Section Six- Networks Flashcards

1
Q

What does LAN stand for?

A

It stands for local area network. It covers a small geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does WAN stand for?

A

WAN stands for Wide area network. A WAN connects LANs that are different geographical locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does PAN stand for?

A

It stands for personal area network. They connect devices over a very short range. They are normally centred around a single user. PAN often use common wireless technology to connect devices like Bluetooth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Benefits of networking computers

A

Sharing files is easier- network users can access the same files, work on them at the same time and copy files between machines.
You can share the same hardware between multiple devices.
You can install and update software on all computers all at once.
You can communicate across the network cheaply and easily.
User accounts are kept centrally, so it can be accessed by any devices on that network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Drawbacks of networks

A

They can be expensive to set up, as you often need a lot of extra hardware.
Networks can be vulnerable to hacking, and malware can easily spread between networked computers.
Some networks are dependent on one or more servers. If those servers go down it can be quite disruptive for people trying to use the network.
Large networks are difficult to manage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What hardware does a network require?

A

A Network Interface Care is a piece of hardware inside a device that allows it to connect to networks.
Switches are used to connect devices on a LAN, while routers transmit data between different networks, and are most commonly used to connect to the Internet.
Most routers contain this including a WAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the different cables that can connect you to the network?

A

Fibre optic cables- transmits data as light. They are high performance and expensive cables- they don’t suffer interference and can transmit over very large distances at a high bandwidth without the loss of signal quality.

CAT 5e and CAT 6 are common types of Ethernet cables. They contain pairs of copper wires which are twisted together to reduce internal interference. They’re cheaper than fibre optic cables and have a decent bandwidth, which is why they are commonly used in homes and offices to connect devices on a LAN.

Coaxial cables are made of a single copper wire surrounded by a plastic layer for insulation and a metallic mesh which provides shielding from outside interference. They tend to be very cheap, although they also have a low bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does WLANs stand for?

A

Local wireless networks. They are also known as Wi-Fi, but Wi-Fi is a specific family of WLAN protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do wireless networks use to transmit data?

A

Radio waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do you need to setup a wireless network?

A

You need a wireless access point (WAP). It’s basically a switch that allows you to connect wirelessly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Benefits of a wireless networks

A

Wireless networks are convenient, as you can get your device to automatically connect to the network, and can also move around while connected to the network.

They can be cheaper and better for the environment as you don’t need any wires.

Very easy to add more users to a wireless network- you don’t need to install extra wires or do any complex setup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Drawbacks of wireless networks

A

Wireless networks are generally less secure than wired networks- access points are usually visible to all devices, not just trusted ones, which allow hackers to gain access.

There is a limit on how far a wireless network can reach.

They generally have a lower bandwidth and is less reliable than wired networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In a star topology, how are all the devices connected?

A

All the devices are connected all around the centre.

All the devices are connected to a central switch or server that controls the network. The central switch allows multiple devices to access the server simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pros of a star topology

A

If a device fails or a cable is disconnected, the rest of the network is unaffected.

Simple to add more devices to the network.

Tend to have a better performance than other setups- data goes straight to the central device so all devices can transmit data at the same time.

Very few data collisions on a star network compared with other topologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cons of a star topology

A

In wired networks, every device needs a cable to connect to the central switch or server. This can be expensive.

The switch is expensive.

If there is a problem with the switch or server then the whole network is affected.

There is a maximum number of devices able to be connected to one switch. So you may have to buy another one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How are the devices connected in a bus topology?

A

Bus topologies use a single ‘backbone’ cable called a bus, to connect all devices.

Two terminators are placed at the ends of the bus to stop data reflecting back along the bus. Without the terminators, reflected signals would cause interference and potentially make the network unusable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Pros of a bus topology

A

The network is unaffected if a device fails.

Bus networks aren’t dependent on a central switch working to keep the whole network running.

They’re relatively cheap to set up. The total length of wiring needed is much less, and the hardware you need is cheaper than switches, both to buy and maintain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cons of a bus topology

A

Data collisions are common on a bus network. When there is a data collision the data must be resent, which slows the network down.

The more devices you add to the network, the more likely data collisions are. This makes bus topologies unsuitable for a large network.

To try and avoid data collisions, devices must wait for the bus to be available before they can send any data- this can also slow the network down.

