Networking - Computer Science Flashcards

(38 cards)

1
Q

What does LAN stand for?

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does WAN stand for?

A

Wide Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name three factors that affect the performance of networks.

A
  • Bandwidth
  • Latency
  • Number of devices connected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give two examples of network frameworks

A
  • Client-server
  • Peer-to-peer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List four hardware components needed to connect stand-alone computers into a Local Area Network.

A
  • Wireless access points
  • Routers
  • Switches
  • NIC (Network Interface Controller/Card)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does DNS stand for?

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of hosting in the context of the Internet?

A

To store and serve websites and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Cloud?

A

A worldwide collection of computer networks providing storage and services over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give two examples of network topologies

A
  • Star
  • Mesh
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a wired mode of connection?

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are three wireless modes of connection?

A
  • Wi-Fi
  • Bluetooth
  • Sattelite
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is encryption?

A

A method of securing data by converting it into a coded format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does IP stand for in networking?

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does MAC stand for in networking?

A

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name three common protocols.

A
  • TCP/IP
  • HTTP
  • FTP
  • HTTPS
  • POP
  • IMAP
  • SMTP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does TCP stand for?

A

Transmission Control Protocol

17
Q

What does HTTP stand for?

A

Hyper Text Transfer Protocol

18
Q

What does HTTPS stand for?

A

Hyper Text Transfer Protocol Secure

19
Q

What does FTP stand for?

A

File Transfer Protocol

20
Q

What does POP stand for?

A

Post Office Protocol

21
Q

What does IMAP stand for?

A

Internet Message Access Protocol

22
Q

What does SMTP stand for?

A

Simple Mail Transfer Protocol

23
Q

Define the TCP/ IP protocol stack.

A
  • Consists of four layers that enable internet communication.
  • This is a modular design with each layer being responsible for a small part of the communication process.
  • Each layer is a self-contained area of network functionality
24
Q

What is malware?

A

Malicious software designed to harm or exploit any programmable device

25
What is social engineering in the context of cybersecurity?
Manipulating individuals to divulge confidential information
26
What is phishing?
A form of social engineering aimed at acquiring sensitive information
27
What is a brute-force attack?
An attempt to crack a password or encryption key by trying all possible combinations
28
What is a denial of service attack?
An attack intended to make a machine or network resource unavailable to its intended users
29
What does SQL injection refer to?
A code injection technique that exploits security vulnerabilities in an application's software
30
Name three common prevention methods in cybersecurity.
* Penetration testing * Anti-malware software * Firewalls
31
What is penetration testing?
A simulated cyber attack against a computer system to check for vulnerabilities
32
What role do user access levels play in network security?
They restrict access to resources based on user permissions
33
What is the purpose of using passwords in cybersecurity?
To authenticate users and protect access to systems and data
34
What is physical security in the context of cybersecurity?
Measures taken to protect physical assets from unauthorized access or damage
35
What is the purpose of the application layer in the TCP/ IP protocol stack and what protocols/ hardware operate here?
* Applications such as email clients and web browsers create data to send in this layer * SMTP , FTP and HTTP operate in this layer
36
What is the purpose of the transport layer in the TCP/ IP protocol stack and what protocols/ hardware operate here?
* The transport layer creates the connection between two computers, or ‘hosts’ * Data is then divided up into packets and given a packet number * Packets are reassembled by the recipient’s Transport layer * Lost packets are resent *TCP operates here
37
What is the purpose of the internet layer in the TCP/ IP protocol stack and what protocols/ hardware operate here?
* The Internet layer is responsible for routing packets * Source and destination addresses are written on to the packets ready for transmission * IP operates here
38
What is the purpose of the link layer in the TCP/ IP protocol stack and what protocols/ hardware operate here?
* Enables the transfer of packets between nodes on a network. * Enables the transfer of packets between different networks. * Ethernet & Wi-Fi operate on this layer.