Networks Flashcards

1
Q

What does LAN stand for?

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What area does a LAN cover?

A

A small geographical area located on a single site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who owns the hardware for a LAN?

A

The organisation that uses it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Are LANs wired, wireless, or both?

A

Both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where are LANs used?

A

1) businesses
2) schools
3) universities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does WAN stand for?

A

Wide Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a WAN connect?

A

LANs that are in different geographical locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can WANs be connected?

A

1) telephone lines (copper or fibre optic)
2) satellite links
3) radio links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the biggest WAN?

A

The Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does PAN stand for?

A

Personal Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What area does a PAN cover?

A

Devices over a very short range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What devices are often connected in a PAN?

A

1) smartphones
2) smartwatches
3) headphones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What wireless technology do PANs use to connect devices?

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the advantages of networking computers?

A

1) sharing files is easier - network users can access the same files, work on them at the same time and copy files between machines
2) you can share the same hardware (like printers) between multiple devices
3) you can install and update software on all computers at once, rather than one-by-one
4) you can communicate easily across a network cheaply and easily
5) user accounts can be stored centrally, so users can log in from any device on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the disadvantages of networking computers?

A

1) they can be expensive to set up, as you often need a lot of extra hardware
2) networks can be vulnerable to hacking, and malware can easily spread between networked computers
3) some networks are dependent on one or more servers. If those servers go down it can be very disruptive for people trying to use the network
4) large networks are difficult to manage and may require employing a specialist to maintain them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a NIC used for?

A

Allows a device to connect to networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a switch used for?

A

To connect devices on a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a router used for?

A

1) to transmit data between different networks

2) to connect to the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is bandwidth?

A

The amount of data that can be sent across a network in a given time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How are devices connected in a star topology?

A

All the devices are connected to a central switch or server that controls the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the advantages of a star topology?

A

1) if a device fails or a cable is disconnected, the rest of the network is unaffected
2) it’s simple to add more devices to the network, since each device is connected to the switch using a separate cable
3) star topologies tend to have better performance than other setups - data goes straight to the central device so all devices can transmit data at the same time
4) there are very few data collisions on a star network compared with other network topologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the disadvantages of a star topology?

A

1) in wired networks, every device needs a cable to connect to the central switch or server. This can be expensive
2) the switch itself is also an expensive piece of hardware
3) if there is a problem with the switch or serer then the whole network is affected
4) the maximum number of possible connections on the network is determined by the switch - if you need more, you might need to buy a new one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How are devices connected in a bus topology?

A

Bus topologies use a single ‘backbone’ cable, called a bus, to connect all the devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why are two terminators placed at the end of the bus?

A

1) to stop data reflecting back along the bus

2) without the terminators, reflected signals would cause interference and potentially make the network unusable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the advantages of a bus topology?

A

1) the network is unaffected if a device fials
2) bus networks aren’t dependent on a central switch working to keep the whole network running
3) they’re relatively cheap to set up compared to star networks. The total length of wiring needed is much less, and the hardware you need is cheaper than switches, both to buy and to maintain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the disadvantages of a bus topology?

A

1) data collisions are common. When there is a data collision the data must be resent, which slows the network down
2) the more devices you add to the network , the more likely data collisions are. This makes bus topologies unsuitable for large networks
3) to try and avoid data collisions, devices must wait for the bus to be available before they can send any data - this can also slow the network down
4) if the bus cable gets broken, it splits the network into separate parts. Since the separated networks don’t have terminators at both ends of the bus, there will be a lot of reflected signals which can shut down the entire network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the definition of a protocol?

A

A protocol is a set of rules for how devices communicate and how data is transmitted across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How is data send between networks?

A

Equal-sized packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a layer?

A

A group of protocols which have similar functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the 4 layers of the TCP/IP protocol model?

A

Layer 4 - Application Layer
Layer 3 - Transport Layer
Layer 2 - Network Layer
Layer 1 - Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the role of the application layer?

