paper 1 - 1.3, 1.4 & 1.6 Flashcards

1
Q

What are five advantages of networking computers?

A
  1. It is easy to share documents. Different users can work on the same document at once.
  2. Only one internet connection is required as it can be shared between every device connected to the network.
  3. Centralised backups can be carried out automatically.
  4. Software updates/patches can be automatically pushed out by the server to ensure that all devices are up to date.
  5. Users can log in to any machine connected to the LAN as accounts are stored centrally on the server.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the definition of ‘bandwidth’?

A

Bandwidth is the amount of data that can be transmitted in a given period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the acronym Mbps stand for?

A

Megabits Per Second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Write about the impact that bandwidth can have on the performance of a network.

A

The amount of available bandwidth has a major impact on the performance of a network. The larger the amount of available bandwidth that is available the more data that can be transmitted in a given period of time.

If there is a large number of users on the network the amount of bandwidth available to each user may be limited. This will result in data being transmitted at a slower rate which will slow down the performance of the network.

Where large media files are being streamed the amount of available bandwidth is particularly important. Should a number of users be watching streaming HD content demand on bandwidth will be high. If there is insufficient bandwidth this could result in a reduction of quality in the video.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is meant by the term ‘client server network’?

A

All devices are connected to a central server.
The central server receives and processes requests from ‘clients’.
The server stores user account details and files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are three reasons why you might choose a peer network model for a business?

A

All devices have equal status, there is no central server which makes them relatively easy to maintain.
There is no dependence on the server. If one device fails only the information stored on that device will be inaccessible. The network will still operate without that node.
They are relatively easy to set up without the need for a network manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A home internet connection goes through a hybrid device. What three network devices does it typically contain?

A

Router
Switch
Wireless access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a router?

A

To transmit data between at least two different networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does DNS stand for?

A

Domain Name System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

when you type a web address into a browser, what are the main steps that take place during this process to get the page to load?

A
  1. Enter URL into browser
  2. Browser requests IP address of site from ISP
  3. ISP requests IP address from DNS server
  4. DNS responds with details of the name server
  5. ISP asks name server for site IP address
  6. Name server responds with IP address of the host
  7. ISP sends IP address to the browser
  8. Browser sends request to the server hosting the site
  9. server hosting the site sends across content
  10. browser receives website content
  11. website displayed to the user
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Many fast broadband connections use fibre optic cable instead of copper. What are three reasons why fibre optic cable is the preferred choice?

A

Fibre optic cables transmit data through light so do not suffer from electrical interference.
Data can be transmitted over very large distances without any loss of signal quality.
They are able to transmit data at a higher bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is using cloud computing useful to some businesses?

A

[] Any user within the business will be able to load up the files on any device in any location as long as they have a data connection and the necessary permission.
[] If they runs out of storage capacity it is easy to increase.
[] All of the hardware and maintenance tasks will be performed by the cloud provider, they will not have a pay for specialist staff.
[] The data will be automatically backed up.
[] There is no large upfront cost. They will just have to pay a regular fee for the cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of a web server?

A

Control access to a centralised resource (definition of a server)
Stores content for web pages
Stores layout data for web pages
Receives and processes requests for web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of a web client?

A

Sends requests for web pages
Sends DNS requests for IP addresses
Displays the results of web requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You have a games console in your bedroom and a video streaming device in your lounge. You use both devices to watch movies. The Wireless Access Point is located in the lounge. You have found that you are able to stream movies at a far higher quality in the lounge than in your bedroom. Why is this?

A

The further the device is from the WAP the weaker the signal will be, so the lower the bandwidth will be.
Objects such as walls and doors will reduce the signal strength.
Other electrical devices could reduce the signal strength and interfere with the signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When clicking a hyperlink to a webpage, which device is the server, which device is the client and what communication happens between them?

