Section 2 - Networks Flashcards

(138 cards)

1
Q

how much area does a LAN cover?

A

it covers a small geographical area located on a single site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is a LAN?

A

a local area network, owned by the organisation that uses it.
they can be wired (Ethernet cables) or wireless (Wi-Fi)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

who owns LAN’s?

A

businesses, schools and universities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

why do people use LAN’s?

A

sharing files is easier - network users can access the same files, work collaboratively on them and copy between machines
hardware can be shared
internet connection can be shared
you can install and update software on all computers at once
you can communicate with LAN users cheaply and easily
user accounts can be stored centrally, so users can log in from any device on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a WAN?

A

wide area network.
it connects LAN’s that are in different geographical locations. e.g. a WAN can connect offices in different countries.
the internet is 1 big WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

do people buy WAN’s?

A

organisations hire infrastructure from telecommunications companies, who own and manage the WAN. WAN’s are more expensive to set up than LAN’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how are WAN’s connected?

A

using fibre or copper telephone lines, satellite links or radio links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is bandwidth?

A

the amount of data that can be transferred in a given time. the greater the bandwidth, the better the network can perform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how can a network become congested?

A

available bandwidth is shared between users of a network - too many users or heavy use may cause congestion and slow the network. you can limit bandwidth available to individual users to solve this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

are wired or wireless connections faster?

A

wired connections are generally faster and more reliable than wireless. fibre optic cables give better performance than copper cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what does wireless performance depend on?

A

signal quality, this means it is affected by the range of the device, the amount of interference from other devices and physical obstructions like thick walls in buildings. choice of hardware and network topology also have a big effect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a network interface controller?

A

an internal piece of hardware that allows a device to connect to a network. these used to be on separate cards, but now they’re built into the motherboard. they exist for both wired and wireless connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what do switches do?

A

they connect devices on a LAN. they receive data (in units called frames) from 1 device and transmit this data to the device on the network with the correct MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what do routers do?

A

they are responsible for transmitting data between networks - they’re always connected to at least 2 different networks
they direct data (in packets) to their destination.
they are used in homes and offices to connect the LAN to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are Ethernet cables used for?

A

to connect devices in a LAN. most common are CAT 5e and CAT 6. they are ‘twisted pair’ cables, containing 4 pairs of copper wires which are twisted together to reduce internal interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are coaxial cables?

A

they are made of a single copper wire surrounded by a plastic layer for insulation and a metallic mesh which provides shielding from outside interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what are fibre optic cables?

A

they transmit data as light. they are high performance cables that don’t suffer interference and can transmit over very large distances without loss of signal quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what devices use radio waves to transmit data?

A

mobile phones, TV’s and wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is needed to set up a wireless network?

A

a WAP (wireless access point) device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what are WAP’s?

A

its basically a switch that allows devices to connect wirelessly. they are not hotspots, which are locations where you can connect to a WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

how can devices have wireless capability?

A

many modern devices have the necessary hardware built in, but devices that don’t can often use a dongle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are USB dongles?

A

they can be plugged into computers to allow them to connect wirelessly to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what are HDMI dongles?

A

they can use wireless networks to stream high-quality video to a TV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what 2 radio frequencies bands does WI-FI use?

