Networks Flashcards

1
Q

what are some common network devices?
(state)

A

Network interface card (NIC)
Hubs
Switches
Bridge
Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is a Network interface card (NIC)?
(define)

A

*These are needed to allow a device(PC) to connect to a network.
*Turns binary data into an electrical signal that allows network access.
*Usually integrated into the motherboard.
*have unique Media access control (MAC) a 6 figure serial number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a hub?
(define)

A
  • it is a hardware device that connects multiple devices to form a Local Area Network (LAN)
    *HUBS are ‘dumb’ only being able to allow one device to transmit a message at a time
  • it sends it to the whole LAN instead of just the intended device
    this causes alots of traffic
    *hubs are rarely used nowadays
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are switches?
(define)

A

*Intelligent hubs
*They read the MAC address to send to the intended device
*which reduce traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a Bridge?
(define)

A

*main purpose is to connect (the different segments) LANs to other LANs that use the same protocol.
*improving security as they seperate the different LANs (segments)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are Routers?
(define)

A

*A device that connects different types of network (different protocols) together
*creating Wide Area Network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can Routers be used for?

A

connecting devices to the Internet
storing the devices address (IP Address)
routing data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is IN a packet?

A

it consists of three parts
- Header
- Body: (also known as payload)
-Footer: (also known as the trailer) can also checks for errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is in the headers of a packet?

A

contains the address of the source and destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is in the body of a packet?

A

this contains the main message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is in the footer of a packet?

A

this informs the receiving device that it has reached the end of the packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

list the steps that a router goes through when routing

A
  1. splits the file into packets and Addresses them with the recipient’s IP address
  2. these packets are sent onto the network using cable or radio waves (wireless Network)
  3. it inspects the packet to find its destination and decides on most efficient route
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why does a router split the file

A

the transmission of a large file will take up a lot of the bandwidth causing for a slow network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is LAN

A

Local Area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is LAN made up of?

A

Local area network is made up mostly of Hubs and switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

where is Local Area Network used mostly?

A

Local area Networks are normally used in small areas like a home or a company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what are some advantages of using LAN?

A

Allows for a more centralized management of updates, backups and software installations
can be come more secure with the use of firewalls
Allows the users on the LAN to share resources like printers etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some disadvantages of using LAN?

A

-Possible failure due to hardware failure
-accessing data can be slow as the network traffic would be quite high
-require a lot of maintenance for the LAN to be up to date
-prone to get attacked by standalone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

WLAN

A

wireless local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is WLAN

A

it allow devices to connect to the LAN with out needing a physical cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what are some advantages of using WLAN

A

-Allows users to connect anywhere in the range of a Wireless Access Point (WAP).
-They can be used in various indoor and outdoor environments, making them highly flexible.
-As the requirements change, additional WAPs can be added relatively easily.
-Printer access can be given to wireless devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are some disadvantage of WLAN

A

-The strength of their signals can be affected by obstacles such as walls.
-Speeds can be affected by high-traffic areas.
-It can sustain interference from other devices which can affect performance and connectivity.
-Can be vulnerable to security threats due to signal interception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

WAN

A

Wide Area Network

24
Q

what is WAN

A

WAN is created from other LANs that connect to the each other, more expensive however it comes with more security
uses routers, modems

25
Q

what are some advantages of WAN

A

-provides the ability to connect geographically dispersed locations
-Offer the flexibility to scale up or down based on the organisation’s needs
-admissions can monitor and manage the network infrastructure from a single location.

26
Q

what are some disadvantages of WAN

A

-Settings up and maintaining a WAN can be expensive
-Cover larger distances and rely on public networks or leased lines

27
Q

difference and similarities between Bluetooth and Wifi

A

-Bluetooth uses a transmission frequency of 2.4 GHz, whereas Wi-Fi uses a 2.4 – 5.0 GHz range.
- wifi transfers data faster
- wifi has a larger range
- Bluetooth only allows 7 devices to connect at once
- wifi can have many devices connected at once

28
Q

what are the three types of cloud computing

A

Public cloud
private cloud
hybrid cloud

29
Q

what is a public cloud

A

The customer and the cloud storage provider are different companies.

30
Q

what is a private cloud

A

The customer and the cloud storage provider are a single organization.

31
Q

what is a hybrid cloud

A

Combines public and private cloud options and allows sensitive data to remain private while providing public cloud services for less sensitive information.

