Section Two - Networks Flashcards

1
Q

What does LAN stand for?

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a LAN cover?

A

A small geographical area located on a single site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give one reason why you should use a LAN:

A

Sharing files is easier - network users can access the same files, work collaboratively on them and copy between machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does WAN stand for?

A

Wide Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of a WAN?

A

To connect LANs that are in different geographical locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can WANs be connected?

A

Through fibre or copper telephone lines, satellite links or radio links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give an example of a WAN you use every day:

A

The Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Bandwidth?

A

The amount of data that can be transferred in a given time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Finish the sentence:

The greater the bandwidth, the…

A

…better the network can perform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False? Wired connections are generally SLOWER and LESS reliable than Wireless.

A

False.

Wired connections are generally FASTER and MORE reliable than Wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does Wireless performance depend on?

A

Signal Quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What factors affect Signal Quality?

A

Range of Device
Amount of inference from other devices
Physical Obstructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does NIC stand for?

A

Network Interference Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an NIC?

A

An internal piece of hardware that allows a device to connect to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of a switch in a LAN?

A

To connect devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are routers responsible for?

A

Transmitting data between networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What can Ethernet cables be used for?

A

To connect devices in a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Give examples of a type of Ethernet cable:

A

CAT 5

CAT 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False? Ethernet Cables contain THREE twisted pairs of FIBRE-OPTIC wires.

A

False.

Ethernet Cables contain FOUR twisted pairs of COPPER wires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why are the wires in Ethernet cables twisted together?

A

To reduce internal interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are Coaxial cables made of?

A

A single copper wire surrounded by a plastic layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the purpose of the plastic layer in Coaxial cables?

A

Insulation and shielding from outside inteference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How do fibre-optic cables transmit data?

A

Using light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or False? Fibre-Optic cables are HIGH performance cables that DON’T suffer interference and CAN transmit over very large distances.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What do wireless devices use to transmit data?

A

Radio waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does WAP stand for?

A

Wireless Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What could a WAP simply be described as?

A

A switch that allows devices to connect wirelessly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What radio frequency bands are used by Wi-Fi?

A

2.4Ghz and 5Ghz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Fill in the gaps:

1) networks are made up of a (2) and (3

A

(1) Client-server
(2) Sever
(3) Clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a client-server network managed by?

A

A server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Describe a client-server relationship:

A

Clients send requests to the server. The serve processes the request and responds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are the PROS of a client-server network?`

A

Easy to keep track of files
Easy to perform back-ups
Easy to install and update software
Easy to manage security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the CONS of a client-server network?

A

Expensive to set up (needs specialists to maintain)
All clients lose access is server goes down
The server can be overloaded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

True or False?

Peer-to-Peer networks USE servers.

A

False.

Peer-to-Peer networks DON’T use servers. Clients connect directly to each other without a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are the PROS of a Peer-to-Peer network?

A

Easy to maintain

No dependence on server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are the CONS of a Peer-to-Peer network?

A

No centralized management
Less reliable
Slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a topology?

A

The layout of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Give two examples of topologies:

A

Star and Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

In a STAR topology, where are all the devices connected to?

A

A central switch or server that controls the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

True or False?

Star networks MAY be wired or wireless.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are the PROS of a Star Topology?

A

If a device fails, the rest of the network is unaffected.
Adding more devices is simple
Better performance than other set-ups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What are the CONS of a Star Topology?

A

In wired networks, every device needs a cable. This makes it expensive.
If there is a problem with the switch or server the whole network is affected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

In a MESH topology, where are all the devices connected to?

A

They are all connected to each other.
It is decentralized - networking devices are directly or indirectly connected to every other device without a central switch or server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the MAIN advantage of a mesh topology?

A

There is NO single point where the network can fail. If one device fails, data will just be sent along an alternative route.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the difference between a FULL MESH topology and a PARTIAL MESH topology?

A

A full mesh topology is where every device is connected to every other device. In a partial mesh topology, not all devices are fully connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q
Fill in the gaps:
Networks need (1) to set the rules.
A

(1) Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is a protocol?

A

A set of rules for how devices communicate and how data is transmitted across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

When are MAC Addresses used?

A

When devices are communicating on the same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

True or False?

MAC Addresses are unique to the device and cannot be changed.

A

True

50
Q

What are MAC addresses made up of?

A

48 or 64-bit binary numbers. To make them easier they’re converted into hexadecimals.

