmail(scare users) into making a payment

46
Q

most vulnerable with social engineering

A

the elderly
the youngs
people not familiar with technology

47
Q

spyware

A

designed to collect information about what you are doing on the computer
e.g. keylogger

there are also hackers that hack cameras and mics

48
Q

anti-malware vs anti-virus

A

COVERAGE

anti-malware: designed to log keys(keylogger) and target adverts(adware) + virus

anti-virus: ‘quarantine’ the file so it cannot be used to spread the virus; does not cover malware

49
Q

hackers

A

black hat
grey hat
white hat

50
Q

DOS and DDOS

A

sending requests after requests to affect server performance

denial of service- one attacker using one/ more devices
distributed denial of service- uses botnet

51
Q

network security methods

A

-username and password
-acceptance usage policy
-penetration testing
-physical security
-user access levels

cards included:
-firewalls
-encryption