S6 - Networks (Done) Flashcards

1
Q

Why would a LAN be used ?

A

Local Area Network - to cover small area, all hardware is owned by organisation that uses it and they can be wired or wireless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a WAN for ?

A

Wide Area Network - connects LANs in different locations (a business with offices in three different countries needs a WAN for all devices to connect), organisations hire infrastructure from companies because its very expensive and they can be connected using telephone lines, satellite links or radio links. The internet is the biggest WAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a PAN ?

A

Personal Area Network - connect devices on very short range (centred around a single user), use common wireless technology (Bluetooth) to connect devices - strong signal but very short range. PANs normally don’t require additional hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the benefits of networking computers ?

A

Easier to share and work on documents collaboratively, same hardware shared between multiple devices, install and update software on all computers at once, easy to communicate across a network cheaply and user accounts can be stored centrally allowing them to log in on any device on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the drawbacks of networking computers ?

A

Can be expensive to set up as need a lot of hardware, networks can be vulnerable to hacking and malware can easily spread, networks can be dependant on servers - if they crash you’re unable to access the network and large networks are difficult to manage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a NIC ?

A

A network interface card, a piece of hardware inside a device that allows it to connect to networks - for both wired and wireless connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a switch in a network ?

A

They’re used to connect devices on a LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a router ?

A

They transmit data between different networks - commonly used to connect to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is in a home ‘router’ ?

A

Most are in fact a router, switch and WAP all in one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a WAP ?

A

A wireless access point, a switch allowing devices to connect wirelessly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What determines what cable you’ll use in a wired connection ?

A

It will be dependant on cost, bandwidth and how far you want to transmit data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is bandwidth ?

A

The amount of data that can be sent across a network in a given time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How fibre optic cables work ?

A

Transmit data as light, high performance and expensive, don’t suffer interference and can transmit over large distances at high bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are CAT 5e and CAT 6 cables examples of ?

A

Ethernet cables, contain pairs of copper wires twisted together to reduce internal interference, cheaper than fibre optic with decent bandwidth - commonly used in homes and offices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a coaxial cable ?

A

Single copper wires surrounded by plastic layer and metallic mesh to reduce outside interference, very cheap with a low bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do wireless networks transmit data ?

A

Through radio waves - so signal can be reduced by physical objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are WLANs ?

A

They are local wireless networks - wireless LANs, commonly referred to as wi-fi which is actually a specific family of WLAN protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a WAP ?

A

A wireless Access Point - basically a switch that allows devices to connect wirelessly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a hotspot ?

A

A location where you can connect to a WAP - not a WAP itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How can you set up a wireless network ?

A

You need a WAP the devices can connect wirelessly to, so it’s necessary for them to have wireless capability which is usually built in these days but can be done using a USB dongle - HDMI dongles are popular for TVs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the benefits of wireless networks ?

A

They are convenient as you can automatically connect and move around, can be cheaper as there are less wires, and it’s easy to add more users without extra wires or a complex setup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the drawbacks of wireless networks ?

A

Generally less secure as access points are visible to all devices which could allow hackers to gain access, distance from WAP, any obstructions, and interference from other signals can reduce signal strength, and have lower bandwidth and are less reliable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a network topology ?

A

The layout of the network, the two examples we know are star and bus topologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a star topology ?

A

All devices are connected to a central switch or server - controlling the network, the switch allows many devices to access the server simultaneously. They can be wired or wireless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the advantages of star topologies ?

A

If one device/cable fails the rest of it is unaffected, simple to add more devices as each is connected to the switch with its own cable, tend to have better performance than other set ups - devices connected to switch directly so they can transmit at the same time, and has very few data collisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are some disadvantages of star topologies ?

A

Hardware - such as wires for each device connected and the switch - can be expensive, if there’s an issue with the switch or server it can affect whole network, maximum possible connections on the network is determined by the switch - if you need more connections you’d need to buy a new switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a bus topology ?

A

Use a backbone cable - a bus - to connect all devices with a terminator at each end to stop data reflecting back along the bus which would cause interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the advantages of a bus topology ?

A

Network is unaffected if one device fails, aren’t dependant on central switch to keep network running, and are relatively cheap as length of wiring needed is less and hardware needed (bus and terminators) is less to buy and maintain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are some drawbacks of bus topologies ?

A

Data collisions are common - so data has to be resent slowing network, the more devices the more likely a data collision - unsuitable for large networks, to avoid collisions devices must wait for bus to be free slowing the network, and if bus is broken it splits network into separate parts - without terminators at both ends causing reflected signals which can shut down the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a protocol ?

