networks Flashcards

1
Q

factors that affect the performance of networks:

A

-bandwidth
amount of data that can be sent and received in a given amount of time
measured in bits per sec, bit rate

-no. of users
too many users/ devices on same network can cause network to slow down if insufficient bandwidth for data

-transmission media
-error rate
-latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

how does error rate affect performance of networks
-connection
-signal quality of wireless and copper

A

-less reliable connections means more errors when data being transferred
-data has to be resent till correct arrival
-signal quality of wireless depends on interference and range of devices
-signal quality of copper cables depends on grade of material which reduces interference
-length of cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the internet

A

a global connection of interconnected networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

feature of LAN

A

-LAN
-small geographical are
-all hardware owned by the org that uses it
-found in businesses, schools, unis
-in home: printers, PCs, smart TVs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

benefits of LAN

A

-sharing files is easier
-share hardware (printer)
-internet connection can be shared
-can communicate with other LAN users cheaply and easily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

features of WAN

A

-wide area
-connects LANs that r in diff geo locations
-orgs hire infrastructure from telecom companies, WAN more expensive to set up than LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

hardware required to connect a LAN
-NETWORK INTERFACE CARD

A

-NETWORK INTERFACE CARD
-uses a protocol to determine how connection should work
-allow device to connect to wired or wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

hardware required to connect a LAN
-Wireless Access Point
(basically describe a wireless network)

A

-WAP
provides a link between wireless and wired networks
creates a wireless LAN that allows Wi-fi enable devices to connect to a wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

hardware required to connect a LAN
-SWITCH

A
  • the switch uses the NIC address on a device to route traffic
  • router sends data between networks
  • router needed to connect a LAN to a WAN
  • router uses the IP address on a device to route traffic to other routers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

copper and fibre optic cables
- connections between desktop computers and a switch are usually made w/ …………
- …………. are cheap and flexible which makes them easy to install
- longer distance networks and WAN are usually connected w/ ………….
- ………… has a higher bandwidth than ……… and suffers from less interference

A
  • connections between desktop computers and a switch are usually made w/ UNSHIELDED TWISTED PAIR (UTP) COPPER CABLES
  • COPPER CABLES are cheap and flexible which makes them easy to install
  • longer distance networks and WAN are usually connected w/ FIBRE OPTIC CABLES
  • FIBRE OPTIC has a higher bandwidth than COPPER and suffers from less interference
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

difference betw/ HUB and SWITCH

A

HUB: broadcasts messages to all devices on the network.
SWITCH: sends the message to the intended recipient only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

advantage and disadvantage of a full mesh network

A

ADVANTAGE:
- if you break any connection you can still route traffic via another route
DISADVANTAGE:
- lot more cabling and switch hardware required, adds to cost for large networking
-> can instead use partial mesh, lower amount of hardware needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

disadvantages of ethernet

A

-users location limited by the need for physical cable connections
-relies on lots of cables, connections , hardware = inc. in cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

features of bluetooth:

A

-ideal for connecting personal devices
-very short range, 10 meters
-very low power consumption compared to wi-fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ENCRYPTION
-wireless network …… data, so it must be ……. to be secure
-this is done by scrambling the data into ……… using a ‘master key’ created from the SSID of the network and the password

-data is then decrypted by the receiver using ……., so this key is not transmitted

A

-wireless network BROADCAST data, so it must be ENCRYPTED to be secure
-this is done by scrambling the data into CIPHER TEXT using a ‘master key’ created from the SSID of the network and the password

-data is then decrypted by the receiver using the same MASTER KEY, so this key is not transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MAC addressing is used to route

A

frames on a LAN
-each MAC address is unique to every network interface card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IP addressing is used to route

A

packets on a WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IPv4 VS IPv6

A

32 bits
128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

STANDARDS are a set of specifications for:
……. and ……..
w/o standards most devices wouldn’t be able to successfully communicate

A

-hardware
-software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is a protocol

A

a set of rules that allows two devices to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is TCP (transmission control protocol)

A

provides error free transmission between two routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what is IP (internet protocol)

A

routes packets across a WAN
(along with TCP, makes up the TCP/IP protocol stack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what is HTTP (hypertext transfer protocol)
and HTTPS (hypertext transfer protocol secure)

A

-a client-server method of requesting and delivering HTML web pages

HTTPS - used when sensitive information needs to be transferred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what is FTP (file transfer protocol)

