Section 4: Computer Networks Flashcards

1
Q

VoIP

A

Voice over internet protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Networking

A

sharing information and resources through linked computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PAN

A

personal area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LAN

A

local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WAN

A

wide area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 3 major categories of networks?

A
  1. PAN
  2. LAN
  3. WAN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are PAN networks used for?

A

short-range communications, within a few feet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name 2 examples of technology that may utilize PAN networks?

A
  1. wireless headphones to a smartphone
  2. Wireless mouse to a PC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are LANs (not acronym)

A

a collection of computers in a single building or building complex.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a WAN (not acronym)

A

link systems over a greater distance including machines across the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name one type of open network?

A

the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Communication over the internet is governed by what?

A

a collection of standards known as the TCP/IP protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is topology

A

another classification of networks, designated by the pattern in which the machines are connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 4 common topologies of networks?

A
  1. bus
  2. star
    (1 and 2 most common)
  3. ring.
  4. mesh
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How are the machines connected to a bus network?

A

machines are connected to a common communication line called a bus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How are machines connected in a star network?

A

star networks have a single machine serving as a single point to which all others are connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How are machines connected in a ring network?

A

ring topologies connect directly to each other as a peer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How are machines connected in a mesh network?

A

Mesh connects every device in a network to every other device.

Mesh networks enable redundancy while also introducing significantly more network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How is the star topology used today? (Example)

A

wireless networks where communication is carried out via radio broadcast to a central machine called the AP (Access point)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AP

A

Access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which network topology best handles downed links without losing connectivity between devices?
A. Bus
B. Ring
C. Mesh
D. Star

A

C. Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What function do protocols serve in a computer?

A

Networks rely on protocols to govern communication.

Using protocols, vendors are able to build products for network applications that are compatible with products from other vendors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is interprocess communication (what does it do?)

A

allows the activities or processes on different computers within a network to coordinate actions and a complete tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is client/server & what are the basic roles?

A

A popular convention for interprocess communication.

Processes are categorized as either a client making requests or a server satisfying client requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

P2P

A

peer-to-peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How does P2P work?

A

processes both request and provide service to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Name 2 examples of the P2P model

A
  1. Instant Messaging
  2. Interactive games played by users on multiple machines.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the Gnutella Protocol?

A

Operates without any centralized server and allows for numerous software clients to be used for access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are distributed systems?

A

execute software processes on more than one computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Name 3 types of distributed systems.

A
  1. Cluster computing
  2. Grid Computing
  3. Cloud Computing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How does Cluster Computing work?

A

Uses many independent computers to provide computation or services comparable to a larger machine. Can use several individual machines similarly to a larger supercomputer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are two benefits to Cluster Computing?

A
  1. Provides high availability as it’s likely at least one computer in a cluster will be available.
  2. Can balance loads by automatically shifting requests among the cluster members.
  3. (Cost—can be more affordable than other options eg supercomputer.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is Grid Computing?

A

A type of distributed system that’s more loosely coupled than clusters but still works together as a system to complete large tasks.

Typically includes specialized software to make it easier to distribute workload and data among machines in the grid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is Cloud Computing?

A

provides large pools of shared computers that can be allocated to clients as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a benefit of cloud computing?

A

reasonably guarantees for reliability and scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the downside to Cloud Computing?

A

it raises concerns about security and privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is transmission medium?

A

a component that carries data from one network device to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are the two types of transmission medium?

A
  1. Wired
  2. Wireless
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Name 3 common network media used in wired networks.

A
  1. Twisted pair cables
  2. coaxial cable
  3. optical fiber cable.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Name 3 common network media used in wireless networks

A
  1. radio waves
  2. microwaves
  3. infrared waves.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

UTP

A

Unshielded twisted pair (twisted pair cables)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

STP

A

shielded twisted pair (twisted pair cables)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What are the two most common types of twisted pair cables?

A
  1. UTP
  2. STP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the difference between STP and UTP twisted pair cables?

A

STP consist of two separately insulated copper wires wound around each other, making them more expensive than UTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the benefit of SPT

A

the insulating sheath protects the wires from things like neighboring unshielded cables and electromagnetic interference from fluorescent lights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the maximum segment length of Twisted pair cables?