A

Providing networking services to applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are some protocol examples for the application layer?

A

1) HTTP
2) HTTPS
3) IMAP
4) FTP
5) SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the role of the transport layer?

A

Setting up communications between two devices, splitting data into packets and checking packets are correctly sent and delivered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are some protocol examples for the transport layer?

A

1) TCP

2) UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the role of the internet layer?

A

Adding IP addresses to data packets, directing them between devices and handling traffic. Used by routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are some protocol examples for the internet layer?

A

1) IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the role of the link layer?

A

Passing data over the physical network. Responsible for how data is sent as electrical signals over cables, wireless and other hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are some protocol examples for the link layer?

A

1) Wi-Fi

2) Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are the advantages of using layers?

A

1) it breaks network communication into manageable pieces. This helps developers concentrate on only one area of the network without having to worry about the others
2) as layers are self-contained, they can be changed without the other layers being affected
3) having set rules for each layer forces companies to make compatible, universal hardware and software, so different brands will work with each other and always work in basically the same way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What does HTTP stand for?

A

Hyper Text Transfer Protocol

41
Q

What does HTTPS stand for?

A

HTTP Secure

42
Q

What does FTP stand for?

A

File Transfer Protocol

43
Q

What does IMAP stand for?

A

Internet Message Access Protocol

44
Q

What does SMTP stand for?

A

Simple Mail Transfer Protocol

45
Q

What is HTTP used for?

A

Used by web browsers to access websites and communicate with web servers

46
Q

What is HTTPS used for?

A

A more secure version of HTTP. Encrypts all information sent and received

47
Q

What is FTP used for?

A

To access, edit and move files between devices on a network

48
Q

What is IMAP used for?

A

To retrieve emails from a server

49
Q

What is SMTP used for?

A

To send emails. Also used to transfer emails between servers

50
Q

What does TCP stand for?

A

Transmission Control Protocol

51
Q

What does UDP stand for?

A

User Datagram Protocol

52
Q

What is TCP used for?

A

1) establishing a connection between the sending and receiving devices
2) communicating with the receiving device to make sure that all packets have been transferred correctly

53
Q

What is UDP used for?

A

1) breaking down the data into packets without numbering them
2) sending packets once and not checking with the receiving device that everything everything has been received

54
Q

What does IP stand for?

A

Internet Protocol

55
Q

What is IP used for?

A

1) establishing connections between routers
2) handling network traffic
3) directing data packets to their destination across the internet or other IP networks - packet switching

56
Q

What is Wi-Fi?

A

A family of protocols commonly used in WLANs

57
Q

What layer does Wi-Fi operate on?

A

Link Layer

58
Q

What two radio frequency bands does Wi-Fi use?

A

1) 2.4GHz

2) 5GHz

59
Q

When is UDP suitable?

A

For applications that need fast, efficient transmission

60
Q

Give an example of when you would use UDP.

A

Live video streaming

61
Q

When is TCP suitable?

A

When you need a reliable connection

62
Q

Give an example of when you would use TCP.

A

Downloading files

63
Q

How does packet switching work?

A

1) each packet is sent between a series of routers

2) each router reads the packet’s header and uses the IP address to decide which router to send the packet to next

64
Q

What does WPA stand for?

A

Wi-Fi Protected Access

65
Q

What does WPA do?

A

Encrypts data on Wi-Fi networks

66
Q

What is penetration testing?

A

When organisations employ specialists to simulate potential attacks to their system

67
Q

Why is penetration testing used?

A

To identify possible weaknesses in cyber security

68
Q

What are the two forms of penetration testing?

A

1) white box penetration testing

2) black box penetration testing

69
Q

What does white box penetration testing do?

A

Simulates a malicious insider who has knowledge of the current system. The person carrying out the test will be given user credentials to see what they can do with them

70
Q

What does black box penetration testing do?