51
Q

When are IP Addresses used?

A

When devices are communicating between different networks.

52
Q

Describe the difference between STATIC and DYNAMIC IP addresses:

A

Static IP addresses are permanent addresses. Dynamic IP addresses are assigned to the device by a network server, meaning your device may have a different IP address every time you log on to the network.

53
Q

True or False?

IP addresses are 32-bit and CAN’T be 128 bit.

A

False.

IP addresses can either be a 32-bit or 128-bit binary number.

54
Q

Fill in the gaps:

Data is sent between networks in (1).

A

(1) Packets

55
Q

Describe the header of a packet:

A

Every data packet has a header - this contains control information. This information includes the packet’s destination address, the source address and the packet number.

56
Q

What is the purpose of a checksum number in a packet?

A

A form of validation used to check that the payload data hasn’t been corrupted during transit.

57
Q

What is PACKET SWITCHING used for?

A

It is used to direct the data.

58
Q

Order the steps of PACKET SWITCHING:
A receipt confirmation is sent to the sending device
Each router reads the packet header and decides which way to send the packet.
The sending device splits the data into packets
The receiving device uses packet numbers to put them in the right order.
Each packet is given a packet number.
As the packets take different routes, they can arrive in the wrong order.

A

The sending device splits the data into packets
Each packet is given a packet number.
Each router reads the packet header and decides which way to send the packet.
As the packets take different routes, they can arrive in the wrong order.
The receiving device uses packet numbers to put them in the right order.
A receipt confirmation is sent to the sending device.

59
Q

What are the two most important protocols?

A

TCP - Transmission Control Protocol

IP - Internet Protocol

60
Q

What is the purpose of a TCP?

A

To set the rules for how devices connect on a network. It’s in charge of splitting data into packets and reassembling packets. It’s responsible for checking the data is correctly sent and delivered.

61
Q

What is the purpose of an IP?

A

To control packet switching.

62
Q

What does HTTP stand for and what is it used for?

A

Hyper Text Transfer Protocol

-Used by web browsers to access websites and communicate with web servers.

63
Q

What does HTTPS stand for and what is it used for?

A

HTTP Secure

-A more secure version of HTTP. Encrypts all information sent and received.

64
Q

What does FTP stand for and what is it used for?

A

File Transfer Protocol

-Used to access, edit and move files between devices on a network.

65
Q

What does POP3 stand for and what is it used for?

A

Post Office Protocol - version 3
Used to retrieve emails from a server. The server holds the email until you download it, at which point it deletes it from the server.

66
Q

What does IMAP stand for and what is it used for?

A

Internet Message Access Protocol
Used to retrieve emails from a server. The server holds the email until you actually delete it - you only download a copy.

67
Q

What does SMTP stand for and what is it used for?

A

Simple Mail Transfer Protocol

Used to send emails. Also used to transfer emails between servers.

68
Q

What are the four layers of Network Protocols?

A

Application Layer
Transport Layer
Network Layer
Data Link Layer

69
Q

What is the fourth layer?

A

Application Layer

70
Q

What do protocols in the fourth layer cover?

A

Turning data into websites and other applications and vice versa.

71
Q

What are examples of protocols in the fourth layer?

A

HTTP, FTP, SMTP

72
Q

What is the third layer?

A

Transport Layer

73
Q

What do protocols in the third layer cover?

A

Controlling data flow

74
Q

What are examples of protocols in the third layer?

A

TCP

75
Q

What is the second layer?

A

Network Layer

76
Q

What do protocols in the second layer cover?

A

Making connections between networks, directing data packets and handling traffic. Used by routers.

77
Q

What are examples of protocols in the second layer?

A

IP

78
Q

What is the first layer?

A

Data Link Layer

79
Q

What do protocols in the first layer cover?

A

Passing data over the physical network. Responsible for how bits are sent as electrical signals over cables, wireless and other hardware.

80
Q

What are the advantages of using layers?

A
  • Breaks network communications into manageable pieces.

- Layers can be changed without other layers being affected

81
Q

Fill in the Gaps:

The Internet is a (1) collection of (2)

A

(1) Worldwide

(2) networks

82
Q

What protocol is the Internet based around?

A

TCP/IP

83
Q

True or False?

The World Wide Web is a collection of websites that are hosted on web servers.

A

True

They are accessed through the HTTP protocol.

84
Q

Complete the sentence:

A Domain Name Serve translates a website’s domain name into…

A

..its IP address. The internet has a network of Domain Name Servers.

