Networks Flashcards

1
Q

What does LAN stand for?

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What area does a LAN cover?

A

A small geographical area located on a single site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who owns the hardware for a LAN?

A

The organisation that uses it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Are LANs wired, wireless, or both?

A

Both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where are LANs used?

A

1) businesses
2) schools
3) universities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does WAN stand for?

A

Wide Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a WAN connect?

A

LANs that are in different geographical locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can WANs be connected?

A

1) telephone lines (copper or fibre optic)
2) satellite links
3) radio links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the biggest WAN?

A

The Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does PAN stand for?

A

Personal Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What area does a PAN cover?

A

Devices over a very short range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What devices are often connected in a PAN?

A

1) smartphones
2) smartwatches
3) headphones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What wireless technology do PANs use to connect devices?

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the advantages of networking computers?

A

1) sharing files is easier - network users can access the same files, work on them at the same time and copy files between machines
2) you can share the same hardware (like printers) between multiple devices
3) you can install and update software on all computers at once, rather than one-by-one
4) you can communicate easily across a network cheaply and easily
5) user accounts can be stored centrally, so users can log in from any device on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the disadvantages of networking computers?

A

1) they can be expensive to set up, as you often need a lot of extra hardware
2) networks can be vulnerable to hacking, and malware can easily spread between networked computers
3) some networks are dependent on one or more servers. If those servers go down it can be very disruptive for people trying to use the network
4) large networks are difficult to manage and may require employing a specialist to maintain them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a NIC used for?

A

Allows a device to connect to networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a switch used for?

A

To connect devices on a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a router used for?

A

1) to transmit data between different networks

2) to connect to the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is bandwidth?

A

The amount of data that can be sent across a network in a given time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How are devices connected in a star topology?

A

All the devices are connected to a central switch or server that controls the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the advantages of a star topology?

A

1) if a device fails or a cable is disconnected, the rest of the network is unaffected
2) it’s simple to add more devices to the network, since each device is connected to the switch using a separate cable
3) star topologies tend to have better performance than other setups - data goes straight to the central device so all devices can transmit data at the same time
4) there are very few data collisions on a star network compared with other network topologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the disadvantages of a star topology?

A

1) in wired networks, every device needs a cable to connect to the central switch or server. This can be expensive
2) the switch itself is also an expensive piece of hardware
3) if there is a problem with the switch or serer then the whole network is affected
4) the maximum number of possible connections on the network is determined by the switch - if you need more, you might need to buy a new one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How are devices connected in a bus topology?

A

Bus topologies use a single ‘backbone’ cable, called a bus, to connect all the devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why are two terminators placed at the end of the bus?

