networking Flashcards

(30 cards)

1
Q

router

2

A
  • Forwards data packets between networks, creating an overlay internetwork
  • Can merge with switch, firewall, and modem within one hardware component
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

switch

2

A
  • Connects devices on a network
  • Directs data to the device that requested it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

firewall

3

A
  • Can be hardware or software
  • Controls incoming and outgoing network traffic by analysing data packets and determining whether it should be let through
  • Hardware: protects you from outside world, software: protect specific device from other internal systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

modem

1

A
  • Modulates analog signals to encode information, and demodulates signals to decode
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wireless access point

2

A
  • Allows wireless devices to connect to a wired network
  • Connects to router or is built in
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network interface card (NIC)

2

A
  • Enables device to connect to a network
  • Connects to cable or wifi which connects to network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is networking?

and resources examples

A

group of computers that are interconnected for the purpose of exchanging data and sharing resources
- Resources: printers, internet access, servers, modems, scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a network operating system? what is its key functions?

A

Operating system: is a specialized software that manages network resources and facilitates communication between devices on network
- key functions: controls network traffic, defines communication protocols, manages resources, handles user authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

network operating systen server vs client software?

A
  • server software: installed on servers, control file access, authentication
  • client software: installed on device, establish connection via NIC between device and other devices on network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a network protocol? and network standard?

3 for protocol, 1 for standard

A

What is a network protocol?
- Set of rules followed by network
- Made up of rules, procedures, and formats that define communication between multiple devices over a network
- Must be used by sender and receiver

What is a network standard: an industry agreed upon standard for the rules that make-up protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TCP/IP definition

A

: transmission control protocol/internet protocol, is a suite of communication protocols that governs how data is transmitted over the internet and other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TCP/IP points?

4

A
  • TCP converts data into segments so it can be sent between a server and client
  • IP is the address to which the data Is sent. TCP is responsible for delivery
  • It divides the different communications into layers, each layer has a different function, and it helps keep things standardized
  • TCP is reliable data delivery – recovering damaged, lost, unordered data by the network layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the TCP/IP layers?

5

A

applicant, transport, internet, network, physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is HTTP definition and points

2 points

A

Definition: Hypertext transfer protocol, A set of rules a server has to follow when it comes to the transmission of files through the world wide web
- HTTP works within the application layer
- No SSL certificate required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HTTPS points

5

A
  • Same this as HTTP but secure
  • Works within transport layer
  • HTTP with a SSL (secure socket layer)
  • SSL established secure connections for protocols
  • All communications between browser and website are encrypted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

public key encryption points

3

A
  • Uses pair of keys
  • Public key is freely shared, allowing anyone to encrypt messages to owner
  • Private key owned by owner, can decrypt the messages
15
Q

digital certificates purpose

2

A

verifies identity, makes owners public key available

16
Q

digital signature points and purpose

2 points

A
  • Are fundamental component of public key infrastructure, that provides crucial security services for electronic communication and transaction
    -l
  • Purposes: authentication of sender, integrity (message not altered during transmit), non-repudiation (proof the sender actually sent the message
17
Q

802.11x definition and purpose?

A
  • definition: family of standards defining how wireless LANs operate (Wi-Fi)
  • Purpose: built with the intent of replacing ethernet using wireless communication
18
Q

802.11x characteristics

6

A
  • Wi-Fi uses radio frequency
  • Evolution of frequencies and speeds
  • Wi-Fi access points are now set up at home and public hotspots, giving convenient internet access
  • Become essential part of lives
  • More susceptible to interference from other devices
    • communication standard developed for wireless LAN technology (WLAN)
19
Q

802.11x advantages

3

A
  • Cost effective
  • Mobility
  • Wider coverage
20
Q

802.11x disadvantages

3

A
  • Security concerns
  • Slower data transfer speeds
  • strength
21
Q

802.3 definition and purpose

A

Definition: ethernet is a family of computer networking technologies for LANs, forming the basic technology for connectivity
- Purpose: provides foundation for how data is transmitted/received in a wired network

22
Q

802.3 characteristics

3

A
  • Commonly associated with ethernet cables or twisted pair cables
  • Different cables and speeds
  • Stable, high speed connection that is less prone to interference
23
802.3 advantages | 3
- Not expensive - Simple to join - Flexible cabling
24
802.3 disadvantages | 2
- One fault affects whole system - Data packet collisions
25
firewalls - as security measure | 1 def, 2 points
- Controls incoming/outgoing network traffic by analysing data packets and determining whether iit should be let through - Hardware or software - Can filter: ports, IP addresses, domain names, protocols, keywords
26
physical security measure | 2 points + examples
- Limits access to spaces where data is stored, preventing unauthorized access from gaining sensitive information - E.g. cameras, biometric authentication, access controls, locks/keys - Should be implemented alongside cyber security measures to ensure safety
26
passwords as security measure | 4 points
- A sequence of characters used to verify users identity and grant access - Type of authentication - More complex = harder to crack - Better passwords include: upper and lower case, numbers, special characters
26
other security measures | 6
- Authentication - Network/route settings - Setting access permissions - Encryption - Logging: - Backups: