section 2 networks Flashcards

1
Q

what is a LAN

A

local area network that covers a small geographical area and is often found in schools and universities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why use a LAN

A
sharing files
share the same hardware
share internet connection
updates all at once
communicate cheaply
user accounts can be stored centrally
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is WAN

A

wide area network

connect LANs that are in different areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what factors affect performance of networks

A

Bandwidth
wired or wireless connections
network topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is bandwidth

A

is the amount of data that can be transferred in a given time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a network interface card

A

an internal piece of hardware that allows a device to connect to a network
built into the motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are switches

A

connect devices on a LAN

switches receive data from one device and transmit this data to the device on the network with the correct MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are routers

A

responsible for transmitting data between networks

they also direct data packets to their destinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ethernet cables

A

CAT 5 and CAT 6

twisted pair cables which are twisted together to reduce internal interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Coaxial cables

A

single copper wire surrounded by plastic layer which provides shielding from outside interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fibre optic

A

transmits data as light

high performance because they don’t suffer from interference and can transmit over large distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how do wireless networks work

A

use radio waves to transmit data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how do you connect a network to wireless and devices

A

need a wireless Access point which is a switch that allows devices to connect wirelessly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how does WIFI work

A

uses two radio frequency bands the two bands overlap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What affects WIFI

A

interference between net works using adjacent channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is a passive attack and the best defense

A

someone monitors data travelling on a network and intercepts any sensitive information they find

data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is an active attack and best defense

A

when someone attacks a network with malware

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is an insider attack

A

someone within the organisation exploits their network access to steal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is a brute force attack and best defense

A

is a type of active attack used to gain information by cracking passwords through trail and error
use automated software to produce hundreds of passwords

locking accounts and strong passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is a denial of service attack

A

where hacker tries to stop users from accessing a part of a network
involve flooding the network with useless traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is malware

A

software that can harm devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are typical actions of malware

A

locking files(ransomware)
spyware
opening back doors
rootkits(alter permission)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what is a virus and how they spread

A

attach by coping themselves to certain files

users spread them by copying infected files and activate by opening them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what are worms and how they spread

