1.3.3 Networks Flashcards

1
Q

Define a network

A

Two or more computers connected together, to share information and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define a LAN

A

Local Area Network:

A connection of devices

In a small geographical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the advantages of a LAN?

A
  • Enables privacy from the outside world
  • Can control the access to data/programs
  • Can control the access to devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the disadvantages of a LAN?

A
  • Requires some expertise to install and maintain
  • Can be costly for a larger LAN
  • Unauthorised access to data depends on personnel and their security measures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the role of an NIC

A

Network Interface Card:

Converts data signals from a node into one that can be transferred over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the role of a switch

A

Connects all the nodes together; intelligent so can send data packets only to their intended destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the role of a hub

A

Connects all the nodes together; not intelligent so data packets are transmitted across the whole network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the role of a router

A

Manage data packets, enabling them to be sent between networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the role of a WAP

A

Wireless Access Point:

Allows nodes to connect to the network wirelessly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference of a client-server network over a peer-to-peer network?

A
  • A computer is designated as the server, rather than all having the same status
  • Server manages network traffic and data requirements, thus having less collisions and being faster
  • Larger networks have more servers, this can handle a greater network demand
  • Popular of companies, rather than home networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Advantages and disadvantages of a bus network topology

A
  • Cheap, due to all nodes being connected to one cable
  • Data collisions slow the network - travels both ways
  • Whole network suffers from cable faults
  • Only useful over small areas
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Advantages and disadvantages of a ring network topology

A
  • Cheap: only one cable
  • One-way data travel - no collisions
  • Whole network suffers from cable faults
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Advantages and disadvantages of a star network topology

A
  • Other nodes are unaffected from a cable fault
  • Can be costly with large number of nodes
  • Network will slow with multiple nodes requesting data or software at the same time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Advantages and disadvantages of a mesh network topology

A
  • Every node is connected
  • Other routes are available to combat high network traffic or cable faults
  • Very expensive: large amounts of cabling required
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between a LAN and a WAN?

A

LAN: Located on one site, owner owns the network devices

WAN: Covers a large geographical area, devices can be provided by telecoms companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain ‘Web Hosting’

A

A computer on a network: serves users of the internet as a host.

Websites are usually hosted on servers for people to access them (sometimes for a fee)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Explain ‘IP address’

A

Internet Protocol Address:

A unique number given to every computer on the internet.

Identifies the computer, may change each time a network is joined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Explain ‘ISP’

A

Internet Service Provider:

The company who provides you with an internet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Explain ‘URL’

A

Uniform Resource Locator:

The name for a web adress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Explain ‘DNS’

A

Domain Name System:

The system used to find the computer hosting the required website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Explain ‘the Cloud’

A

A network of servers hosted on the internet, offering a range of services for data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does a DNS work?

A
  • The website’s URL is entered
  • The URL is sent to the ISP, where it is looked up in their DNS’s address book
  • The required IP address is returned to you, to communicate to the computer hosting the website
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Advantages of the Cloud

A
  • Don’t need to buy and install software
  • Any connected device can access the service
  • No need to upgrade software
  • Collaborative documents can be formed
  • Work is saved automatically
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Disadvantages of the Cloud

