CA7 Flashcards

1
Q

State:

Purpose of Batch OSs

A

Collects programs and data together in a batch before processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

State:

3 functions/features of a batch OS

A

3 of:
* Processes batches of data at regular intervals
* No user interaction required
* Batch processing carried out when least demand for processing power
* Can be set up to run at specific times
* Batches processed on a first-come-first-served basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

State:

Purpose of Multi-tasking/Time-sharing OSs

A

Enables the use of a single computing resource for multiple uses at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

State:

3 functions/features of a multi-tasking/time-sharing OSs

A

3 of:
* Involves processor carrying out multiple tasks at a time
* Programs being used are eitehr waiting, runnable or running
* OS schedules the processes to be exectured by the CPU
* As the OS facilitates multi-tasking, several aplications can be stored in the RAM at same time complex to setup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

State:

Purpose of Real-time operating systems (RTOS)

A

Swtiches between tasks rapidly giving the impression that programs are being executed at the same time, Aids the management of different hardware resources and hosts the applications that run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

State:

3 purposes of real-time operating systems (RTOS)

A

3 of:
* Typically used for embedded applications
* Data is processed as soon as it is received by the processor
* It is high performance - fast response time and based on user requirements
* Priority scheduling
* Higher security and reliability standards
* It will always produce the same output if the same input is used - known as determinism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

State:

Purpose of network operating systems (NOS)

A

Runs on a server and provides capability to manage users, groups and security applications and data and other networking functions. Facilitates sharefile and printer access across multiple users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

State:

3 functions/features of network operating systems (NOS)

A

3 of:
* Centralised servers are stable
* Security of the network is managed by the server
* Facilitates remote access to the servers from different locations and types of systems
* Upgrades using new technologies and hardware are easily integrated into the system
* Purchase and running costs are high
* There is a dependency on a central location
* Regular updates and maintenance are required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State:

Purpose of mobile OSs

A

Software platform to run mobile devices. Responsible for determining its functions and features of the device. Determines which third-party apps can run on the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

State:

3 types of mobile OSs

A
  • Android OS - Google’s open and free software stack that includes an OS, middleware and key applications
  • iPhone OS/Apple IOS - only available on devices manufactured by apple -derived from Mac OS
  • Windows Mobile - Microsoft OS used in smartphones and mobile devices with or without touchscreens - based on windows CE 5.2 kernel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

State:

Software that is used to help manage, control and maintain the computer system and associated resources

A

Utility Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

State:

2 examples of utility software, that are not built-in to OSs

A

2 of:
* Anti-virus
* Anti-malware
* Registry cleaners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define:

Application software

A

Specific programs that are installed onto a computer system or made available via the cloud, for end-users to perform a range of tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

State:

2 examples of application software

A

2 of:
* Graphics software
* CAD software
* Office suite; Microsoft 365
* Browser software; Google chrome, Firefox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define:

Code Development Tools

A

Tools used by programmers when developing software, enabling them to create, maintain and debug the software they are developing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain:

Integrated Development Environments (IDEs)

A

Access tools within one central interface, include, at minimum, a source code editor, compiler and debugger and sometimes other tools; class and object browsers and class heirarchy diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

State:

3 examples of tools used by developers (other than an IDE)

A

3 of:
* Source code editor
* Compiler
* Debugger
* Assembler
* Linker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fill The Blank:

Not all ……………….. which make up a digital system are suitable for all …………………….., their environments or the industry sector that they are in

A

Components, Businesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Fill The Blank:

When using a component (software, hardware, …………………) it is important to consider the …………………. and …………………… of the component to make sure it is ………………….. and will produce the benefits that the business requires.

A

Peripherals, Benefits, Drawbacks, Appropriate/Required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define:

Feature of a component (software, hardware, peripheral)

A

Something that a digital system, hardware/software component or peripheral has associated with its functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define:

Benefit of a component (software, hardware, peripheral)

A

Outcome/result from using the digital system, component or peripheral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define:

Drawback of a component (software, hardware, peripheral)

A

Something which can have a negative effect on or disadvantage a business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Explain:

What RAID means and what it is

A
  • RAID - Redundant array of independent disks
  • Combining of multiple disk drives into a single unit (array)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Fill The Blank:

Because disks in RAID work in …………….., RAIDs are more ………….. and ……………. and reduce …….. loss and improve overall performance

A

Unison, Reliable, Faster, Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Fill The Blank:

The increase in ………… and ……………… from using RAID depend on the ……… used

A

Speed, Reliability, Type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Explain:

RAID 1

A
  • Also called disk mirroring
  • Two identical sets of disks and used for redundancy
  • If one drive fails, the business can still operate and the broken drive easily replaced with all data copied across from functioning drtive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

State:

1 advantage and 1 disadvantage of RAID 1

A

Advantage:
* Increase in read performance due to data being able to be read from either of the two functioning drives

Disadvantage:
* Slightly higher rate latency as the data must be written to both drives in the array

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define:

Redundant/Redundancy

A

Where a system is still able to function regardless of issues that may occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Define:

Read Performance

A

The time taken to open a file from storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Define:

Rate latency

A

The amount of time (delay) it takes to send information from one point to the next

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Explain:

RAID 5

A
  • Contains at least 3 drives (possibly more) with blocks of data being striped across the multiple drives
  • Parity bits written across each drive after each sequence of saved data
  • Parity checksum is storedo n one drive and used to calculate the value of the parity bits to check whether any data is missing and replace it
  • Usually has its own hardware controller
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

State:

1 advantage and 1 disadvantage of RAID 5

A

Advantage:
* Even more increased performance to RAID 1 because of data striping because data is spread across the drives and can all be read at once

Disadvantage:
* Can only withstand one disk failure and means other data backups should be implemented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Explain:

RAID 10

A
  • Combination of disk mirroring and disk striping
  • Requires at least 4 drives and a disk controller
  • Four disks divided into 2 sets of 2 where each set is RAID 1 for two different sets of data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

State:

2 advantages and 2 disadvantages of RAID 10

A

Advantages:
* Data redundancy due to there being a mirrored image of the data
* Increased read/write performance because of data striping
* Rebuild time reduced in the event of a disk failure as long as a mirror image is still available

Disadvantages:
* Does not have parity checking
* If a total failure of one sub-array occurs, the entire system can crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Define:

Data striping

A

The technique used to store consecutive segments of data (eg: a file) on different physical storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Define:

Parity

A

A technique that checks whether any data has been lost or overwritten when it is moved from one storage place to another or transmitted between computers on a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Explain:

What NAS means and what it is

A
  • NAS - Network Attached Storage
  • Storage device that is connected to a network and acts as a central point for the storage, management and access of files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Fill The Blank:

As the ……… is connected directly to the network, it can only be accessed by …………………. networked devices or users

A

NAS, Authorised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Fill The Blank:

NAS is configured with data transfer ……………. (DRPs) such as Network File System (NFS) allowing the …………………….. of data between devices

A

Protocols, Transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

State:

2 advantages of using NAS

A
  • Easy to add additional storage - just have to add additional disk drives
  • Data recovery and backup is easier - but should never be only backup option
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Explain:

What does SAN mean and what it is

A
  • SAN - Storage Area Network
  • Network of interconnected storage devices accessible by computers and servers
  • Purpose is to store, manage and protect data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Fill The Blank:

SAN uses ………….. storage where data is broken down into …………… and stored seperately with each ………… given a unique identifier and a software program …………………….. the requested …………….

A

Block, Blocks, Block, Reassembles, Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Fill The Blank:

In SAN, once a request is made, the software identifies the blocks based on their unique identifier and …………………. them into one ……… that is then accessible for the user

A

Reassembled, File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Fill The Blank:

Block storage system means data can be accessed more ………….. than a standard file-storage system and can be accessed using different types of …………………. …………………

A

Quickly, Operating Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Fill The Blank:

A ………. network is usually connected using ……….-………. cabling which is faster than other forms of cabling and uses a protocol known as fibre channel providing better ……………………

A

SAN, Fibre-Optic, Performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Fill The Blank:

SANs are ………………… in relation to the technology required and it is also complex to set up, ……………… and …………………….. meaning that there is the additional cost for a skilled ………………….. manager to monitor and maintain the SAN - they are however more easily ……………. by adding hard disks and switches

A

Expensive, Configure, Maintain, Network, Scalable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Explain:

2 advantages of connecting devices to form a network

A

2 of:
* Reliability - a central servber means data is still available if a device fails
* Accessibility on a global scale - If network is a WAN, then resources like data, files, info are accessible to the user of a connected device regardless of location
* Manageability - Server-based networks, individual software applications do not need to be installed on every computer connected to the network, the software is installed and can be upgraded/updated centrally and then be readibly accessible to all connected devices
* Security - Controlled centrally to mitigate risks against security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Explain:

2 disadvantages of connecting devices to form a network

A

2 of:
* Servers - a server-based network will be reliant on servers for files or mail, meaning its important that networks have powerful computers used as servers which makes it easier to set up and maintain the network
* Implementation costs - Initial costs are high with hardware (servers, switches etc.)
* Maintainability - Complex configurations and installations, these tasks can only be completed by experienced network specialists who can demand high wages for their skills and knowledge
* Security - Security risks especially with large networks with many users that could introduce viruses etc when accessign and sharing resources and files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

State:

4 advantages of wireless networks

A

4 of:
* Quick to deploy
* Supports increased mobility
* Lower cost of setup
* Aids the use of BYOD (bring your own device)
* simpler maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

State:

4 disadvantages of wireless networks

A
  • Shared medium - can become congested
  • Connectivity is not guaranteed
  • Security for businesses can be a concern
  • Throughput drops further you are from the access point
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Fill The Blank:

WiFi …… networks can be used to connect devices in an area with no …………. ………………

A

Mesh, Physical Cabling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

State:

The three common speeds found in the UK of WiFi networks

A

2.4GHz, 5GHz, 6GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Fill The Blank:

A higher WiFi speed means more ……….. at a higher ………….

A

Devices, Speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Fill The Blank:

A wireless network is easily ………………. without needing major re-configuration. A wireless network can also use ………………… and web-content ………………..

A

Scalable, Application, Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

State:

5 advantages of wired networks

A

5 of:
* Supports high bandwidth to endpoints
* Dedicated connection if using switch
* Full duplex operation
* Supports large distances
* Stable and not prone to interference
* Greater security
* High level of user control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

State:

5 disadvantages of wired networks

A

5 of:
* Expensive to install
* Can take a long time to install
* Expensive to upgrade
* Lack of mobility
* Inconvenient
* Higher maintanence costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Fill The Blank:

Because a wired network uses physical …….. it is reliant on ………………. cabling at a location to be used

A

Cables, Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Fill The Blank:

A wired network will use either …………. or …….. optic cabling to connect devices to the network

A

Copper, Fibre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Define:

Full Duplex

A

Send and receive at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Fill The Blank:

Fibre optics may be used over copper because they are harder to …….

A

Sniff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Fill The Blank:

A wired network will be much higher …………….. than a wireless alternative

A

Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Define:

LAN

A

Local Area Network - Connection of groups of computers and low voltage devices across short distances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Define:

WLAN

A

Wireless Local Area Network - Same as a LAN, but without cables connecting the hosts and servers (often using WiFi)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Define:

WAN

A

Wide Area Network - A series of LANs that have been joined together, often not owned by one person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Define:

WWAN

A

Wireless Wide Area Network - Use mobile phone signals which are provided by mobile phone services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Define:

PAN

A

Personal Area Networks- Very small networks connecting devices within one building and used by an individual or small business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Define:

WPAN

A

Wireless Personal Area Network - Wireless version of a PAN, using bluetooth or WiFi and have limited distance accessibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Define:

Bandwidth

A

Measurement of how much data can be transfered between one point to another on a network, over a set period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Define:

Speed of a network

A

Rate at which data can be sent over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Fill The Blank:

