section 2 networks Flashcards

1
Q

what is a LAN

A

local area network that covers a small geographical area and is often found in schools and universities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why use a LAN

A
sharing files
share the same hardware
share internet connection
updates all at once
communicate cheaply
user accounts can be stored centrally
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is WAN

A

wide area network

connect LANs that are in different areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what factors affect performance of networks

A

Bandwidth
wired or wireless connections
network topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is bandwidth

A

is the amount of data that can be transferred in a given time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a network interface card

A

an internal piece of hardware that allows a device to connect to a network
built into the motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are switches

A

connect devices on a LAN

switches receive data from one device and transmit this data to the device on the network with the correct MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are routers

A

responsible for transmitting data between networks

they also direct data packets to their destinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ethernet cables

A

CAT 5 and CAT 6

twisted pair cables which are twisted together to reduce internal interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Coaxial cables

A

single copper wire surrounded by plastic layer which provides shielding from outside interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fibre optic

A

transmits data as light

high performance because they don’t suffer from interference and can transmit over large distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how do wireless networks work

A

use radio waves to transmit data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how do you connect a network to wireless and devices

A

need a wireless Access point which is a switch that allows devices to connect wirelessly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how does WIFI work

A

uses two radio frequency bands the two bands overlap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What affects WIFI

A

interference between net works using adjacent channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is a passive attack and the best defense

A

someone monitors data travelling on a network and intercepts any sensitive information they find

data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is an active attack and best defense

A

when someone attacks a network with malware

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is an insider attack

A

someone within the organisation exploits their network access to steal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is a brute force attack and best defense

A

is a type of active attack used to gain information by cracking passwords through trail and error
use automated software to produce hundreds of passwords

locking accounts and strong passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is a denial of service attack

A

where hacker tries to stop users from accessing a part of a network
involve flooding the network with useless traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is malware

A

software that can harm devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are typical actions of malware

A

locking files(ransomware)
spyware
opening back doors
rootkits(alter permission)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what is a virus and how they spread

A

attach by coping themselves to certain files

users spread them by copying infected files and activate by opening them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what are worms and how they spread

A

they self replicate without any user help

exploit weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what are Trojans

A

malware disguised as legitimate software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what is social engineering

A

a way of gaining sensitive information or illigal access to networks by influencing people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what is a common way of social engineering

A

over the telephone by pretending to be administrator and persuades them to give confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what is phishing

A

when criminals send emails to people claiming ti be from a well known business
they are normally sent to lots of people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

what is SQL

A

structured query language

main coding languages used to access information in a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

what are SQL injections

A

are pieces of SQL typed into a website input box which then revels sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

what will a good network policy have

A
regularly test the network
use passwords
enforce user access levels
install anti-malware
encrypt sensitive data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

what is penetration testing

A

organisation employ specialists to simulate potential attacks on their network
it identifys possible weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

what is network forensics

A

investigations undertaken to find the cause of attacks on a network. For this to work an organisation needs a system of capturing data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

why are passwords used and what should they be like

A

help prevent unauthorized users accessing the network

should be strong, combinations, regularly changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

what are user access levels

A

control which part of the network different groups of users can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

what is good about user access levels

A

help limit the number of people with access to important data, so help prevent insider attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

what is encryption

A

when data is translated into code which only someone with the correct key can access

38
Q

what is anti malware software

A

designed to find and stop malware from damaging an organisation’s network and the devices on it

39
Q

what do firewalls do

A

block unauthorised access and examine all data

40
Q

what is a client server network

A

the devices connected to the server are clients

they send requests to the server the server processes it and responds

41
Q

pros of a client server

A
easier to keep track of files
easier to perform backups
easier to install updates
servers are reliable
easier to manage network security
42
Q

cons of client server

A

expensive
server dependence
server may become overloaded

43
Q

what is a peer to peer network

A

all devices are equal, connecting directly to each other without a server

44
Q

pros of peer to peer

A

easy to maintain

no server dependence

45
Q

cons of peer to peer

A

no centralized management
easy to lose track of whats stored where
less reliable
machines slow down when other devices access them

46
Q

what are the advantages of using layers

A

communication into manageable pieces
self contained
having set rules forces companies to make compatible hardware and software

47
Q

what is the data link layer

A

passing data over the physical network. Responsible for how bits are sent as electrical signals over cables, wireless and other hardware

48
Q

what is the network layer

A

making connections between networks, directing packets and handling traffic

49
Q

what is the transport layer

A

controlling data flow splitting packets and checking packets are correctly sent and delivered

