4. Computer Networks Flashcards

1
Q

Sharing information and resources through linked computer systems is called ____.

A

networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three major categories of networks?

A

Personal Area Network (PAN): normally used for short-range communications, such as wireless headphones to a smartphone or a wireless mouse to a PC.

Local Area Network (LAN): a collection of computers in a single building or building complex.

Wide Area Network (WAN): a collection of systems over a greater distance, including machines on the opposite sides of the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A(n) ____ network’s internal workings are based on designs that are in the public domain.

A(n) ____ network’s internal workings are based on designs owned or controlled by third parties.

A

open, closed (or proprietary)

The internet is an example of an open network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is one of the most common network topologies. In this type of network, the machines are connected to a common communication line.

A

Bus network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In a ____ network, a single machine serves as a central point to which all others are connected.

A

star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In a ____ network, devices connect directly to other devices (though not to all devices) as a peer.

A

ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A ____ network connects every device in the network to every other device. These types of networks enable redundancy while also introducing significantly more network traffic.

A

mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The bus network topology became popular in the 1990s when it was implemented under a set of standards/protocols known as the ____.

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The star topology is used today in wireless networks where communication is carried out via radio broadcast to a central machine called the ____.

A

access point (AP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Instant messaging and interactive games played by users on multiple machines are both examples of the ____ model for interprocess communication.

A

peer-to-peer (P2P)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ systems execute software as processes on more than one computer.

A

Distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are three types of distributed system?

A
  1. Cluster computing: uses many independent computers to provide computation or services comparable to those of a larger machine. Cluster computing provides high availability as it is likely that at least one computer in the cluster will be able to answer a request even when others in the cluster are unavailable or broken down.
  2. Grid computing: typically includes specialized software to make it easier to distribute the workload and data among the machines in the grid.
  3. Cloud computing: provides large pools of shared computers that can be allocated to clients as needed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two types of transmission media?

A

Wired and wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are examples of wired network media?

A

Twisted pair cables, coaxial cable, optical fiber cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are two common types of twisted part cables?

A

Unshielded twisted pair (UTP) cables and shielded twisted pair (STP) cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network bandwidth is typically measured in ___ per second and ____ per second.

A

megabits (Mbps) and gigabits (Gbps). (Note the difference between megabits and megabytes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

____ cables have an outer plastic that is used in computer networks and to deliver cable TV services.

A

Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

____ is a signal at a very narrow frequency range on which data or information is superimposed and then transmitted.

A

Baseband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____ is considered high-capacty transmission technologies that are used to transmit data, voice, and video across long distances and at high speeds.

A

Broadband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

____ cable uses the concept of reflection of light through a core made up of glass or plastic.

A

Fiber-optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Wireless transmission uses ____ waves, such as ____ and ____ waves, to transmit data within a network.

A

electromagnetic, infrared, radio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Using your smartphone to make a payment at the grocery store is an example of using ____ communication.

A

near field (NFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Bluetooth supports distances shorter than ____ feet.

A

30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Wi-Fi devices can be accessed up to ____ feet away.

A

300

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the various categories of network cables, and what are their maximum bandwidths?

A

CAT1 - 1Mbps
CAT2 - 4 Mbps
CAT3 - 10 Mbps
CAT4 - 16 Mbps
CAT5 - 100 Mbps
CAT5e - 1 Gbps
CAT6 - 10 Gbps
CAT7 - 10 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the difference between the Internet (capital “i”) and the internet (lower-case “i”)?

A

The Internet is the worldwide internet. An internet, on the other hand, is simply a network of networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A ____ converts incoming analog data from an ISP to digital data, and outgoing digital data into analog. It provides the access point to the Internet.

A

modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A ____ monitors network traffic and blocks traffic that triggers its safety rules, providing a barrier between a trusted private network and an untrusted network like the Internet.

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

____ are special-purpose computers that forward messages to and from the machines on their network.

A

Routers

A router connected to your LAN acts as gateway to the internet. (This device on your LAN can be also be called a Gateway.) Routers manage network traffic by having a routing table of known devices. If a destination address is unknown to the Router, it will forward the message to another router. This analyze and forward process continues until the message reaches the correct address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Routers use their ____ to match up the private IP address with the internet IP address, and send the message to the correct machine.

A

forwarding table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A network ____ extends the network by using ____ to forward data to the intended hard-wired devices.

A

switch, packet switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

____ extend the range of cabling types so connections can be made by increasing the strength of the network signal.

A

Repeaters

33
Q

____ are used to connect to different types of network and provide management of the message.

A

Bridges

For example, a bridge can connect a twisted pair and coaxial network. The bridge analyzes the network message and will only bridge the network if a message is addressed to a device on the other side.

34
Q

____ are used on LANs to reduce network traffic by management of network messages.

A

Switches

Older devices would broadcast all messages to all devices on the LAN. For example, on a 100-device network, a switch would only send one message to the destination device. This management example would create 99% less traffic.

35
Q

What type of cable can broadcast in both baseband and broadband mode?

A

Coaxial

36
Q

The individual networks comprising the internet are constructed and maintained by ____.

A

internet service providers (ISPs)

37
Q

How many tiers of ISPs are there?

A

three

38
Q

Tier ____ ISPs are the least common type of ISP and serves as the backbone of the internet.

A

1

Tier 1 ISPs consist of high-speed, high-capacity, international WANs that are typically operated by large communication companies.

39
Q

Tier ____ ISPs are more common and regional in scope.