If the bus cable gets broken, it splits the network into separate parts. Since the separated networks don’t have terminals at both ends of the bus, there will be a lot of reflected signals which shuts down the entire network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a protocol?

A

A protocol is a set of rules for how devices communicate and how data is transmitted across a network.

(Extra information) Protocols cover how communication between two devices should start and end, how the data should be organised, and what the devices should do if the data goes missing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are layers in a protocol?

A

A layer is a group of protocols which have similar functions.

Layers are self-contained - protocols in each layer do their job without needing to know what’s happening in other layers.

Each layer serves the layer above it- it does the hidden work needed for an action on the layer above.

21
Q

What are the 4 layers of the TCP/IP model?

A

Layer 1- Link layer
Passing data over the physical network . Responsible for how data is sent as electrical signals over cables, wireless and other hardware, and for interpreting signals using device drivers.
Wi-Fi, Internet

Layer 2- Internet Layer
Adding IP addresses to data packets, directing them between devices and handling traffic. Used by routers.
IP

Layer 3- Transport Layer
Setting up communications between two devices, splitting data into packets and checking packets correctly sent and delivered.
TCP,UCP

Layer 4- Application layer
Providing networking services to applications.
HTTP, FTP,SMTP,HTTPS

22
Q

What are the advantages of using layers?

A

Breaks the network communication into manageable pieces.

As layers are self contained, they can be changed without other layers being affected.

Having set rules for each layer forces companies to make compatible, universal hardware and software, so different brands will work with each other and always work in basically the same way.

23
Q

What does the protocol HTTP, HTTPS, FTP, IMAP, SMTP stand for and what is it used for?

A

HTTP- Hyper text transfer protocol- used by web browsers to access websites and to communicate with web servers.

HTTPS- Hyper Text Transfer Protocol Secure- a more secure version of HTTP. Encrypts all information sent and received.

FTP- File Transfer Protocol- Used to access,edit and move files between devices on a network.

IMAP- Internet Message Access Protocol- Used to retrieve emails from a server.

SMTP- Simple Mail Transfer Protocol- used to send emails. Also, used to transfer emails between servers.

24
Q

What are TCP and UDP?

A

They are transport layer protocols which control the packaging and unpacking of data.

25
Q

What does TCP stand for and what does it do?

A

Transmission Control Protocol establishes a connection between the sending and receiving devices. It splits the data into numbered packets that can be reassembled into the original data once they reach their destination, even if they arrive out of order. It communicates with the receiving device to make sure that all packets have been transferred correctly. If not the missing data can be resent. The sending device gets conformation when the transfer is complete.

26
Q

What does UDP stand for and what does it do?

A

User Datagram Protocol breaks the data down into packets without numbering them. They are by the receiving device in the order that they arrive. It only sends it once and doesn’t check if the receiving device has got everything. This saves time, but there is no way of knowing if packets have gone missing in transit.

27
Q

Comparison of UDP to TCP

A

UDP is suitable for applications that need fast, efficient transmission. A hiccup in video quality from a missing packet is better than a delay in live stream.

TCP is better when you need a reliable connection. Missing data packets can cause files to be corrupted and unusable, but you wouldn’t want to have to re-download the file.

28
Q

What does IP stand for and what does it do?

A

Internet Protocol operates on the Internet layer, establishing connections between routers and handling network traffic. IP addresses are unique numbers assigned to to every device connected to an IP network.
IP is responsible for directing data packets to their destination across the Internet using a process called packet switching.

29
Q

What is packet switching?

A

Each packet is sent between a series of routers- each routers reads the packet’s header and uses the IP address to decide which router to send the packet next to. Which way the data is sent changes depending on network traffic- so the packets can take different routes. If a router receives too many packets at once, it may prioritise some over the others.
Packet switching is an efficient use of the network because there are so many possible routers that each pocket can take- packets can reach their receiving device quickly, even if there’s heavy traffic.

30
Q

Information on WiFi

A

WiFi is a family of protocols commonly used in WLANs. It operates on the link layer- units of data sent on the link layer- units of data sent on the link layer are called frames instead of packets.

WiFi uses two radio frequency bands- 2.4 GHz and 5 GHz. 2.4 GHz has a greater range and is better st getting through walls, while 5 GHz is faster over short distances.

