Topic3 Flashcards

1
Q

What does LAN stand for

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe a LAN

A

Covers small area
Can be Ethernet or wireless or both
Often in schools business university

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of a LAN

A

Sharing files
Connect to printers
Have user accounts stored centrally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is A WAN

A

A collection of LANs that are all connected across large geographic sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Factors that affect performance of networks

A

Bandwidth
Wired if wireless
Obstructions of wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is A NIC

A

Network interface card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is bandwidth

A

The amount of data that can be transferred at a give time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the NIC do?

A

It is an internal piece of hardware that allows devices to to connect to the Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a switch

A

A device that connects data on a LAN it receives data and transmits it the correct device using the MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a router

A

A piece of hardware in a lan responsible for transmitting data to other networks they direct data were to go
They connect LANS to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the benefits of wired connections

A

Faster
Reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of wire on a wired connection

A

Cat 5e
Cat 6
Coaxial
Fibre optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are cat5e and cat6 wires

A

A twisted pair of wires contain 4 pairs of copper wires which are twisted together to stop interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are coaxial wires ?

A

A single cooper wire surround by plastic and for insulation and and a metallic mesh to prevent interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are fibre optic cables?

A

Transmit data as light they are very fast but expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does wireless connections transmit data

A

Using wires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Benefits of wireless

A

More portable
More convenient
Cheaper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Bluetooth

A

A connection between two devices
Low range
Low bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is WiFi’

A

A wireless connection to a LAN
High range
High bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a client server network made up from?

A

Server and clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a client server network

A

A Network with a central server that all devices connect to
Files and software are usually stored centrally
Clients send requests to the server for data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Pros for client server

A

Easier to keep track of files
Easier to perform back ups
Easier to update
Easier to manage network security
Reliable and always on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cons of client server network

A

Expensive
Server dependence
May become overloaded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is peer to peer network

A

A network without a server where all devices are connected directly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Pros of peer to peer

A

Easy to maintain
No server dependence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Cons of peer to peer

A

No centralised management devices need to update and mange own security
Easy to loose track of files
Less reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is star topology

A

A network where all devices are connected to the centre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Pros of star topology

A

If a cable or devices fails expect central server the network doesn’t fail
Simple to add more devices
Better performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Cons of start topology

A

Every device needs a cable in wired networks
If there is a problem with the switch or server, and the whole network is affected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the bus topology?

A

All devices are arranged in a line and connected to a single backbone cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is ring topology?

A

Ring topology data moves in One Direction around the room, prevent collisions, but only one device can send data at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is mesh topology?

A

When all devices are connected to each other, the network is decentralised

33
Q

Benefits of a mess topology

A

And no single point the network can fail as there is usually a different route

34
Q

Cons of mesh topology

A

It’s very expensive, you need a lot of wires and many devices

35
Q

Difference between full mesh, topology and’s partial topology

A

Full as where every device is connected
Partial is where most devices are connected, but some I just connected with one route

36
Q

What are network protocols?

A

The rules for transmitting data

37
Q

What are communication protocols?

A

They specify how communication between two devices must start and end and hold data must be organised

38
Q

What is a Mac address?

A

Are unique identifier to each device on the network

39
Q

How long a Mac addresses?

A

48 or 64 bit binary numbers, but I converted to hexadecimal to make it simple

40
Q

What is an IP address?

A

IP addresses are used when sending data between networks e.g. of the Internet IP addresses are sign is a manually automatically before the devices can access the network

41
Q

What are the two versions of IP addresses?

A

IPV4
IPV6

42
Q

What is IPV4

A

The ip address with over 4 billion different and are 8 bits long

43
Q

What is ipv6

A

A 16 bit long Ip address represent in hexadecimal

44
Q

What is TCP

A

Transmission Control Protocol
Sets the rules for how devices connect to networks in charge of splitting data into packets
And checking data is correctly sent

45
Q

What is IP

A

Internet protocols
Responsible for directing packets across networks

46
Q

What is HTTP

A

Hyper text transfer protocols
Used by web browsers to communicate with web servers

47
Q

What is HTTPS

A

A secure version of HTTP encrypts data

48
Q

What is FTP

A

File Transfer protocols
Used to access edit and move files between devices on a network

49
Q

What is POP3

A

Post office protocols version 3
Used or retrieve emails from a server the server holds the email until it is downloaded

50
Q

What is IMAP

A

Internet message access protocols
Used to access emails on a server until deleted by you
You only download a copy

51
Q

What is smtp

A

Simple mail transfer protocol
Used to send email

52
Q

What are layer in networks

A

A group of protocol with similar functions
They are self contained and don’t know what is happening in other layers
Each layer servers the layer above

53
Q

Advantages of using layers

A

Breaks down protocols into manageable pieces
They can be changed within effecting other layers

54
Q

What is the internet

A

A network of networks

55
Q

What is a domain name service

A

A service used to translate website domain name into ip address making it easier to remember

56
Q

What is a domain name server

A

A server which stores ip addresses and matching Ip address

57
Q

What is hosting

A

When a business uses its server to store files of other companies

58
Q

Pros of the cloud

A

Can access files from almost every where
Easy to increase amount of storage
No need for expensive hardware
No need for It staff

59
Q

Cons for the cloud

A

Needs a connection to internet
Dependent on host
Subscription

60
Q

What is a passive attack?

A

Where is someone monitors data travelling on the network and intercept any sensitive information they find

61
Q

What is an active attack?

A

When someone attacked a network with malware, or other planned attacked

62
Q

What is an insider attack

A

Someone within an organisation exports the network access to steal information

63
Q

What is a brute force attack?

A

It’s a type of attack, used to gain information by cracking passwords through trial and error

64
Q

What is a denial of service attack?

A

Where a hacker tries to stop users from accessing a part of a network website. Most involved flooding the network with uses traffic making it look extremely slow or completely inaccessible.

65
Q

What is a virus?

A

Virus attach a copy themselves to certain files. And run auto scrips and spread.

66
Q

What is a worm?

A

Worms are like viruses, but they self replicate without any use to help meaning they can spread very quickly

67
Q

What is a Trojan?

A

Malware disguised as legitimate software

68
Q

What are network security threats?

A

Social engineering
Phishing
SQL injection

69
Q

What is social engineering?

A

Is the weight of gaining sensitive information or illegal access networks by influencing people

70
Q

What are phishing emails

A

Emails from a person claiming to be from a well known company emails contain links to fake websites so hackers can steal data

71
Q

What is SQL injection

A

Structured query language
SQL code is typed into input box which then reveals sensitive information

72
Q

How to prevent hacks and attacks

A

Test regularly
Passwords
Install antimalware

73
Q

What is penetration testing?

A

When organisations employ specialists to simulate potential attacks

74
Q

What is physical security?

A

Physical aspects of the security system, e.g. locks passwords, and security guards

75
Q

What are user access levels?

A

Prevent insider attacks control, which parts of the network, different people or groups can access

76
Q

What is anti malware software?

A

It is designed to stop and find malware prevent damage to organisations networks

77
Q

What is a firewall?

A

A piece of software that monitors all data, exiting and entering the network and stops any potential threats

78
Q

What is encryption?

A

Encryption is when data is translated into a code which only someone with the correct key can access encrypted text is called ciphertext