Section 6 - Networks Flashcards
Keywords and questions
Define the term Local Area Network (LAN)
A group of devices connected to share data, located on a single site
State two advantages of connecting the computers together into a LAN
- The computers can share the files more easily
* The computers can share hardware
Explain a difference between a PAN (Personal Area Network) and a LAN
A PAN has a very short range, often connectung devices in the same room, whereas a LAN has a slightly bigger range, connecting devices across a site.
Give three advantages of the star tropology.
If a device or connection fails the rest of the network is unaffected.
It’s easy to add more devices to the network compared to other tropologies.
Direct connections to switch/server mean all devices can transmit data at once.
State the purpose of a terminator.
To absorbsignals and stop data reflecting back along the bus.
Explain one advantage and one disadvantage of bus tropologies compared to star tropologies
Advantage: A bus network isn’t reliant on a central server or switch whereas a star network will completely fail if the central device stops working.
Disadvantage: Bus networks are reliant on a single cable so if that cable was to fail then the whole network would stop working.
Define the term network protocol.
A set of rules for how devices communicate across a network
Give three benefits of using layers when working with network protocols.
Layers break network communication into manageable pieces.
Layers allow developers to focus on one area of the network without worrying about the others.
There are set rules for each layer.
Describe two families of protocols that work on the link layer of the TCP/IP model
1) Wi-Fi is a family of protocols that manage wireless data transfer on WLANs (Wireless Local Area Networks).
2) Ethernet is a family of protocols that manage data transfer on wired LANs.
Describe what is meant by a packet
A packet is a unit of data sent over a packet-swicthing network that contains the main data and extra information, e.g. source and destination address.
Define the term cyber security
Cyber security is the processes, practices and technologies that are put in place to protect networks, data, computers and software from attack, damage or unauthorised access.
What is the difference between black box and white box penetration testing
In a black box test, the person carrying out the attack is not given any information or credentials, whereas in a white box test, the person carrying out the test is given normal user access to the network.
State the name given to the practice of sending fake emails.
Phishing
What is the purpose of sending fake emails?
Phishing emails are used to trick people into thinking they are emails from legitimate organisations so that they give criminals their personal information, e.g. account login details.