networks Flashcards

1
Q

factors that affect the performance of networks:

A

-bandwidth
amount of data that can be sent and received in a given amount of time
measured in bits per sec, bit rate

-no. of users
too many users/ devices on same network can cause network to slow down if insufficient bandwidth for data

-transmission media
-error rate
-latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

how does error rate affect performance of networks
-connection
-signal quality of wireless and copper

A

-less reliable connections means more errors when data being transferred
-data has to be resent till correct arrival
-signal quality of wireless depends on interference and range of devices
-signal quality of copper cables depends on grade of material which reduces interference
-length of cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the internet

A

a global connection of interconnected networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

feature of LAN

A

-LAN
-small geographical are
-all hardware owned by the org that uses it
-found in businesses, schools, unis
-in home: printers, PCs, smart TVs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

benefits of LAN

A

-sharing files is easier
-share hardware (printer)
-internet connection can be shared
-can communicate with other LAN users cheaply and easily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

features of WAN

A

-wide area
-connects LANs that r in diff geo locations
-orgs hire infrastructure from telecom companies, WAN more expensive to set up than LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

hardware required to connect a LAN
-NETWORK INTERFACE CARD

A

-NETWORK INTERFACE CARD
-uses a protocol to determine how connection should work
-allow device to connect to wired or wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

hardware required to connect a LAN
-Wireless Access Point
(basically describe a wireless network)

A

-WAP
provides a link between wireless and wired networks
creates a wireless LAN that allows Wi-fi enable devices to connect to a wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

hardware required to connect a LAN
-SWITCH

A
  • the switch uses the NIC address on a device to route traffic
  • router sends data between networks
  • router needed to connect a LAN to a WAN
  • router uses the IP address on a device to route traffic to other routers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

copper and fibre optic cables
- connections between desktop computers and a switch are usually made w/ …………
- …………. are cheap and flexible which makes them easy to install
- longer distance networks and WAN are usually connected w/ ………….
- ………… has a higher bandwidth than ……… and suffers from less interference

A
  • connections between desktop computers and a switch are usually made w/ UNSHIELDED TWISTED PAIR (UTP) COPPER CABLES
  • COPPER CABLES are cheap and flexible which makes them easy to install
  • longer distance networks and WAN are usually connected w/ FIBRE OPTIC CABLES
  • FIBRE OPTIC has a higher bandwidth than COPPER and suffers from less interference
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

difference betw/ HUB and SWITCH

A

HUB: broadcasts messages to all devices on the network.
SWITCH: sends the message to the intended recipient only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

advantage and disadvantage of a full mesh network

A

ADVANTAGE:
- if you break any connection you can still route traffic via another route
DISADVANTAGE:
- lot more cabling and switch hardware required, adds to cost for large networking
-> can instead use partial mesh, lower amount of hardware needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

disadvantages of ethernet

A

-users location limited by the need for physical cable connections
-relies on lots of cables, connections , hardware = inc. in cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

features of bluetooth:

A

-ideal for connecting personal devices
-very short range, 10 meters
-very low power consumption compared to wi-fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ENCRYPTION
-wireless network …… data, so it must be ……. to be secure
-this is done by scrambling the data into ……… using a ‘master key’ created from the SSID of the network and the password

-data is then decrypted by the receiver using ……., so this key is not transmitted

A

-wireless network BROADCAST data, so it must be ENCRYPTED to be secure
-this is done by scrambling the data into CIPHER TEXT using a ‘master key’ created from the SSID of the network and the password

-data is then decrypted by the receiver using the same MASTER KEY, so this key is not transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MAC addressing is used to route

A

frames on a LAN
-each MAC address is unique to every network interface card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IP addressing is used to route

A

packets on a WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IPv4 VS IPv6

A

32 bits
128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

STANDARDS are a set of specifications for:
……. and ……..
w/o standards most devices wouldn’t be able to successfully communicate

A

-hardware
-software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is a protocol

A

a set of rules that allows two devices to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is TCP (transmission control protocol)

A

provides error free transmission between two routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what is IP (internet protocol)

A

routes packets across a WAN
(along with TCP, makes up the TCP/IP protocol stack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what is HTTP (hypertext transfer protocol)
and HTTPS (hypertext transfer protocol secure)

A

-a client-server method of requesting and delivering HTML web pages

HTTPS - used when sensitive information needs to be transferred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what is FTP (file transfer protocol)

A
  • used for sending files between a network usually on a WAN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what is POP (post office protocol)

A
  • retrieves emails from a mail server
  • removes it from the server and transfers to your device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what is SMTP (simple mail transfer protocol)

A
  • send emails to an email server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what is IMAP (internet message access protocol)

A
  • used by mail clients to manage remote mailboxes and retrieve email from a mail server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what is the function of a switch

A

-connects devices on a LAN
-receives data in frames from one device and transmits it to the device on the network w/ correct MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

what is the function of a router

A

transmits data between separate networks / across the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

what is the function of a WAP

A

allows devices to connect to a LAN wirelessly

31
Q

what is a p2p network

A

group of devices connected to share data with each other
- every device is equal in status
-connected w/o a server

32
Q

what is a client server network

A

group of devices connected to a central server/ comp
- which manages the clients and stores files centrally

33
Q

different forms of attack

A

-malware
-phishing
-brute force
-denial of service
-data interception and theft
-SQL injection

34
Q

what is malware

A

software which is specifically designed to disrupt, damage or gain unauthorized access to a computer system

35
Q

what is phishing

A

sending emails pretending to be reputable companies in order to incite peeps to reveal personal info

