Networking - Computer Science Flashcards

1
Q

What does LAN stand for?

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does WAN stand for?

A

Wide Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name three factors that affect the performance of networks.

A
  • Bandwidth
  • Latency
  • Number of devices connected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give two examples of network frameworks

A
  • Client-server
  • Peer-to-peer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List four hardware components needed to connect stand-alone computers into a Local Area Network.

A
  • Wireless access points
  • Routers
  • Switches
  • NIC (Network Interface Controller/Card)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does DNS stand for?

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of hosting in the context of the Internet?

A

To store and serve websites and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Cloud?

A

A worldwide collection of computer networks providing storage and services over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give two examples of network topologies

A
  • Star
  • Mesh
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a wired mode of connection?

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are three wireless modes of connection?

A
  • Wi-Fi
  • Bluetooth
  • Sattelite
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is encryption?

A

A method of securing data by converting it into a coded format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does IP stand for in networking?

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does MAC stand for in networking?

A

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name three common protocols.

A
  • TCP/IP
  • HTTP
  • FTP
  • HTTPS
  • POP
  • IMAP
  • SMTP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does TCP stand for?

A

Transmission Control Protocol

17
Q

What does HTTP stand for?

A

Hyper Text Transfer Protocol

18
Q

What does HTTPS stand for?

A

Hyper Text Transfer Protocol Secure

19
Q

What does FTP stand for?

A

File Transfer Protocol

20
Q

What does POP stand for?

A

Post Office Protocol

21
Q

What does IMAP stand for?

A

Internet Message Access Protocol

22
Q

What does SMTP stand for?

A

Simple Mail Transfer Protocol

23
Q

Define the TCP/ IP protocol stack.

A
  • Consists of four layers that enable internet communication.
  • This is a modular design with each layer being responsible for a small part of the communication process.
  • Each layer is a self-contained area of network functionality
24
Q

What is malware?

A

Malicious software designed to harm or exploit any programmable device

25
Q

What is social engineering in the context of cybersecurity?

A

Manipulating individuals to divulge confidential information

26
Q

What is phishing?

A

A form of social engineering aimed at acquiring sensitive information

27
Q

What is a brute-force attack?

A

An attempt to crack a password or encryption key by trying all possible combinations

28
Q

What is a denial of service attack?

A

An attack intended to make a machine or network resource unavailable to its intended users

29
Q

What does SQL injection refer to?

A

A code injection technique that exploits security vulnerabilities in an application’s software

30
Q

Name three common prevention methods in cybersecurity.

A
  • Penetration testing
  • Anti-malware software
  • Firewalls
31
Q

What is penetration testing?

A

A simulated cyber attack against a computer system to check for vulnerabilities

32
Q

What role do user access levels play in network security?

A

They restrict access to resources based on user permissions

33
Q

What is the purpose of using passwords in cybersecurity?

A

To authenticate users and protect access to systems and data

34
Q

What is physical security in the context of cybersecurity?

A

Measures taken to protect physical assets from unauthorized access or damage

35
Q

What is the purpose of the application layer in the TCP/ IP protocol stack and what protocols/ hardware operate here?

A
  • Applications such as email clients and web browsers create data to send in this layer
  • SMTP , FTP and HTTP operate in this layer
36
Q

What is the purpose of the transport layer in the TCP/ IP protocol stack and what protocols/ hardware operate here?

A
  • The transport layer creates the connection between two computers, or ‘hosts’
  • Data is then divided up into packets and given a packet number
  • Packets are reassembled by the recipient’s Transport layer
  • Lost packets are resent
    *TCP operates here
37
Q

What is the purpose of the internet layer in the TCP/ IP protocol stack and what protocols/ hardware operate here?

A
  • The Internet layer is responsible for routing packets
  • Source and destination addresses are written on to the packets ready for transmission
  • IP operates here
38
Q

What is the purpose of the link layer in the TCP/ IP protocol stack and what protocols/ hardware operate here?

A
  • Enables the transfer of packets between nodes on a network.
  • Enables the transfer of packets between different networks.
  • Ethernet & Wi-Fi operate on this layer.