Topic 3) Networks Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is a Server?

A

A computer system or a software application that provides a service to other computer systems on the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a client?

A

Computer system or software application that requests a service from a server, connected to the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Computer Networks?

A

A computer network is formed when 2 or more computers are linked together
Every computer or device on a network can send and recieve data from any other computer/device on the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What devices are used to connect computers to a network?

A

Hubs
Switches
Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Hub? How do they work?

A

A connection point for devices on a single network.
When a network device wishes to send data across the network, it copies the data and sends it to all devices connected to its ports
–> very unecessary traffic, slows the network down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Switch?

A

It identifies which device is connected to each port. Data is only sent to the computer that needs it.
–> Much faster than a Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Router?

A

Connects multiple networks and serves as an intermediary between them ie. home network and the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Internet?

A

A globally connected network system
Uses TCP/IP Protocols to transmit data
Not centrally governed
Hosts web pages on the World Wide Web (www.____________)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does the Internet work?

A

Every file/data you send over the internet gets split into packets
The packets all take different routes but ultimately reach the same destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Router?

A

Used to manage traffic
Controls the data flow of packets
Checks address on data packets
Puts the packets on the correct path through a secure transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the types of network?
Briefly describe each one

A

LAN- Covers a single building or collection of buildings
WAN- Covers larger areas (1km radius), or several LAN’s
VLAN- 1 or more physical LANS’s, divides a network into numerous networks
SAN- Network of storage devices, purpose specific
WLAN- Takes requests and responses from the internet.
Intranet- private network, only accessible from within one network
Extranet- an accessible network via an online portal.
VPN- private internet access
PAN- Personal Area Network
P2P- Sharing resources with 2 or more computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a VPN?

A

all requests are sent to the VPN server, the server then makes the request on the users behalf, returning the reponse to the user via the VPN client.
All connections are encrypted, connecting between user and client is tunnelling and the encryption is usually (SSL, TLS or IPSec)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the advantages to VPN’s?

A

Authentication: Encryption cannot be changed by an outsider
Encryption: Data cannot be accessed or altered
Tunnelling: Data can be secured using proprietary protocols
Multiple Exit Nodes: Origin of initial data packets is unclear, and data can appear to originate from multiple IP Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Protocol?

A

A set of rules for data transmission
ie. TCP/IP, HTTPS, SFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the roles of protocols?
- and what do they do?

A

Maintain Data Integrity- same data that is sent is received
Flow Control- data is sent and received at the same rate
Prevent Deadlock- two packets don’t “block each other”
Prevent Errors- makes sure no errors are introduced in transmit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the OSI model?

A

Open Systems Interconnection
It models network connection in layers

17
Q

What are the 7 OSI Layers? (minimum of 3)

A

“All People Seem To Need Data Processing”
Application
Presentation
Session
Transport
Network
Data Link
Physical

18
Q

What is Transmission Media?
Describe it

A

Physical media by which data packets are transmitted
Two types: Wired and Wireless

19
Q

What are some examples of Wired Transmission Media?

A

Ethernet, Fiber Optic, Coaxial

20
Q

What are some examples of Wireless Transmission Media?

A

Radio Waves (WLAN), Microwaves

21
Q

What 4 factors need to be considered with Transmission Media?

A

Security
Reliability
Cost
Speed

22
Q

What are the differences between Wifi and Ethernet?

A

Ethernet is faster, more consistent speed, lower latency of data transfer
Wifi is easier to install and deploy, and is cheaper
Ethernet is more secure, can only be tapped through physical access

23
Q

Whats’s the difference between Fiber Optic and Copper Cabling?

A

Fiber is faster, more expensive, lighter and almost impossible to tap, immune to interference, and has a longer range
Copper is succeptible to electromagnetic interference, shorer range, heavier and thicker

24
Q

What are the types of transmission factors?
- and what are they?

A

Primary Factors: Traffic
Secondary Factors: Time of Day, Distance, Infrastructure
Tertiary Factor: Environmental Issues (Temperature, Interference), Financial Factors (Cheaper equipment, etc.), Type of Data (Size, Streaming, etc.)

25
Q

What are the two types of Compression?

A

Lossy
Lossless

26
Q

What is Lossy Compression?

A

Removes Data
Smaller File Size
Irreversible
Used when some data can be lost

27
Q

What is Lossless Compression?

A

Uses algorithm to reduce file size
Larger than lossy, but smaller than normal
Reversible
Used when no data can be lost (text, software, etc.)

28
Q

What are the types of Authentication, and what are some examples?

A

One Factor: One way, (Something you know)
ie. passwords, security question or pin code
Two Factor: Two ways, (Something you know, and something you have)
ie. smartphone, smart code, hardware token, in addition to first factor
Three Factor: Three ways, (Something you know, something you have and something you are)
ie. fingerprint, retinal scans, facial recognition

29
Q

What is Encryption?

A

Encoding data, which can only be read by the sender and reciever who also have access to the “key” which decodes the data

30
Q

What is a MAC Address?

A

Media Access Control
Used to identify network-enabled devices in networks
“Hard-coded” by the manufactorer
Unique, 6 pairs of 2 hex digits
Can get checked against a list and is prodominntly used by the authorities.

31
Q

What are Firewalls?

A

Hardware or Software based
Analyzes data packets, controls incoming and outgoing traffic according to predetermined rules, can filter based on MAC Addresses.

32
Q

What are some types of Physical Security?

A

Locked Doors
Cages
Security Guards
Secure Rooms
Hurricane/Earthquake Proof
EMP-insulated