36
Q

what is brute force attack

A

trial and error method of attempting passwords and pin numbers
automated software is used to generate a larger number of consecutive guesses

37
Q

What is denial of service attack

A

flooding the server with useless traffic causing the server to become overloaded and unavailable

38
Q

what is data interception and theft

A

act of stealing info from unknown victim with intent of compromising privacy / obtaining confidential information

39
Q

what is SQL injection

A

-technique used to view or change data in a database
-by inserting additional code into a text input box
-creating a different set string

40
Q

how does a client server network work

A

-clients make requests to a server
The server manages that request and response

41
Q

how does a P2P network work

A

data is shared directly between systems without requiring a central server
each computer is equally responsible for providing data

42
Q

advantages of a star topology

A

advantages
- improved security because data packets are sent directly from the hub/switch to the specific node
- systems can be directly attached to the central system without causing network failure
- transfer speeds are generally fast as there are minimal network collisions

43
Q

factors that affects performance of a network

A
  • bandwidth
  • no. of users at the same time
  • no. of data collisions
  • interference
  • amount of data to transfer
  • server / CPU performance
44
Q

what is the internet

A

a global network of interconnected networks

45
Q

what is a DNS

A

a DNS server stores a list of domain names and a list of corresponding IP addresses where the website is stored

46
Q

what is a network protocol

A

network protocols defines standards for data transmission

47
Q

how to prevent malware

A

Have a strong security software:
- firewall
- spam filter
- anti-virus
- anti-spyware
- anti-malware

  • enabling OS and security software updates
  • staff training: careful to open email attachments and downloading software
  • backup files regularly onto removable media
48
Q

how to prevent phishing

A
  • spot fake emails and webs
  • don’t disclose personal or corporate information
  • disabling browser pop-ups
49
Q

How to prevent a brute force attack?

A
  • Network lockout policy.
  • Using progressive delays.
  • Using effective passwords.
  • Using challenge response: I am not a robot and reCAPTCHA.
50
Q

How to prevent a denial of service attack?

A
  • Strong Firewall.
  • Packet filters on routers.
  • Configuring the Web Server.
51
Q

How to prevent data interception and theft?

A
  • Encryption.
  • Using virtual networks.
  • Strong passwords. Locking computers, logging off.
  • Investigating your own network for vulnerabilities.
52
Q

How to prevent SQL injection?

A
  • Validation on input boxes.
  • Setting database permissions.
  • Penetration testing.
53
Q

Seven common prevention methods.

A
  • Penetration testing.
  • Anti-malware software.
  • Firewalls.
  • User access levels.
  • Passwords.
  • Encryption.
  • Physical security.
54
Q

How to prevent data interception?

A

Encryption.

55
Q

MAC addresses are … or … bit binary numbers

A

48 or 64, converted into hexadecimal

56
Q

features of static IP

A

-permanent, very expensive
-used to connect printers on a LAN, and for hosting webs on the Internet

57
Q

features of dynamic IP

A

-assigned to device by network server
-diff IP every time you log on to network
-cost effective, can be reused
-used by Internet Service Providers

58
Q

one advantage of using layers in network protocols

A

-self contained
so allows different developers to concentrate on one aspect of the network

-a layer can be taken out and edited w/o affecting other layers
promotes interoperability betw/ vendors and systems

59
Q

what is meant by a protocol

A

a division of network functionality

60
Q

what is a WAN

A

-the computers are geographically remote/ more than 1 mile apart

61
Q

What is the meaning of directories?

A

A directory is a unique type of file that contains only the information needed to access files or other directories. As a result, a directory occupies less space than other types of files.

62
Q

prevention for pharming

A

check to see website is valid

63
Q

prevention for DOS attack

A

use of proxy server/ firewall

64
Q

prevention for hardware failure/ loss

A

backup

65
Q

what hardware do you need to connect to the internet

A

ROUTER/
MODEM

66
Q

drawbacks to cloud storage

A
  • Cannot access files if no Internet access
  • Not in control of security
  • …data may be hacked/stolen
  • May cost monthly fee
  • if cloud storage fails you have lost your data
  • May be issues as to who owns the data
  • If login details are forgotten/lost may not have access to files
67
Q

advantages of cloud storage

A
  • Can access files from any device
  • Can access files from anywhere // with access to the Internet
  • Security may be higher than at home
  • May be free of cost
  • Easier/quicker to share files with others
  • More available storage space on her device
  • Easier to increase storage capacity (not memory)
  • Can be used a backup in case of data loss
68
Q

examples of utility software

A

-backup
-encryption
-compression
-defragmentation

69
Q

the OS provides a user ……
allows user to interact with the …….

A

-interface
-hardware

70
Q

purpose of ROM

A

-stores BIOS
-stores data that should not be changed/ that needs to be retained when power off
-boot-up instructions
-stores firmware/ OS

71
Q

explain how a URL is converted to IP address

A
  • URL sent to DNS
  • DNS looks up IP in its database
  • DNS returns IP
  • IF not found, DNS sends to higher level DNS
72
Q

what is the purpose of defragmentation software?

A

-collates free space together
-collates file X together (all same files together)
-reduces movement of read/write disk across disk, speeds up file access

-SSD shouldn’t be defrag’d
-as no moving parts and would reduce their lifespan

73
Q

Features of Open Source software:

A

-users can modify and distribute software
-support provided by community
(may not be fully tested)
-can be installed of any num. of computers
-users have access to Source Code

74
Q

Features of Propriety software:

A

-users can’t modify/distribute (Protected by Copyrights Design & Patents act)
-supported by developers (tested by developers prior to release)
-usually paid for and licensed per user per computer
-users no access to source code