Section 4: Computer Networks Flashcards

1
Q

Networking

A

The sharing of information and resources through linked computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of network classifications via connection patterns

A

Bus: machines connected to a single communication line
Star: single machine acts as the single point for connection
Ring: devices connect directly to each other as peers, forming a circle
Mesh: every device is connected to every other device in the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cluster computing

A

Using many computers to work comparable to a larger machine; can be more cost effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Transmission media

A

Components that carry data from one network device to another. Wired or wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Coaxial cables

A

First used in the 1940s and used for base band and broadband. The bandwidth is about 80 times that of twisted wires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Base band

A

Signal at a very narrow frequency range on which info is superimposed and transmitted. An example would be ethernet LANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Broadband

A

High capacity transmission technology used to transmit data across long distances in at high speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fiber optic cable

A

Able to transmit a lot of data. About 26,000 times the bandwidth of twisted pear wires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware

A

Any software designed to cause damage to a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virus

A

Any software program that inserts itself into existing programs in a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Worm

A

An autonomous program that forwards copies of itself to other devices on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spyware

A

Collects information about computer activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phishing

A

Sending emails posing as a legitimate business asking for information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Denial-of-service (DoS)

A

Overloads a computer with messages in order to suffocate network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Packet sniffing/Man-in-the-middle (MITM)

A

Intercepts data traveling to and from a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Brute force attack

A

Uses all possible combinations of characters to learn a password

17
Q

Dictionary attacks

A

Uses an application and large text file to try many words and combinations to figure out a password.

18
Q

Hash values

A

Passwords stored as scramble text

19
Q

Rainbow Tables

A

Tries to identify hash values, then converts it back to the plain text password

20
Q

CIA of Computer Security

A

Confidentiality
Integrity
Accessibility

21
Q

Firewalls

A

Blocks outgoing messages with certain destination addresses or blocks incoming messages from suspicious sources

22
Q

Proxy server

A

Software that acts as an intermediary between a client and a server in order to protect the client

23
Q

Encryption

A

Encodes information in order to keep it confidential even if the data is stolen