A

A set of rules for how devices communicate and how data is transmitted across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What things are covered by a protocol ?

A

How communication between two devices should start and end, how the data should be organised and what the devices should do if data goes missing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What format is data in when sent over a network ?

A

Data is split into equal sized packets - each containing extra information like destination and source addresses and a checksum - used to find errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is network layer ?

A

A group of protocols which have similar functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

How do layers work ?

A

They’re self contained - not dependent on knowing what happens in other layers to do their job, and each layer serves the one above it - doing work to accommodate for an action on the layer above.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are the layers of the TCP/IP model ?

A

Layer 4 - application layer, layer 3 - transport layer, layer 2 - internet layer and layer 1 - link layer.

36
Q

What happens in the application layer ?

A

Provides network services to applications - involves protocols such as HTTP, FTP and SMTP, and is responsible for things like file, email and data transfer.

37
Q

Whats happens in the transport layer ?

A

Sets up communications between two devices, splits data into packets and checks packets are correctly sent and delivered - including TCP and UDP protocols.

38
Q

What is the role of the internet layer ?

A

Responsible for adding IP addresses to data packets, directing them between devices and handling traffic, used by routers - includes the IP protocol.

39
Q

What does the link layer do ?

A

Passes data over the physical network, responsible for how data is sent as electrical signals over cables, wireless and other hardware, and for interpreting signals using device drivers - includes protocols such as Ethernet or wi-fi.

40
Q

What are the advantages of using layers in the network ?

A

Breaks network communication down into manageable pieces developers can concentrate on without worry about other areas, they are self contained so can be changed without affecting other layers, and the set rules for each layers forces companies to make compatible, universal hardware and software.

41
Q

What is HTTP ?

A

Hyper Text Transfer Protocol - used by web browsers to access websites and communicate within we servers.

42
Q

How is HTTPS different to HTTP ?

A

HTTPS is like HTTP but secure (Hyper Text Transfer Protocol Secure) - performs the same function but encrypts all information sent and received.

43
Q

What is FTP ?

A

File Transfer Protocol - used to access, edit and move files between devices on a network.

44
Q

What is IMAP ?

A

Internet Message Access Protocol - used to retrieve emails from a server.

45
Q

What is SMPT ?

A

Simple Mail Transfer Protocol - Used to send emails, and to transfer emails between servers.

46
Q

Where are TCP and UDP protocols used ?

A

Used in the transport layer, they control the packaging and unpackaging of data.

47
Q

What is TCP ?

A

Transmission Control Protocol - establishes connection between sending/receiving devices, splitting data into numbered packets to be reassembled into original data at the destination, even if they arrive out of order.

48
Q

What is UDP ?

A

User Datagram Protocol - breaks data into unnumbered packets , so are read by receiving device in order they arrive.

49
Q

How does TCP communicate with the receiving device ?

A

Communicates with receiving device to make sure all packets transferred correctly, and if not the missing/corrupted packets can be resent. Sending device receives confirmation when transfer is complete.

50
Q

How does UDP communicate with the receiving device ?

A

It doesn’t - only send each packet once and doesn’t check with receiving device that everything has been received, saving time, however no way of knowing if packets have gone missing in transit.

51
Q

When would UDP be used ?

A

For applications that need fast, efficient transmission (like live video streaming - small hiccup in video quality is better than a delay).

52
Q

When would TCP be used ?

A

For when you need a reliable connection (downloading files - missing packets could cause file to be corrupted or unusable but you would have to redownload it)

53
Q

What is IP ?

A

Internet Protocol - operating on internet layer establishing connections between routers and handling network traffic.

54
Q

What are IP addresses ?

A

Unique numbers assigned to every device connected to an IP network - added tot he header of each packet at the internet layer.

55
Q

What is the IP responsible for ?

A

Directing data packets tot heir destination across the Internet and other IP networks using packet switching.

56
Q

What is packet switching ?

A

Where each packet is sent between a series of routers - each router reading the packets IP address to decide which router to send it to next, which way the data is sent changes depending on network traffic so some packets take different routes.

57
Q

What is Wi-Fi ?

A

A family of protocols commonly used in WLANs, operating on the link layer - where units of data are called frames instead of packets.

58
Q

How does Wi-Fi transmit data ?

A

Over two frequency bands, 2.4 GHz - greater range and better at getting through walls and other obstructions, and 5 GHz - which is faster over short distances.

59
Q

When can interference occur when using Wi-Fi ?

A

The bands are split into numbered channels that each cover a small frequency range - channels in the 2.4 GHz band overlap so networks using adjacent or overlapping channels can cause interference.

60
Q

What is Ethernet ?