A
  • Sensitive data stored in other countries may be under different data laws
  • Can be less secure than local storage
  • Completely reliant upon the network/internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the role of an internet registrar?
* Holds the details of domains available for purchase * Registers company details * Resolves domain name disputes
26
How are files sent over the internet?
They are split into data packets before being transmitted
27
What are the components of a data packet?
Data Error check Packet header
28
Describe the Error check within a data packet
Includes a checksum number: a calculation for checking if all the data has arrived uncorrupted
29
Describe the Packet header within a data packet
Sequence number: for data packets to be put back together in the right order Return address: when needed to notify the sender's computer if the packet has been received or has been corrupted Destination address: so the packet arrives in the correct location
30
Define a protocol
A set of rules for devices to follow
31
Describe a MAC address
(Media Access Control) Hard-coded into each networked device, so data can be sent to the correct node's NIC
32
Describe the features of an IP address
Used so data on a WAN is sent to the correct network/node Dynamic: changes whenever you connect to a network
33
Describe TCP/IP
* Transmission Control Protocol / Internet Protocol determines how data is sent over the internet * TCP: defines rules for splitting up packets, ensures data is split apart and put together the right way * IP: ensures data packets are directed towards their destination in the most appropriate way
34
Describe 'Packet Switching'
* TCP splits a file in packets * IP directs packets through routers * Packet switching occurs by packets being directed to other routers on their journey * TCP reassembles the packets per their sequence number
35
Describe 'Circuit Switching'
When two devices are connected by a dedicated communication channel. * Data is sent in-order for no receiving delay * Wastes bandwidth as others cannot use the same channel
36
Describe HTTP
Hyper Text Transfer Protocol: Governs the way websites and web servers are accessed by web browsers
37
Describe HTTPS
HTTP Secure: Ensures all data being sent is encrypted
38
Describe FTP
File Transfer Protocol: Governs the way stored files are accessed from a server
39
Describe POP
Post Office Protocol: Governs how emails area accessed from a server
40
Describe IMAP
Internet Message Access Protocol: Similar to POP, and with emails remaining in the server after the client downloads it, e.g. for multiple devices
41
Describe SMTP
Simple Mail Transfer Protocol: Governs how data is sent between mail servers
42
What are the 4 protocol layers?
Application layer - layer 4 Transport layer - layer 3 Network layer - layer 2 Data Link & Physical Layer - layer 1
43
Describe the 4th protocol layer
Application layer: FTP, HTTP, HTTPS, POP, IMAP, SMTP Provides user access to applications, websites, files, and emails
44
Describe the 3rd protocol layer
Transport layer: TCP Provides transport of data between devices by splitting files into data packets
45
Describe the 2nd protocol layer
Network layer: IP Provides the routing of packets across the network by addressing
46
Describe the 1st protocol layer
Data Link Layer & Physical Layer: Ethernet Provides the physical transport of data through electrical signals
47
Explain physical protocols
These govern how data is sent through physical mediums. E.g.: * Wired or wireless transmission * Copper or fibre optic cabling
48
Explain logical protocols
These govern the data that is being sent E.g. bit rate, error checking, ordering of packets, compression and encryption, digital signatures
49
Describe 'handshaking'
* Two devices communicating over the internet will decide on which protocols to use * One device sends a list of protocols, the other sends acknowledgement or rejects them and another is chosen
50
What is the difference between a MAC address and IP address?
MAC: fixed to a device when on a LAN IP: dynamic to a LAN or device on a WAN
51
Describe 'virus'
Small programs which cause physical harm to a computer system E.g. standard virus, worm virus, trojan virus
52
Describe 'standard virus'
Hides in programs and replicates itself to spread. Aims to delete or damage data
53
Describe 'worm virus'
Replicates itself to use more of the computer's resources
54
Describe 'trojan virus'
Often causes harm in the background, e.g. creating backdoors, deleting data, changing setups
55
Describe 'spyware'
Watches the user's activity and sends back information
56
Describe 'adware'
Downloads and displays unwanted adverts and collects marketing information. Tries to direct you to unwanted websites
57
Describe 'ransomware'
Locks your computer, demanding money to get it working again
58
Describe 'rootkit'
Contains tools to allow criminals to access your computer at administrator level
59
Describe 'pharming'
Seeks to change a stored IP address to send you to a fake website
60
Describe 'phishing'
Tries to acquire sensitive information through direct communication by impersonation
61
Describe 'people' in relation to network threats
A lack of knowledge leads people to be more susceptible to threats when influenced to give away information
62
Describe 'brute force attacks'
Using trial and error to hack an account
63
Describe 'denial of service'
Attempting to bring down websites by using up the web server's resources: repeatedly tries to access the website
64
Describe 'data interception and theft'
Using specialist hardware and software to secretly monitor network traffic. Can intercept packets.
65
Describe 'SQL injection'
Attaching SQL commands to a password to alter the SQL statements, allowing access to other accounts or data
66
Describe 'poor network policies'
A set of rules and procedures that network users must follow. If it is poor or not followed properly then the risk of a breach is increased.
67
Describe 'penetration testing'
A company will invite an expert to simulate a range of network attacks. This attempts to discover weaknesses
68
Describe 'network forensics'
Networks should have software continually monitoring network traffic. This helps with finding the source of attacks
69
Describe 'network policy'
An Acceptable Use Policy, Backup Policy, and Disaster Recovery Policy should exist. These sets of rules govern how the network is used and maintained
70
Describe 'anti-virus/-malware software'
Software dedicated to finding and destroying viruses and malware. Must be kept up-to-date
71
Describe 'firewall'
This will monitor data packets flowing into a computer. Packets are received by ports, and the firewall opens ports where data is expected to come to
72
Describe 'proxy server'
A computer which receives internet requests, analyses them against a set of protocols, then sends it out - intermediary
73
Describe 'encryption'
Data is converted from plaintext to cyphertext with an encryption key before being sent on a network
74
Describe 'user access levels'
Users of a system will have different rights depending on their role in the company. This changes what they have access to