A

they self replicate without any user help

exploit weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what are Trojans
malware disguised as legitimate software
26
what is social engineering
a way of gaining sensitive information or illigal access to networks by influencing people
27
what is a common way of social engineering
over the telephone by pretending to be administrator and persuades them to give confidential information
28
what is phishing
when criminals send emails to people claiming ti be from a well known business they are normally sent to lots of people
29
what is SQL
structured query language | main coding languages used to access information in a database
30
what are SQL injections
are pieces of SQL typed into a website input box which then revels sensitive information
31
what will a good network policy have
``` regularly test the network use passwords enforce user access levels install anti-malware encrypt sensitive data ```
32
what is penetration testing
organisation employ specialists to simulate potential attacks on their network it identifys possible weaknesses
33
what is network forensics
investigations undertaken to find the cause of attacks on a network. For this to work an organisation needs a system of capturing data packets
34
why are passwords used and what should they be like
help prevent unauthorized users accessing the network | should be strong, combinations, regularly changed
35
what are user access levels
control which part of the network different groups of users can access
36
what is good about user access levels
help limit the number of people with access to important data, so help prevent insider attacks
37
what is encryption
when data is translated into code which only someone with the correct key can access
38
what is anti malware software
designed to find and stop malware from damaging an organisation's network and the devices on it
39
what do firewalls do
block unauthorised access and examine all data
40
what is a client server network
the devices connected to the server are clients | they send requests to the server the server processes it and responds
41
pros of a client server
``` easier to keep track of files easier to perform backups easier to install updates servers are reliable easier to manage network security ```
42
cons of client server
expensive server dependence server may become overloaded
43
what is a peer to peer network
all devices are equal, connecting directly to each other without a server
44
pros of peer to peer
easy to maintain | no server dependence
45
cons of peer to peer
no centralized management easy to lose track of whats stored where less reliable machines slow down when other devices access them
46
what are the advantages of using layers
communication into manageable pieces self contained having set rules forces companies to make compatible hardware and software
47
what is the data link layer
passing data over the physical network. Responsible for how bits are sent as electrical signals over cables, wireless and other hardware
48
what is the network layer
making connections between networks, directing packets and handling traffic
49
what is the transport layer
controlling data flow splitting packets and checking packets are correctly sent and delivered
50
what is the application layer
turning data into websites and other applications and vise versa
51
what is a layer
a group of protocols which have similar functions
52
What is the TCP/IP protocol
dictates how data is sent between networks
53
what is TCP
transmission control protocol sets the rules for how devices connect on the network. In charge of splitting the data into packets and reassembling the packets back into original data once it reaches the receiving device
54
what is IP
internet protocol is responsible for packet switching
55
what is the HTTP protocol
hyper text transfer protocol(used by web browsers to access websites and communicate with web servers)
56
what is the HTTPS protocol
HTTPsecure(a more secure version of HTTP
57
what is the FTP protocol
file transfer protocol(used to access, edit and move files between devices on a network)
58
what is the IMAP protocol
internet message access protocol(used to retrieve emails from a server the server holds the email until you delete it)
59
what is the POP3 protocol
post office protocol(used to retrieve emails from a server | server holds the email until you download it)
60
what is the SMTP protocol
simple mail transfer protocol(used to send emails)
61
what is the internet
a network of networks, it's a WAN which connects devices and networks from all over the world
62
what is the worldwideweb
a collection of websites that are hosted on web servers and accessed through the HTTP protocol
63
what are URLs
are addresses used to access web servers and resources on them
64
what is a domain name server
translates a websites domain name into its IP address
65
what is cloud computing
using the internet to host general storage
66
advantages of cloud computing
``` access files from connected devices easy to increase storage size no need to buy expensive hardware no need to pay it staff provides security updated automatically ```
67
disadvantages of cloud computing
connection to the internet dependent on host vulnerable to hackers subscription fees
68
what is a virtual network
a network that is entirely software based | they are created by partitioning off some of the networks bandwidth
69
what are the advantages of virtual networks
exist on the same network, making them more efficient | has its own security
70
what is a virtual private network
a type of virtual network that can be used to send data securely over a large network
71
how is data sent between devices
data is split into equal sized packets
72
what does each packet contain
header-this contains the control information which has the destination address checksum-a form of validation used to check that the payload data hasn't been corrupted during transit
73
how does packet switching work
1) splits the data and each piece is given a packet number 2) each router reads the packet header and decides which way to send the packet next 3) packets can take different routes depending on the traffic 4) the packets arrive in the wrong order so they use the packet numbers to reassemble 5) when all the data is received and the checksum matches a receipt conformation is sent
74
what is a star topology
all devices are connected to a central switch or server that controls the network
75
advantages of a star topology
if a device fails it is unaffected simple to add more devices better performance because of few data collisions
76
disadvantages of a star topology
every device will need wires | problem with switch or server every thing dies
77
what is a bus topology
all devices arranged in a line connected to a single backbone data collisions are common
78
what is a ring topology
data moves in one direction around the ring preventing collisions only one device can send data at a time
79
what is a mesh topology
a decentralized networking devices are either directly or indirectly connected to every one without the need for a central server
80
advantages of mesh
no single point where the network can fail | can take different routes
81
disadvantages of mesh
expensive
82
what is a protocol
a set of rules for how devices communicate and how data is transmitted across a network
83
what is a MAC address
are unique identifiers and are assigned to all the network devices they are unique and can not be changed
84
how many bits are in MAC binary
48 or 64
85
where is the MAC address mainly used
Ethernet protocol on LANs | LAN switches read the MAC address and use them to send data to the right device
86
what are IP address used for
when sending data between TCP/IP networks
87
how are IP address assigned
manually or automatically
88
what is a static IP address | advantages and disadvantages
permanent addresses there used to connect printer and for hosting websites on the computer companies don't want there IP address changing IP addresses are expensive
89
what is a dynamic IP address
are assigned to the device by a network server meaning the device will have a different IP address each time you log in
90
how many bits are in a IP address binary
32 or 128
91
how does does DNS work
1) type in URL and the ISP looks up the domain name and finds the IP address 2) the web browser sends a request straight to that IP address asking for the page
92
advantages of DNS
don't have to remember IP address private servers still available but shielded help browse the internet fast internet connection