Network Flashcards

1
Q

define MAC

A

MAC stands for Media Access Control and is a unique serial number assigned to eachnetwork interface controller (NIC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How are devices identified on a network

A
  • Internet protocol
  • MAC address
  • Device name
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The role of IP

A

It has a unique address that networked devices use to send data to each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The versions of IP

A
  • IPv4
  • IPv6
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Components of a wired network

A
  • Switch
  • Router
  • Server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a wireless access point

A

A wireless access point allows devices with Wi-Fi connectivity to connect to a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

roles of a router

A

It stores the addresses of all devices that are connected to it so that it can foward network traffic to its destination using the quickest route.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

roles of a server

A

Shares data as well as to share resources and distribute work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

define ISP

A

ISP or Internet Service Protocol, is used to connect to the internet but users need to subscribe to an ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

role of a web browser

A

A web browser is a type of software application used to request and display information stored on web servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

functions of a search engine in regards to information retrieval

A

Search engine helps users retrieve information on a wide variety of valuable topics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

role of filter software in user safety

A

The filtering software monitors and manages the locations where users are browsing on the Internet which allows the organisation to allow or block web traffic to protect users from threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

define client server network

A

A network that uses servers and clients is called a client-server network.
A client is a computer connected to a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

define peer to peer network

A

Peer to peer networks share their resources with other computers in the network, but they don’t have access to servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the role of servers in client server network

A

The server connects all of the other computers in the network by acting as a hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

benefits of using LAN

A
  • Access to shared peripherals
  • Access to shared storage and data
  • Shared access to the internet
  • Media streaming
17
Q

drawbacks of LAN

A
  • limited geographical range
  • data sharing via outside resources.
18
Q

define firewall

A

A firewall is used a t a gateway to a network and controls the network traffic to and from a network.

19
Q

purpose of WEP/WPA in wireless networks

A
20
Q

what is encryption

A

Encryption is the process of encoding, scrambling or jumbling data so unauthorized users are prevented from being able to understand it.

21
Q

what is the role of a VPN

A

It protects its users by encrypting their data and masking their IP address, leaving their browsing history and location untraceable.

22
Q

how does file access rights contribute to data protection

A

It allows organizations or individuals to determine who has access to certain files and folders, ensuring that only authorized individuals can view and download sensitive information.

23
Q

importance of backups and data recovery

A

It keeps a copy of one or more files incase the file is lost.

24
Q

difference between public key encryption and symmetric key encryption

A

public key encryption uses two different keys, one to encrypt and the other to decrypt

25
Q

which security device controls traffic in a network

A

firewall

26
Q

why is a booster used in a network

A

to amplify the signal in a network to extend its range