Networking Flashcards

1
Q

What are some Authentication Methods?

A

Username and Passwords
Biometrics
Swipe Cards/Keys
Personal Details
Two factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the Health Records Act 2001cover?

Is it a state or federal law?

A

-Victorian Law
-Contains condition and laws to how and when an individual’s personal health data and info can be collected by Vic gov and private organisations that either offer health services or handle health records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Chapter 7: What are the two types of IDS’?

A

A Host Intrusion detection system (HIDS) and A Network Intrusion detection system (NIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Multi-factor authentication?

A

requires the user to provide two or more pieces of evidence to verify their identity to be able to complete a transaction online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define and describe an IPS

A

Intrusion Prevention Systems - contains the functionality of an IDS, but also attempts to stop and block threats without the need for human intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are security threats?

A

Anything that would cause potential harm to data or information.
Loss, Theft, Damage and Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does WAN stand for?

A

Wide Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is multi-factor authentication?

A

Multi-Factor Authentication is a process that requires a user to provide two or more pieces of evidence of identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Chapter 7: What should a password include?

A

At least 8 characters
One UPPER case
One lower case
One symbol
No spaces
NOT be password
Same as username
Regularly be changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is packet switching?

A

When data is sent over the internet, TCP breaks it down into small packets, each packet is then sent over the internet. packets may take different routes to the same destination. IP identifies the most efficient route for each packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Chapter 7: What is an Intrusion Detection System? (IDS)

A

Monitors network traffic and aims to detect intrusions
Can be hardware or software based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Chapter 7: What is a Stand Alone Device?

A

A self contained device or system that can perform its function without the need of another device computer or connection it does not communicate with any other device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Blockchain?

A

The Blockchain is a collection of data records that is stored on multiple devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Psuedo Code ?

A

Represents steps of processing that will occur when the solution is implemented in plain english

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Chapter 7: What are some benefits of a network ?

A

Sharing Hardware
Sharing Data and Information
Sharing Software
Transferring funds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Privacy Act 1988?
Is it a state or Federal law?

A

-Federal Law
-Related to how personal data and info can be collected by Australian government and private organisations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

State and explain a function of a Network operating system.

A

Administration - adding, deleting and organizing users and performing maintenance tasks such as backups
File management - locating and transferring files
Device management - co-ordinating printing, record use, etc
Security - monitoring and when necessary restricting access

18
Q

What is Pseudo Code?

A

Logic processes written in plain English

19
Q

What is a microcontroller?

A

an integrated circuit that incorporates a processor, memory and input/output (I/O) controllers within one chip.

20
Q

Chapter 7: What are some examples of authentication methods.

A

Username and Passwords
Biometrics
Swipe Cards/Keys
Personal Details – DOB, Drivers Licenses, Medicare card, address or a combo
Two factor Authentication

21
Q

Describe a Personal Area Network

A

a network in which a a users individual devices are connected to each other

22
Q

List the 10 Privacy Principles

A

Collection, Use and Disclosure, Data quality, Data Security, Openness,
Access and corrections, Unique Identifiers, Anonymity, Transborder data flows, Sensitive information.

23
Q

List 3 types of Network Architecture

A

Peer to Peer
Client Server
Personal Area

24
Q

Describe a peer to peer network

A

each device shares information and data with other devices

25
Q

Explain how a router differs from a switch ?

A

Routers connect local devices to each other and the internet, while switches only connect devices locally.

26
Q

Explain credential management?

A

involves checking user credentials to determine whether they are who they claim to be ?

27
Q

Chapter 7: What is an Intrusion Prevention System (IPS)?

A

Is an extension of an IDS
IDS identifies issue and alerts people
IPS blocks the threat without the need for human intervention
May delete suspicious packets, reset network connections, block packets from particular locations.
Can be configured to follow a set of rules.

28
Q

What is a digital system?

A

Can consist of a single device, a collection of devices or a network.

Consists of Both Hardware and Software

29
Q

What does the HIDS and the NIDS do?

A

HIDS: Monitors data packets and sends an alert is it detects suspicious activity
NIDS: Monitors passing traffic and checks it against a library of known attacks

30
Q

List 3 key pieces of legislation that you should be aware of when working with user data?

A

Privacy Act 1988
Privacy and Data Protection Act 2014
Health Records Act 2001
Copyright Act 1968

31
Q

Ethics are?

A

beliefs, principles or standards that individuals, organisations or society have regarding acceptable behaviour

32
Q

Define and describe an IDS

A

Intrusion Detection System - is used to monitor network traffic in an attempt to detect intrusions

33
Q

Types of constraints that affect a digital solution:

A

Economic, Technical, Legal, Usability

34
Q

Chapter 7: What are the two types of Networks?

A

Local Area Network (LAN)
Wide Area Network (WAN)

35
Q

Define and explain the acronym TCP/IP

A

Transmission Control Protocol/Internet Protocol - is a set of rules that allow communication between two networked devices,

36
Q

What is a digital system used for?

A

Used to transform data into information, providing output to meet the user’s needs

37
Q

What is the Privacy and Data Protection Act 2014

Is it a State or Federal Act ?

A

-Victorian State Law
-Relates to how and when personal data and info can be collected by Vic Gov agencies, local councils…

38
Q

What does the Copyright Act 1968 cover?

Is it a state of federal law?

A

-Federal Law
-Contains conditions and rules related to copyright

39
Q

Define and explain the acronym IP

A

Internet Protocol - is a set of rules that are followed to allow devices to communicate over the internet

40
Q

Describe a client-server network

A

contains a server that provides data and services to client devices

41
Q

What are Access Rights?

A

Defines what areas or information a user has access to in a network.