Finals Flashcards

1
Q

Function of Switch

A

connects devices in a LAN network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Function of Firewall

A

permits or denies network traffic based on policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Function of wireless router

A

used to connect a network to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Function of server

A

is used to store resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Difference between a firewall and switch

A

firewall is a security device or software that is used to protect or secure networks

switch is used to connect devices in a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of data transmission modes

A
  • Simplex
  • Half duplex
  • Full duplex
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Simplex

A
  • communication is unidirectional.
  • only one of the two devices on a link cam transmit, the other can only receive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Half duplex

A
  • each station can both transmit and receive, but not at the same time
  • when one device is sending, the other can only receive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Full duplex

A
  • both stations can transmit and receive simultaneously
  • signals going in one direction share the capacity of the link with signals going in another direction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VLAN

A
  • allows one to separate users into separate broadcast domains
  • VLANS improves security, segmentation and flexibility. Each VLAN on a switch behaves as if it is a separate physical bridge
  • the switch forwards packets only to ports assigned in the same VLAN
  • This reduces network traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

User acceptance testing

A
  • one of the last stages of the software development life cycle. It is sometimes known as end user testing
  • is conducted on a product by the end users of the product for approval for production release
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OSI (open systems inteconnection) layer

A
  • Application layer
  • Presentation layer
  • Session layer
  • Transport layer
  • Network layer
  • Data link layer
  • Physical layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TCP (transmission control protocol) layer

A
  • Network access layer
  • Internet layer
  • Transport layer
  • Application layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OSI layer characteristics

A
  • Has seven layers
  • The physical and data link layers are separate layers
  • The network layer specifies routing and logical addressing functions
  • Follows a vertical approach
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TCP layer characteristics

A
  • It has four layers
  • OSI layers 1 and 2 layers maps to the TCP network access layer
  • The network layer becomes the internet layer
  • Follows horizontal approach
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Different types of cabling

A
  • Single mode fibre optic cabling
  • Multimode fibre optic cable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Characteristics of fibre optic cable

A
  • allows multiple beams of light to pass through
  • has a larger core
  • mostly used in LANS
  • uses an LED as the light source
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Structure of a network security system

A
  • consists of three different controls namely physical network security
  • which is designed to prevent unauthorized personnel from gaining physical access to network components such as routers, cabling cupboards and so on
  • technical network security, which protect data that is stored on the network or which is in transmit across, into or out of the network
  • administrative network security, which consist of security policies and processes that control user behavior, including how users are authorized and authenticated and also restricts the data that each user can access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

User profiles on a network

A
  • Local user profile
  • Roaming user profile
  • Mandatory user profile
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Local user profile

A
  • created the first time that a user logs onto a computer
  • it is stored on a computer’s local hard disk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Roaming user profile

A
  • copy of the local profile is copied to and stored on a server share
  • this profile is downloaded every time that a user logs on to to any computer on the network and any changes made to a roaming user profile is synched with the server copy when you log off
22
Q

Mandatory user profile

A
  • type of profile that administrators can use to specify particular settings for users
  • only system admins can make changes to mandatory user profiles
23
Q

Access control

A
  • method of limiting access to a system or to physical or virtual resources
  • process by which users can access and are granted certain privileges to system resource and info
  • security technique that has control over who can view different aspects, what can be viewed and who can use resources in a computing environment
  • fundamental concept in security that reduces risk to the business or organisations
24
Q

Utility program

A

system software that helps users to analyse, configure, monitor or help maintain their computers

25
Q

Requirements for a networks

A

-must provide connections, communications and services

26
Q

Print queue

A
  • list of printer output jobs held in a reserved memory area.
  • maintains the most current status of all active and pending print jobs
27
Q

Network capacity planning

A
  • process of planning a network for utilization, bandwidth, operations, availability and other network capacity constraints
  • type of network management process that assists network admins in planning for network infrastructure and operations in line with current and future operations
28
Q

Baselines for a computer network

A
  • data transmission rate
  • how much is the network used
  • number of lost packets
29
Q

Packet switching

A
  • breaks data messages into packets, which are sent at the same time across available circuits between the source and destination device
  • packet switching does not set up a circuit between communication devices
30
Q