A

2

Tier 1 and Tier 2 ISPs are essentially networks of routers that collectively provide the internet’s communication infrastructure.

40
Q

Tier ____ ISPs, also called ____ ISPs, are independent internets, sometimes called intranets, operated by a single organization that supplies internet access to homes and businesses.

A

1, access

41
Q

The devices used to connect to the access ISP are called ____ or ____.

A

end systems, hosts

42
Q

The internet uses ____ addresses as unique identifiers.

A

IP (internet protocol)

43
Q

The internet used to use a ____-bit address pattern (IP version ____ or ____) to uniquely identify all of the internet components until we ran out of unique identifiers. Today we use ____-bit addresses (IP version ____ or ____) in addition to legacy addresses.

A

32, 4, IPv4, 128, 6, IPv6

44
Q

IPv4 addresses are traditionally written in ____ notation, which the bytes of the address separated by ____.

A

dotted decimal, periods

45
Q

IPv6 addresses are written in ____.

A

hexadecimal

An IPv6 address could look like this: 2001:D88:12:34::1111

46
Q

An alternative internet identification system accesses machines using ____.

A

mnemonic

47
Q

“.edu” or “.com” are examples of ____.

A

top-level domains (TLD)

48
Q

____ is a hierarchical and decentralized system that translates human-readable domain names into numerical IP addresses—which computers use to identify one another on a network.

A

DNS (Domain Name System)

49
Q

At the top of the DNS hierarchy are the ____ DNS servers, which direct requests to the appropriate top-level domain (TLD) servers.

A

root

50
Q

____ is the process of translating a domain name into an IP address.

A

DNS resolution

51
Q

Every domain must be registered with the ____.

A

ICANN (Internet Corporation for Assigned Names and Numbers)

52
Q

____ are rules, procedures, and formats that govern the communication of multiple devices over a network.

A

Network protocols

53
Q

Email transmission is supported by basic network protocols such as ____.

A

SMTP (Simple Mail Transfer Protocol)

54
Q

SMTP uses Domain Name System (DNS) lookups to identify the recipient of the email and send the message over the internet to a mail server where it can be retrieved using protocols such as ____ and ____.

A

POP3 (Post Office Protocol version 3), IMAP (Internet Message Access Protocol)

55
Q

____ is used for voice communication over the Internet.

A

VoIP (Voice over Internet Protocol)

56
Q

Transporting audio and video data across the Internet in near real-time is referred to as ____.

A

streaming

57
Q

Large-scale streaming services use ____, which are groups of servers distributed strategically over the Internet that stream copies of content to nearby end users.

A

Content Delivery Networks (CDNs)

58
Q

A networking technology called ____ enables an end user to connect to the closest server automatically.

A

anycast

59
Q

Who came up with the idea of combining internet technology with hypertext (linked documents), leading to the World Wide Web (WWW)?

A

Tim Berners-Lee

60
Q

The World Wide Web (WWW) is composed of a ____ document format for embedding hyperlinks to other documents, a ____ for transferring hypertext over the network, and a ____ process that supplies hypertext pages upon request.

A

hypertext, protocol, server

61
Q

Each hypertext document available through the World Wide Web is given a unique address called a ____.

A

uniform resource locator (URL)

62
Q

What is an example of a commonly-structured model of a URL?

A

http://subdomain.domain.top-level-domain/directory-path/document_name.html

63
Q

The ____, a generalized language, provides a standardized style for designing notational systems for representing data as text files.

A

extensible markup language (XML)

64
Q

The Internet is ____ while the World Wide Web is ____ on top of the Internet.

A

infrastructure, service

65
Q

XML focuses on ____, while HTML focuses on ____.

A

semantics, appearance

66
Q

____ is any software intentionally designed to cause damage to a computer, server, client, or computer network

A

Malware (malicious software)

67
Q

A ____ is a software program that infects a computer by inserting itself into programs that already reside in the machine.

A

virus

68
Q

A ____ is an autonomous program that forwards copies of itself to other machines in a network and could result in detriment of individual machines or the operations of the network.

A

worm

69
Q

____ resides on a computer, collecting information about the computer’s activities and reporting back to the spyware’s instigator. Passwords or credit card numbers can be exposed via this type of malware.

A

Spyware

70
Q

____ is another technique used to obtain private information by simply asking for it. The perpetrator sends emails posing as a legitimate business asking for information

A

Phishing

71
Q

A ____ attack is the process of overloading a computer with messages and results in suffocating the network resources.

A

denial-of-service (DoS)

72
Q

____, also referred to as a(n) ____ attack, involves an attacker intercepting data as it is traveling to or from the victim’s device, including authentication credentials.

A

Packet sniffing, man-in-the-middle (MITM)

73
Q

In a ____ attack, the attacker uses all possible combinations of characters to learn a user’s password.

A

brute force

74
Q

____ attacks are performed by the attacker by using an application and a large text file with just words.

A

Dictionary

75
Q

____ try to identify the hash value of a password, then convert it back to plain text.

A

Rainbow tables

76
Q

What does the CIA triad stand for?

A

Confidentiality, Integrity, and Availability. Moving toward one point in this triad could compromise another.

77
Q

A ____ is a software that acts as an intermediary between a client and a server to shield the client from adverse actions of the server.

A

proxy server

78
Q

____ software monitors network behaviors such as the origin and volume of traffic, looking for anomalies to proactively or reactively mitigate unwanted occurrences.

A

Network auditing

79
Q

Familiar, easy-to-read names that are used to navigate the internet, such as “www.google.com” are called ____ names.

A

domain