Computer Systems (III) - Networks Flashcards

1
Q

What is a network?

A

Two or more electronic devices that are connected together for the purpose of communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How are networks connected?

A

By a wired medium such as Ethernet cables or wireless medium, such as WiFi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a computer or device that is not connected to a network known as?

A

Stand-alone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List the advantages of networking devices

A

File sharing
Hardware sharing
Communication
Roaming access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List the advantages of networking devices on larger networks (businesses / schools)

A

Centralised maintenance and updates
Centralised security
User monitoring
Levels of access (different user rights)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List the disadvantages of networking devices

A

Cost
Management
Spread of malware
Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does LAN stand for?

A

Local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the following show?

A

A LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the properties of a LAN?

A

A LAN is a network that is geographically confined to one building or site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does WAN stand for?

A

Wide area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the following show?

A

A WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the properties of a WAN?

A

A WAN covers a large geographical area

Most WANs are made from several LANs connected together

The Internet is a global WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is bandwidth when referring to network performance?

A

The amount of data that can be transferred at any given time, e.g. 500 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can bandwidth, and therefore network performance, be increased?

A

Too many devices sharing the bandwidth of the network will cause congestion and slow performance

Bandwidth can be limited to devices

Wired (fibre versus copper) / WiFi signal can impact as can the hardware / topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What hardware components are needed to connect a computer / device to a network?

A

Network interface controller (NIC)

Transmission medium (wired / wireless)

Connection point (router / hub / switch / WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a NIC?

A

Network interface controller (internal hardware allowing a device to connect to a network)

Can be separate cards but often built into the motherboard (wired / wireless)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a switch?

A

Switches connect devices onto a LAN

They receive data (units called frames) from one device and transmit this data to other devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a router?

A

Routers transmit data between networks

Data (packets) are directed to their destination

They are used to connect LANs to the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Name a common wired transmission medium for data transfer between computers

A

Ethernet (CAT 5e / CAT 6) – twister pair cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Name a common transmission medium to carry a TV signal

A

Coaxial cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How do fibre optics work and what advantages do they have?

A

Data transmitted as light – they suffer from no interference so can transmit over very large distances

*Are expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does wireless work?

A

Radio waves transmit data

Wireless Access Point (WAP) devices allow connections (a switch)

Wireless subject to interference and limited range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the properties of WiFi?

A

Multiple devices to the same LAN

Range up to 100m

High bandwidth (for wireless)

Often used in the home (routers / desktops / laptops / smart TVs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the properties of Bluetooth?

A

Direct connection between two devices

Range around 10m

Low bandwidth

Often found in headphones / wearables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a client-server network?

A

A network managed by a server, to which clients connect

Files and software stored centrally

Profiles / passwords to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the advantages of a client-server network?

A

Easier to keep track of files

Easier to backup

Easier to install updates / network security

Reliable and always on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the disadvantages of a client-server network?

A

Expensive to setup

IT specialists needed to maintain

Server dependence – clients lose access if goes down

Server can become overloaded and slow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a Peer-to-Peer (P2P) network?

A

Devices all being equal, connecting directly

Files stored on individual devices, and shared

Often used in the home between devices / connect to a printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the advantages of a Peer-to-Peer network?

A

Easy to maintain

No dependence – if one device fails, the whole network isn’t lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the disadvantages of a Peer-to-Peer network?

A

No centralised management (security / backups more complicated)

Duplicates of files when copied between devices

Less reliable peer machines – one breaking may cause data loss

Machines slow when other devices access them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A device connected to a network is known as what?

A

A node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a network’s topology?

A

The arrangement of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the two most common network topologies?

A

Star topology

Mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What does the following show?

A

A star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are the properties of a star topology network?

A

All nodes indirectly connect to each other (through switches)

The switch acts as a central point, through which all communications pass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are the advantages of a star topology network?

A

Each node is separately connected – failure of one node doesn’t impact others

New nodes easily added

High performance – message passed only to intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are the disadvantages of a star topology network?

A

Whole network fails if the switch fails

Lots of cabling is required - expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are the two types of mesh topology?

A

Full mesh topology

Partial mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are the properties of a mesh topology network?

A

No central connection point – each node is connected to at least one other node

Each node is capable of sending messages to and receiving from other nodes (nodes act as relays)

40
Q

What does the following show?

A

Full mesh topology

Each node is connected to every other node

41
Q

What does the following show?

A

Partial mesh topology

Not all nodes are connected directly (simpler, but data has further to travel)

42
Q

What are the advantages of mesh topologies?

A

Messages received quickly if the route is short

Messages should always get through – many possible routes

No node should be isolated (multiple connections) and multiple connections = multiple transmissions

New nodes added easily

43
Q

What are the disadvantages of mesh topologies?