It is important that the ………………. of a network is able to handle the required …………….. of all devices connected to the network so that the overall ………… is acceptable for all users

A

Bandwidth, Bandwidth, Speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Define:

Symmetrical bandwidth

A

Same amount of data can be transmitted in both directions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Define:

Asymmetrical bandwidth

A

The upload bandwidth is smaller than the download capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Fill The Blank:

When installing a network it is important to calculate the amount of ……………… required

A

Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

State:

2 steps into calculating the required bandwidth for a network

A

1) Find out how much network bandwidth is available
2) Find out average usage required by each application
(both expressed in bytes per second - Bps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Define:

Latency

A

Measure of time taken to transmit data from one point to another over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

State:

What unit latency is measure in

A

Milliseconds (ms)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Describe:

How distance impacts latency

A

The further away a user is from the destination of a packet, the longer it will take to be sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Fill The Blank:

DSL, cable and fibre optic have a lower latency than …………. because this, although it travels at the speed of light has to travel further than the alternatives and is therefore slower

A

Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Fill The Blank:

A ………. takes time to process data and therefore latency occurs

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Define:

Propogation delay

A

Length of time it takes the data packets to travel from the device to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Fill The Blank:

If a ………… location takes a long time to process data it can become a ………………. in a network

A

Storage, Bottleneck

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Fill The Blank:

An efficient network will have high ……………. and low …………

A

Bandwidth, Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Define:

Bottleneck

A

Limitation of data flow by a network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

State:

What name is given to the computers on a network

A

Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Explain:

Briefly, a client-server network

Client-server Network Model

A

Server with computers connected to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Fill The Blank:

The server is used to provide …………….. and ………………………. to the client computers but is …………………. protected from being accessed at each client

Client-server Network Model

A

Services, Resources, Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

State:

2 common uses of client-server networks

Client-server Network Model

A

2 of:
* Web service
* Games hosting
* Private networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

State:

1 advantage of a client-server network

Client-server Network Model

A

Centrally controlled - control of all connected devices is easier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

State:

2 disadvantages of a client-server network

Client-server Network Model

A
  • If the server fails, the whole network is not functional
  • A lot of clients on the network will cause network traffic congestion which can slow the system down
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Explain:

Thin client

Thin client Network Model

A

Runs by accessing resources on a central server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Fill The Blank:

A thin client does not have local ………………..

Thin client Network Model

A

Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

State:

2 advantages of thin clients

Thin client Network Model

A
  • Because resources are accessed from central server, operating costs are lower
  • Easier to do maintenance, set security requirements or upgrades because all data is stored on a central server and changes only need changing on a central server
  • Simple to increase size of network (scalability) by adding new thin clients to network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Explain:

Briefly, peer-to-peer network model

Peer-to-peer Network Model

A

No central server, where peers (clients) act as clients and servers to all other peers on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

State:

What a P2P network allows users to share

Peer-to-peer Network Model

A
  • Folders/Files
  • Peripherals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Fill The Blank:

Each device on the network provides ……………….. to the network and ……………….. resources the network provides

Peer-to-peer Network Model

A

Resources, Consumes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

True or False:

A P2P network has worse performance than a client-server network

Peer-to-peer Network Model

A

False - They have better performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

State:

2 advantages of P2P networks over client-peer networks

Peer-to-peer Network Model

A
  • Cost of a peer to peer network is lower
  • Easy scalability in comparison
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Explain:

Differences between a logical and physical topology

A

Physical: Physical structure and layout of devices on a network; devices, cabels, switches etc.
Logical: Way data passes from one device to another through the network or how it acts on the network media regardless of physical connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Explain:

Star network topology

A
  • Each device is connected to a central device using a point-to-point link.
  • Central hub receives signals from a node and transmits (repeats) the signal to all other connects nodes.
  • The hub manages and controls all network functions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

State:

2 advantages of a star network topology

A

2 of:
* Easy to install, wire and reconfigure
* No disruption to the network when connecting or removing nodes
* Easy to troubleshoot. This is because all data goes through a central point
* Faulty equipment such as network cards, media and nodes can be easily isolated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

State:

2 disadvantages of a star network topology

A

2 of:
* If the hub fails, the network fails
* It requires more cabling than many other topologies
* It can be expensive (mainly due to the cost of the hub)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Explain:

Mesh network topology

A
  • Often used in WANs
  • Every devices has a point-to-point contact with every other device in a network - fully connected mesh topology

Because the fully connected approach is impractical, a hybrid approach is sometimes used when critical devices are interconnected (partial mesh topology)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

State:

2 advantages of a mesh network topology

A

2 of:
* No traffic problems because of the dedicated links
* It is more robust than other topologies; if there is a failure in one of the links, it does not impact the whole system
* Data travels down a dedicated line and is more secure
* Fault detection is easier as there are point-to-point links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

State:

2 disadvantages of a mesh network topology

A
  • There is a ‘mesh’ of wiring which is difficult to maintain
  • Installation is complex and costly; connection between every node
105
Q

Explain:

Tree network topology

A
  • AKA: Star bus topology
  • Groups of star-configured noes are connected to a linear bus (in a tree shape)
106
Q

State:

2 advantages of a tree network topology

A

2 of:
* Point-to-point wiring for individual segments
* It supports the expansion of existing networks
* The network can be reconfigured to emet existing needs
* Other nodes on the network are not affected if one node fails
* It provides a hierarchical and central data arrangement of the nodes

107
Q

State:

2 disadvantages of a tree network topology

A

2 of:
* The length of the network depends on the cable used
* Network is dependent on the backbone cable - if this fails, the whole network fails
* The bigger the network, the more complicated it becomes to configure
* Limit to the length of each segment within the network that is also dependant on the type of cabling used
* Performance can be slow due to the number of nodes on the network
* Network traffic can be heavy because data travels from the centre cable
* Costly and time consuming to implement with complex maintenance requirements

108
Q

Explain:

VLAN network topology

A
  • Virtual Local Area Network
  • Logically seperate ut networks (e.g seperate departments in a business)
109
Q

State:

2 advantags of using a VLAN network topology

A

2 of:
* Provides more security control as each VLAN is a simulated seprate network within a large overall network
* Latency is decreased
* Easier to scale upwards or downwards as each area can be addressed in isolation and not impact other areas on the main network
* Easier to troubleshoot problems on a smalelr network than a larger one

110
Q

State:

2 disadvantages of using a VLAN network topology

A

2 of:
* Can be more expensive to implement as additional routers may be required to control traffic on large networks
* Maitenance needs to be carried out using a logical and structured process to maintain existing VLAN segmentation
* Means that implementation planning can take longer than other, simpler setups

111
Q

Explain:

Internet Service Providers

A

Companies who privately own the core networks who have contracts with each other to form the large, global network

112
Q

Fill The Blank:

Businesses and individuals hold a …………… with an individual …… to acces the entire …………..

