Networking - Computer Science Flashcards
What does LAN stand for?
Local Area Network
What does WAN stand for?
Wide Area Network
Name three factors that affect the performance of networks.
- Bandwidth
- Latency
- Number of devices connected
Give two examples of network frameworks
- Client-server
- Peer-to-peer
List four hardware components needed to connect stand-alone computers into a Local Area Network.
- Wireless access points
- Routers
- Switches
- NIC (Network Interface Controller/Card)
What does DNS stand for?
Domain Name System
What is the purpose of hosting in the context of the Internet?
To store and serve websites and applications
What is the Cloud?
A worldwide collection of computer networks providing storage and services over the Internet
Give two examples of network topologies
- Star
- Mesh
What is a wired mode of connection?
Ethernet
What are three wireless modes of connection?
- Wi-Fi
- Bluetooth
- Sattelite
What is encryption?
A method of securing data by converting it into a coded format
What does IP stand for in networking?
Internet Protocol
What does MAC stand for in networking?
Media Access Control
Name three common protocols.
- TCP/IP
- HTTP
- FTP
- HTTPS
- POP
- IMAP
- SMTP
What does TCP stand for?
Transmission Control Protocol
What does HTTP stand for?
Hyper Text Transfer Protocol
What does HTTPS stand for?
Hyper Text Transfer Protocol Secure
What does FTP stand for?
File Transfer Protocol
What does POP stand for?
Post Office Protocol
What does IMAP stand for?
Internet Message Access Protocol
What does SMTP stand for?
Simple Mail Transfer Protocol
Define the TCP/ IP protocol stack.
- Consists of four layers that enable internet communication.
- This is a modular design with each layer being responsible for a small part of the communication process.
- Each layer is a self-contained area of network functionality
What is malware?
Malicious software designed to harm or exploit any programmable device
What is social engineering in the context of cybersecurity?
Manipulating individuals to divulge confidential information
What is phishing?
A form of social engineering aimed at acquiring sensitive information
What is a brute-force attack?
An attempt to crack a password or encryption key by trying all possible combinations
What is a denial of service attack?
An attack intended to make a machine or network resource unavailable to its intended users
What does SQL injection refer to?
A code injection technique that exploits security vulnerabilities in an application’s software
Name three common prevention methods in cybersecurity.
- Penetration testing
- Anti-malware software
- Firewalls
What is penetration testing?
A simulated cyber attack against a computer system to check for vulnerabilities
What role do user access levels play in network security?
They restrict access to resources based on user permissions
What is the purpose of using passwords in cybersecurity?
To authenticate users and protect access to systems and data
What is physical security in the context of cybersecurity?
Measures taken to protect physical assets from unauthorized access or damage
What is the purpose of the application layer in the TCP/ IP protocol stack and what protocols/ hardware operate here?
- Applications such as email clients and web browsers create data to send in this layer
- SMTP , FTP and HTTP operate in this layer
What is the purpose of the transport layer in the TCP/ IP protocol stack and what protocols/ hardware operate here?
- The transport layer creates the connection between two computers, or ‘hosts’
- Data is then divided up into packets and given a packet number
- Packets are reassembled by the recipient’s Transport layer
- Lost packets are resent
*TCP operates here
What is the purpose of the internet layer in the TCP/ IP protocol stack and what protocols/ hardware operate here?
- The Internet layer is responsible for routing packets
- Source and destination addresses are written on to the packets ready for transmission
- IP operates here
What is the purpose of the link layer in the TCP/ IP protocol stack and what protocols/ hardware operate here?
- Enables the transfer of packets between nodes on a network.
- Enables the transfer of packets between different networks.
- Ethernet & Wi-Fi operate on this layer.