A

The webserver is the device that stores the webpage data.
The client is the computer that requested the web page.
When clicking a hyperlink, the client sends a request to the webserver.
The webserver processes the request and prepares the webpage.
The webpage is then sent to the client.
The webpage is opened in the client’s browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are five reasons a Star network topology may be used to set up a new network?

A

They are very reliable.
If one connection fails it does not affect the rest of the network.
It is relatively easy to add additional devices onto the network.
It is relatively fast as each device has its own connection to the switch / server.
There are few data collisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are five disadvantages of using a Star network topology instead of a Mesh network topology?

A

There is a high level of dependence on one single, central device.
If the central device fails the whole network will fail.
The use of a switch or router could increase the cost of the whole network.
The performance of the network will be dependent upon the specification of the central device/switch.
The number of additional devices that can be added to the network could be restricted by the central device/switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the definition of ‘protocol’?

A

A set of rules that govern how devices communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the protocol that is used to transmit data between different networks?

A

Transmission Control Protocol / Internet Protocol. TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the difference between HTTP and HTTPS?

A

HTTP transmits data over the internet in an unsecure format whereas HTTPS uses encryption so that any data that is intercepted is meaningless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Data is transmitted across a network in packets. What are five items that each data packet will contain?

A
Network address source
Network address destination
Packet number / sequence
Error detection codes
Payload
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what is IMAP used for?

A

it’s used to retrieve emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what is SMTP used for?

A

it’s used to send emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what is HTTP used for?

A

it’s used by web browsers to communicate with web servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Protocols are divided into layers. Why are layers used?

A

Network communication components are standardised which helps to ensure that different types of hardware and software are able to communicate.
Through separating the overall network communication processes it makes troubleshooting easier should an error occur.
To ensure that if changes are made in one layer they do not affect any other layers
Through dividing overall network communication into smaller, individual components it makes the software development process more straightforward.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Packet switching is used to send data on the internet. How does packet switching work?

A

Data is split into individual packets.
Each packet is given a packet number which shows the numerical order of the packet.
The router reads the packet and sends it on to the next location.
The receiving device will read the packet number and reassemble the data in the correct order.
As the device reassembles the data from the packets if a packet is missing it will send an error message to the sending device requesting that the packet is resent.
The sending device will resend the packet.
Once all of the packets are received and reassembled the receiving device will calculate the checksum to ensure that none of the data has become corrupted.
A confirmation message will send from the receiving device to the sending device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the difference between an IP address and a MAC address?

A

A MAC address is permanently assigned to a device on the network whereas an IP address may change when the device joins a different network.

29
Q

What is the difference between IPv4 and IPv6 addresses?

A

IPv4 – 4 blocks of denary digits between 0 and 255 Values separated by full stops.
IPv6 – 8 blocks of 4 hexadecimal digits Values separated by colons.

30
Q

list the steps to the encryption process

A
  • client requests HTTPS session
  • certificate sent to client from the server
  • client creates session key
  • encrypted session key is sent to the server
  • the session key is decrypted with the private key
  • session is encrypted with the session key
31
Q

What is the purpose of POP3?

A

To retrieve emails, only award the mark for retrieve (or similar). The protocol cannot be used to send emails.

32
Q

What are five differences between Bluetooth and Wi-Fi?

A

Bluetooth uses less power
Bluetooth has a shorter range
Bluetooth has a slower data transfer speed
Bluetooth is normally used for ad-hoc connections
Bluetooth is normally used for personal devices/as part of a PAN, rather than a LAN

33
Q

give 10 methods that could be used to infect a laptop with malware

A
10 from:
[] Software that was installed from an untrustworthy source, for example,
screensavers, etc.
 Existing anti-malware software is out of date
 Out of date system software/application software
 Out of date browser
 Out of date firewall
 Infected removable drives
 Exploitation of a software vulnerability
 Various social engineering techniques, e.g. phishing
 Scareware
 Infected email attachment
 Infected link
 Spam email
 A hacked website
 Fake website
 Popup software
 Illegal file sharing
 Distributed denial of service
 Adware
 Rootkits
34
Q

What are three types of anti-malware that should be used to protect a laptop?