A

1) to stop data reflecting back along the bus

2) without the terminators, reflected signals would cause interference and potentially make the network unusable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are the advantages of a bus topology?
1) the network is unaffected if a device fials 2) bus networks aren't dependent on a central switch working to keep the whole network running 3) they're relatively cheap to set up compared to star networks. The total length of wiring needed is much less, and the hardware you need is cheaper than switches, both to buy and to maintain
26
What are the disadvantages of a bus topology?
1) data collisions are common. When there is a data collision the data must be resent, which slows the network down 2) the more devices you add to the network , the more likely data collisions are. This makes bus topologies unsuitable for large networks 3) to try and avoid data collisions, devices must wait for the bus to be available before they can send any data - this can also slow the network down 4) if the bus cable gets broken, it splits the network into separate parts. Since the separated networks don't have terminators at both ends of the bus, there will be a lot of reflected signals which can shut down the entire network
27
What is the definition of a protocol?
A protocol is a set of rules for how devices communicate and how data is transmitted across a network
28
How is data send between networks?
Equal-sized packets
29
What is a layer?
A group of protocols which have similar functions
30
What are the 4 layers of the TCP/IP protocol model?
Layer 4 - Application Layer Layer 3 - Transport Layer Layer 2 - Network Layer Layer 1 - Link Layer
31
What is the role of the application layer?
Providing networking services to applications
32
What are some protocol examples for the application layer?
1) HTTP 2) HTTPS 3) IMAP 4) FTP 5) SMTP
33
What is the role of the transport layer?
Setting up communications between two devices, splitting data into packets and checking packets are correctly sent and delivered
34
What are some protocol examples for the transport layer?
1) TCP | 2) UDP
35
What is the role of the internet layer?
Adding IP addresses to data packets, directing them between devices and handling traffic. Used by routers
36
What are some protocol examples for the internet layer?
1) IP
37
What is the role of the link layer?
Passing data over the physical network. Responsible for how data is sent as electrical signals over cables, wireless and other hardware
38
What are some protocol examples for the link layer?
1) Wi-Fi | 2) Ethernet
39
What are the advantages of using layers?
1) it breaks network communication into manageable pieces. This helps developers concentrate on only one area of the network without having to worry about the others 2) as layers are self-contained, they can be changed without the other layers being affected 3) having set rules for each layer forces companies to make compatible, universal hardware and software, so different brands will work with each other and always work in basically the same way
40
What does HTTP stand for?
Hyper Text Transfer Protocol
41
What does HTTPS stand for?
HTTP Secure
42
What does FTP stand for?
File Transfer Protocol
43
What does IMAP stand for?
Internet Message Access Protocol
44
What does SMTP stand for?
Simple Mail Transfer Protocol
45
What is HTTP used for?
Used by web browsers to access websites and communicate with web servers
46
What is HTTPS used for?
A more secure version of HTTP. Encrypts all information sent and received
47
What is FTP used for?
To access, edit and move files between devices on a network
48
What is IMAP used for?
To retrieve emails from a server
49
What is SMTP used for?
To send emails. Also used to transfer emails between servers
50
What does TCP stand for?
Transmission Control Protocol
51
What does UDP stand for?
User Datagram Protocol
52
What is TCP used for?
1) establishing a connection between the sending and receiving devices 2) communicating with the receiving device to make sure that all packets have been transferred correctly
53
What is UDP used for?
1) breaking down the data into packets without numbering them 2) sending packets once and not checking with the receiving device that everything everything has been received
54
What does IP stand for?
Internet Protocol
55
What is IP used for?
1) establishing connections between routers 2) handling network traffic 3) directing data packets to their destination across the internet or other IP networks - packet switching
56
What is Wi-Fi?
A family of protocols commonly used in WLANs
57
What layer does Wi-Fi operate on?
Link Layer
58
What two radio frequency bands does Wi-Fi use?
1) 2.4GHz | 2) 5GHz
59
When is UDP suitable?
For applications that need fast, efficient transmission
60
Give an example of when you would use UDP.
Live video streaming
61
When is TCP suitable?
When you need a reliable connection
62
Give an example of when you would use TCP.
Downloading files
63
How does packet switching work?
1) each packet is sent between a series of routers | 2) each router reads the packet's header and uses the IP address to decide which router to send the packet to next
64
What does WPA stand for?
Wi-Fi Protected Access
65
What does WPA do?
Encrypts data on Wi-Fi networks
66
What is penetration testing?
When organisations employ specialists to simulate potential attacks to their system
67
Why is penetration testing used?
To identify possible weaknesses in cyber security
68
What are the two forms of penetration testing?
1) white box penetration testing | 2) black box penetration testing
69
What does white box penetration testing do?
Simulates a malicious insider who has knowledge of the current system. The person carrying out the test will be given user credentials to see what they can do with them
70
What does black box penetration testing do?
Simulates an external cyber attack. The person carrying out the test will not be given any credentials, but will try to hack the organisation in any way they can
71
What is malware?
Code that is designed to cause harm or gain unauthorised access to a computer system. It is often installed on someone's device without their knowledge or consent
72
How can malware get onto a device?
1) being downloaded in an email attachment | 2) hidden on removable media
73
List some actions that malware might carry out.
1) deleting or modifying files 2) locking files - ransomware encrypts all the files on a computer. The user receives a message demanding a large sum of money be paid in exchange for a decryption key 3) displaying unwanted advert - adverts can cause pop-up ads that cannot be closed 4) monitoring the user - spyware secretly tracks actions like key presses and sens info to the hacker, who might be able to work out things like passwords and bank details 5) altering permissions - rootkits can give hackers administrator-level access to devices
74
List some ways that malware can spread between devices.
1) viruses attach (by copying themselves) to certain files. Users spread them by copying infected files and activate them by opening infected files 2) worms self-replicate without any user help, meaning they can spread very quickly 3) Trojans don't replicate themselves - users install them not realising they have a hidden purpose
75
What is social engineering?
A way of gaining sensitive information or illegal access to networks by influencing people
76
List some social engineering methods.
1) pharming 2) phishing 3) shouldering 4) blagging
77
What is pharming?
When a user is directed to a fake version of a website designed to look just like the real thing, with the aim that the user won't notice the difference
78
How can you reduce the risk of pharming?
1) ensure that anti-malware software is up-to-date | 2) web filters
79
What is phishing?
When criminals send emails or texts to people claiming to be from a well-known business. The emails often lead the victim to a fake website
80
How can you reduce the risk of phishing?
Spot: 1) poor grammar 2) emails asking users to follow links 3) emails asking users to update personal details
81
What is shouldering?
Watching and observing a person's activity (typically over their shoulder)
82
List some examples of shouldering
1) spying someone's PIN number at a cash machine | 2) watching someone putting their password into a secured computer
83
How can you reduce the risk of phishing?
Being discreet
84
What is blagging?
When someone makes up a story or pretends to be someone they're not, to persuade the victim to share information or do things they wouldn't normally do
85
How can you reduce the risk of blagging?
Use security measures that can't be given away (biometrics)
86
List some ways of protecting networks against threats.
1) encryption 2) anti-malware software 3) automatic software updates 4) user access levels 5) MAC address filtering
87
What is encryption?
When data is translated into a code which only someone with the correct key can access, meaning unauthorised users cannot read it
88
What is encrypted text called?
Cipher text
89
What is anti-malware software designed to do?
1) Find and stop malware from damaging an organisation's network and the devices on it
90
What do automatic software updates do?
Patch (fix) any identified security holes in a piece of software
91
What do user access levels control?
Which parts of the network different groups of users can access
92
What does MAC address filtering do?
Makes sure the only people on a network are trusted users. It checks the unique identification (MAC address) of each device that tries to connect to the network and only lets allowed devices join the network
93
What does user authentication do?
Prevents unauthorised people from accessing data from the network
94
What precautions should you take with your passwords?
1) long 2) a combination of letters, numbers and symbols 3) changed regularly
95
What are biometric measures?
1) Scanners to identify people by a unique part of their body
96
List some example of biometric measures.
1) fingerprint 2) retina 3) voice
97
Why is email confirmation used?
1) to confirm that the email address belongs to the person registering 2) to stop people from using fake email addresses to sign up for things
98
What is a CAPTCHA test designed to do?
Prevent programs from automatically doing certain things