1.3.3 Networks - Josh D Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is a standalone machine?

A

A single computer not connected to any other computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is a network formed?

A

By connecting one computing device to another via cable or wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 5 important advantages of networks?

A
  1. Users can share files
  2. Users can share peripherals and internet connection
  3. Users can access files from other computers
  4. Servers can control security, updates and backups
  5. You can communicate with other people e.g. email
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are 3 important disadvantages of networks?

A
  1. Malware and viruses spread easily between computers
  2. Central dependency on server
  3. Computers may run slower with high network traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a standard and two important examples?

A

Standards are a set of hardware and software specifications that allow manufacturers to create products and services that are compatible with each other. E.g. character sets (ascii, unicode) and HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a protocol?

A

Protocols are a key way of ensuring technology-based standards are followed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the Transmission Control Protocol (TCP) do?

A

TCP provides error free transmission between two routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the Internet Protocol (IP) do?

A

IP routes packets across a WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the User Datagram Protocol (UDP) do?

A

UDP is an alternative to TCP with no error checking (so it’s unreliable). It is a simple end-to-end connection model used to send short messages where speed is more important than accuracy (e.g. gaming).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What protocols are used for communication over LAN/WAN?

A

TCP, IP, UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the Hypertext Transfer Protocol (HTTPS) do?

A

HTTP allows client and server to send and receive requests.
Used to deliver HTML web pages. Fundamental protocol for WWW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between HTTP and HTTPS?

A

HTTPS is the same as HTTP but involves encryption and authentication. The ‘s’ stands for secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What protocol is used for sending files over a WAN?

A

File Transmission Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an FTP client?

A

An app that sits above the FTP protocol and generates the appropriate FTP commands automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the simple mail transfer protocol (SMTP)?

A

It transfers outgoing emails from clients to servers, and between servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the post office protocol (POP)?

A

POP retrieves emails from a server and transfers it to your device. It is deleted from the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the internet message access protocol (IMAP)?

A

IMAP keeps emails on the server, maintaining synchronicity between devices. You view a copy of the email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the Internet and the World Wide Web?

A

The Internet is a wide area network of WANs. WWW is a service on the internet. Internet ≠ WWW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the concept of layers?

A

To divide the complex tasks of networking into smaller simpler tasks that work in tandem with each other.
Each layer has a defined responsibility and each one provides a service to the layer above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are 3 advantages of using layers?

A
  1. It reduces a complex problem into smaller sub-problems
  2. Devices can be manufactured to operate at a particular layer
  3. Products from different vendors will work together
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the 4 layers in the TCP/IP stack?

A

Application, Transport, Internet and Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What happens on the application layer?

A

Network applications (web browsers, email clients etc) use an appropriate protocol to transmit data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Give some examples of protocols that occur on the application layer

A

FTP, HTTP(S), STMP, IMAP, POP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What happens on the transport layer?

A
  1. Establishes a connection using UDP
  2. Data is split into packets
  3. Port numbers + sequence numbers are added to the packet header
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What happens on the internet/network layer?

A
  1. Each packet receives a source and destination IP address
  2. Socket = IP + Port, e.g. 127.56.87.2:80
    Socket tells us where to send the packet (IP) and to which application (port)
26
Q

What happens on the link layer?

A
  1. Responsible for adding source and destination MAC addresses
  2. When data goes through multiple routers over a WAN, MAC addresses are changed at each hop
  3. “Packet” becomes a “frame”
27
Q

What is a MAC address?

A

A 48 or 64-bit code assigned to each device by the manufacturer to uniquely identify the device

28
Q

IP addresses AND MAC addresses are used for communication over a [LAN/WAN/both]

A

Both.
Although communication over a LAN only requires MAC addresses, modern LANs use IP addresses treating it as if it were a WAN

29
Q

What is broadcasting?

A

When a MAC address is unknown, the data is sent to all devices on the network. The correct device will accept the data, and the switch will store the MAC address with its corresponding device eliminating the need for future broadcasting

30
Q

What is the World Wide Web?

A

WWW is a collection of hypertext files and other files hosted on web servers

31
Q

What is the role of web servers in the World Wide Web?