A

[] Anti-virus
 Anti-spyware
 Malware scanner

35
Q

How could phishing take place at a business?

A

 Staff respond to fake email
 Staff respond to fake link
 Staff respond to fake website
 Staff respond to spam
 Staff respond to popup software fake instant messages
 Staff respond to social media messages, ‘likes’, etc.

36
Q

What are six potential problems to a business if phishing takes place?

A

 Acquisition of user names and passwords
 Acquisition of financial details/credit card details
 Identity theft
 Data theft
 Staff disclose personal/confidential data
 Financial data theft

37
Q

Give 8 examples of social engineering other than phishing that employees at a business should be aware of.

A
 Pharming
 Blagging/pre-texting
 Shoulder surfing
 Baiting scenarios
 Countermeasures
 Tailgating
 Quid-pro-quo
 Hoax viruses
38
Q

What is meant by the term ‘brute force attack’?

A

 An attack that attempts to decode passwords/encryption keys/encrypted
data
 All possible/numerous combinations are attempted
 A trial and error method
 Resource/time consuming method

39
Q

What are eight features of a strong password?

A
 At least eight characters
 Include upper case
 Include lower case
 Include special characters
 Include numbers
 Does not include a name, company name or user name
 Does not contain a complete word
 Relates to an acronym
40
Q

What are nine measures in addition to a password that could be used to keep a computer’s data secure?

A
 Encryption/encrypt data
 Set a PIN/pattern to lock the phone
 Install security software
 Download apps from trusted sources
 Keep the operating software and apps updated
 Log out of sites
 Turn off automatic Wi-Fi connection
 Turn off Bluetooth and NFC when not in use
 Biometrics
41
Q

What are ten reasons why companies may be targeted by a denial of service attack?

A
 Protest/hacktivism
 Cyber vandalism
 Distraction technique
 Espionage – commercial, industrial. political
 Can lead to malware/data theft if part of a distraction technique
 If a distributed denial of service attack can lead to computer/network
control
 Extortion
 Competition between companies
 Make a website unavailable
 Interrupt an organisation’s work
 Suspend an organisation’s work
 Block user requests
42
Q

What are five measures that a company could take to prepare for a denial of service attack?

A

 Networks should be monitored
 Penetration testing should be undertaken/vulnerabilities should be found
 Vulnerabilities should be fixed/remedied
 A response plan should be produced
 Proxy servers and firewalls

43
Q

What is one method that a business could use to ensure that sensitive documents will not be read by anyone except the intended recipient?

A

Encryption.

44
Q

What are 6 reasons why an attacker might want to target an organisation’s database with an SQL injection?

A
 Access sensitive data
 Steal/retrieve personal data
 Access/steal/retrieve financial data
 Create/read/update/modify/delete data
 Destroy data
 Take control of data
45
Q

What are six measures that an organisation should take to guard their software applications from an SQL injection attack?

A
 Limit user access/privileges
 Create user accounts
 Apply input sanitation
 Apply an input validation technique
 Apply patches/software updates
 Install web application firewall/strong web application firewall
46
Q

What are eight advantages of using a firewall?

A
 Controls network traffic/allows data from authorised
 Blocks data from unauthorised sources
 Protects against attackers
 Offers different protection levels
 Protects privacy
 Provides warnings
 Filters advertisements/popups
 Filters web content
47
Q

Give a comparison of intrusion detection and vulnerability testing.

A

 Intrusion detection monitors a network for unauthorised access by an
attacker.
 Intrusion detection identifies unauthorised access after an attacker has
breached a network’s security.
 Vulnerability testing scans a network for vulnerabilities.
 Vulnerability testing detects vulnerability before an attack occurs.

48
Q

How would penetration testing help to secure a company’s computer network?