A

328 feet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

How is network bandwidth usually measured?

A

megabits per second (Mbps) and gigabits per second (Gbps)

48
Q

Which has more bandwidth, Twisted pair cables or coaxial cables?

A

coaxial cables.

49
Q

What is baseband

A

a signal at a very narrow frequency range on which data or information is superimposed and then transmitted.

50
Q

Name 2 examples of baseband

A
  1. EthernetLANs
  2. Serial Cables
51
Q

What is broadband?

A

high-capacity transmission technologies used to transmit data, voice, and video across long distances at high speeds.

52
Q

Name 3 examples of broadband

A
  1. Coaxial cable
  2. fiber optic cable
  3. radio waves.
53
Q

How do fiber optic cables work?

A

use the concept of reflection of light through a core made up of glass or plastic. The core is surrounded by a less dense glass or plastic covering called the cladding.

54
Q

What is a server?

A

a server is a computer that provides services, such as website hosting and routing for other devices

55
Q

What is a switch?

A

a network switch extends the network by using a packet switching to forward data to the intended hard-wired devices.

56
Q

What are routers?

A

special-purpose computers that forward messages from the machines on their network.

57
Q

How do routers work?

A

they use their forwarding table to match up the privacy IP addresses with the internet IP address and send the message to the correct machine.

58
Q

What is a firewall

A

monitors network traffic and blocks traffic that triggers its safety rules, providing a barrier between a trusted private network and an untrusted network like the internet.

59
Q

What does a modem do?

A

bridges the gap between the customer and the ISP converting the incoming analog data into digital and the outgoing digital data into analog. Provides the access point to the internet.

60
Q

What 4 devices can be used to connect networks?

A
  1. Repeaters
  2. Bridges
  3. Switches
  4. Routers
61
Q

What are repeaters?

A

extend the range of cabling types so connections can be made by increasing the strength of the network signal.

62
Q

What are bridges?

A

used to connect different types of network and provide management of the message.

ex. a bridge can be used to connect a twisted pair and coaxial network.

63
Q

What are switches?

A

used on LANs to reduce network traffic by management of network messages.

64
Q

What is a Gateway?

A

a device on your LAN.

65
Q

How do routers manage traffic?

A

Having a routing table of known devices. If a destination address is unknown to the router, it will forward the message to another router. This analyze and forward process continues until the message reaches the correct address.

66
Q

Which type of transmission media can broadcast in baseband mode?
A. Twisted Pair Cable
B. Optical Wire
C. Wireless Transmission
D. Coax Cable

A

D. Coax Cable

67
Q

Who constructs and maintains the individual networks comprising the internet?

A

ISPs

68
Q

How are ISPs classified?

A

classified in theirs depending on the role they play in the overall internet structure.

69
Q

What is Tier 1 ISP hierarchy

A

The backbone of the internet. Tier 1’s consist of high-speed, high-capacity, international WAN’s that are typically operated by large communication companies.

70
Q

What is Tier 2 ISP hierarchy

A

More common than Tier 1 and more regional in scope. Essentially networks of routers that collectively provide the internet’s communication infrastructure.

71
Q

What is Tier 3 ISP hierarchy

A

Access ISPs, typicall independent internets sometimes called intranets operated by a single organization that supplies internet access to homes and businesses.

72
Q

What are end systems or hosts?

A

Common internet devices used to connect to the access ISP. Include common devices such as PC’s, laptops, and smartphones but also includes cameras, cars, and home appliances.

73
Q

What are some examples (3) of technologies used to connect end systems to larger networks?

A
  1. Satellites
  2. Telephone lines
  3. Cables
74
Q

IP

A

Internet Protocol

75
Q

What kind of IP addresses are in use today?

A

IPv6 (IP version 6) with126-bit addresses in addition to legacy IPv4 addresses.

76
Q

How are ISP’s assigned?

A

ICANN coordinates internet operations and awards blocks of consecutively numbered IP addresses to ISPs. ISP’s then assign a unique IP address to each machine within their region of authority.

77
Q

How are IPv4 addresses written?

A

Written in dotted decimal notation with the bytes of the address separated by periods.

Example: 192.207.177.103

78
Q

How are IPv6 addresses written?