A

2.4 GHz and 5 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
why are only certain channels used in the 2.4 GHz frequency band?
the bands are split into numbered channels that each cover a small frequency range. the channels overlap and WiFi performance is affected by interference between networks. to avoid this only certain channels that are spaced apart should be used
26
what are the advantages of the 2.4 GHz frequency band?
has a greater range, so can serve devices across a wider area better at getting through solid objects/ walls
27
what are the advantages of the 5 GHz frequency band?
much faster when communicating over a short distance | there are more non-overlapping channels, so there's less chance of interference from other devices
28
how does the client-server network work?
files and software are stored centrally. | clients send requests to the server e.g. asking for data. the server processes the request and responds
29
in a client server network what does the server do?
stores user profiles, passwords and access information - it may request a password before fulfilling certain requests or deny requests to users without the right access information
30
what are the pros of a client-server network?
easier to keep track of files as he're stored centrally easier to perform back-ups easier to install and update software easier to manage network security servers are very reliable and are always on
31
what are the cons of a client-server network?
expensive to set up and needs IT specialists to maintain the network and server server dependence - if the server goes down all clients lose access to their work the server may become overloaded if too many clients are accessing it at once
32
how do peer-to-peer networks work?
all devices are equal, connecting directly to each other without a server. files are stored on individual devices and share them with others they can be used at home to share files between devices, or connect devices to a printer
33
what are the pros of peer-to peer?
easy to maintain - you don't need any expertise or expensive hardware no dependence on server - if 1 device fails the network is unaffected
34
what are the cons of peer-to peer?
no centralised management - devices need their updates and security installed individually. backups are also more complicated copying files between devices creates duplicate files - its easy to lose track of whats stored where and which files are up-to-date peer machines are less reliable and data may be lost if 1 fails machines are prone to slow down when other devices access them
35
what is a star topology?
all devices are connected o a central switch or server that controls the network. the central switch allows many devices to access the server simultaneously they can be wired and wireless
36
what are the pros of a star topology?
if a device fails or a cable is disconnected, the rest of the network is unaffected its simple to add more devices to the network better performance than other setups - data goes straight to the central device so all devices can transmit data at once and there are fewer data collisions
37
what are the cons of a star topology?
in wired networks, every device needs a cable to connect to the central switch or server. this can be expensive if there is a problem with the switch/server, the whole network is affected
38
what is a mesh topology?
it is decentralised - networking devices are either directly or indirectly connected to every other 1 without the need for a central switch or server. they send data along the fastest route from 1 device to another
39
what are the advantages of mesh topology's?
there is no single point where the network can fail, if 1 device fails data can be sent along an alternative route
40
what are the disadvantages of mesh topology's?
if it is a wired network it is very expensive, but with wireless technology, they are more practical
41
what is a full mesh?
where every device is connected to every other device
42
what is a partial mesh topology?
not all devices are fully-connected
43
what is a protocol?
a set of rules for how devices communicate and how data is transmitted across a network
44
what do protocols cover?
how communication between 2 devices should start and end, how data should be organised, and what devices should do if data goes missing
45
what are MAC addresses?
unique addresses assigned to all network-enabled devices by the manufacturer. they can't be changed.
46
how long are MAC addresses?
48 or 64-bit binary numbers, that are converted to hexadecimal
47
how are MAC addresses used?
they are mainly used by the Ethernet protocol on LAN's. LAN switches read the MAC addresses and use them to direct data to the right device
48
when are IP addresses used?
when sending data between TCP/IP networks e.g. over the internet. they aren't linked to hardware, they are assigned either manually or automatically before the device can access the network
49
what are static IP addresses?
permanent addresses. they're used to connect printers on a LAN, and for hosting websites on the internet - companies don't want their IP address changing, they can be expensive and businesses pay lots of money for them.
50
what are dynamic IP addresses?
they are assigned when a device logs onto a network, so it may have a different address every time it connects. internet device providers (ISPs) usually use them because they are more cost effective and can be reused
51
how long are IP addresses?
they can be 32 bit or 128 bit binary numbers, depending on the version of IP. longer 128 bit numbers are translated into 8 hexadecimal numbers. the 32 bit ones are converted into 4 denary numbers
52
what do data packets have?
a header a payload a checksum
53
what is in a packets header?
the control information. the control information includes the packet's destination, the source address and the packet number
54
what is the packets payload?
the thing a person is likely to read, and the whole reason the data packet has been sent in in the 1st place. it might be part of an email, document, web page or streamed video
55
what is the checksum of a packet?
it is a form of validation used to check that the payload data hasn't been corrupted during transit. the sending and receiving devices both calculate a checksum by performing a function on the payload. if the values match the data has been received correctly
56
how is lots of data able to be sent across the internet?
the sending device splits the data into packets to be sent across the network. each packet is given a packet number to show the order of the data
57
how is packet switching used by routers?
each router reads the packet header and decides which way to send the packet, according to the IP rules the way the data is sent changes depending on network traffic so the packets can take different routes. if a router receives too many packets at once, it may prioritise some over others
