Topic 4: Networks Flashcards

1
Q

Standalone computer

A

A computer that is not connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network

A

An arrangement(or group or setup) of two or more computers that are connected together for the purpose of sharing hardware and/or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internet of Things (IoT)

A

A network of physical objects that use sensors, actuators, embedded systems and wireless technology such as WiFi, Bluetooth and Zigbee, to collect and exchange data, with minimal or no human interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

VoIP

A

Voice of Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

LAN

A

Local Area Network ( in a small area)

Example:
- School network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WAN

A

Wide Area Network

Example:
- Bank network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WLAN

A

Wireless Local Area Network

Example:
- Hand held scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Server

A

A computer connected to a network used to coordinate(store and share) vast amounts of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Latency

A

The time it takes for a message to transfer (ms). Also known as ping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Internet

A
  • An interconnected network or network of networks.
  • Most networks are part of the internet.
  • Consists of multiple cables or links that connect countries together, and can be though of as the backbone.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Packet switching

A
  • Breaking down a large amount of data into small packets, each packet is independent of one another.
  • Each packet is tagged with the recipient and source IP and a sequence number for the packets to be put back in order at the destination.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Server

A

A computer connected to a network used to coordinate(store and share) vast amounts of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network topology

A

A Network Topology is the arrangement with which computer systems or network devices are connected to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bus topology

A

In a bus topology, all nodes in the network are connected directly to a central cable that runs up and down the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ring topology

A

In a ring topology network, each node is connected to two other devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Star topology

A

In a star topology, all nodes indirectly connect to each other through one or more switches. The switch acts as a central point through which all communications are passed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Mesh topology

A

In a mesh topology, there is no central connection point. Instead, each node is connected to at least one other node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Router

A

Manages communication on the network. Can have a built-in wireless access point (WAP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TCP

A
  • Transmission Control Protocol
  • Responsible for delivering data to a given address
  • Transport layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Modem

A

Modulator/Demodulator

21
Q

HTTP

A
  • Hyper Text Transfer Protocol
  • Application layer
22
Q

SMTP

A
  • Simple Mail Transfer Protocol
  • Application layer
23
Q

IP

A
  • Internet protocol
  • Responsible for obtaining the address to which data is sent.
  • Internet layer
24
Q

TCP/IP

A
  • Layered protocol stack (Application layer, Transport layer, Internet layer, Link layer)
  • Collection of protocols
  • It sets how data should be formatted and transmitted across networks
25
Q

Web server

A

Holds and shares web pages

26
Q

File server

A

Holds and maintains user files

27
Q

File server

A

Holds and maintains user files

28
Q

Mail server

A

Handles emails between users

29
Q

Methods to protect networks

A
  • Access control: Ensures that only authorised users can access the network and its resources
  • Authentication (User management) : Ensures that users can only access data relevant to them
  • File permissions: Prevents misuse: deleting/copying data, installing software
  • Physical security: Prevents damage to hardware
  • Firewall: Acts as a barrier between an organisation’s internal network and the internet. Inspects incoming and outgoing data traffic and decides what data to allow through
30
Q

Importance of network security

A
  • Business success: data on the network is vital for running an organisation, it might fail if comprimised
  • Privacy: data on the network might be sensitive
  • Financial: the data might be financially valuable
31
Q

Vulnerabilities of the cloud

A

Cloud data centres attract many attacks due to the vast amount of information stored, sensitive data is best stored locally.

32
Q

Ethical hacking

A

Looks for weaknesses in software and systems by trying to penetrate into them so that they can be addressed.

33
Q

Penetration testing

A

Used to test a computer system or network in order to find vulnerabilities

34
Q

Social engineering

A

Exploiting human behavior. The attacker will ‘engineer’ a situation where the target individuals give away confidential information

35
Q

Unpatched software

A

Someone can exploit a vulnerability in an unpatched (unfixed) software that still has that vulnerability

36
Q

Anti-malware software

A

Prevents infection by malware by searching for it and destroying it

37
Q

Encryption

A

Scambles data for anyone who doesn’t have the key to unscramble it.

38
Q

Asymmetric encryption

A
  • Uses two different keys
  • Every user has two keys (public and private)
  • A message encrypted with a public key can only be decrypted with its private key
39
Q

Symmetric encryption

A
  • Uses one key
  • Encrypts and decrypts data using the same key
  • Both ends of the transmission must know the exact shared key
40
Q

Link layer

A
  • Ethernet
    -Wi-Fi
41
Q

Internet layer

A

IP

42
Q

Transport layer

A

TCP

43
Q

Application layer

A
  • FTP
  • HTTP
  • HTTPS
  • SMTP
  • POP
  • IMAP
44
Q

POP

A
  • Post Office Protocol
  • Used by a client to retrieve emails from a mail server
45
Q

IMAP

A
  • Internet Message Access Protocol
  • Similar to POP but messages can be read and stored on the message server
46
Q

Dynamic IP

A

When you first connect to the internet, you are given an IP, but returned when you disconnect. In other words, next time you connect to the internet the IP will be different

47
Q

Domain name

A

Is a human-friendly form of an IP address.
E.g: www.pearson.com
- easier to use than equivalent IP

48
Q

URL

A

Uniform Resource Locator.
- It is the complete web address of a particular web, page, image or any other resource on the internet.

49
Q

What happens when a web page is requested

A

1) When a user types URL, the browser sends the URL to a DNS server (its purpose is to match the domain names to IP addresses) , asking for corresponding IP address
2) Once it receives the IP address from the DNS server, the browser sends an HTTP page request to the web server that holds the page data.
3) The server finds the correct files and sends them to the browser. Once it receives the data, the browser renders the page and displays in on the screen.