32
Q

what are advantages of cloud computing

A
  • Services can be scaled up or down according to changing requirements.
  • Cloud storage eliminates the need for a business to purchase expensive equipment for infrastructure and maintenance.
  • Readily available globally, allowing both remote working and data sharing.
  • Providers offer high levels of ensuring that services are always available.
  • A backup of the data from the cloud will allow full data recovery in case of incidents.
  • Files can be synced across multiple devices.
  • There is no need to carry storage devices around.
33
Q

what are some disadvantage of cloud computing

A
  • A stable internet connection is always required.
  • Data storage in clouds may be vulnerable to security breaches.
  • The user depends on the storage provider for reliability and availability of services.
  • The services may become expensive as the amount of storage or bandwidth required increases.
34
Q

what is “internet”

A

-The Internet is a very large global network that consists of many other interconnected networks
-The World Wide Web is a vast collection of web pages that can be accessed using a web browser.
-The World Wide Web allows you to access information by using the internet

35
Q

what are some characteristic of internet

A

-It is an open network, meaning everyone can access the same resources and information as everybody else.
-People from all over the world can communicate with each other in real-time.
-Available to anyone who has a suitable device and access to any one of the interconnected networks.

36
Q

what are some uses of internet

A

Education and training
Social Networking
Online shopping
Entertainment

37
Q

what is “intranet”

A

-Usually private and are used to send information securely and safely.
-Access to an organisation’s Intranet is restricted and only accessible to authorised users such as employees.

38
Q

what are some characteristics of intranet

A

-A private network that is accessible to employees within a company or organization.
-Usually behind a firewall to ensure security.
-Allows for document sharing and the use of collaboration tools between users.
-It can be customized to meet the specific requirements of the business.
-Users will require a username and password to access the Intranet.

39
Q

what are some advantages of intranet over internet

A

-better bandwidth than the internet,
-data is kept within the organization,
-less chance of hacking and attacks,
-administrators can manage access to external sites and links.

40
Q

what is “extranet”

A

-Private Intranet that also allows access by selected parties that reside outside of the organization.
-These parties, for example, maybe customers, key stakeholders or clients.
-Users will have an authorization level once they have successfully logged in, which will determine which resources they may access.

41
Q

What are some similarities between Internet, intranet and extranet

A

-They are all web-based technologies
-They allow users to access information remotely
-They all use client-server architecture
-They all use security measures such as authentication and encryption
-They all promote and facilitate information and resource sharing

42
Q

what are some difference between Intranet, internet and extranet

A

-The internet is a global network, whereas an intranet/extranet is a private network contained within an organization
-The use of the internet covers a wide range of purposes, whereas an intranet/extranet is designed for specific users and purposes.
-Much information is publicly available, whereas an intranet/extranet is not.
-The Internet is not owned solely by one person or organization, whereas the organization usually owns intranets/extranets.

43
Q

hacking

A

Unauthorized access given to the computer

44
Q

Pharming

A

This is malicious code installed on a user’s computer or a web server; the code will redirect the user to a fake website without their knowledge (the user doesn’t have to take any action, unlike phishing).

45
Q

Phishing

A

involves getting sensitive information, such as usernames, passwords, and credit card details

46
Q

Viruses

A

Program code that replicates (copies itself) to delete or corrupt files and cause the computer to malfunction

47
Q

other authentication methods

A

zero login
Biometric Recognition
Magnetic Stripes:
Smart Cards
Physical Tokens
Electronic Tokens

48
Q

zero login

A

A security concept that eliminates traditional login methods, such as usernames and passwords, using biometrics or other authentication factors for seamless and password-less access

49
Q

Biometric Recognition

A

These authentication methods use unique physical or behavioural characteristics, such as fingerprints, iris scans, or voice recognition, to verify a person’s identity.

50
Q

Magnetic Stripes:

A

These are authentication features on cards storing data magnetically.
explanation- They enable secure identification and authorization by containing encoded information that magnetic stripe readers can read.

51
Q

Smart Cards

A

Smart cards are portable devices with integrated circuits to store and process data.
explanation- They are used for authentication, identification, and secure transactions in various applications such as banking, telecommunications, and access control.

52
Q

Physical Tokens

A

It is a type of authentication that takes the shape of a solid object.
explanation- The user demonstrates ownership of the token through interaction with a login system.
Physical tokens have embedded clocks that create one-time passwords (OTPs) when a PIN and other authentication information are entered.

53
Q

Electronic Tokens

A

are applications that users install on their hardware, such as smartphones.

explanation - To access a website, users must first authenticate themselves using electronic tokens. The user has already set up the electronic token app with their smartphone. The user launches the app on their smartphone when the website asks them to verify their identity. The program creates an OTP that is only good for a short period of time.

54
Q

Anti malware software

A

designed to protect devices against viruses and malicious software.
explanation - It has 3 primary purposes: detect, prevent and remove malicious software. It is installed onto a computer system and will operate in the background.

55
Q

Firewall

A

software or hardware that protect against unauthorized access
prevents users/ programs from using the internet
can block packets