A

Contract, ISPs, Internet,

113
Q

Fill The Blank:

ISPs use the ……………. layer and …………….. layer of the TCP/IP model to make computer to computer connections and transmit data between them

A

Internet, Transport

114
Q

Explain:

Briefly, the 3 tiers of ISPs

A

Tier 3: Local ISPs, businesses and homeowners have contracts for these
Tier 2: Acts as a go-between Tier 1 and 3 ISPs, often regional or country-wide like Vodafone - act same as Tier 1 ISPs but with a wider reach for internet access and will charge tier 3 ISPs
Tier 1: Global reach across internet, charge tier 2 ISPs

115
Q

Explain:

Router

A

Manage communication between different devices on a network and allows connected devices to access the internet

116
Q

Fill The Blank:

A wired router requires devices to be connected using ……………….. cables whereas a …………….. router allows for wireless connectivety (but likely with some physical connections available too)

A

Ethernet, Wireless

117
Q

Fill The Blank:

Routers use the ….. …………………. of a connected device to deliver packets to the correct device

A

IP Addresses

118
Q

State:

The layer in the OSI model routers operate, and the 3 layers they use

A

on the network layer and use the network, physical and data-link layers

119
Q

Explain:

Why routers are known as self-learning devices

A

Will automatically identify new devices connected to the network and ensure additonal devices know of its existence

120
Q

Fill The Blank:

Routers support ………………. and ……………………….

A

Filtering, Encapsulation

121
Q

True or False:

A network switch is required for internet access

A

False - a network switch is not required for internet access, but a router is

122
Q

State:

Where a network switch is used

A

Used in large businesses’ networks and data centres where the devices are connected using ethernet cables

123
Q

Fill The Blank:

A switch is used to connect devices …………… in a network and will only transmit packages to the device data is ………………… for

A

Within, Intended

124
Q

Fill The Blank:

A layer .. switch uses the ………….. ……………… ………… (…….) address of each device so that is can send the data to the correct device and works in the ……..-……….. layer of the OSI model

A

Media Access Control (MAC), Data-Link

125
Q

Fill The Blank:

A layer .. switch works in the …………….. layer of the OSI modeland uses the ….. addresses of the destination device to route packages

A

3, Network, IP

126
Q

Fill The Blank:

Network switches that operate in the ………………. layer of the OSI model are usually used to support ………….

A

Network, VLANs

127
Q

State:

Who developed the OSI model and in what year

A

International Organization for Standardization (OSI) in 1977

128
Q

State:

7 Layers of OSI model

A
  • Physical
  • Data Link
  • Network
  • Transport
  • Session
  • Presentation
  • Application (User at this end)
129
Q

Describe:

Application layer in the OSI model

A

Protocols for proccess to process communication

130
Q

Describe:

Presentation layer in the OSI model

A

Provides common representation of the data transferred between application layer services

131
Q

Describe:

Session layer in the OSI model

A

Provides services to the presentation layer to organise it’s dialogue and manage the data exchange

132
Q

Describe:

Transport layer in the OSI model

A

Services to segment, transfer and reassemble data for individual communications between the end devices

133
Q

Describe:

Network layer in the OSI model

A

Services to exchange individual pieces of data over network being identified between different services

134
Q

Describe:

Data Link layer in the OSI model

A

Protocols which describe methods for exchanging data frames between devices over a common media

135
Q

Describe:

Physical layer in the OSI model

A

Mechanical, electrical, functional and procedural means to activate, maintain and deactivate physical connections for bit transmission to and from end devices

136
Q

State:

The 4 layers in the TCP/IP Model, in order

A

Application, Transport, Internet, Network Access/Network Interface

137
Q

Explain:

Purpose of application layer

A

Provides applications with the means to access the services of the other layers and defiens the protocols used by the applications to exchange data

138
Q

Explain:

Purpose of transport layer

A

Provides application layer with session and datagram communication services

139
Q

Explain:

Purpose of internet layer

A

Provides addressing, packaging and routing functions

140
Q

Explain:

Purpose of network access layer

A

Physical interface between the host system and the network hardware

141
Q

Fill The Blank:

The …………………………. …………… Protocol/Internet Protocol (TCP/IP) is the protocol used for communication beteen computers on the ………….. and defines how devices should be ……………….. to the internet and how data is ………………………. between them.