A

Full mesh networks can be impractical to setup (high number of connections needed)

Many connections require a lot of maintenance

44
Q

Where are mesh topologies commonly found?

A

Where reliability is very important:

Military organisations

Cities for traffic flow / sewage / lighting

Emergency services

Utility smart meters

45
Q

What does communication require?

A

Rules – determining transmission speed / error checking / addressing methods etc…

46
Q

What are rules that govern communication known as?

A

Protocols

47
Q

What are the two main addressing protocols called?

A

Media Access Control (MAC)

Internet Protocol (IP)

48
Q

What is MAC addressing and what are the properties of it?

A

Communications on the same network

Each device has a unique MAC address (assigned by the manufacturer)

MAC addresses are 48 or 64-bit binary numbers (converted to hexadecimal)

49
Q

What are MAC addresses mainly used by?

A

Ethernet protocol on LANs – switches read the MAC address and direct the data to the correct device

50
Q

What is IP addressing and what are the main properties?

A

IP addresses are used when sending data between TCP/IP networks (e.g. over the Internet)

IP addresses are automatically or manually assigned

IPv4 is 32 bit and IPv6 is 128 bit (allowing for 2128 unique addresses)

51
Q

How does IPv6 work?

A

IPv6 addresses split into 16-bit chunks with each getting a hexadecimal

52
Q

How does IPv4 work?

A

IPv4 addresses split into 8-bit chunks with each given as a denary

53
Q

What is TCP/IP?

A

TCP/IP protocol dictates how data is sent between networks (e.g. the Internet) and is made of two protocols: TCP and IP

54
Q

What is the TCP within the TCP/IP protocol?

A

Transmission Control Protocol – sets the rules for how devices connect (data split into packets / reassembling the data packets / checking the data is correctly sent and delivered)

55
Q

What is the IP within the TCP/IP protocol?

A

Internet Protocol – directs packets to their destination across the network

56
Q

What other protocols are built upon the TCP/IP to do specific Internet-based task?

A

HTTP (Hyper Text Transfer) – web browsers

HTTPS (HTTP Secure) – more secure HTTP protocol (encryption)

FTP (File Transfer Protocol) – access / edit / move files

POP3 (Post Office v3) – retrieves email (server holds until downloaded)

IMAP (Internet Message Access) – retrieves email (server holds until deleted)

SMTP (Simple Mail Transfer) – sends emails

57
Q

Why do network protocols have layers?

A

Network protocols are divided into layers (a group of protocols which have a similar function)

Layers break communication into manageable pieces, can be changed without impacting other layers and standards force companies to make compatible, universal hardware and software

58
Q

In a network protocol layer, how do the layers interact?

A

Layers are self-contained

Each layer serves the layer above it (e.g. layer 4 triggers an action on layer 3, which triggers an action on layer 2, which triggers an action on layer 1)

59
Q

Draw an example of a 4-layer network protocol

A
60
Q

What is the Internet?

A

A worldwide collection of networks – based on the TCP/IP protocol

61
Q

What is the world wide web?

A

A collection of websites, hosted on web servers and accessed through the HTTP protocol

62
Q

What are URLs?

A

Addresses used to access web servers and resources within them

63
Q

What is the domain name service?

A

DNS translates the website domain name into IP addresses (so you can access www.tesla.com via this and not the IP address)

Domain Name Servers store the IP addresses and matching domain names

64
Q

What is the cloud?

A

The cloud uses the Internet to store files and applications

It acts like an extension of traditional client-server networks

65
Q

What are the advantages of the cloud?

A

Users can access files and applications from any connected device

Easy to increase storage and no expensive hardware needed

Backup and security provided + software updates

No need to pay for IT support staff

66
Q

What are the disadvantages of the cloud?

A

Internet connection required

Dependent on the host for security / backups / updates + subscription fees can be expensive

Data can be vulnerable to hackers

Unclear on ownership over cloud data

67
Q

What type of network attacks exist?

A

Active
Eavesdropping (passive)
External
Internal

68
Q

What is an active network attack?

A

Active - where the hacker attempts to modify or delete data, or to prevent a network from operating correctly.

An example of this is denial of service (DOS) attacks on the internet, which use many internet enabled computers to force a web server offline.

69
Q

What is a passive network attack?

A

Eavesdropping (passive) - where the hacker monitors a network in order to gain information.

An example of this is wiretapping, where communications are monitored.

70
Q

What is an external network attack?

A

External - where someone outside of an organisation attempts the hack

71
Q

What is an internal network attack?

A

Internal - where someone within an organisation attempts the hack

72
Q

What network threats exist?

A
Malware
Phishing
Brute force
Denial of service
Data interception and theft
Structured query language injection
Poor network policy
People
73
Q

What is malware?