A

Web servers host/store hypertext files (and other files) and handle client requests by sending the files to the client

32
Q

How does typing a URL lead to loading a web page? (5 steps)

A
  1. User requests a URL via a browser
  2. Browser sends domain name to Domain Name System (DNS)
  3. DNS maps domain name to an IP address
  4. Browser can send GET request to web server using the IP address
  5. Web page is returned to browser
33
Q

How does the Domain Name System work? (in other words how does the DNS take a URL and give an IP address) (8 steps)

A
  1. URL received by DNS resolver server (e.g. www.google.com)
  2. … which queries a DNS root name server
  3. … that responds with address of top-level domain server (TLD) for .com
  4. Resolver makes a request to the (.com) TLD server
  5. … which responds with IP address of the domain’s name server (google.com)
  6. Resolver server queries domain’s name server
  7. … which returns google.com’s IP address
  8. … so the Resolver server can give the browser the IP address of google.com
34
Q

What is a Local Area Network (LAN)?

A

Any network that covers a small geographical area usually on a single site.
The hardware tends to be owned by the organisation using it

35
Q

What is a Wide Area Network (WAN)?

A

Any network that covers a large geographical area.
WANs are formed when multiple LANs are connected together.
The infrastructure used in a WAN is leased from telecommunication companies

36
Q

What is circuit switching?

A

When you create a temporary dedicated link of fixed bandwidth that lasts until transmission is complete

37
Q

What is the main pro and main con with circuit switching?

A

Pro: Guarantees quality of transmission (perfect for an end-to-end link)
Con: Lots of wasted potential bandwidth

38
Q

What is packet switching?

A

When you break streams of data into smaller blocks, each sent independently of one another.
At each node packets are sent down the least congested route

39
Q

What is the main pros and main con with packet switching?

A

Pro: More efficient and affordable as all bandwidth can be used at once
Pro: Can easily respond if parts of the network fail
Con: Doesn’t guarantee quality transmission (packets can be lost and arrive out of order)

40
Q

Why do we need network security?

A

To only let authorised users access what they need, prevent unauthorised access and minimise the damage caused by unauthorised access

41
Q

Define hacker

A

Someone who attempts to gain access to a computer system with the intent of damaging data or harming the system

42
Q

What is a black-hat hacker?

A

A hacker that attempts to gain access via nefarious means usually to steal data or cause damage

43
Q

What is a white-hat (ethical) hacker?

A

A hacker employed by a company to hack their system to find and report vulnerabilities

44
Q

What is a grey-hat hacker?

A

A hacker who illegally gains access to a system but reports the issue to the company

45
Q

What is malware?

A

Any code written with the intent to harm

46
Q

What are common effects of malware?

A

Deleting/corrupting/encrypting data, crashing computers, reducing network speeds and keylogging (and sending key logs to hacker)

47
Q

What are viruses?

A

Viruses are pieces of code that copy and spread themselves, designed with a detrimental effect

48
Q

What is spyware?

A

Malware that gathers data about a user. It can harvest browsing habits, email addresses, passwords etc

49
Q

What is denial of service (DoS) attack?

A

DoS attacks are when an attacker floods a server/network with useless traffic, overloading it.

50
Q

Why are DoS attacks such a problem?

A

They cost time and money to deal with

51
Q

What is a distributed denial of service (DDoS) attack?

A

When multiple devices attack a server all at once. Usually a hacker infects devices which unknowingly become ‘zombies’

52
Q

What is SQL injection?

A

A code injection used to attack poorly coded database programs, code is entered into a text box and executed by the server

53
Q

What is social engineering?

A

Manipulation techniques that exploit human error, luring users to exposing data, spreading malware or providing access to a system

54
Q

What is phishing?

A

When cybercriminals trick users into giving personal info by pretending to be a trustworthy source

55
Q

What is pharming?

A

When malicious code installed on a PC or server redirects users to malicious websites without their knowledge or input. AKA “Phishing without the lure”

56
Q

What is a firewall?

A

A software or hardware (or both) that only lets certain traffic through. It blocks certain ports and certain types of traffic. It can also inspect traffic to see if it is suspicious

57
Q

What are the 2 main roles of firewalls?

A
  1. Prevent unauthorised incoming traffic
  2. Prevent prohibited outgoing traffic (e.g. blocking certain websites)
58
Q

What are secure password systems?

A

They prevent unauthorised access. They can be made more secure by implementing password rules

59
Q

What is the downside with robust secure password systems?

A

Too many strict rules cause users to write down their password so they don’t forget. This defeats the point of passwords

60
Q

What does anti-malware software do?

A

It detects malware. It comes pre-installed.