Topic3 Flashcards

1
Q

What does LAN stand for

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe a LAN

A

Covers small area
Can be Ethernet or wireless or both
Often in schools business university

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of a LAN

A

Sharing files
Connect to printers
Have user accounts stored centrally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is A WAN

A

A collection of LANs that are all connected across large geographic sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Factors that affect performance of networks

A

Bandwidth
Wired if wireless
Obstructions of wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is A NIC

A

Network interface card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is bandwidth

A

The amount of data that can be transferred at a give time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the NIC do?

A

It is an internal piece of hardware that allows devices to to connect to the Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a switch

A

A device that connects data on a LAN it receives data and transmits it the correct device using the MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a router

A

A piece of hardware in a lan responsible for transmitting data to other networks they direct data were to go
They connect LANS to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the benefits of wired connections

A

Faster
Reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of wire on a wired connection

A

Cat 5e
Cat 6
Coaxial
Fibre optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are cat5e and cat6 wires

A

A twisted pair of wires contain 4 pairs of copper wires which are twisted together to stop interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are coaxial wires ?

A

A single cooper wire surround by plastic and for insulation and and a metallic mesh to prevent interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are fibre optic cables?

A

Transmit data as light they are very fast but expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does wireless connections transmit data

A

Using wires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Benefits of wireless

A

More portable
More convenient
Cheaper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Bluetooth

A

A connection between two devices
Low range
Low bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is WiFi’

A

A wireless connection to a LAN
High range
High bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a client server network made up from?

A

Server and clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a client server network

A

A Network with a central server that all devices connect to
Files and software are usually stored centrally
Clients send requests to the server for data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Pros for client server

A

Easier to keep track of files
Easier to perform back ups
Easier to update
Easier to manage network security
Reliable and always on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cons of client server network

A

Expensive
Server dependence
May become overloaded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is peer to peer network

A

A network without a server where all devices are connected directly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Pros of peer to peer
Easy to maintain No server dependence
26
Cons of peer to peer
No centralised management devices need to update and mange own security Easy to loose track of files Less reliable
27
What is star topology
A network where all devices are connected to the centre
28
Pros of star topology
If a cable or devices fails expect central server the network doesn’t fail Simple to add more devices Better performance
29
Cons of start topology
Every device needs a cable in wired networks If there is a problem with the switch or server, and the whole network is affected
30
What is the bus topology?
All devices are arranged in a line and connected to a single backbone cable
31
What is ring topology?
Ring topology data moves in One Direction around the room, prevent collisions, but only one device can send data at a time
32
What is mesh topology?
When all devices are connected to each other, the network is decentralised
33
Benefits of a mess topology
And no single point the network can fail as there is usually a different route
34
Cons of mesh topology
It’s very expensive, you need a lot of wires and many devices
35
Difference between full mesh, topology and’s partial topology
Full as where every device is connected Partial is where most devices are connected, but some I just connected with one route
36
What are network protocols?
The rules for transmitting data
37
What are communication protocols?
They specify how communication between two devices must start and end and hold data must be organised
38
What is a Mac address?
Are unique identifier to each device on the network
39
How long a Mac addresses?
48 or 64 bit binary numbers, but I converted to hexadecimal to make it simple
40
What is an IP address?
IP addresses are used when sending data between networks e.g. of the Internet IP addresses are sign is a manually automatically before the devices can access the network
41
What are the two versions of IP addresses?
IPV4 IPV6
42
What is IPV4
The ip address with over 4 billion different and are 8 bits long
43
What is ipv6
A 16 bit long Ip address represent in hexadecimal
44
What is TCP
Transmission Control Protocol Sets the rules for how devices connect to networks in charge of splitting data into packets And checking data is correctly sent
45
What is IP
Internet protocols Responsible for directing packets across networks
46
What is HTTP
Hyper text transfer protocols Used by web browsers to communicate with web servers
47
What is HTTPS
A secure version of HTTP encrypts data
48
What is FTP
File Transfer protocols Used to access edit and move files between devices on a network
49
What is POP3
Post office protocols version 3 Used or retrieve emails from a server the server holds the email until it is downloaded
50
What is IMAP
Internet message access protocols Used to access emails on a server until deleted by you You only download a copy
51
What is smtp
Simple mail transfer protocol Used to send email
52
What are layer in networks
A group of protocol with similar functions They are self contained and don’t know what is happening in other layers Each layer servers the layer above
53
Advantages of using layers
Breaks down protocols into manageable pieces They can be changed within effecting other layers
54
What is the internet
A network of networks
55
What is a domain name service
A service used to translate website domain name into ip address making it easier to remember
56
What is a domain name server
A server which stores ip addresses and matching Ip address
57
What is hosting
When a business uses its server to store files of other companies
58
Pros of the cloud
Can access files from almost every where Easy to increase amount of storage No need for expensive hardware No need for It staff
59
Cons for the cloud
Needs a connection to internet Dependent on host Subscription
60
What is a passive attack?
Where is someone monitors data travelling on the network and intercept any sensitive information they find
61
What is an active attack?
When someone attacked a network with malware, or other planned attacked
62
What is an insider attack
Someone within an organisation exports the network access to steal information
63
What is a brute force attack?
It’s a type of attack, used to gain information by cracking passwords through trial and error
64
What is a denial of service attack?
Where a hacker tries to stop users from accessing a part of a network website. Most involved flooding the network with uses traffic making it look extremely slow or completely inaccessible.
65
What is a virus?
Virus attach a copy themselves to certain files. And run auto scrips and spread.
66
What is a worm?
Worms are like viruses, but they self replicate without any use to help meaning they can spread very quickly
67
What is a Trojan?
Malware disguised as legitimate software
68
What are network security threats?
Social engineering Phishing SQL injection
69
What is social engineering?
Is the weight of gaining sensitive information or illegal access networks by influencing people
70
What are phishing emails
Emails from a person claiming to be from a well known company emails contain links to fake websites so hackers can steal data
71
What is SQL injection
Structured query language SQL code is typed into input box which then reveals sensitive information
72
How to prevent hacks and attacks
Test regularly Passwords Install antimalware
73
What is penetration testing?
When organisations employ specialists to simulate potential attacks
74
What is physical security?
Physical aspects of the security system, e.g. locks passwords, and security guards
75
What are user access levels?
Prevent insider attacks control, which parts of the network, different people or groups can access
76
What is anti malware software?
It is designed to stop and find malware prevent damage to organisations networks
77
What is a firewall?
A piece of software that monitors all data, exiting and entering the network and stops any potential threats
78
What is encryption?
Encryption is when data is translated into a code which only someone with the correct key can access encrypted text is called ciphertext