A

Transmission, Control, Internet, Connected, Transmitted

142
Q

Fill The Blank:

Data that is sent over a network (including the internet) is referred to as ……………….. where large ……………. of data re broken down into smaller …………………

A

Packets, Packets, Datagrams

143
Q

Fill The Blank:

Once datagrams reach their final destination they are ……………….. as a single file or block of ……………………… data

A

Reassembled, Contiguous

144
Q

State:

3 parts of a data packet

A
  • Header
  • Payload
  • Trailer
145
Q

Explain:

The header in a datapacket

A

Contains instructions about the data with several parts:

146
Q

State:

The 9 parts of the header of a data packet

A
  • Originating address - IP address of sender
  • Destination address - IP Of receiver
  • Internet protocol - Defining type of packet being transmitted
  • Size of header and payload
  • Number of hops - Number of routers that the packet will pass through on its journey
  • Time to Live (TTL) - Amount of time it exists within the network before being discarded by the router
  • Flags - Used to inform the router whether the packet can be divided into datagrams
  • Checksum - Used to detect any errors during transmission
  • Packet number - Number of the packet where there is a sequence of packets
147
Q

Define:

Contiguous Data

A

Data that is stored in a collection of adjacent locations

148
Q

Define:

Time To Live (TTL)

A

Amount of time or ‘hops’ that a packet is set to exist inside a network before being discarded by the router - TTL is also used in CDNs caching and DNS caching

149
Q

Define:

Hops

A

Refers to number of routers that a packet passes through from its source to its destination. A hop can also be counted when a packet passes through other hardware on a network such as switches, access points and repeeaters - it is dependent on what role the devices have on the network and their configuration

150
Q

Explain:

The payload of a datapacket

A

This is the body of the data packet and contains the actual data that is being sent/received

151
Q

Explain:

The Trailer of a datapacket

A
  • Sometimes called footer
  • used to inform the receiving device that it is the end of the packet
152
Q

Expain:

What error checking is often done in the trailer/footer of a datapacket

A
  • Cyclic Redundancy Check (CRC)
  • Will add up all 1s in the payload and stores the results as a hexadecimal
  • Upon receiving the packet the device will add up the number of 1s in the payload and compare it with the hexadecimal value stored in trailer
  • When these values match it confirms there was no errors during transmission and if not the receiving devices sends a request to the sender for them to resend the packet
153
Q

Explain:

Packet Switching

A

Where the data packet is divided into smaller data packets and trasmitted individually across the network as opposed to transmitting one large data packet.

154
Q

Explain:

Why packet switching is done

A
  • Used to reduce the chances of lost packets
  • Facilitates the resending of data packets
  • Reduces transmission latency
155
Q

Fill The Blank:

With packet switching, packets are not necessarily ………….. along the same path within the network which means packets arrive at the destination in no particular ………….. and the destination must ……………………… the packets into an appropriate order to be able to retrieve the original message

A

Routed, Order, Reconstruct

156
Q

Fill The Blank:

The TCP/IP model has 4 layers whereas the OSI model has … layers

A

7

157
Q

Fill The Blank:

The OSI model uses a vertical approach and the TCP/IP model uses a ………………… approach

A

Horizontal

158
Q

The TCP/IP model has a ……………. orientated approach but the OSI model is based on the funcionalities of the layers

A

Protocol

159
Q

The TCP/IP model combines the presentation and …………… layers into its application layer and the OSI model differentiates between ……………………., services and protocols

A

Session, Services

160
Q

The TCP/IP model combines the data link and …………. layers and it is called the network layer and the OSI model acts as an interaction ……………… between the network and end-user

A

Physical, Gateway

161
Q

The TCP/IP model only has ………………………….. transmission in the network layer and connection and connectionless transmission is available in the transport layer and in the OSI model, the connection and ……………………………… transmissions are provided in the network layer and it only provides connection transmission in the ……………… layer

A

Connectionless, Connectionless, Transport

162
Q

Explain:

Briefly, TCP/IP

A

Transmission Control Protocol/Internet Protocol - A set of standardised rules that allow computers to communicate on a network (suc has the internet)

163
Q

Explain:

Briefly, DNS

A

Domain Name System - When accessing a website a user can enter the IP address or use the hostname address, but because IP addresses are not easy to memorise the DNS converts the IP address into a host name than be read easily by users

164
Q

Explain:

Briefly, ARP

A

Address Resolution Protocol - Communication layer protocol that supports the process between the datalink and network layers. Identifies the designated MAC address based on the available IP address

165
Q

Explain:

Briefly, RDP

A

Remote Desktop Protocol - Microsoft product that provides users with a graphical user interface (GUI) when connecting to other networked computers

166
Q

Explain:

Briefly, VNC

A

Is used for remote desktop sharing and displays the virtual destop of another computer, allowing it to be controlled over a network connection

167
Q

Explain:

Briefly, SSH

A

Secure SHell - Used to operate services over an unsecured network using cryptography. Ity is commonly used by network admins who are required to access, manage and control systems and applications remotely

168
Q

Explain:

Briefly, SIP

A

Sesion Initiation Protocol - Singalling protocol, able to initiate, maintain, adjust and terminate real-time sessions

169
Q

Explain:

Briefly, SMB

A

Server Message Block - This is a network communication protocol that enables the shared access of files, printers and ports between connected nodes on a network

170
Q

Explain:

FTP/S

A

File Transfer Protocol/Secure - Basedo n the client and server model architecture and is used to transfer files between the client and the server on the network

171
Q

Explain:

Briefly, HTTP/S

A

Hyper Text Tranfer Protocol/Secure - Used to authenticate a website that the user is attempting to access. Provides secure network communication through the protection of the privacy and integrity of any data that is exchanged. Achieved via encryption of exchanged data

HTTP provides communication but there is no securing of data

172
Q

Explain:

Briefly, IMAP

A

Internet Message Access Protocol - Internet email protocol that stores emails on the mail server, the users then can retrieve the messages and respond to them

173
Q

Explain:

Briefly, POP3

A

Post Office Protocol - Within the application layer, facilitates the retrieval of emails from a remote server to the user’s local device. Enables user to view emails offline

174
Q

Explain:

Briefly, SMTP

A

Simple Mail Transfer Protocol - Communication layer protocol that is used to send emails

175
Q

Explain:

Briefly, SNMP

A

Simple Network Management Protocol - This collects and organises information associated with the devices that are managed on an IP network. It can modify the information in order to change the behaviour of the connected device. Devices include routers, switches and printers.

