Questions Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Outline the features of a virtual private network (VPN)

A

VPN transmission is always encrypted / provides a secure connection;

Establishes the tunnel between sender/receiver;

Sender/receiver is authenticated before sending/receiving;

VPN users have access to all services available;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protocols

A

Protocols are sets of rules for transmitting data correctly;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Usability

A

refers to making the system easy to use and matching it closer to user needs/requirments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

explain how a virtual private network
(VPN) allows a travelling salesperson to connect securely to their company’s network.

A

Tunnelling protocols;
Allows the data to be encapsulated/hidden whilst travelling across the internet;

The use of gateways;
Allows the salesperson to connect with the company’s server;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Prototype

A

Prototype is used to ensure all essential functions/operations of the system are present/meets the needs of the users;
Prototype is used to speed up development process;
Positive user’s feedback helps in refining the acceptable prototype in order to develop the complete system/product;
Or else a further prototype should be created in order to develop the satisfactory system/product;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Discuss two possible problems that may occur during data migration.

A

Data loss/data corruption;
When moving data, from one storage device to another (via network/ cables or transferred by people), data could be corrupted/lost and not useful anymore;

Incompatibility of data formats;
Necessary to translate from one format to another, to be able to use the data in the new system which causes delays/performance issues in business/office operation;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ethernet, extranet and wirless:

A

extranet allows extneral users specified access to an orafgnIation network

ethernet is wired connection

wireless is wired internet

Ethernet is a type of wired networking technology that uses cables to transmit data between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe two features of a VPN that make it secure.

A

Encryption;
Any Data intercepted will not be readable;

Vpns use

Symmetric encryption: This involves the use of a single secret key to encrypt and decrypt data. Both the sender and the receiver use the same key to encrypt and decrypt the data.

and
Asymmetric encryption: This involves the use of two keys, a public key and a private key, to encrypt and decrypt data. The sender uses the recipient’s public key to encrypt the data, and the recipient uses their private key to decrypt it.

Tunnelling software;
Security properties of each tunnel should be agreed by the administrators of the two endpoints of the tunnel;

Tunneling software ensures that all data transmitted between the user’s device and the VPN server is secure and private, protecting the user’s sensitive information

Multiple exit nodes;
Makes it hard to distinguish where the data was generated thus more secure (less
prone to phishing);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State one technology that is necessary for a VPN.

A

IPsec with encryption;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Functions of an operating system

A

Provides a user interface
Does memory management
Allows multi-tasking
Providessecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

desrcibe two problems that cna occur from data migration

A

Incompatible file formats;
Which could lead to incomplete or incorrect data transfer;

data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the role of a router in this network.

A

controls the flow of data in the network;
inspects address of data packets;

directs to the appropriate network path/ selects a path between networks (by inspecting address of data packets);

securely transmits data packets (across that path toward the intended destination);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe two hardware components the school will need to implement the wireless network.

A

Wireless) router;
A central hub for all the computers to connect to;
Enables wireless network packet forwarding and routing;

Wireless repeaters;
To expand the reach of the network;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identify two technologies the school would require to provide a VPN.

A

Encryption protocol IPSec

VPN Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption

A

Data encryption refers to calculations/algorithms that transform plain text into a form that is non-readable to unauthorized parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wide area network

A

A wide area network is a telecommunications network that extends over a large geographic area.