Topic 3 - Computer network, connections and protocals Flashcards

(31 cards)

1
Q

What is the difference between a LAN and a WAN?

A

LAN = local area network and has a small geographical area under 1 mile.
WAN = wide area network over 1 mile owned my multiple entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a client server network?

A

In a client server network devices take up one of two roles they either are a client or a server.
Client - Requests something for example a website.
Server - Server responds to a request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Peer to peer network?

A

All devices can be both a client and a server.
They can connect independently any device can connect to any other device and share information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a star topology?

A

Has a central node where every other device has to connect to. This means you are very reliant on the central device so it becomes a single point of failure. The advantage is it is very easy to add a new device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a wireless access point (WAP)?

A

Provides a wireless signal often built into a router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a mesh topology?

A

In a mesh device each device is connected to every other device. This makes it very difficult to install. It is high performing and low collisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a router?

A

Forward packets between networks.
Assigns ip addresses to a device.
Directs traffic efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a network interface card (NIC) ?.

A

Every network connected to a network has to have a NIC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a switch?

A

Uses MAC addresses to ensure packets go to the correct destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the factors that affect the performance of a network and explain each one?

A

The bandwidth - The maximum amount of data that can be transferred at a time. Bandwidth has to be shared across all devices transmitting.

Number of users - more devices = slower performance as bandwidth is shared across all devices.

Latency - delay between sending and receiving data

Transmission media - Wired connections like fibre optic are faster and more reliable than wireless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an IP address and what are the two types?

A

IP addresses can locate devices on the internet geographically.
There are two types IPv4 - ran out of combinations
IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is DNS?

A

Translates website names into IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are cloud servers?

A

Remote servers on the internet to store data and run applications instead of using local devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the advantages and disadvantages of cloud?

A

Advantages
Access the file anywhere with internet.
Backups are automatic
Reduces need for expensive hardware.
Easy to increase capacity.
Disadvantages
Needs internet connection.
Potential security and privacy risks.
Less control over data.
Often have to pay a subscription

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are protocols?

A

A set of rules enabling a device to communicate.
Protocols are examples of standards an agreed set of rules to ensure compatibility.

17
Q

What are layers?

A

A grouping of protocols that perform similar functions.

18
Q

What is SQL injection?

A

SQL Injection is a type of cyber attack where a hacker inputs malicious SQL code into a form (like a login box) to access or manipulate a database.

19
Q

What is brute force attacks?

A

Where an attacker tries every combination of a password.
You can less the risk by having long passwords and a limit on attempts .

20
Q

What is a DoS attack?

A

A DoS attack is a cyber attack that tries to make a website or network unavailable by flooding it with traffic or requests.
It overloads the system so that genuine users can’t access it

21
Q

What is social engineering?

A

Trick humans into giving passwords.
phishing message with a link to a faked website.

22
Q

What is malware?

A

Malicious software for example viruses and spyware.
Malware usually tries to damage your computer or extract information from you.

23
Q

What is DDOS attack?

A

A DDoS attack is similar to a DoS attack, but instead of using one computer, it uses multiple computers (often part of a botnet) to flood a network or website with traffic.

24
Q

What is a virus?

A

A computer virus is a malicious software program that replicates itself and spreads from one computer to another.

It often attaches itself to files or programs and can cause damage to data or systems.

25
What is spyware?
Spyware is a type of malicious software that secretly monitors and collects information about a user’s activities without their knowledge or consent.
26
What is penetration testing?
Simulating an attack to find issues so you can find gaps and bugs.
27
What are firewalls?
A firewall is a bit of hardware or software checking packets coming into the network and coming out of the network checking if they don't meet a certain rule.
28
What is physical security?
CCTV, locks, security staff.
29
What is anti-malware?
Scans for known malware and removes it.
30
What is user access levels
User access levels define the permissions or rights a user has within a system or network. They determine what a user can see, do, and modify on a device, file, or application.
31
What is encryption?
Scrambling data so those with a key can decrypt and understand the text.