Networks And Connectivity Flashcards

0
Q

What are the four principal LAN topologies?

A

Bus topology
Ring topology
Star topology
Tree topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What are the two main forms of network?

A

LAN Local Area Network

WAN Wide Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the bus topology

A

All devices are connected to a central cable called the bus. Fast and relatively inexpensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the ring topology

A

All devices are connected to one another in the shape of a closed loop. Each device is directly connected to two other devices. Relatively expensive and difficult to install but have high bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the star topology

A

All devices are connected to a central hub. Relatively easy to install and manage, but bottlenecks can occur as all data has to pass through central hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the tree topology

A

Combines characteristics of the bus and star topologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List the main options for connecting computers and devices in a network

A
Unshielded twisted pair
Type 1 cable
Fibre optic cable
Broadband
Infrared
Wireless
Satellite
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of cable is the most basic used to connect devices on a network?

A

Unshielded twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are risks created when connecting devices with cables?

A

If an attacker can access cables they can compromise the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How are WANs usually connected?

A

Fibre optic cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the main risk of cable-less network connections?

A

Attacker does not need physical access to cables to access the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four primary advantages of a wireless network?

A

Users can connect at any location with no additional wires
Reconfiguration easy as no wiring changes involved
Office based and remote workers can upload and download data directly without need for memory sticks
Fewer points of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List seven main risks of wireless network connections

A

Can be eavesdropped outside building
Can be eavesdropped by visitors
May suffer radio interference
Failures tend to make all access unavailable
More types of risky devices in wireless network e.g. Bluetooth
Wireless network could be broadcast without encryption or weak encryption
Even 256 bit WEP encryption can be broken quite easily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A network or group of networks may be referred to as a d—

A

Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of a domain?

A

To group together devices and networks that share a common function or location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the eight main network management responsibilities?

A
Planning and design
Change management
Maintenance
Performance
Capacity management
Availability management
Problem determination and troubleshooting
Configuring, monitoring, controlling and optimising all networked resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network planning is typically aligned closely with what?

A

The business and information technology strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A review of network management should address what six things?

A

Network procedures in place
Network management responsibilities and roles
Network technologies and tools used
Customer service requirements and network service level agreements
Current and planned business requirements impacting the network
Effectiveness/quality of network services in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When messages are transmitted across the internet, they are broken up into a number of — depending on the length of the message

A

Packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What happens to packets when they arrive at the receiving computer?

A

They are reassembled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the term describing the process of turning messages into packets and back again?

A

Transaction Control Protocol TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the three main design characteristics of the internet?

A

System uses routers intelligent enough to determine whether particular routes are usable and route packets accordingly
Designed for transmission of academic material so no inbuilt security
No central control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

With respect to the internet, what are the three main types of customer within a business context?

A
Trading partners (B2B)
Individual customers (B2C)
Staff (B2E)
23
Q

Why do many organisations now specify in their security policy that emails have the same status as headed notepaper?

A

Because an email acknowledgment to an offer forms a contract

24
In general, with whom does the responsibility lie for protecting an email message?
The sender
25
Are emails between individuals within an organisation any safer than emails to people outside the organisation?
No, attackers can use sniffer programs
26
What does a sniffer program allow an attacker to do?
It allows all network traffic to be seen and manipulated as it passes along the network
27
When considering whether access to certain internet content should be restricted, what aspects should an organisation take into consideration?
Does the site offer info that will enhance organisation? Will use of site be a distraction that reduces productivity? Is site likely to contain malware? Should downloads be permitted from site to individual machines or to a central download point? Is access to site legal?
28
What is an INTRAnet?
An internal version of the internet, but functioning only within the organisation. Server providing the information only has an internal IP address.
29
What is an EXTRAnet?
Similar to the intranet, it is not for public access, but links two or more trading partners to form a shared private network
30
What is a virtual private network (VPN)?
It provides a secure network to link devices or LANs ACROSS the internet, using a process known as tunnelling.
31
What is the primary inherent risk associated with the use of social networking sites?
That personal information is made public, including comments about employers and so forth, leading to loss of reputation or breach of legislation
32
What is the risk of using social networking sites to employee productivity?
It can adversely affect it
33
What are the four main ways in which an organisation can gain from social media?
Advertising Engagement (with customers, etc) Interaction (replying to comments about products) Understanding the market (using feedback)
34
How can social media help an organisation in the face of bad publicity?
It can help them react quickly and positively
35
In what seven ways can trust be exploited via social networking?
``` Requests for money Charges Phishing Mystery trips Chain letters Grooming Cyber-bullying ```
36
What is a 'mystery trip'?
When you click on a link only showing the short form of the website address but you are diverted elsewhere
37
How can the risks of personal internet use during office hours be minimised?
By introducing an Acceptable Use Policy AUP
38
What controls should be considered to manage the risks of using social networking sites
Refer to printed list
39
What are the four main risks of using a chat room?
Usernames identifying gender or colour may attract unwelcome remarks or assumptions Open conversations may give away personal details Not all users may actually be who they seem Users may receive advice or guidance from those not qualified to give it
40
What is 'cyber slacking'?
Use of the internet and mobile technology during work hours for personal purposes
41
What are the 5 negative consequences to the business of cyber slacking?
Lost working hours Lost productivity Reduced bandwidth for business activities Inappropriate or illegal material being downloaded Compromise of organisation due to implication in employee's activities
42
What are likely to be the three main reasons for cyber slacking?
Employees are bored Work too many hours Or feel unchallenged
43
What are the first lines of defence in mitigating the risks associated with social networking?
Staff training and awareness | Sound policies impartially enforced
44
Apart from losses to productivity and the use of company bandwidth, what are four other risks arising from uncontrolled use of social networks?
Reputation risk Fraud or commercial confidentiality risks Risks to both staff and employer from providing personal info Data security risks
45
List a number of protective systems, for both the individual and the organisation, that can minimise the risks of social networking.
See printed list
46
What is a protocol?
A standard for how things should behave
47
What are the two main protocols with respect to information systems?
TCP Transmission Control Protocol | IP Internet Protocol
48
For what is TCP responsible?
Breaking down messages into packets and reassembling them at the other end
49
What does IP Internet Protocol handle?
The various aspects of actually routing packets to their destination
50
What are the two key aspects of IP addressing?
Any device connected to the internet must have a unique IP address The internet does not recognise certain IP addresses, which can only be used privately within organisations
51
What usually handles the links between the internet connections and the private ones?
A gateway computer, usually the firewall
52
List four general controls that should be considered regarding the security of computer networks
Operational responsibility for networks should be separated from computer operations where appropriate Responsibilities and procedures for management of remote equipment including equipment in user areas should be established Special controls should be in place to safeguard confidentiality and integrity of data passing over public networks Management activities should be closely coordinated both to optimise the service to the business and ensure controls are consistently applied across information processing infrastructure
53
What are the key components forming the network structure that ought to be documented so that security decisions can be made?
Communications rooms where equipment is located Management centre where network is controlled Disposition of communication lines All the nodes (or devices) on the network
54
What three TYPES of control can mitigate the risks of connected networks?
Network domain segregation Network connection control Network connection limitations