A

Malware is malicious software that is designed to hack a system.

Malware can take many different forms.

74
Q

What is a malware virus?

A

Programs embedded (hidden) within other files. They replicate themselves and become part of other programs

Viruses often cause damage by deleting or modifying data

75
Q

What is a malware worm?

A

Programs similar to viruses except that they are not hidden within other files

Worms often spread through emails.

76
Q

What is a malware trojan?

A

Programs which pretend to be legitimate but in reality are malware. They are often disguised as email attachments

Trojans cannot spread by themselves - instead they deceive a user into installing the program

77
Q

What is malware, spyware?

A

Programs that monitor user activities (such as websites visited, usernames and passwords used) and send the information back to a hacker

78
Q

What is malware, ransomware?

A

Programs that attempt to blackmail a user into making a payment to a hacker

Some types of ransomware do little but try to scare users into paying, while others go further - they encrypt documents and will not decrypt them until a ransom is paid

79
Q

What is Phishing?

A

Emails that try to trick users into giving away personal details. The phishing email pretends to be a genuine message and tries to deceive the user into following a link to a website that looks like the real company, for example, a bank. However, it is a fake website designed to catch data such as bank account numbers and security codes.

80
Q

What is Brute Force?

A

Where a program is used to find a password by trying all possible combinations of characters until the correct one is obtained

81
Q

What is Denial of Service?

A

Where a computer (or many computers) is used to prevent a server from performing its tasks. This is done by bombarding the server over and over again with requests

Eventually the server is tied up trying to handle all the DOS requests, making it very difficult for it to respond to legitimate requests

82
Q

What is Data Interception and Theft?

A

Where data is intercepted during transmission. This is done using software called a packet sniffer, which examines data packets as they are sent around a network, or across the internet

The information gathered is sent back to a hacker

83
Q

What is Structured Query Language (SQL) Injection?

A

Where SQL code is entered as a data input. Many databases use SQL code to interrogate the data and maintain the structure

SQL code can be inputted as data, which can cause errors or unintended operations

84
Q

How can people become a network threat?

A

Where users do not adhere to network policy. People frequently ignore rules, or accidentally or deliberately break them. For example, many users choose easy to guess passwords, or send and receive personal emails which containing viruses

This behaviour increases the chances of a network being compromised and its data being accessed by unauthorised users (social engineering)

85
Q

How is poor network policy a threat and what do these policies tend not to have?

A

Levels of access to prevent users from accessing sensitive data unless they are authorised to do so

Rules preventing external device connections

Regulation regarding secure passwords

Rules to govern what websites can be visited

Methods to prevent any user wirelessly connecting an unsecured device

Controls on what facilities can be accessed remotely (away from the organisation)

A formal backup procedure that is adhered to

A regular maintenance programme

86
Q

What network security techniques are there?

A
Penetration testing
Network forensics
Network policies
User access levels
Secure passwords
Encryption
Anti-malware software
Firewalls
87
Q

What is penetration testing?

A

To determine how resilient a network is against an attack

It involves authorised users (sometimes an external party or organisation) who probe the network for potential weaknesses and attempt to exploit them. Software that enables network managers to test the resilience of networks themselves is also available

88
Q

What are network forensics?

A

Monitoring the traffic on a network. At regular intervals transmitted data packets are copied

The copy and information about the packet are then stored for later analysis. This is usually processed in batches. The information gathered can help identify invasive traffic (from hackers) or to determine where data is being sent

89
Q

What should a network policy ensure?

A

Passwords and securely and regularly changed

Users cannot connect unauthorised equipment

Levels of access are given, which allow only authorised users to access sensitive data

Regular backups / disaster recovery procedures + maintenance / anti-virus software

Regular penetration testing and forensic analysis

90
Q

What is user access?

A

Access levels determine the facilities a user has access to, such as software, email, internet access, documents and data, the ability to install and/or remove software and the ability to maintain other users’ accounts

A network manager should make sure users can only access the facilities they need

91
Q

What rules should exist around passwords?

A

Passwords help prevent unauthorized users accessing the network

They should be strong (letters, numbers and symbols) and regularly changed

92
Q

What is encryption?

A

Translating data into a code which only someone with the correct key can access

93
Q

During encryption, what terminology is used for the original text and the encrypted text?

A

Plain text becomes Cipher text

94
Q

What is a firewall?

A

A tool that monitors traffic going into and out of a computer or network

95
Q

What types of firewall exist?

A

Hardware-based or software-based

Hardware-based are more expensive but tend to be more effective

96
Q

What is anti-malware?

A

Anti-malware includes anti-virus software, anti-phishing tools and anti-spyware software. It works by scanning through all the files on a computer and checking them against a list (known as definitions) of known malware.

It is reactive - it can only detect, prevent and remove known malware