58
why do data packets need packet numbers?
the packets take different routes, so they can arrive in the wrong order. the receiving device uses the packet numbers to reassemble them in the right order
59
when is a timeout message sent?
the receiving device checks periodically that all the packets have been received, if they haven't arrived in a certain time then a timeout message is sent. this is done because sometimes packets go missing
60
what happens if all the data is received, and the checksums match?
a receipt confirmation is sent to the sending device
61
why is packet switching an efficient use of the network?
because there are so many possible routes that data can take - packets can reach their receiving device even if there's heavy traffic
62
what is TCP/IP?
a protocol that dictates how data is sent between networks. its made up of 2 protocols : TCP and IP
63
what does the transmission control protocol do?
it sets the rules for how devices connect on the network. its in charge of splitting the data into packets and reassembling the packets back into the original data. it also checks the data is correctly sent and delivered
64
what does internet protocol do?
its responsible for packet switching
65
what is HTTP?
hyper text transfer protocol. its used by web browsers to access websites and communicate with web servers
66
what is HTTPS?
HTTP secure, its a more secure version of HTTP. it encrypts all information sent and recieved
67
what is FTP
file transfer protocol. used to access, edit and move files between devices on a network, e,g, to access files on a server from a client computer
68
what is POP3?
post office protocol, version 3. its used to retrieve emails from a server. the server holds the email until you download it, at which point it is deleted from the server
69
what is IMAP?
internet message access protocol. its used to retrieve emails from a server. the server holds the email until you delete it - you only download a copy. most web-based email recipients use it
70
what is SMTP?
simple mail transfer protocol. its used to send emails. also used to transfer emails between servers
71
what is a layer?
a group of protocols which have similar functions. the are self-contained so protocols in each layer can do their job without needing to know whats happening in other layers. each layer serves the layer above it
72
what are the 4 different layers?
layer 4 - application layer layer 3 - transport layer layer 2 - network layer layer 1 - link layer
73
what does the application layer do?
it turns data into websites and other applications and vice versa. e.g. HTTP, FTP, SMTP
74
what does the transport layer do?
controls data flow - e.g. splitting data into packets and checking packets are correctly sent and delivered. e.g. TCP
75
what does the network layer do?
make connections between networks, directly data packets and handling traffic. used by routers. e.g. IP
76
what does the data link layer?
it passes data over the physical network. its responsible for how bits are sent as electrical signals over cables, wireless and other hardware. e.g. ethernet
77
what are the advantages of using layers?
it breaks network communication into manageable pieces they are self contained each layer has set rules
78
how is breaking network communication into manageable pieces an advantage of layers?
it helps developers concentrate on only 1 area of the network without having to worry about the others
79
how is being self contained an advantage of layers?
they can be changed without the other layers being affected
80
how is each layer having set rules an advantage of layers?
it forces companies to make compatible, universal hardware and software, so different brands will work with each other and always work in basically the same way
81
what is the internet?
its a WAN which connects devices and networks
82
what is the world wide web?
a collection of websites that are hosted on web servers and accessed through the http protocol
83
what are URLs?
addresses used to access web servers and resources on them. they are made of a protocol, domain name and path
84
what does a domain name server do?
it translates a websites domain name into its IP address. the internet has a network of domain name servers, meaning you don't need to remember IP addresses to access websites
85
what is hosting?
when a business uses its servers to store files of another organisation. the traditional use for this on the internet is the hosting of websites
86
what is internet hosting used for?
general storage of user files and providing online software - this is cloud computing (the cloud). it acts like an extension of a traditional client-server network where user files are stored centrally on a network server
87
what are the pros of the cloud?
users can access files from any connected device easy to increase how much storage is available no need to buy expensive hardware to store data no need to pay IT staff to manage the hardware cloud host provides security and back ups for you cloud software will be updated automatically
88
what are the cons of the cloud?
need connection to the internet to access files dependent on host for security and back-ups data in the cloud can be vulnerable to hackers unclear who has ownership over cloud data subscription fees for using cloud storage and software may be expensive
89
what is a virtual network?
a network that is entirely software-based. virtual networks are created by partitioning off some of a physical network's bandwidth to form a separate network
90
how many virtual networks can exist on a physical network?
several virtual networks can exist on the same physical network. these networks all share the same hardware, making virtual networks more efficient than standard physical networks.
91
why can virtual networks only be accessed with certain software?
each virtual network has its own security, including firewall. this means they can only be accessed by using certain software or login information - other people could be using the same physical network and not have access to the virtual network
92
what is a virtual private network (VPN)?
a type of virtual network that can be used to send data securely over a large network, like a WAN or the internet e.g. a VPN can be used to send data securely between 2 offices on different sites, or to set up a school intranet that all the students can access from home
93
what is a virtual LAN?
it allows you to split a LAN into several separate networks using the same hardware
94
what is a passive attack?
where someone monitors data travelling on a network and intercepts any sensitive information they find. they use network-monitoring hardware and software such as packet sniffers. they are hard to detect because packet sniffers don't actively do any harm
95
what is the best defence against passive attacks?
data encryption
96
what are active attacks?
when someone attacks a network with malware or other planned attacks. they are more easily detected
97
what is the best defence against active attacks?
firewall
98
what is an insider attack?
someone within an organisation exploits their network access to steal information
99
what is a brute force attack?
a type of active attack used to gain information by cracking passwords through trial and error. they use automated software to produce hundreds of likely password combinations
100
how do brute force attacks work?
they may try lots of passwords against 1 username or vice versa
101
how can risk of brute force attacks be reduced?
simple measures like locking accounts after a certain number of failed attempts and using strong passwords
102
what is a denial-of-service attack (DoS)?
where a hacker tries to stop users from accessing a part of a network or website. most DoS attacks involve flooding the network with useless traffic, making the network extremely slow or completely inaccessible
103
what are some typical actions of malware?
``` deleting or modifying files scareware locking files spyware rootkits opening backdoors ```
104
what is an example of scareware?
it tells the users their computer is infected with loads of viruses to scare them into following malicious links or paying for problems to be fixed
105
how can malware be used to lock files?
ransomware encrypts all the files on a computer. the user receives a message demanding a large sum of money be paid in exchange for a decryption key
106
what is spyware?
it secretly monitors user actions, e.g. key presses, and sends info to the hacker
107
what are rootkits?
they altar permissions, giving malware and hackers administrator-level access to devices
108
what a re 'backdoors'?
holes in someones security which can be used for future attacks
109
what different ways can malware access your device?
viruses worms Trojan horses
110
what do viruses do?
attach (by copying themselves) to certain files, e.g. .exe files and autorun scripts. users spread them by copying infected files and activate them by opening infected files
111
what do worms do?
they are like viruses but they self-replicate without any user help, meaning they can spread very quickly. they exploit weaknesses in network security
112
what are Trojan horses?
malware disguised as legitimate software. they don't replicate themselves - users install them not realising they have a hidden purpose
113
what is social engineering?
a way of gaining sensitive information or illegal access to networks by influencing people, usually the employees of large companies
114
what is a common form of social engineering?
it takes place over the telephone - someone rings an employee and pretends to be a network administrator or someone within the organisation. they gain the employees trust and persuade them to disclose confidential information, this might be personal or sensitive company details
115
what is phishing?
when criminals send emails or texts to people claiming to be from a well-known business. the emails often contain links to spoof versions of the company's website.
116
how do criminals use phishing?
they can request that the user update their personal information. when the user inputs this data into the website they give to the criminals, who can access their genuine accounts
117
how many emails do phishers send?
they often send it to thousands of people, in the hope that someone will read the email and believe its contents to be legitimate
118
how can phishing be protected against?
many email programs, browsers and firewalls have anti-phishing features that will reduce the number of phishing emails to received. some giveaways are poor grammar.
119
what does SQL stand for?
structured query language
120
what is SQL?
1 of the main coding languages used to access information in databases
121
what are SQL injections?
pieces of SQL typed into a websites input box which then reveal sensitive information
122
how could an SQL injection be used?
if the websites SQL code does not have strong enough input validation, then someone may be able to enter a piece of SQL code which allows them to access other people's account information as well as their own
123
what does a good network policy do?
``` regularly test the network use passwords enforce user access levels install anti-malware and firewall software encrypt sensitive data ```
124
why should a good network policy regularly test the network?
to find and fix security weakness and investigate any problems
125
why should a good network policy use passwords?
to prevent unauthorised people from accessing the network
126
why should a good network policy enforce user access levels?
to limit the number of people with access to sensitive information
127
why should a good network policy install anti-malware and firewall?
to prevent and destroy malicious software attacks
128
what is penetration testing?
pentesting is when organisations employ specialists to simulate potential attacks on their network
129
why is pentesting used?
to identify possible weakness in a network's security by trying to exploit them. the results of the pentest are then reported back
130
what are network forensics?
investigations undertaken to find the cause of attacks on a network. to conduct network forensics, an organisation needs to have a system of capturing data packets as they enter their network
131
what happens in network forensics after the network is attacked?
the captured data packets can be analysed to discover how the network was attacked and decide how to prevent future attacks
132
how can unauthorised users be prevented from accessing the network?
passwords. they should be strong - they should be many characters long , use a combination of letters, numbers and symbols - and be changed regularly
133
what do user access levels do?
control which parts of the network different groups of users can access
134
example of user access level:
business managers are likely to have a higher access level so they can access more sensitive data, like pay information. they may also have write access to files that others can only read and the ability to change employees' access levels
135
what is anti-malware software?
its designed to find and stop malware from damaging a network and the devices on it. there are lots of different types, including antivirus programs which isolate and destroy computer viruses
136
how do companies use anti-malware?
companies use firewalls to block unauthorised access. firewalls examine all data entering and leaving the network and block any potential threats
137
what is encryption?
when data is translated into a code which only someone with the correct key can access, meaning unauthorised users can't read it. it is essential for sending data over a network securely
138
what is encryption text called?
cipher text, non- encrypted data is called plain text