The bands are split into numbered channels that each cover a small frequency range. The channels in 2.4GHz band overlap. Networks using adjacent or overlapping channels can cause interference.

It’s important that data is encrypted on Wi-Fi networks. There are security protocols for this, called WPA (WiFi Protocol Access) and WPA2.

31
Q

What is cyber security?

A

Cyber security aims to protect networks, data, program and computers against damage, cyber attacks and unauthorised access. It covers the technologies, practices and processes.

32
Q

What is a penetration test?

A

Penetration testing is when organisation employ specialists to stimulate potential attacks to their system. It’s used to identify possible weaknesses in their cyber security. The reports are then reported back so that vulnerabilities can be fixed.

33
Q

What is a white box penetration test?

A

White box penetration test stimulates a malicious insider who has knowledge of the current system. The person carrying out the test will be given user credentials to see what they can do with them.

34
Q

What is a black box penetration test?

A

Black box penetration testing stimulates an external cyber attack. This person carrying out the test will not be given any credentials but will try to hack the organisation in any way they can.

35
Q

What is a malware?

A

A malware is a malicious code that is designed to cause him or gain unauthorised access without their knowledge or consent.

36
Q

Typical actions of malware?

A

Deleting or modifying files.

Locking files- ransomware encrypts all the files on a computer. The user receives a message demanding a large sum of money be paid in exchange for a description key.

Displaying unwanted adverts-adware can cause pop-up ads that cannot be closed.

Monitoring the user-spyware secretly tracks actions like key presses and sends info to the hacker, who might be able to work out things like passwords and bank details.

Altering permissions-rootkits can give hackers administrator-level access to devices.

37
Q

In which ways can malware spread between devices?

A

Viruses attach to certain files. Users spread them by copying infected files and activate them by opening infected files.

Worms are like viruses but they self-replicate without any user help, meaning they can spread very quickly. They exploit weaknesses in network security.

Trojans are malware disguised as legitimate software. Unlike viruses and worms, trojans don’t replicate themselves-users install them.

38
Q

What is pharming?

A

Pharming is where a user is directed to a fake version of a website designed to look just like the real thing, with the aim that the user won’t notice the difference.
When the user inputs personal information and bank details, they’re actually handing it to a criminal.
It is often carried out using malware that automatically redirects people from legitimate site to a fake one.

39
Q

What is phishing?

A

Phishing is when criminals send emails or texts to people claiming to be from a well-known business. The emails often lead the victim to a fake website, just like pharming.

40
Q

What is shouldering?

A

Shouldering is watching and observing a person’s activity.

E.g. spying someone’s PIN number at a cash machine.

You just need to be discreet.

41
Q

What is blagging?

A

Blagging is when someone makes up a story or pretends to be someone they’re not, to persuade the victim to share information or do things they wouldn’t normally do.

42
Q

What methods help to protect important data?

A
Encryption
Anti-malware software
Automatic software update
User access level
MAC address filtering
43
Q

What is encryption?

A

Encryption is when data is translated into a code which only someone with the correct key can access, meaning unauthorised users cannot read it. Encryption text is called cipher text, whereas data which has not been encrypted is called plain text. Encryption is essential for sending data over a network securely.

44
Q

What is an anti-malware software?

A

An anti-malware software is designed to find and stop malware from damaging an organisation’s network and the devices on it. There are many different types of anti-malware software. E.g. firewalls.

45
Q

What is an automatic software update?

A

They are used to patch any identified security holes in a piece of software. Software that is unpatched or outdated could be more easily exploited by hackers, malware and viruses.

46
Q

What is user access levels?

A

It controls which parts of the network different groups of users can access. User access levels limit the number of people with access to important data, so help to prevent attacks within the organisation.

47
Q

What is MAC address filtering?

A

It is a way of making sure the only people on a network are trusted users. It check the MAC address of each device that tries to connect to the network and only lets allowed devices join it.

48
Q

Methods of user authentication

A

Passwords- should be strong many characters long and use a combination of letters,number and symbols. It should be regularly changed.
Biometric measure- use scanners to identify people by a unique part of their body.
Email confirmation- to confirm that it is you logging in
CAPICHA- stands for completely automated public Turing test and humans apart. It is designed to prevent programs from automatically doing certain things. It usually consists of a simple task, like typing out a blurred and distorted word.