Action to take for:
Unauthorized attempts to access systems or data

A
  • encrypt sensitive corporate data at rest or as it travels over a network using suitable software or hardware tech
  • that way attackers will not be able to access confidential data
31
Q

Action to take for:
Insider threat

A

implement employee monitoring software to reduce the risk of data breaches and the theft of intellectual property by identifying careless, disgruntled or malicious insiders

32
Q

Action to take for:
Phishing attack

A
  • defend against phishing attacks starts by educating users to identify phishing messages
  • a gateway email filter can trap many mass targeted phishing emails and reduce the number of phishing emails that reach users’ inboxes
33
Q

Multiplexing

A
  • divides a communication channel into several logical channels allowing each one to send a different message signal or transfer data
  • the device that does multiplexing is called a MUX
  • the device that reverses the processes which is demultiplexing is called a DEMUX
34
Q

Two types of ACL’s

A
  • Standard ACL
  • Extended ACL
35
Q

types of LAN media

A
  • Fibre optic cable
  • Coaxial cable
  • Twisted pair cable
  • Unshielded twisted pair cable
  • Shielded twisted pair cable
36
Q

NIC (network interface card)

A
  • hardware that allows a PC to connect a network
  • this network is a cabled/ wired network
37
Q

USB network adapter

A

allows a PC or laptop to connect to a network wirelessly

38
Q

Asynchronous data transmission

A

occurs when data is transmitted over a medium in bursts using a start and end bit

39
Q

Synchronous data transmission

A

data transfer method where a continuous stream of data signals is accompanied by regular timing signals

40
Q

Cause of problem

A
  • Two computers on the network are configured with the same IP address or are trying to use the same IP address
  • Sometimes if a computer is configured with a static IP on the network, and a DHCP server try to assign the same IP address to another PC causing a conflict in IP addresses
41
Q

How to solve problem

A
  • manually configure the PC with a different IP address
  • disable and then re enable the network adapter
  • release and renew the IP address
  • Update the network card driver
42
Q

Benefits of networking monitoring tools

A
  • Cost effectiveness: if the network fails it will result in the business losing profits
  • Better security: monitoring enables the admin to catch unwanted malware and viruses
  • Increased productivity: monitors the current hardware and software determining which device or equipment is faulty
  • Bandwidth utilization: track bandwidth usage and inform the admin network when bandwidth utilization is reaching critical levels
43
Q

Types of connectors that can be used with fibre optic cabling

A
  • Bionic connector
  • Standard connector
  • ST connector
  • SMA connector
44
Q

How to add wireless network to a wired network

A
  • connect the WAP to the router or switch using an Ethernet cable
  • connect wireless client to the wireless network that the WAP is broadcasting
  • on the computer access the web based utility of the WAP by launching a web browser and entering the IP address of the WAP in the address bar
  • in the authetication window, enter the usename and password of the WAP in the Username and Password fields respectively
  • Once logged in, in the navigation area, choose LAN > IPv4 Settings
  • Click a radio button to choose the connection type which should be DCHP to automatically assign IP addresses
    -click save
45
Q

command to save software on a server

A

xcopy d: . \server1softwareprogram . /s

46
Q

info that must be recorded after succesfully installing app

A
  • app name
    -installation date
47
Q

how to troubleshoot a wireless network

A
  • check the WIFI settings and make sure it is turned on
  • check the Ethernet cables to and from the router
  • Restart the wireless router
  • Check if the username and password is correct
48
Q

network maintenance tasks

A
  • Installing, replacing or upgrading hardware and software
  • Documenting the network and maintaining network documentation
  • Securing the network from internal and external threats
  • Troubleshooting reported problems
49
Q

ATM

A
  • packet switching protocol that enables encoding of data traffic into small predetermined sized cells
  • this protocol is based on connection oriented tech
  • operates by establishing between two end points in a virtual circuit before exchange of data commences
  • protocol suite of ATM sets up a mechanism to route traffic on a data stream
50
Q

Types of backup

A
  • Full backup
  • Incremental backup
  • Differential backup
  • Mirroring