85
Q

What is Hosting?

A

When a business uses its servers to store files of another organisation.

86
Q

What are the advantages of The Cloud?

A
  • Easily access files
  • Easy to increase storage
  • No expensive hardware
  • No maintenance fee
  • Security and back-ups provided
  • Updated automatically
87
Q

What are the disadvantages of The Cloud?

A
  • Need access to Internet
  • Dependent on Host
  • Data vulnerable to hackers
  • Subscription fees
88
Q

Fill in the Gaps:

A (1) network that is entirely (2)-based.

A

(1) virtual

(2) software

89
Q

How are Virtual Networks created?

A

Virtual Networks are created by partitioning off some of a physical network’s bandwidth to form a separate network.

90
Q

What is the impact of Virtual Networks having there own security?

A

Virtual Networks can only be accessed by using certain software or login information.

91
Q

What does VPN stand for?

A

Virtual Private Network

92
Q

What is a VPN?

A

A type of virtual network that can be used to send data securely over a large network.

93
Q

What is a PASSIVE attack?

A

Where someone will monitor data travelling on a network and intercepts any sensitive information they find.

94
Q

What is the best DEFENCE against PASSIVE attacks?

A

Data Encryption

95
Q

What is an ACTIVE attack?

A

When someone attacks a network with malware or other planned attacks.

96
Q

What is the main DEFENCE against an ACTIVE attack?

A

A Firewall

97
Q

What is an INSIDER attack?

A

Where someone within an organisation exploits their network access to steal information.

98
Q

What is a BRUTE FORCE attack?

A

A type of active attack used to gain information by cracking passwords through trial-and-error.

99
Q

What measures REDUCE the risk of a BRUTE FORCE attack?

A

Locking accounts after a certain number of attempts

Strong Passwords

100
Q

What is a DENIAL-OF-SERVICE attack?

A

Where a hacker tries to stop users from accessing a part of a network or website.

101
Q

What do most DENIAL-OF-SERVICE attacks involve?

A

Flooding the network with useless traffic, making the network extremely slow or completely inaccessible.

102
Q

What is Malware?

A

Software that can harm devices.

It is installed on someone’s device without their knowledge or consent.

103
Q

What are typical actions of malware?

A

Deleting/Modifying files.
Scareware
Locking Files
Spyware

104
Q

What is Social Engineering?

A

A way of gaining sensitive information or illegal access to networks by influencing people.

105
Q

What is Phishing?

A

Phishing is when criminals send emails or texts to people claiming to be from a well-known business.

106
Q

Fill in the gaps:

(1) Injections give criminals easy access to (2) data.

A

(1) SQL

(2) Insecure

107
Q

What does SQL stand for?

A

Structured Query Language

108
Q

What are SQL injections?

A

Pieces of SQL typed into a website’s input box which then reveal sensitive information

109
Q

What is the coding language of SQL used for?

A

To access information in databases

110
Q

What is an issue of a website’s SQL code not having a strong enough input validation?

A

Someone may be able to enter a piece of SQL code which allows them to access other people’s account information.

111
Q

What are the properties of a GOOD network policy?

A

Regularly test the network to find and fix security weaknesses
Use passwords to prevent unauthorised access
Enforce user access levels
Install anti-malware and firewall software
Encrypt sensitive data

112
Q

What is penetration testing?

A

When organisations employ specialists to stimulate potential attacks on a network.

113
Q

What is penetration testing used for?

A

To identify possible weaknesses in a network’s security and trying to exploit them.

114
Q

What are network forensics?

A

Investigations undertaken to find the cause of attacks on a network.

115
Q

What do organisations need to conduct network forensics?

A

A system of capturing data packets as they enter their network.

116
Q

What are network forensics used for?

A

To analyse packets after attacks to discover how the network was attacked and decide how to prevent future attacks.

117
Q

What is the purpose of passwords?

A

To help prevent unauthorised users accessing the networks.

118
Q

What is the purpose of User Access Levels?

A

To control which part of the network different groups can access

119
Q

What type of attack do User Access Levels help prevent? Give Reasons.

A

Insider Attacks because they help limit the number of people with access to important data.

120
Q

What is the purpose of Anti-Malware software?

A

To find and stop malware.

121
Q

What is Encryption?

A

When data is translated into a code which only someone with the correct key can access.

122
Q

What is encrypted text called?

A

Cipher text