176
Q

Explain:

Briefly, TELNET

A

Referred to an application protocol which allows for bidirectional interactive communication using a virtual terminal connection

177
Q

State:

3 types of environments that may be used by an organisation

A

Physical, Virtual, Cloud

178
Q

Define:

Virtualisation

A

The technology that enables a single physical hardware system to be separated into multiple simulated environments or dedicated resources

179
Q

State:

“Software that connects to the hardware and facilitates the splitting of one system into separate and distinct environments referred to as VMs”

Virtual Environments

A

Hypervisor

180
Q

Fill The Blank:

VMs rely on the hypervisor to separate the …………………… of the machine from the hardware and distribute them and hardware that is equipped with a hypervisor is called the …………. and VMs are called ……………..

A

Resources, Host, Guest

181
Q

Fill The Blank:

The guests treat the resources such as the …….., memory and …………… as a ………….. of resources and receive only what they require from the ……………….

A

CPU, Storage, Pool, Operator

182
Q

State:

2 examples of types of virtualisation and briefly explain them

A

2 of:
* Data virtualisation - Treat data as a dynamic supply, provide processing functions that can bring data together from multiple sources and tranform data and accommodate new data sources
* Desktop virtualisation - Install multiple OSs onto a single machine, to allow a central admin to install simulated destop environments on very large quantities of physical machines simultaneously - allowing mass configuration, updates etc.
* Server vritualisation - Allow a server to serve multiple functions at once (involves partitioning)
* OS virtualisation - Load multiple types of operating system side by side, making multiple accessible on one device reducing hardware costs and increases security as all virtual instances can be monitored
* Network function virtualisation - Seperate key network functions independent of hardware, allowing them to be packaged together to form a new network, reducing number of physical components required to create multiple independent networks

183
Q

State:

5 key features of virtual environments

A

4 of:
* Increased security - Manager can control and filter activity of guest’s programs; mitigate risk of harmful operations being carried out
* Managed execution - Execution of sharing, aggregation, emulation and isolation managed from central virtual server
* Sharing - Creation of separate computing environments within same host reduces number of active servers and limits power consumption
* Aggregation - Group of hosts are combined and presented to guests as a single virtual host - done with cluster management software
* Emulation - Guest programs are executed in an environment that is controlled by a virtualisation layer, which allows for completely different environments to the host to be smulated meaning execution of guest programs that require specific characteristics
* Isolation - Each guest has a separate environment and the VM can filter activities of the guests and mitigate the risk of harmful operations against the host - also allows performance tuning
* Portability - hardware virtualisation = Virtual image of guest can safely be moved and programming-level virtualisation = binary code representing application components can run on any installation of the corresponding VM

184
Q

Explain:

Efficient use of hardware of virtual environments

Benefits of using virtual environments

A

Virtualisation means many instances can be made on one piece of hardware, maximising effective use to a wider variety of guests - reducing costs and effectives increased

185
Q

Explain:

Continous availability of virtual environments

Benefits of using virtual environments

A

Allows access at any time and easy to move instance from one server to another without shutting down and restarting

186
Q

Explain:

Simple recovery of virtual environments

Benefits of using virtual environments

A

Duplications, backups and recories are much easier with virtual instances where tools are available for nearly real-time backup and mirroring capabilities

187
Q

Explain:

Simplified and faster setup of virtual environments

Benefits of using virtual environments

A

Compared to building and setting up new physical hardware, virtual environments can be setup quickly within minutes

188
Q

Explain:

Easier migration to the cloud for virtual environments

Benefits of using virtual environments

A

Most of the data is on one server with virtualisation versus many machines when converting to the cloud

189
Q

State:

3 benefits of using virtual environments

A
  • Efficient use of hardware
  • Continuous availabilty
  • Simple recovery
  • Simplified and faster setup
  • Easier migration to the cloud
190
Q

Explain:

High initial investment costs of virtual environments

Drawbacks of using virtual environments

A

Initial setup of servers and storage is higher than a regular installation of a system

191
Q

Explain:

Risk to data to virtual environments

Drawbacks of using virtual environments

A

Data may be hosted on a third part resource (cloud) which could be vulnerable to attacks, unauthorised access

192
Q

Explain:

Scalability challenges for virtual environments

Drawbacks of using virtual environments

A

Easy to implement, but not in a short period of time because software, security, storage and resource availability have to be considered - can be time-consuming because a third party can be involved

193
Q

Explain:

Reduced performance for virtual environments

Drawbacks of using virtual environments

A

Virtual environments provides optimal use of resources but additional performance may not available if required by a VE - resources may not be shared equally or be shared depending on the task being carried out - if performance needed is not available then time to complete increases

194
Q

Explain:

Unintended server sprawl for virtual environments

Drawbacks of using virtual environments

A

When more servers are created, the workload to a administrative staff increases because new virtual environments, and therefore virtual servers are created

195
Q

State:

3 drawbacks of using virtual environments

Drawbacks of using virtual environments

A
  • High initial investment costs
  • Risk to data
  • Scalability is challenging
  • Reduced performance
  • Unintended server sprawl
196
Q

Define:

Cloud computing

A

Outsourcing of IT services and infrastructure, making them accessible remotely via the internet

197
Q

State:

Two benefits of using cloud computing models

A
  • Boost productivity
  • Provide organisations a competitive edge
198
Q

State:

The four different categories of cloud models

A
  • Public
  • Private
  • Community
  • Hybrid
199
Q

Fill The Blank:

Used by a range of …….-users from large organisations to individuals and can be accessed through a digital-device and ……… connection, paying with a ……………….. or a pay-to-use basis.

A

User, Internet, Subscription

200
Q

State:

Two examples of public cloud organisations

A

2 of:
* AWS
* IBM Cloud
* Google Cloud

201
Q

Explain:

Who uses a private cloud organisation and how it would be restricted

A
  • Used by a specific organisation
  • Can be hosted on site premises or remotely through virtualisation
  • Requires organisation installs and maintains infrastructure, including hardware, software and networking components
202
Q

Fill The Blank:

A …………… cloud is one that is designed for and used by a group of organisations working in a particular …………….

A

Community, Industry

203
Q

Define:

Hybrid model

A

Best of both world which incorporates the best aspects of practe and public clouds that integrate with each other

204
Q

Explain:

IaaS

A

Infrastructure provided could include a network, servers, storage areas and an OS. This means that the organisation can reduce the costs and physical presence of hardware.

