Networks Flashcards

1
Q

Why do we connect computers in a network?

A
  1. To share data and software
  2. To share printers, hard drives and other hardware peripherals
  3. To enable people to communicate with each other using services such as email
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are properties of a LAN?

A
  1. Cover a small geographical area
  2. Managed by a local manager
  3. Owned by one person or an organisation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are properties of a WAN?

A
  1. Cover a large geographical area to connect networks to each other
  2. Managed by several different people
  3. Collective ownership
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How are computers addressed in the internet?

A

Most devices: Dynamic IP which changes each time they connect and reconnect to the internet
Routers and servers: Static IP which stays the same

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens when a web page is requested?

A
  1. The user types a URL, which gets sent to a DNS server asking for its corresponding IP address
  2. The DNS matches the URL to the IP address and sends it to the browser
  3. The browser then sends the page request to the web server holding the page data
  4. The server finds the correct files and sends them to the browser which is then displayed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does packet switching work?

A
  1. The sender’s file is broken up into packets
  2. The packets are directed to their destination by routers
  3. Packets take different routes across the network
  4. The receiving computer reassembles them in the correct order using information in the packet headers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a packet contain?

A
  1. Header
  2. Payload
  3. Footer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the packet header contain?

A
  1. Destination IP
  2. Source IP
  3. Packet number
  4. Checksum
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the properties of copper wires?

A
  1. Up to 100m range
  2. Up to 10Gbps bandwidth
  3. Susceptible to electrical interference
  4. Used to connect devices in a LAN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the properties of fibre-optic cables?

A
  1. Up to 80km in range
  2. Up to 100Gbps bandwidth
  3. Immune to electrical interference
  4. Used for long distance data traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are properties of Wi-Fi?

A
  1. Up to 100m range, but physical objects obstruct signal
  2. High power consumption
  3. Used to connect LANs and connect devices to the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are properties of bluetooth?

A
  1. Up to 10m range
  2. Low power consumption
  3. Used to pair devices over short distances
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are properties of zigbee?

A
  1. Up to 100m range
  2. Low power consumption
  3. Used for home automation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are properties of RFID?

A
  1. Up to 1m range
  2. Low power consumption
  3. Used in security tags, passports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are properties of NFC?

A
  1. Up to 10cm range
  2. Very low power consumption
  3. Contactless payment systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is FTP?

A

File Transfer Protocol provides the rules for file transfer between computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is HTTP?

A

Hyper Text Transfer Protocol provides the rules to be followed by a web browser and web server when requesting and supplying information. Used to send requests and return web content

18
Q

What is HTTPS?

A

Secure HTTP with encrypted communications between a host and client

19
Q

What is SMTP?

A

Simple Mail Transfer Protocol which provides the rules for sending email messages from client to server and then from server to server

20
Q

What is POP?

A

Post Office Protocol is used by a client to retrieve emails from a mail server which are downloaded and then deleted on the server

21
Q

What is IMAP?

A

Internet Message Access Protocol is where you can read messages which are stored on a different server

22
Q

What happens in the application layer?

A

Sending: Provides the interfaces and protocols needed by the user
Receiving: displays the received information to the user

23
Q

What happens in the transport layer?

A

Sending: Splits outgoing data into packets and numbers them. Adds a header containing a sequence number and checksum and passes the packets to the internet layer
Receiving: Checks incoming packets and sends a resend request for any that have been damaged or lost in transport. Reassembles packets into the correct order and passes the data to the application layer

24
Q

What happens in the internet layer?

A

Sending: Adds the source and destination IP address to packet headers, enabling routers to guide each packet to its destination
Receiving: Strips address information from incoming packet headers

25
Q

What happens in the transport layer?

A

Sending: Uses network-specific protocols to convert binary data into electrical, light or radio signals for network transmission
Receiving: Converts incoming signals into binary data

26
Q

What is a star topolgy?

A

Each computer is connected individually to a central switch

27
Q

What are the advantages of a star topology?

A
  1. If a wire is damaged, the whole network will continue to function
  2. Data is only send to the intended computer directly
28
Q

What are the disadvantages of a star topology?

A
  1. If the central point fails, then so will the entire network
  2. Requires a lot of cable because each computer is connected individually to a central component making it expensive
29
Q

What is a mesh topology?

A

Each computer is connected to at least one other computer. As well as sending signals, each computer also relays data

30
Q

What are the advantages of a mesh topology?

A
  1. Can handle high volumes of data
  2. If one component fails, there is always an alternative route for data
31
Q

What are the disadvantages of a mesh topology?

A
  1. Expensive as lots of cable required
  2. Difficult to manage
32
Q

What is a bus topology?

A

Each node is connected to a main cable called a bus with terminators on each end

33
Q

What are the advantages of a bus topology?

A
  1. Easy to set up
  2. Easy to add extra devices
34
Q

What are the disadvantages of a bus topology?

A
  1. Lots of data collisions occur when multiple devices transmit data at the same time
  2. If the main cable fails, the whole network fails
35
Q

What is penetration testing?

A

Testers take the role of hackers to try and gain unauthorised access to a system or network to find vulnerabilities that can be fixed

36
Q

What is black-box penetration testing?

A

Testers aren’t given any information about the network and have to use methods of a real hacker

37
Q

What is white-box penetration testing?

A

Testers are given access to relevant network and system information and use this to identify potential security loopholes that could be exploited by people within the organisation

38
Q

What is ethical hacking?

A

Hackers make attempts to penetrate a computer system or network on behalf of the owner to find security vulnerabilities

39
Q

What is access control?

A

Where users are limited to who can log into a network and what they are permitted to do

40
Q

What is physical security?

A
  1. Access doors should be kept locked and fitted with security recognition
  2. Biometric security recognition can be used on mobile devices to authenticate users
41
Q

What are firewalls?

A

Software or hardware that prevents communications from entering the network