A

In hexadecimal

Example: 2001:DB8:12:34::1111

79
Q

ICANN

A

Internet Corporation for Assigned Names and Numbers

80
Q

Where must every domain be registered?

A

With ICANN

81
Q

What are network protocols?

A

Rules, procedures and formats that govern the communication of multiple devices over a network.

82
Q

HTTP

A

Hypertext Transfer Protocol

83
Q

SMTP

A

Simple Mail Transfer Protocol.

84
Q

How does SMTP work?

A

Uses Domain Name System (DNS) lookups to identify the recipient of the email and send the message over the internet to a mail server where it can be retrieved using protocol such as POP3 and IMAP

85
Q

DNS

A

Domain Name System

86
Q

POP3

A

Post Office Protocol version 3

87
Q

IMAP

A

Internet Message Access Protocol

88
Q

How does VOIP work?

A

It establishes a connection between two devices and then performing real-time two-way transmission of audio data.

89
Q

What is a softphone?

A

Allow two or more computers to share a call without any additional hardware.

90
Q

CDNs

A

Content Delivery Networks

91
Q

What are CDNs

A

Content delivery networks which are groups of servers distributed strategically over the internet that stream copies of content to nearby end users.

92
Q

Anycast

A

Enables an end user to connect to the closest server automatically.

93
Q

URL

A

Uniform Resource Locator.

94
Q

What do URL’s include?

A

The protocol, domain, and all subdomains as well as the resource path ID and name of the document.

95
Q

HTML

A

HyperText Markup Language

96
Q

What is HTML

A

HTML is a way of encoding a document.

97
Q

XML

A

Extensible Markup Language

98
Q

What is XML

A

A standardized style for designing notational systems for representing data as text files.

99
Q

What is the difference between XML and HTML?

A

XML emphasizes semantics while HTML focuses on appearances.

100
Q

What is Malware?

A

Any software intentionally designed to cause damage to a computer, server, client, or computer network.

101
Q

Name 4 types of Malware?

A
  1. Computer Viruses
  2. Worms
  3. Spyware
  4. Phishing
102
Q

What is a virus?

A

A software program that infects a computer by inserting itself into programs that already reside in the machine.

When the “host” program is executed, the virus is also executed, possibly performing degradations of portions of the OS, erasing large amounts of data, or corrupting data and other programs.

103
Q

What is a worm?

A

An autonomous program that forwards copies of itself to other machines in a network and could result in detriment of individual machines or the operations of the network.

104
Q

What is spyware?

A

Resides on the computer collecting information about the computers activities and reporting back to the spyware’s instigator. Passwords and credit card numbers can be exposed using spyware.

105
Q

DoS

A

Denial of Services attack

106
Q

What is a DoS attack?

A

It’s the process of overloading a computer with messages and results in suffocating the network resources.

107
Q

MITM

A

Man in the middle

108
Q

What is Packet Sniffing?

A

MITM attack. The attacker intercepts the data as it’s traveling to or from the victim’s device, including authentication credentials.

109
Q

Rainbow table attack and dictionary attack are two forms of what kind of attack?

A

Brute force.

110
Q

What is a brute force attack?

A

The attacker uses all possible combinations of characters to learn the user’s password.

111
Q

What is a dictionary attack?

A

Attacks are performed by the attacker using an application and a large dictionary text file with just words. When the attacker runs the application, it tries identifying the password by trying hundreds or thousands of words per minute from that dictionary file.

112
Q

How are passwords usually stored in most applications?

A

Scrambled text or hash values similar to “298cde70c32a57b84d0a546fedbb2596”

113
Q

What is a Rainbow Tables attack?

A

Rainbow tables try to identify the hash value of the password and then convert it back to plain text.

114
Q

What is a firewall?

A

A filter traffic passes through. A program. Block outgoing messages with certain destination addresses and blocking incoming messages from untrustworthy sources.

115
Q

What is Network Auditing Software?

A

It monitors network behaviors such as the origin and volume of traffic, looking for anomalies to proactively or reactively mitigate unwanted occurences.

116
Q

BEC

A

Business email compromise. A type of social engineering attack/scam.

117
Q

What are the two most common classifications of software?

A
  1. System software
  2. Application Software