Networks Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is a network?

A

two or more connected computing devices that can share data and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

true or false? the internet is a giant LAN

A

false - the internet is a giant WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does WAN stand for?

A

wide area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The ‘CGP School of Science’ building has 10 classrooms with computers. All of the computers are connected to one central network. Is this a LAN or a WAN?

A

LAN - all computers are in the same ‘local area’ as they are in the same building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why do companies usually hire infrastructure when setting up a WAN?

A

WANs are expensive to set up, so hiring infrastructure can be cheaper and more practical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Devices on a LAN can share hardware like printers, scanners and speakers. Give 2 other benefits of connecting devices on a LAN (there’s actually 4 in the list)

A
  • Internet connection can be shared btw. devices
  • files can be shared easily, and can be worked on by multiple users at the same time
  • software can be installed and updated on all network machines at the same time
  • users can log in from any device on the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An international complany has an office in NY and London. Explain how they can use LANs and WANs to connect all their computers in one network.

A

each office sets up a LAN connecting all devices at that site, the 2 LANs connected via WAN, so both offices are connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does WAP stand for?

A

Wireless access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which piece of hardware manages the transfer of data between devices on a LAN?

A

switch (or hub)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of these is a type of network cable?
Connector, coaxial, covalent

A

coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the purpose of a network interface controller

A

piece of hardware inside a computer that allows it to connect to a network, also has a unique identifier called a MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fibre optic cables are high-performance and do not suffer much from outside interference. However, Ethernet cables, which have lower performance, are still very popular. Suggest one reason why this is the case

A

Ethernet are much cheaper and don’t suffer too badly from outside interference over short distances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Casta networks are developing the HubBanjo, which is a router, a switch and a WAP all in one. During testing, computers could connect wirelessly and share files, but could not connect to the Internet. Explain which parts of the HubBanjo are faulty

A

the router is faulty as computers cannot connect to the Internet
(switch and WAP must be working as the computers can connect wirelessly and share files)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Ethernet?

A

family of network protocols used for wired connections between devices on a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the bandwidth of a network?

A

the amount of data that can be transferred over a network in a given time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In general, which type of wireless technology has a larger connection range; Bluetooth or WiFi?

A

Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Give 2 factors that can affect the bandwidth available to a device on a wired network (there’s actually 5)

A
  • types of cables used
  • types of hardware used
  • network topology
  • number of other devices accessing the network
  • the activity of other devices on the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the advantages of using a wired network rather than a wireless network?

A

wired networks are generally more reliable, have higher bandwidth and are more secure than wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Tamal is deciding whether to have a wired or wireless LAN in his office. The office is a small open room made up of lots of scattered desks. Suggest 2 reasons for having a wireless LAN (there’s 3, sorry pookie, I hate to lie to u)

A
  • open room means there’s little risk of interference from physical obstructions
  • wired LAN requires lots of cables, which could be unsafe/expensive
  • over small distance, the wireless signal should be strong enough
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Describe the roles of the clients and the server in a C-S network

A

clients send requests for resources or services to the server
server processes the requests and responds to the clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

T/F; in a P2P network, files are stored on individual devices

A

true - devices on a P2P network can store and share files without a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Describe 1 security measure that could be used to manage network security on a client-server network

A

they only gave 2 examples but literally use ur common sense, it’s computer science
- user access levels
- passwords
both to restrict or prevent access to info stored on server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A group of 4 anti-celery activists are deciding which type of network to install in their new office, give 2 (i mean 3) benefits of the activists installing a P2P network

A
  • a P2P will be easier to maintain
  • may be cheaper, won’t need to buy expensive server
  • network won’t be dependent on any one device (like a server)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Explain why it is easier to carry out backups on a C-S network than on a P2P network

A

in C-S, all data is stored on the server, so backing up all data requires backup of the server
in P2P, data is stored on the machines themselves, so to backup all data, you need to do a backup of every machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How are devices connected in a star topology?

A

every device is directly connected to a central device that controls that network

26
Q

Dodgy Dan has lots of old computers that he wants to connect in a network, though each computer has a high chance of randomly exploding. Suggest why a full mesh may be appropriate for Dan’s network

A

a full mesh means if a computer explodes, there would always be a different route that data could be sent along to reach the destination device

27
Q

Explain the benefits of using wireless connections for a mesh network

A

using wireless connections may be cheaper, as you wouldn’t need to buy cables to connect all of the devices
also, any new devices could connect to the network easily without needing to set up any wiring

28
Q

Give one advantage and one disadvantage of using a star topology rather than a mesh topology for a wired network

A

advantages:
- can be easier to add more devices to the network
- devices do not have to waste processing power transmitting data for other devices
disadvantages:
- if a wire is damaged/broken, a computer could lose access to the network, whereas there could be another route for the data on a mesh network
- if there’s a problem with the switch/server, the entire network goes down

29
Q

What are network protocols?

A

sets of rules for how devices communicate and how data is transmitted across a network

30
Q

Network protocols are grouped int layers, what is a layer?

A

a group of protocols that have similar network functionality

31
Q

When a government website is accessed, all info sent and received is encrypted, which protocol is being used?

