Section 4: Computer Networks Flashcards

1
Q

What are Networks?

A

A service that allows people to share information and resources through linked computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do Networks work?

A

Network software and its configurations manage the operations of the network interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is PAN?

A
  • PAN (Personal Area network)
  • Used between devices i.e. Bluetooth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is LAN?

A
  • LAN (Local Area network)
  • Provides network access to a small office or building (Wi-Fi)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is WAN?

A
  • WAN (Wide Area Network)
  • Provides network access to a wide range of across the country or even across the world (Internet)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Public Domain?

A

Services provided to everyone for free w/out licensing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is open network?

A

Freely circulated and are often more popular than proprietary designs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is TCP/IP Protocol?

A

Governs communication of devices over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Bus topology?

A

Machines are connected to a single communication line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Star topology?

A

Has a single machine serving as a central point to which all others are connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Ring topology?

A

Connect directly to each other as a peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Mesh topology?

A

Connects every device in a network to every other device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are protocols

A

Govern communication in networks, ensuring coordinated message transmission and compatibility among different vendors’ products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why do vendors use protocols?

A

Allow communication between their various products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Client/Server Model (Give an example)?

A

Clients make a request and servers fulfill those requests (Multiple clients send print jobs to a single printer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Peer to Peer Model (Give an example)?

A

Devices both request and provide services to one another (gaming and Instant messaging)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Cluster Computing

A

Independent computers working together to simulate the work of a supercomputer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Grid Computing?

A

Loosely couple systems collaborating to complete large tasks, using specialized software to distribute workloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Cloud Computing?

A

Provides scalable, shared computing resources, allowing users to rent virtual machines and collaborate w/out managing underlying hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is transmission media

A

A component that carries data from one network device to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Coaxial Cable?

A

Have an outer plastic that is used in computer networks and to deliver cable TV services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a Fiber-Optic Cable

A

Uses reflection of light through a core made up of glass or plastic

23
Q

How do Repeaters work?

A

Extend the range of network signals by amplifying them

24
Q

How do Bridges work?

A

Connect different types of networks and manage messages

25
Q

How do Switches work?

A

Reduce network traffic by managing message delivery

26
Q

3 Tiers of ISPs

A

Tier 1: High-speed international WANs that are operated by large communication companies

Tier 2: More common and regional in scope

Tier 3: Independent internets. Operated by a single organization that supplies internet access to homes and businesses

27
Q

What does ICAAN stand for?

A

Internet Corporation for Assigned Names and Numbers

28
Q

What is IPv4?

A

32-bit address pattern to uniquely identify all of the internet components (Used to identify devices)

12 digits in groups of 3.

29
Q

What is IPv6?

A

Uses 128-bit addresses in addition to legacy IPv4

30
Q

What is a Top Level Domain?

A

Top-Level Domains are used to identify what the hyperlinks are and who they belong to

(.com / .edu / .org)

31
Q

What is DNS?

A

Domain name System - Hierarchical and decentralized system that translates human-readable domain names into numerical IP addresses

(computers use to identify one another on a network)

32
Q

What is a domain name?

A

Easy to read names that are used to navigate the internet (www.google.com)

33
Q

How is the DNS organized?

A

Root DNS server sends a request to the TLD Servers

34
Q

What is DNS Resolution?

A

Process of translating a domain name into an IP address

35
Q

What protocol supports Email?

A

SMTP - Simple Mail Transfer Protocol

36
Q

What is VoIP?

A

Voice over Internet Protocol

37
Q

What is a Softphone?

A

Allow two or more computers to share a call w/out any additional hardware

38
Q

What is an Analog Telephone?

A

Allow users to connect their physical phones to a port that digitizes and then transmits real-time audio data

39
Q

What is on Demand Streaming?

A

End user expects to view or listen to media at an arbitrary time of their choosing.

40
Q

What is broadcasting?

A

A server communicates w/ multiple devices at specific times determined by the providers

41
Q

What is large-scale streaming services?

A

They use Content Delivery Networks (CDN) to stream copies of content to nearby end users

42
Q

What is a CDN?

A

Groups of servers distributed strategically over the internet

43
Q

What is a URL?

A

Uniform Resource Locator - Includes protocol, domain, and all subdomains, as well as the resource path ID and name of the document

Unique address given to each hypertext document on the World Wide Web

44
Q

What is the common structure of a URL?

A

http://subdomain.domain.top-level-domain/directory-path/document_name.html

45
Q

What is XML?

A

Extensible Markup Language

Provides a standardized style for designing national systems for representing data as text files. XML emphasizes semantics

46
Q

What does HTML stand for?

A

HyperText Markup Language

Special symbols called tags describe how the doc should appear on a display screen. HTML focuses on appearance

47
Q

What is the difference between malware and a software bug?

A

Malware is intentional disruptions or bugs within software whereas a software bug is unintentional

48
Q

What is a Virus?

A

Infects a computer by inserting itself into programs that already reside in the machine

49
Q

What is a Worm?

A

Autonomous program that forwards copies of itself to other machines in a network and could result in a detriment of individual machine’s or the operations of the network

50
Q

What is Spyware?

A

Collects information about the computer’s activities and reporting back to the spyware’s instigator

51
Q

What is Phishing?

A

Used to obtain private information by simply asking for it

52
Q

Name other types of attacks.

A

DoS Attack - Denial of Service (Overloads computer w/ messages and results in suffocating the network resources)

Packet Sniffing - Referred to as a “Man-in-the-middle” attack MTM where the attacker intercepts the data as it is traveling to or from the victim’s device

Brutal Force Attack - The attacker uses all possible combos of characters to learn a user’s password

Dictionary attack - Using an application and a large dictionary text file w/ just words

53
Q

Protection and Risk Management systems

A

Firewall - Block outgoing messages w/ certain addresses or block incoming messages from untrustworthy sources

Proxy Server - Acts as an intermediary between a client and a server to shield the client

Network Auditing Software - Monitors network behaviors such as the origin and volume of traffic, looking for anomalies to proactively or reactively mitigate unwanted occurrences