A

Another family of protocols that operates on the link layer, similar to Wi-Fi is handles data transmission between devices on LANs but is specifically for wired connections.

61
Q

What is cyber security ?

A

The process of trying to protect networks, data, programs and computers against damage, cyber attacks and unauthorised access - covering technologies, practices and processes used to do this.

62
Q

What is cyber warfare ?

A

Cyber attacks against governments or militaries.

63
Q

What is penetration testing ?

A

/pentesting - when organisations employ specialists to simulate potential attacks to their system - to identify possible weaknesses in cyber security, which are then reported back so these vulnerabilities can be fixed. There can be white box or black box penetration testing.

64
Q

What is white box penetration testing ?

A

It simulates a malicious insider who has knowledge of the current system (an employee), person carrying out the test is given user credentials to see what they can do with them.

65
Q

What is black box pentesting ?

A

Simulates an external cyber attack, person carrying out the test not given any credentials but is attempting to hack the organisation in any way they can.

66
Q

What is malware ?

A

/malicious software - code designed to cause harm or gain unauthorised access to a computer system - often installed onto someones device without their knowledge/consent.

67
Q

What is ransomware ?

A

Where a hacker encrypts all the files on a computer - the user receiving a message demanding a large sum of money paid in exchange for a decryption key.

68
Q

What does adware do ?

A

Displays unwanted pop-up ads that can’t be closed.

69
Q

How does spyware work ?

A

It monitors the user by tracking actions like key presses and sends this info to the hacker who could then work out things like passwords and bank details.

70
Q

What do rootkits do ?

A

They alter permissions, giving hackers administration level access to devices.

71
Q

How do viruses spread malware ?

A

They attach to certain files, users spread them by copying infected files and activate them by opening the infected files.

72
Q

How do worms spread malware ?

A

They work like viruses but they self replicate, allowing them to spread very quickly, exploiting weaknesses in network security and slowing down network traffic.

73
Q

How do trojans spread malware ?

A

They are disguised as legitimate software, tricking users into installing them - they don’t replicate themselves.

74
Q

What is social engineering ?

A

A way of gaining sensitive information or illegal access to networks by influencing people - can be done through pharming, phishing, shouldering and blagging.

75
Q

What is pharming ?

A

User is directed to a fake version of a website that looks like the real thing, when the user puts in personal information, the criminals can then access their genuine account. Often carried out using malware to redirect users from the genuine site to the fake one. Up to date anti malware software can reduce the risk of these, and internet browsers can use web filters to block access.

76
Q

What is phishing ?

A

When criminals send out emails/texts claiming to be from a well-known business - often leading users to fake websites like pharming - these are sent to thousands of people for the few that will believe it. Many email programs or browsers or firewalls have anti-phishing features. Fake emails can be spotted due to bad grammar, requests to follow links or to update personal details.

77
Q

What is shouldering ?

A

Watching a persons activity physically (looking at PIN numbers while they’re entered, or while entering passwords). Doesn’t require technical expertise and can be stopped by being discreet when entering personal details.

78
Q

What is blagging ?

A

When someone makes up a story to get the victim to give information/do things they wouldn’t normally, criminals use these tactics to try and pressure/rush people into giving away details without proper thought - reduce risk by using security measures that can’t be given away (biometrics).

79
Q

What is a network policy ?

A

A set of rules and procedures that an organisation will follow to ensure their network is protected against any possible security threats.

80
Q

What are MAC addresses ?

A

Unique identifiers assigned to network devices by the manufacturer (can’t be changed).

81
Q

What is encryption ?

A

When data is translated into a code only someone with the correct key can access, encrypted text is called cipher text and non-encrypted data is called plain text.

82
Q

How does anti-malware software work ?

A

Finds/stops malware from doing any damage, may different types, like firewalls - examine all data entering and leaving a network and block any potential threats.

83
Q

What is the purpose of automatic software updates ?

A

To patch any identified security holes in a piece of software, unpatched/outdated software can be more easily exploited by hackers, malware and viruses.

84
Q

What do user access levels do ?

A

Controls which parts of a network different users can access, limiting the number of people with access to important data so help prevent attacks from within the organisation.

85
Q

What is MAC address filtering ?

A

It checks the MAC address of devices trying to connect to a network and only lets allowed devices join - makes sure the only people on a network are trusted users.

86
Q

What kind of authentication measures are there ?

A

Passwords, biometric measures, email confirmation and CAPTCHA.

87
Q

What is CAPTCHA ?

A

Completely Automated Public Turing test to tell Computers and Humans Apart - prevents programs from automatically doing certain things (creating many user accounts).