50
Q

what is the application layer

A

turning data into websites and other applications and vise versa

51
Q

what is a layer

A

a group of protocols which have similar functions

52
Q

What is the TCP/IP protocol

A

dictates how data is sent between networks

53
Q

what is TCP

A

transmission control protocol sets the rules for how devices connect on the network. In charge of splitting the data into packets and reassembling the packets back into original data once it reaches the receiving device

54
Q

what is IP

A

internet protocol is responsible for packet switching

55
Q

what is the HTTP protocol

A

hyper text transfer protocol(used by web browsers to access websites and communicate with web servers)

56
Q

what is the HTTPS protocol

A

HTTPsecure(a more secure version of HTTP

57
Q

what is the FTP protocol

A

file transfer protocol(used to access, edit and move files between devices on a network)

58
Q

what is the IMAP protocol

A

internet message access protocol(used to retrieve emails from a server
the server holds the email until you delete it)

59
Q

what is the POP3 protocol

A

post office protocol(used to retrieve emails from a server

server holds the email until you download it)

60
Q

what is the SMTP protocol

A

simple mail transfer protocol(used to send emails)

61
Q

what is the internet

A

a network of networks, it’s a WAN which connects devices and networks from all over the world

62
Q

what is the worldwideweb

A

a collection of websites that are hosted on web servers and accessed through the HTTP protocol

63
Q

what are URLs

A

are addresses used to access web servers and resources on them

64
Q

what is a domain name server

A

translates a websites domain name into its IP address

65
Q

what is cloud computing

A

using the internet to host general storage

66
Q

advantages of cloud computing

A
access files from connected devices
easy to increase storage size
no need to buy expensive hardware
no need to pay it staff
provides security
updated automatically
67
Q

disadvantages of cloud computing

A

connection to the internet
dependent on host
vulnerable to hackers
subscription fees

68
Q

what is a virtual network

A

a network that is entirely software based

they are created by partitioning off some of the networks bandwidth

69
Q

what are the advantages of virtual networks

A

exist on the same network, making them more efficient

has its own security

70
Q

what is a virtual private network

A

a type of virtual network that can be used to send data securely over a large network

71
Q

how is data sent between devices

A

data is split into equal sized packets

72
Q

what does each packet contain

A

header-this contains the control information which has the destination address
checksum-a form of validation used to check that the payload data hasn’t been corrupted during transit

73
Q

how does packet switching work

A

1) splits the data and each piece is given a packet number
2) each router reads the packet header and decides which way to send the packet next
3) packets can take different routes depending on the traffic
4) the packets arrive in the wrong order so they use the packet numbers to reassemble
5) when all the data is received and the checksum matches a receipt conformation is sent

74
Q

what is a star topology

A

all devices are connected to a central switch or server that controls the network

75
Q

advantages of a star topology

A

if a device fails it is unaffected
simple to add more devices
better performance because of few data collisions

76
Q

disadvantages of a star topology

A

every device will need wires

problem with switch or server every thing dies

77
Q

what is a bus topology

A

all devices arranged in a line connected to a single backbone
data collisions are common

78
Q

what is a ring topology

A

data moves in one direction around the ring preventing collisions
only one device can send data at a time

79
Q

what is a mesh topology

A

a decentralized networking devices are either directly or indirectly connected to every one without the need for a central server

80
Q

advantages of mesh

A

no single point where the network can fail

can take different routes

81
Q

disadvantages of mesh

A

expensive

82
Q

what is a protocol

A

a set of rules for how devices communicate and how data is transmitted across a network

83
Q

what is a MAC address

A

are unique identifiers and are assigned to all the network devices
they are unique and can not be changed

84
Q

how many bits are in MAC binary

A

48 or 64

85
Q

where is the MAC address mainly used

A

Ethernet protocol on LANs

LAN switches read the MAC address and use them to send data to the right device

86
Q

what are IP address used for

A

when sending data between TCP/IP networks

87
Q

how are IP address assigned

A

manually or automatically

88
Q

what is a static IP address

advantages and disadvantages

A

permanent addresses
there used to connect printer and for hosting websites on the computer
companies don’t want there IP address changing
IP addresses are expensive

89
Q

what is a dynamic IP address

A

are assigned to the device by a network server meaning the device will have a different IP address each time you log in

90
Q

how many bits are in a IP address binary

A

32 or 128

91
Q

how does does DNS work

A

1) type in URL and the ISP looks up the domain name and finds the IP address
2) the web browser sends a request straight to that IP address asking for the page

92
Q

advantages of DNS

A

don’t have to remember IP address

private servers still available but shielded

help browse the internet

fast internet connection