A
  • used for sending files between a network usually on a WAN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what is POP (post office protocol)
- retrieves emails from a mail server - removes it from the server and transfers to your device
26
what is SMTP (simple mail transfer protocol)
- send emails to an email server
27
what is IMAP (internet message access protocol)
- used by mail clients to manage remote mailboxes and retrieve email from a mail server
28
what is the function of a switch
-connects devices on a LAN -receives data in frames from one device and transmits it to the device on the network w/ correct MAC address
29
what is the function of a router
transmits data between separate networks / across the Internet
30
what is the function of a WAP
allows devices to connect to a LAN wirelessly
31
what is a p2p network
group of devices connected to share data with each other - every device is equal in status -connected w/o a server
32
what is a client server network
group of devices connected to a central server/ comp - which manages the clients and stores files centrally
33
different forms of attack
-malware -phishing -brute force -denial of service -data interception and theft -SQL injection
34
what is malware
software which is specifically designed to disrupt, damage or gain unauthorized access to a computer system
35
what is phishing
sending emails pretending to be reputable companies in order to incite peeps to reveal personal info
36
what is brute force attack
trial and error method of attempting passwords and pin numbers automated software is used to generate a larger number of consecutive guesses
37
What is denial of service attack
flooding the server with useless traffic causing the server to become overloaded and unavailable
38
what is data interception and theft
act of stealing info from unknown victim with intent of compromising privacy / obtaining confidential information
39
what is SQL injection
-technique used to view or change data in a database -by inserting additional code into a text input box -creating a different set string
40
how does a client server network work
-clients make requests to a server The server manages that request and response
41
how does a P2P network work
data is shared directly between systems without requiring a central server each computer is equally responsible for providing data
42
advantages of a star topology
advantages - improved security because data packets are sent directly from the hub/switch to the specific node - systems can be directly attached to the central system without causing network failure - transfer speeds are generally fast as there are minimal network collisions
43
factors that affects performance of a network
- bandwidth - no. of users at the same time - no. of data collisions - interference - amount of data to transfer - server / CPU performance
44
what is the internet
a global network of interconnected networks
45
what is a DNS
a DNS server stores a list of domain names and a list of corresponding IP addresses where the website is stored
46
what is a network protocol
network protocols defines standards for data transmission
47
how to prevent malware
Have a strong security software: - firewall - spam filter - anti-virus - anti-spyware - anti-malware - enabling OS and security software updates - staff training: careful to open email attachments and downloading software - backup files regularly onto removable media
48
how to prevent phishing
- spot fake emails and webs - don't disclose personal or corporate information - disabling browser pop-ups
49
How to prevent a brute force attack?
- Network lockout policy. - Using progressive delays. - Using effective passwords. - Using challenge response: I am not a robot and reCAPTCHA.
50
How to prevent a denial of service attack?
- Strong Firewall. - Packet filters on routers. - Configuring the Web Server.
51
How to prevent data interception and theft?
- Encryption. - Using virtual networks. - Strong passwords. Locking computers, logging off. - Investigating your own network for vulnerabilities.
52
How to prevent SQL injection?
- Validation on input boxes. - Setting database permissions. - Penetration testing.
53
Seven common prevention methods.
- Penetration testing. - Anti-malware software. - Firewalls. - User access levels. - Passwords. - Encryption. - Physical security.
54
How to prevent data interception?
Encryption.
55
MAC addresses are ... or ... bit binary numbers
48 or 64, converted into hexadecimal
56
features of static IP
-permanent, very expensive -used to connect printers on a LAN, and for hosting webs on the Internet
57
features of dynamic IP
-assigned to device by network server -diff IP every time you log on to network -cost effective, can be reused -used by Internet Service Providers
58
one advantage of using layers in network protocols
-self contained so allows different developers to concentrate on one aspect of the network -a layer can be taken out and edited w/o affecting other layers promotes interoperability betw/ vendors and systems
59
what is meant by a protocol
a division of network functionality
60
what is a WAN
-the computers are geographically remote/ more than 1 mile apart
61
What is the meaning of directories?
A directory is a unique type of file that contains only the information needed to access files or other directories. As a result, a directory occupies less space than other types of files.
62
prevention for pharming
check to see website is valid
63
prevention for DOS attack
use of proxy server/ firewall
64
prevention for hardware failure/ loss
backup
65
what hardware do you need to connect to the internet
ROUTER/ MODEM
66
drawbacks to cloud storage
* Cannot access files if no Internet access * Not in control of security * …data may be hacked/stolen * May cost monthly fee * if cloud storage fails you have lost your data * May be issues as to who owns the data * If login details are forgotten/lost may not have access to files
67
advantages of cloud storage
* Can access files from any device * Can access files from anywhere // with access to the Internet * Security may be higher than at home * May be free of cost * Easier/quicker to share files with others * More available storage space on her device * Easier to increase storage capacity (not memory) * Can be used a backup in case of data loss
68
examples of utility software
-backup -encryption -compression -defragmentation
69
the OS provides a user ...... allows user to interact with the .......
-interface -hardware
70
purpose of ROM
-stores BIOS -stores data that should not be changed/ that needs to be retained when power off -boot-up instructions -stores firmware/ OS
71
explain how a URL is converted to IP address
* URL sent to DNS * DNS looks up IP in its database * DNS returns IP * IF not found, DNS sends to higher level DNS
72
what is the purpose of defragmentation software?
-collates free space together -collates file X together (all same files together) -reduces movement of read/write disk across disk, speeds up file access -SSD shouldn't be defrag'd -as no moving parts and would reduce their lifespan
73
Features of Open Source software:
-users can modify and distribute software -support provided by community (may not be fully tested) -can be installed of any num. of computers -users have access to Source Code
74
Features of Propriety software:
-users can't modify/distribute (Protected by Copyrights Design & Patents act) -supported by developers (tested by developers prior to release) -usually paid for and licensed per user per computer -users no access to source code