A

Simulates an external cyber attack. The person carrying out the test will not be given any credentials, but will try to hack the organisation in any way they can

71
Q

What is malware?

A

Code that is designed to cause harm or gain unauthorised access to a computer system. It is often installed on someone’s device without their knowledge or consent

72
Q

How can malware get onto a device?

A

1) being downloaded in an email attachment

2) hidden on removable media

73
Q

List some actions that malware might carry out.

A

1) deleting or modifying files
2) locking files - ransomware encrypts all the files on a computer. The user receives a message demanding a large sum of money be paid in exchange for a decryption key
3) displaying unwanted advert - adverts can cause pop-up ads that cannot be closed
4) monitoring the user - spyware secretly tracks actions like key presses and sens info to the hacker, who might be able to work out things like passwords and bank details
5) altering permissions - rootkits can give hackers administrator-level access to devices

74
Q

List some ways that malware can spread between devices.

A

1) viruses attach (by copying themselves) to certain files. Users spread them by copying infected files and activate them by opening infected files
2) worms self-replicate without any user help, meaning they can spread very quickly
3) Trojans don’t replicate themselves - users install them not realising they have a hidden purpose

75
Q

What is social engineering?

A

A way of gaining sensitive information or illegal access to networks by influencing people

76
Q

List some social engineering methods.

A

1) pharming
2) phishing
3) shouldering
4) blagging

77
Q

What is pharming?

A

When a user is directed to a fake version of a website designed to look just like the real thing, with the aim that the user won’t notice the difference

78
Q

How can you reduce the risk of pharming?

A

1) ensure that anti-malware software is up-to-date

2) web filters

79
Q

What is phishing?

A

When criminals send emails or texts to people claiming to be from a well-known business. The emails often lead the victim to a fake website

80
Q

How can you reduce the risk of phishing?

A

Spot:

1) poor grammar
2) emails asking users to follow links
3) emails asking users to update personal details

81
Q

What is shouldering?

A

Watching and observing a person’s activity (typically over their shoulder)

82
Q

List some examples of shouldering

A

1) spying someone’s PIN number at a cash machine

2) watching someone putting their password into a secured computer

83
Q

How can you reduce the risk of phishing?

A

Being discreet

84
Q

What is blagging?

A

When someone makes up a story or pretends to be someone they’re not, to persuade the victim to share information or do things they wouldn’t normally do

85
Q

How can you reduce the risk of blagging?

A

Use security measures that can’t be given away (biometrics)

86
Q

List some ways of protecting networks against threats.

A

1) encryption
2) anti-malware software
3) automatic software updates
4) user access levels
5) MAC address filtering

87
Q

What is encryption?

A

When data is translated into a code which only someone with the correct key can access, meaning unauthorised users cannot read it

88
Q

What is encrypted text called?

A

Cipher text

89
Q

What is anti-malware software designed to do?

A

1) Find and stop malware from damaging an organisation’s network and the devices on it

90
Q

What do automatic software updates do?

A

Patch (fix) any identified security holes in a piece of software

91
Q

What do user access levels control?

A

Which parts of the network different groups of users can access

92
Q

What does MAC address filtering do?

A

Makes sure the only people on a network are trusted users. It checks the unique identification (MAC address) of each device that tries to connect to the network and only lets allowed devices join the network

93
Q

What does user authentication do?

A

Prevents unauthorised people from accessing data from the network

94
Q

What precautions should you take with your passwords?

A

1) long
2) a combination of letters, numbers and symbols
3) changed regularly

95
Q

What are biometric measures?

A

1) Scanners to identify people by a unique part of their body

96
Q

List some example of biometric measures.

A

1) fingerprint
2) retina
3) voice

97
Q

Why is email confirmation used?

A

1) to confirm that the email address belongs to the person registering
2) to stop people from using fake email addresses to sign up for things

98
Q

What is a CAPTCHA test designed to do?

A

Prevent programs from automatically doing certain things