205
Q

Explain:

PaaS

A

Includes features of IaaS and builds these to include software (eg: dev tools) but still possible for an organisation to use their own development tools; common in development and testing of web-based software

206
Q

Fill The Blank:

PaaS means the provider provides the platform, …………… and …………….. to develop the software on and the organisation develops and ……….. the applications

A

Hardware, Software, Deploying

207
Q

Fill The Blank:

Provides software apps and services and can be accessed from a range of ……… (location ……………) and uses a ……………. based service (fixed fee or pay-to-use)

A

Devices, Independent, Subscription

208
Q

State:

Who is responsible for each of the following resources in the IaaS delivery model

  • Applications
  • Runtime
  • Data
  • Middleware
  • OSs
  • Virtualisation
  • Servers
  • Storage
  • Networking
A
  • Applications - Subscriber (Organisation)
  • Runtime - Subscriber (Organisation)
  • Data - Subscriber (Organisation)
  • Middleware - Subscriber (Organisation)
  • OSs - Subscriber (Organisation)
  • Virtualisation - Service Provider
  • Servers - Service Provider
  • Storage - Service Provider
  • Networking - Service Provider
209
Q

State:

What 2 of the following resources in the PaaS delivery model are the only responsibilities of the subscriber/organisation
* Applications
* Servers
* Runtime
* Data
* OS
* Virtualisation
* Storage
* Networking
* Middleware

A

Applications, Data

210
Q

State:

What 1 thing in the SaaS delivery model is the only responsibility of the subscriber/organisation

A

The user only (use of the app)

211
Q

Define:

Runtime

A

Length of time a computer program takes to run

212
Q

Fill The Blank:

DaaS is a ………… computing model that provides ……… management by using the cloud for the storage, ……………………….., processing and, if required, ……………………. of data through a network connection. This can reduce data …………. and data …………

A

Cloud, Data, Integration, Analytics, Sprawl, Silos

213
Q

Fill The Blank:

DaaS happens through …aaS

A

S[aaS]

214
Q

Explain:

How data as a service (DaaS) can be used with data science platforms

A

At least 2:
* Provides data that can be used through the data science lifecycle
* The platforms support scientists when they are exploring and developing ideas and models
* A data science platform allow the team to collaborate and identify data that has already been gathered easier
* Explore large data sets and plot it

215
Q

Fill The Blank:

Dashboards, also called data …………………………… tools that enable the user to view a …………… ……………………… of the data. They allow for visual ……………………… of performance …………….. and the DaaS is an appriopriate platform for it to use for the accessibility of data

A

Visualisation, Visual Representation, Interpretation, Metrics

216
Q

State:

“The vast amounts and variety of data produced”

A

Data Sprawl

217
Q

Define:

Data Silos

A

A group of raw data accessible by one department but not available to the other departments within the organisation

218
Q

Define:

Data Visualisation

A

Graphical representation of data

219
Q

Define:

“The collection, analysing and reporting of information. This can be in relation to a system, department, individual or even profit of an organisation as a whole”

A

Performance Metrics

220
Q

Fill The Blank:

The implementation of ………… with a database that stores vast amounts of data will mean accessiblity to a wide range of people who could be in different …………………..

A

DaaS (Data as a Service), Locations

221
Q

Fill The Blank:

DaaS enables an …………………… to store big ………. without the necessity to install its own data storage ……………..

A

Organisation, Data, Servers

222
Q

Fill The Blank:

DaaS supports file ……………… because it is all in the cloud as well as ……………………. access to multiple users to authorised files

A

Sharing, Simultaneous

223
Q

Fill The Blank:

DaaS file systems restrict users through granting …………………….. through the implementation of user and ……….. permissions strengthening security of files (which are managed by an …………………………)

A

Permissions, Group, Administrator

224
Q

State:

4 benefits of using DaaS to an organisation and its stakeholders

A

4 of:
* Cross platform transfer
* Automatic updating of data/files
* Wide ranging accessibility
* Reduces the risk of multiple versions of the same data/files existing
* Enhanced security through access permissions levels, passwords and encryption
* Reduction in the costs of data maintenance and delivery
* Facilitates collaboration, regardless of location
* Allows for easier scalability (up or down) for storage requirements
* Supports remote working

225
Q

State:

3 drawbacks of using DaaS to an organisation and its stakeholders

A

3 of:
* Data is transferred over a network, increasing risk of security breaches
* Time consuming for the transferring of large data sets based on bandwidth restrictions
* Can be a limitation of available tools as any tool used must be hosted by or compatible with the DaaS platform
* Compliance with legislation/regulations as sensitive data is located in the cloud, organisations must ensure that they are compliant with the regulation/legislation associated with the country where the DaaS provider is based and origin of data

226
Q

Explain:

Cloud sourcing

A

Where organisations will outsource business processes to a third party (a service provider)

227
Q

Fill The Blank:

Subscribers ………… the service providers for services such as ………., ………., SaaS and DaaS.

A

Pay, PaaS (platform as a Service), IaaS (Infrastructure as a Service)

228
Q

State:

One example of a well-known cloud source used by individuals for storage and sharing of data and files

A

Dropbox

229
Q

Fill The Blank:

Cloud sourcing is easier for …………. (up or down) and the service …………….. is ……………….. for services are up-to-date and maintained as opposed to the subscribers employing technical teams to do it for them

A

Scalability, Provider, Responsible

230
Q

Fill The Blank:

The market for cloud ………… has rapidly expanded and the smaller ……………. providers have to find new innovative ways to retain their share of the ………………..

A

Sourcing, Service, Market

231
Q

Define:

Cloud Portability

A

Ability for organisations to move their applications, platforms and/or data between service providers

232
Q

Fill The Blank:

Providers want to ‘…….-in’ their subscribers so do not offer ………………. between platforms - this can also stop potential subscribers from …………… up because of these restrictions

A

Lock, Portability, Signing

233
Q

Fill The Blank:

Organisations must consider what cloud computing is most …………….. based on their needs and those of other ……………………..

