Networks And Connectivity Flashcards

0
Q

What are the four principal LAN topologies?

A

Bus topology
Ring topology
Star topology
Tree topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What are the two main forms of network?

A

LAN Local Area Network

WAN Wide Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the bus topology

A

All devices are connected to a central cable called the bus. Fast and relatively inexpensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the ring topology

A

All devices are connected to one another in the shape of a closed loop. Each device is directly connected to two other devices. Relatively expensive and difficult to install but have high bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the star topology

A

All devices are connected to a central hub. Relatively easy to install and manage, but bottlenecks can occur as all data has to pass through central hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the tree topology

A

Combines characteristics of the bus and star topologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List the main options for connecting computers and devices in a network

A
Unshielded twisted pair
Type 1 cable
Fibre optic cable
Broadband
Infrared
Wireless
Satellite
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of cable is the most basic used to connect devices on a network?

A

Unshielded twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are risks created when connecting devices with cables?

A

If an attacker can access cables they can compromise the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How are WANs usually connected?

A

Fibre optic cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the main risk of cable-less network connections?

A

Attacker does not need physical access to cables to access the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four primary advantages of a wireless network?

A

Users can connect at any location with no additional wires
Reconfiguration easy as no wiring changes involved
Office based and remote workers can upload and download data directly without need for memory sticks
Fewer points of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List seven main risks of wireless network connections

A

Can be eavesdropped outside building
Can be eavesdropped by visitors
May suffer radio interference
Failures tend to make all access unavailable
More types of risky devices in wireless network e.g. Bluetooth
Wireless network could be broadcast without encryption or weak encryption
Even 256 bit WEP encryption can be broken quite easily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A network or group of networks may be referred to as a d—

A

Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of a domain?

A

To group together devices and networks that share a common function or location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the eight main network management responsibilities?

A
Planning and design
Change management
Maintenance
Performance
Capacity management
Availability management
Problem determination and troubleshooting
Configuring, monitoring, controlling and optimising all networked resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network planning is typically aligned closely with what?

A

The business and information technology strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A review of network management should address what six things?

A

Network procedures in place
Network management responsibilities and roles
Network technologies and tools used
Customer service requirements and network service level agreements
Current and planned business requirements impacting the network
Effectiveness/quality of network services in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When messages are transmitted across the internet, they are broken up into a number of — depending on the length of the message

A

Packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What happens to packets when they arrive at the receiving computer?

A

They are reassembled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the term describing the process of turning messages into packets and back again?

A

Transaction Control Protocol TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the three main design characteristics of the internet?

A

System uses routers intelligent enough to determine whether particular routes are usable and route packets accordingly
Designed for transmission of academic material so no inbuilt security
No central control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

With respect to the internet, what are the three main types of customer within a business context?

A
Trading partners (B2B)
Individual customers (B2C)
Staff (B2E)
23
Q

Why do many organisations now specify in their security policy that emails have the same status as headed notepaper?

A

Because an email acknowledgment to an offer forms a contract

24
Q

In general, with whom does the responsibility lie for protecting an email message?

A

The sender

25
Q

Are emails between individuals within an organisation any safer than emails to people outside the organisation?

A

No, attackers can use sniffer programs

26
Q

What does a sniffer program allow an attacker to do?

A

It allows all network traffic to be seen and manipulated as it passes along the network

27
Q

When considering whether access to certain internet content should be restricted, what aspects should an organisation take into consideration?

A

Does the site offer info that will enhance organisation?
Will use of site be a distraction that reduces productivity?
Is site likely to contain malware?
Should downloads be permitted from site to individual machines or to a central download point?
Is access to site legal?

28
Q

What is an INTRAnet?

A

An internal version of the internet, but functioning only within the organisation. Server providing the information only has an internal IP address.

29
Q

What is an EXTRAnet?

A

Similar to the intranet, it is not for public access, but links two or more trading partners to form a shared private network

30
Q

What is a virtual private network (VPN)?

A

It provides a secure network to link devices or LANs ACROSS the internet, using a process known as tunnelling.

31
Q

What is the primary inherent risk associated with the use of social networking sites?

A

That personal information is made public, including comments about employers and so forth, leading to loss of reputation or breach of legislation

32
Q

What is the risk of using social networking sites to employee productivity?

A

It can adversely affect it

33
Q

What are the four main ways in which an organisation can gain from social media?

A

Advertising
Engagement (with customers, etc)
Interaction (replying to comments about products)
Understanding the market (using feedback)

34
Q

How can social media help an organisation in the face of bad publicity?

A

It can help them react quickly and positively

35
Q

In what seven ways can trust be exploited via social networking?

A
Requests for money
Charges
Phishing
Mystery trips
Chain letters
Grooming
Cyber-bullying
36
Q

What is a ‘mystery trip’?

A

When you click on a link only showing the short form of the website address but you are diverted elsewhere

37
Q

How can the risks of personal internet use during office hours be minimised?

A

By introducing an Acceptable Use Policy AUP

38
Q

What controls should be considered to manage the risks of using social networking sites

A

Refer to printed list

39
Q

What are the four main risks of using a chat room?

A

Usernames identifying gender or colour may attract unwelcome remarks or assumptions
Open conversations may give away personal details
Not all users may actually be who they seem
Users may receive advice or guidance from those not qualified to give it

40
Q

What is ‘cyber slacking’?

A

Use of the internet and mobile technology during work hours for personal purposes

41
Q

What are the 5 negative consequences to the business of cyber slacking?

A

Lost working hours
Lost productivity
Reduced bandwidth for business activities
Inappropriate or illegal material being downloaded
Compromise of organisation due to implication in employee’s activities

42
Q

What are likely to be the three main reasons for cyber slacking?

A

Employees are bored
Work too many hours
Or feel unchallenged

43
Q

What are the first lines of defence in mitigating the risks associated with social networking?

A

Staff training and awareness

Sound policies impartially enforced

44
Q

Apart from losses to productivity and the use of company bandwidth, what are four other risks arising from uncontrolled use of social networks?

A

Reputation risk
Fraud or commercial confidentiality risks
Risks to both staff and employer from providing personal info
Data security risks

45
Q

List a number of protective systems, for both the individual and the organisation, that can minimise the risks of social networking.

A

See printed list

46
Q

What is a protocol?

A

A standard for how things should behave

47
Q

What are the two main protocols with respect to information systems?

A

TCP Transmission Control Protocol

IP Internet Protocol

48
Q

For what is TCP responsible?

A

Breaking down messages into packets and reassembling them at the other end

49
Q

What does IP Internet Protocol handle?

A

The various aspects of actually routing packets to their destination

50
Q

What are the two key aspects of IP addressing?

A

Any device connected to the internet must have a unique IP address
The internet does not recognise certain IP addresses, which can only be used privately within organisations

51
Q

What usually handles the links between the internet connections and the private ones?

A

A gateway computer, usually the firewall

52
Q

List four general controls that should be considered regarding the security of computer networks

A

Operational responsibility for networks should be separated from computer operations where appropriate
Responsibilities and procedures for management of remote equipment including equipment in user areas should be established
Special controls should be in place to safeguard confidentiality and integrity of data passing over public networks
Management activities should be closely coordinated both to optimise the service to the business and ensure controls are consistently applied across information processing infrastructure

53
Q

What are the key components forming the network structure that ought to be documented so that security decisions can be made?

A

Communications rooms where equipment is located
Management centre where network is controlled
Disposition of communication lines
All the nodes (or devices) on the network

54
Q

What three TYPES of control can mitigate the risks of connected networks?

A

Network domain segregation
Network connection control
Network connection limitations