computer networks, connections and protocols Flashcards

1
Q

what are the advantages of networking

A
  • users can share files
  • users can share peripherals
  • users can access their files from any computer on the network
  • servers can control security, software updates and backup of data
  • commutation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is LAN

A

local area network
- covers a small geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is WAN

A

wide area network
- covers a large geographical area, connecting LANs together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the disadvantages of networking

A
  • increased security risk to data
  • malware and viruses spread quicker
  • if a server fails, the computers connected to it may not work
  • computer may run more slowly if there is a lot of data travelling on the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a network

A

two or more devices that are connected together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a sever

A

a computer that manages and stores files, or one that provides services to other computers on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a client

A

a computer that relies on other computers (servers) to provide and manage data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the client-server model

A

when the computers in the network are dependant on a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the advantages to the client-server model

A
  • easier to manage security files
  • easier to take backups of all shared data
  • easier to install software updates to all computers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the disadvantages of the client-server model

A
  • can be expensive to setup and maintain
  • requires IT specialists to maintain
  • the server is a single point of failure
  • users will lose access if the sever fails
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the peer-to-peer model

A

where a peer is a computer on a network, and it is equal to all other peers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does each peer in a network usually do (peer to peer model)

A
  • serve their own files
  • responsible for its own security
  • responsible for its own backup
  • usually have their own printer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the advantages to the peer-to-peer model

A
  • easy to maintain
  • no need for specialist staff
  • no dependency on a single computer
  • cheaper to set up
  • no expensive hardware required
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are the disadvantages to the peer-to-peer model

A
  • the network is less secure
  • users will need to manage their own backup
  • can be difficult to maintain a well ordered file store
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is bandwidth

A

the amount of data the can be sent and received successfully in a given time
- measured in bits per second, often called bit rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is meant by transmission media

A

the media in which data signals are carried

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is latency

A

the delay from transmitting data to receiving it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what factors affect the performance of networks

A
  • bandwidth
  • number of users
  • transmission media
  • error rate
  • latency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what hardware is required to connect a LAN

A
  • a NIC
  • a switch
  • a router
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is NIC

A

network interface controller
- provide a method of connecting to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is the most common transmission medium in modern network

A

fibre-optic cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is a switch

A

a device which sends data between computers on a LAN
- receive data in frames and transmits this data to the another device on the network using the correct MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is a router

A

sends data between networks
- creates a WAN from a number of LANs
- uses IP address to route traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is the internet

A

the most widely known WAN
- simple a collection of interconnected networks across the world

21
Q

what do web servers do

A

store and maintain web content which is downloaded upon request to client computers

22
Q

what is hosting

A

storing files and data on a web server, the web server is referred to as a host

23
Q

what is URL

A

uniform resource locator
- includes the host name

24
Q

what is a DNS

A

domain name servers
- translates a domain name into an internet address

25
Q

why do we use domain names

A

network addresses are difficult to remember so instead we use simpler domain names

26
Q

what is the cloud

A

a generic term for remotely accessed storage

27
Q

what are the advantages of the cloud

A
  • access data at any time
  • access data anywhere
  • access from any device
  • large storage capacity
  • automatic backup
  • easy online collaboration
28
Q

what is the star network topology

A

all devices are connected into the central switch which is intelligent and makes sure traffic only goes where it is intended

29
Q

what is a mesh network topology

A

every device is connected to every other device

30
Q

what are the different modes of connection

A
  • ethernet
  • wi-fi
  • bluetooth
31
Q

which topologies typically use ethernet.

A

star and mesh

32
Q

what are the advantages of wireless networks

A
  • avoids the need to install cables
  • portable connection
33
Q

what are the disadvantages of wireless networks

A
  • bandwidth is lower than a wired connection
  • security is more of a problem than with the wired connections
34
Q

when is Bluetooth ideal use

A

when connecting personal devices

35
Q

how are wireless networks identified

A

by a unique SSID

36
Q

how do wireless networks encrypt data

A

by scrambling the data into cipher text using a ‘master key’

37
Q

what are MAC addresses used to do

A

route frames on a local area network

37
Q

what is an IP address

A

a unique number which is used to address/identify a host computer or node which communicated over IP on the internet

38
Q

what is IPv4 format

A

4 numbers separated by periods
- 4 8 bit numbers

39
Q

give examples of standards

A
  • character sets
  • HTML (for displaying of webpages)
40
Q

what is a protocol

A

a set of standards, agreed rules which allow two devices to communicate

41
Q

what are standards

A

set specifications for hardware and software

42
Q

which two protocols are used together to create the foundation of communication over the internet

A
  • transmission control protocol (TCP) = provides an error free transmission between two routers
  • internet protocol (IP) = routes packets across wide area network
43
Q

what is HTTP

A

hypertext transfer protocol is a way for a client and server to send and receive requests and to deliver HTML web pages

44
Q

what is HTTPS

A

hypertext transfer protocol secure is effectively the same as HTTP except it adds encryption and authentication

45
Q

what is SMTP

A

simple mail transfer protocol = transfers outgoing emails from one server to another / from a email client to server

46
Q

what is POP

A

post office protocol = retrieves emails from a mail server and then removes it from the server and transfer it to your device

47
Q

what is IMAP

A

internet message access protocol = same as POP except it keeps the email on the mail server allowing synchronicity between devices

48
Q

what is the concept of layering

A

a layer is a group of protocols which have similar functions
- layers breaks network connection into manageable pieces which are self-contained

49
Q

what different forms can attacks come in

A
  • passive attack, monitoring data travelling on a network and intercepts sensitive information
  • active attack, attacking a network with malware or another planned attack
  • brute force attack, cracking passwords through combinations
  • denial of service attack - trying to stop users from accessing a part of a network or website
50
Q

what are the different types of malware actions

A
  • deleting or modifying files
  • scareware
  • locking files
  • spyware
  • viruses
  • worms
  • trojans
51
Q

what is social engineering

A

a way of gaining sensitive information or illegal access to network by influencing people

52
Q

what is an SLQ injections

A

pieces of SQL typed into a website’s input box which then reveals sensitive information

53
Q

how can you counteract network security threats

A
  • penetration testing
  • physical attacks
  • passwords
  • user access levels
  • anti-malware software
  • encryption