A

Suitable, Stakeholders

234
Q

Explain:

4 points about what digital resilience involves

A
  • Understanding the risks involved with having a digital environment and identifying how these risks can be mitigated
  • Being able to identify when a problem has occurred and what to do
  • Being able to recover from problems
  • Learning from experience and implementing processes and procedures to mitgate any future occurrences of the same or similar problems
235
Q

Fill The Blank:

Strong digital ……………… is when organisations manage digital risk and continue to deliver their products/services to stakeholders regardless of the situation

A

Resilience

236
Q

Fill The Blank:

With businesses becoming more reliant on …………………., if there is a problem the possibility for …………………… to the functionality of the business increases

A

Technology, Disruption

237
Q

Fill The Blank:

To avoid distruptions when technology goes wrong, businesses must have ……….. in place to be able to adapt to problems and continue to function with minimal disruption to the business or ………………………..

A

Plans, Shareholders

238
Q

Fill The Blank:

When considering their digital ……………………, organistions must balance the opportunities for technological ………………, business ………………… and security while complying with current …………… and regulation

A

Resilience, Change, Expanision, Legislation

239
Q

Fill The Blank:

Data ……………………… is where the same data is stored in multiple locations, and while it can be accidental, is often on purpose for ……………….. purposes to allow for data recovery.

A

Redundancy, Backup

240
Q

Fill The Blank:

Another advantage of data …………………….. is that it provides a mechanism for improving the …………………. of the data because it can be …………………… across multiple sites

A

Redundancy, Compared

241
Q

Explain:

Briefly, 2 disadvantages of data redundancy

A
  • Data redundancy can cause data inconsistency if it is stored in multiple locations but the data does not match
  • Risk of data corruption due to the transfer and/or storage of data between locations/systems
  • Additional costs required for the storage of the data
242
Q

Explain:

Hardware redundancy

A

Consists of one or more additional compelte hardware systems (eg: additonal servers that can be used in case of failure)

243
Q

Explain:

Briefly, 3 types of redundancy

A
  • Dynamic - Where only one system is working at a time and in case of faioure an additional system is started so that the business processes can continue with minimum disruption
  • Static - Where systems run in parallel, all carrying out the same processes - results are continually compared to check accuracy where in case of mismatches a predefined algorithm decides the best outcome
  • Hybrid - Combination of dynamic and static hardware redundancy

These can be applied to both hardware and software redundancy

244
Q

Explain:

Disadvantages of hardware redundancy

A
  • Means a more complicated system
  • Additional costs for the components involved
  • Redundant systems also have to be updated, upgraded and maintained alongside the main systems (otherwise it will become unreliable and less resilient)
245
Q

Explain:

Software redundancy

A

Where there is additional software that can carry out the same tasks as the current software being used

246
Q

Explain:

Back-up systems

A
  • Not just backing up data but whole system (OS, software, configs)
  • If incident occurs, business can restore system to a position prior to the incident
247
Q

State:

3 types of disaster recovery sites

A
  • Hot site
  • Cold site
  • Warm site
248
Q

Explain:

Hot site

A
  • Usually in a different location and runs in parallel to the normal system
  • Replicate primary system and are usually maintained by third party (at a cost)
  • Because they run in parallel they allow prompt restoration of functionality incase of an incident
  • Because these sites have a backup of data, they allow immediate access to up-to-date data without having to source the location of any other data backups
  • Can be in the cloud
  • ‘A fully functioning, up-to-date replica in respect to equipment and data’
249
Q

Explain:

Cold site

A
  • Cheapest option as it does not involve all facilities needed for hot site
  • Only usually used when critical disaster occurs
  • Only a form of data center so incase of an incident technical expertise will be required to install and configure the computer equipment so that the business can continue to function
  • ‘Only have data and none of the equipment for the business environment’
250
Q

Explain:

Warm site

A
  • Combination of a hot and cold site
  • Digital equipment is made readily available but data must be restored onto the system
  • Cost wise is between hot and cold sites
  • ‘Contains basic equipment used in the business environment but does not include any data’
251
Q

State:

4 types of backups

A
  • Full backup
  • Incremental backup
  • Differential backup
  • Mirror backup
252
Q

Explain:

Full backup

A
  • Backup of every file and folder in a system
  • More time consuming and requires sufficient space for all of the data
  • Faster when restoring lost data
  • More robust and reliable than alternatives
  • Only suitable if there is large changes to data on a regular basis
253
Q

Explain:

Incremental backup

A
  • After creating full backup, only backup data that has changed since last backup
  • Use less storage than full backups but use additional resources/compute to compare states of backups/data
  • More time consuming to restore data from an incremental backup than full backup because it has to analyse the data within the backup to establish the timestamp for when data changed - several incremental backups may be required to restore data
254
Q

Explain:

Differential backup

A
  • Data initially does full backup
  • Then will only backup the data that has changed since last full backup
  • Easier to recover data as only requires full backup and most recent differential backup
255
Q

Explain:

Mirror backup

A
  • It is only a backup of the data, but entire system (OS, applications, configs)
  • If hard drive fails, new HDD can be installed and mirror backup taken from the failed drive and can be restored onto new hard drive
  • Faster than other backup types and create a ‘clean’ copy without old or outdated files and folders
256
Q

State:

4 ways that device hardening can be done

A

4 of;
* Disabling unused network ports
* Strict password management and file permissions
* Using multi-factor authentication using hardware tokens as well as passwords on networks
* Updating computer systems with security patches as they become available
* Removing all non-essential services and programs
* Setting time limits on access - can be frustrating for the user to be locked out after a short period of time because they have eg: answered a phone call

257
Q

Fill The Blank:

Device ……………………. is the methodss or processes used to eradicate any means of attack

A

Hardening

258
Q

Fill The Blank:

Careful ……………. has to take place when implementing device hardening - the implications to workflow and productivity must be considered as well as the protential for reducing the …………. surface areas of the system

A

Planning, Attack