A

 Penetration testing looks for vulnerabilities.
 It attempts to exploit the vulnerabilities that it finds.
 The results of penetration testing are presented to network managers to
help them to remedy the vulnerabilities
 It helps to protect a system from cyber attacks
 It identifies and prioritises security risks
 It helps to save money/resources
 It helps to avoid down time
 It helps to protect a company’s reputation

49
Q

What are four ways of physically protecting a network?

A
 Door locks
 Window locks or bars
 Intruder alarm systems
 CCTV systems
 Laptop locks (e.g. Kensington locks)
 Security guards
50
Q

what is the difference between a protocol and a standard?

A

A protocol defines a set of rules used by two or more parties to interact between themselves. A standard is a formalized protocol accepted by most of the parties that implement it.

51
Q

what is a standard?

A

standards are an agreed way of doing things. Standards make it easier for people to build programs and software that work on different systems in different countries. Standards affect many areas of computing, eg software files, formats and hardware.

52
Q

What is meant by an ethical issue?

A

What is considered to be right and wrong by society.

53
Q

What is trolling?

A

 Leaving an off-topic messages in an online community to upset someone.
 Causing public arguments with others online.

54
Q

How can use of technology cause health problems?

A

 RSI
 Eye strain
 Posture
 Back problems

55
Q

What is meant by the digital divide?

A
 Division which exists between those individuals who can use technology and
those who are not.
 Differences in access to technology.
 Groups having more access to technology compared to other groups.
 Reasons include:
o money
o internet access
o location
o training
o disability.
56
Q

What are the ethical issues involved with the introduction of driverless cars?

A

 Who is to blame in an accident?
 In an emergency situation who should the car prioritise?
 Increase in use of cars is bad for the environment.
 Cost of the cars.

57
Q

How does artificial intelligence impact on the medical profession?

A
 Job replacement
 Higher level of accuracy
 More reliable
 Cost
 Improves diagnosis and treatment of patients
58
Q

What is internet censorship?

A

 Control of what can be accessed, published, or viewed on the internet.

59
Q

How does the use of technology impact on the environment?

A

 Increased use of electricity
 Use of natural resources
 E-waste

60
Q

How can e-waste be managed to limit any impact on the environment?

A
 Appropriate disposal.
 Increased recycling.
 Refurbishing of devices.
 Refurbishing of materials.
 Changes in warranty e.g. longer warranty so people are more likely to keep devices.
61
Q

More and more automation is being introduced into the workplace such as in retail or manufacturing. What are the ethical, environmental and cultural impacts of this?

A
 Job replacement
 Accuracy
 Increase use of electricity
 Health issues
 Increased speed
 Cheaper in the long run
62
Q

What year was the Data Protection Act last updated?

A

2018

63
Q

What are the principles of the Data Protection Act?

A

 Data must be collected and used fairly
 Data must only be held and used for the reasons which it was gathered
 Data can only be used for registered purpose
 Data held must be adequate, relevant and not excessive
 Data must be accurate and up to date
 Data cannot be kept for longer than necessary
 Data must be kept safe and secure
 Data cannot be transferred outside of the EU unless they have a suitable DPA
law

64
Q

What offences are illegal under the Computer Misuse Act?

A

 Access computer systems without proper authorisation
 Access computer systems with intent to commit a criminal offence
 Alter data without permission

65
Q

What are three examples of work covered by the Copyright Designs and Patents Act?

A
three from:
 Songs
 Books
 Software
 Music
 Film
 Video games
66
Q

You purchase a CD. Under the Copyright Designs and Patents Act, what four things are illegal for you to do with or use the CD for?

A

 Giving a copy to someone else
 Selling a copy to someone else
 Renting a copy to someone
 Using it on a network

67
Q

What is open source software?

A

 Software which is distributed with no restrictions
 Users have access to source code
 Users can make modifications to the source code

68
Q

What is proprietary software?

A

 Software which is distributed with restrictions
 Individuals buy a licence to use it
 Users do not have access to source code