A

HTTPS

32
Q

POP3 and IMAP are both protocols that are used to retrieve emails from a server, explain the difference between how the 2 protocols work

A

POP3 deletes email from server as soon as you download it, IMAP keeps email on server until you delete it

33
Q

Give 2 advantages of using layers in network protocols

A
  • network communication is broken into more manageable pieces
  • having rules for each layer encourages people to make universal hardware and software
  • each layer is self-contained, so a layer can be changed without affecting any others
34
Q

Alex downloads a PDF from his company’s server that directs him to a useful website. After viewing the website, he sends an email to his colleagues to tell them about it, suggest 3 network protocols Alex may have used and explain how each was used

A

FTP to download PDF, HTTP(S) to access website, SMTP to send email
may have used TCP and IP to send across network

35
Q

What are URLs?

A

web addresses used to access web servers and the resources stored on them

36
Q

What does file hosting mean?

A

when a business uses its servers to store another organisation’s files

37
Q

T/F; the cloud can provide increased computing power

A

true - the could can also offer data storage and access to applications

38
Q

Explain the role of a DNS

A

a domain name server turns a website’s domain name into an IP address, allowing users to access the website using the domain name, rather than having to know the IP address

39
Q

Give a benefit of using cloud applications

A

cloud applications are run on powerful servers, so users can access demanding applications with a computer that has low spec hardware

40
Q

A blogger is thinking about using the cloud to store the photos that she takes while travelling around the world. Give a benefit and a drawback of using cloud storage to save her photos

A

cloud storage can provide lots of storage space at a low cost, and she won’t have to carry around any extra hardware
but, if she visits places with poor internet access, it might be difficult for her to upload her photos to the cloud storage

41
Q

What is meant by an active attack?

A

when someone uses malware or other direct methods to attack a network

42
Q

An employee exploits their security clearance to steal information from the company, which type of attack is this an example of?

A

insider attack

43
Q

Suggest how to protect a network from data interception

A

encrypt the data sent over the networks

44
Q

Describe how a denial of service attack works

A

a network (or website) is flooded with useless traffic, making the network extremely slow or inaccessible to users

45
Q

A hacker has written a program called “madhax.exe” that can automatically input data into a website. Describe how this program could be used to carry out a brute force attack on a website that requires user to log into their private accounts

A

the program could be used to try lots of potential username and password combinations very quickly. sooner or later, this could come across a valid combination, giving the hacker access to that user account

46
Q

A company develops a new piece of software that can monitor and record data packets being sent across a network, explain an ethical issue with developing this type of technology

A
  • software could be used by the government to intercept information about illegal activities, though the public may see this as an invasion of privacy
  • creating the software means its possible that criminals could use it to access sensitive information as it is being sent across a network
47
Q

viruses, worms and trojans are all types of malware. What is malware?

A

harmful software that’s installed on someone’s device without their knowledge

48
Q

What is meant by the term ‘social engineering’?

A

gaining sensitive information or illegal access to networks by influencing people

49
Q

What is phishing?

A

sending emails pretending to be from well-known businesses, asking for personal details

50
Q

Outline how SQL injections can be used to gain unauthorised access to a database

A

weak input validation is exploited by entering something that changes the SQL statement

51
Q

How can a business reduce the risks of phishing?

A

filtering suspicious emails, blocking links to untrusted websites and educating staff about phishing scams

52
Q

Suggest how malware cold be used to exploit a user into giving money to a hacker

A
  • using malware to encrypt the user’s files and demanding money in exchange for a decryption key to be sent
  • using malware to redirect a user to a fake version of a website they trust, then trick them into sending money to the hacker
53
Q

Identify 2 weaknesses in the following network security rules:
- update the firewall every five years
- give admin privileges to all users so they can fix themselves

A

the firewall should be updated more frequently that once every five years
admin access shouldn’t be given to everyone as it allows access to sensitive information

54
Q

Give 2 examples of software that can improve network security

A

anti-malware, spam filter, encryption utilities, firewalls

55
Q

What is needed to turn encrypted cipher text back into plain text?

A

the decryption key

56
Q

How can a company limit the number of staff with access to sensitive information?

A

create user access levels that restrict access to information

57
Q

What is the benefit of performing penetration testing?

A

potential weakness can be identified while there isn’t an actual threat, and fixed before a real attack takes place

58
Q

Siobhan uses the password ‘cat’, suggest how she could make it more secure

A

use more characters, a mixture of letters, numbers and symbols, user uppercase and lowercase letters

59
Q

Suggest 2 physical security measures that can improve network security

A
  • locks and passcodes can restrict access to certain areas like server rooms
  • surveillance equipment like cameras or motion sensors can deter intruders
60
Q

A company is having issues with people sneaking onto staff computers while they’re on their lunch, they decide to implement a procedure where users will need to enter their password every 5 minutes
evaluate this new procedure

A

the procedure will make it much harder for people to gain unauthorised access to staff computers, as computers that have been left unattended will only be useable for 5 minutes before the password is required, however re-entering the password so frequently will waste a lot of the staff’s time, and they will likely find it very annoying