Unit 12: Behind the Scenes: Networking and Security in the business world Flashcards

1
Q

4 benefits of business networks

A
  1. enables resource sharing
  2. facilitates knowledge sharing - data access to multiple people
  3. enables software sharing - deliver software form server to client
  4. enhances communication - connects employees
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

network administrators?

A

additional personnel that are required to maintain a business network due to its complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

client/server network/server-based network?

A

contains servers and client computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

sever?

A

a computer that stores and shares resources on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

client?

A

a computer that requests resources from the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

which one is centralized and which one is decentralized

a) client/server networks
b) P2P networks

A

a) centralized

b) decentralized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

when are P2P networks difficult to administer?

A

past 10 users therefore not used for business networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

scalability?

A

more users can be added easily without affecting the performance of the other network nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the 2 most common types of client/server networks?

A
  1. LAN - local area network

2. WAN - wide area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

types of client/server networks

A
  1. PAN - devices used by one person connect via wireless media
  2. LAN - network consisting of nodes covering a small geographical area
  3. HAN - small LAN installed in a home
  4. WAN - multiple LANs connected together over a long distance
  5. MAN - WANs constructed by municipalities to provide connectivity in a specific geopraphical area
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

intranet?

A

private network set up by a business that is used exclusively by a select group of employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

extranet?

A

an area of an intranet that only certain corporations/individuals can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EDI?

A

electronic data interchange - enabled by extranet they allow the exchange of large amounts of business data in a standardized electronic format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VPN?

A

virtual private network - uses public internet communications infrastructure to build a secure, private network among various locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

tunneling?

A

data packets are placed inside other data packets allowing VPN to be achieved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

6 key components fo a client/server network

A
  1. servers
  2. network topologies
  3. transmission media
  4. network adapters
  5. network navigation devices
  6. network OS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

network topology?

A

physical or logical arrangement of computers, transmission media, and other networks components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

NIC?

A

network interface card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

dedicated server?

A

a server used to fulfill the specific function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

8 categories of servers

A
  1. print servers
  2. app servers - a repository for app software
  3. database servers - access
  4. authentication server - keeps track of who logs in
  5. file server - storage and management
  6. email server - process and deliver
  7. communication server
  8. web/cloud server - host website to make available on the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

print queue/print spooler?

A

a software holding area for print jobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Apache HTTP server and Microsoft IIS are examples of?

A

special software run by a web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IIS?

A

internet information services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

virtualization?

A

using specialized software to make individual physical servers behave as though they are more than one physical devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

protocol?

A

set of rules for exchanging communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

bus/linear bus topology?

A

where all computers are connected in a sequence on a single cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

data collision?

A

when 2 computers send data at the same time and the sets of data collide somewhere in the connection media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what networks don’t have a data collision problem?

A

none

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

access method?

A

controls which computer can use the transmission media at a certain time in order to prevent data collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

passive topology?

A

when nodes do nothing to move data along with the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

terminator?

A

a device that absorbs a signal so that it’s not reflected back onto parts of the network that has already received it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

costs and benefits of a bus network

A
  1. benefit - inexpensive

2. cost - causes a break in the “cable” and limits performance/delays data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

ring/loop topology?

A

type of network topology where computer and peripherals are laid out in a circular configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

token?

A

spacial data packet used in a ring topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

token method?

A

access method that ring networks use t avoid data collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

active topology?

A

nodes participate in moving data through a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

is a ring topology an active or passive topology?

A

active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

is a bus topology an active or passive topology?

A

passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

star topology?

A

nodes connect to a switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

switch?

A

central communication device - receives node signal and retransmits it to another node that needs to receive the signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

which topology is most commonly used by client/server networks? why?

A

star topology - because its the most flexible for a low price - most efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

CSMA/CD?

A

carrier sense multiple access with collision detection - where a node uses carrier sense to verify that no other nodes are currently transmitting data signals in order to check if it is safe to transmit data

43
Q

carrier sense?

A

computers version of listening

44
Q

jam signal?

A

a signal that alerts nodes that a collision has occurred

45
Q

4 advantages of a star topology?

A
  1. failure of one node doesn’t affect network - other nodes
  2. easy to add nodes
  3. acceptable performance even with many nodes
  4. switch makes repairs easier
46
Q

2 advantages of bus topology?

A
  1. min amount of cable

2. easy, reliable, and inexpensive installation

47
Q

2 advantages of ring topology?

A
  1. fair network allocation

2. acceptable performance even with many nodes

48
Q

hybrid topology?

A

combining multiple topologies into one network

49
Q

6 factors to consider when choosing a network cable

A
  1. max run length - how long cable can run before data signal degrades
  2. bandwidth - the amount of data transmission
  3. flexibility - how much it can bend
  4. cable cost
  5. installation cost
  6. interference
50
Q

transmission media?

A

a physical system that data takes to flow between devices on the network

51
Q

3 types of cables

A
  1. twisted-pair
  2. coaxial
  3. fiber-optic
52
Q

things that cause transmission media interference

A
  1. EMI - when a cable is exposed to a strong electromagnetic field
  2. RFI - when a cable is disrupted by a radio frequency
53
Q

EMI?

A

electromagnetic field interference

54
Q

RMI?

A

radio frequency interference

55
Q

twisted-pair cable?

A

pairs of copper wires twisted around each other covered by a protective sheath

56
Q

STP cable?

A

shielded twisted-pair - cable that contains a layer of foil shielding on a twisted-pair cable meant to reduce interference

57
Q

UTP cable?

A

unshielded twisted-pair - twisted-pair cable that doesn’t have a shielding

58
Q

what is UTP cable used for and why?

A

business networks because it is cheaper

59
Q

what are the 4 components of coaxial cable?

A
  1. a core - used to transmit the signal
  2. layer of nonconductive insulating material surrounding the core
  3. layer of braided metal shielding covering installation to reduce interference
  4. external layer of plastic - jacket
60
Q

what are the 3 components of fiber-optic cable?

A
  1. multiple glass/plastic fibre (core) - used to transmit data
  2. protective layer of glass/plastic wrapped around the core
  3. outer sheath made of Kevlar - bulletproof vest
61
Q

network adapter?

A

devices that perform specific tasks to enable nodes to communicate on a network

62
Q

NIC?

A

network interface card - network adapter installed inside a computer/peripheral

63
Q

3 thing network adapters do

A
  1. generate high-powered signals to enable network transmissions
  2. responsible for breaking the data into packets and transmitting and receiving data
  3. act as a gatekeeper for info flowing to and from the client computer
64
Q

what is the standard communication protocol used on most client/server network?

A

ethernet network

65
Q

wireless NIC?

A

wireless network interference card - special networking card that allows a computing device to connect to a network using a wireless media

66
Q

WAP?

A

wireless access point - gives wireless devices a sending and receiving connection point to a network

67
Q

device driver?

A

a special communication software that enables the network adapter to communicate with the server’s and computing system’s OS

68
Q

MAC address?

A

media access control address - physical address/serial number

69
Q

IEEE?

A

institute of electrical and electronics engineer - a committee responsible for allocating blocks of numbers to network adapter manufacturers - MAC’s

70
Q

IP?

A

internet protocol

71
Q

what is the difference between a MAC address and an IP address?

A

MAC address - used to identify purposes internally on a network
IP address - used to identify purposes externally on a network

72
Q

frame?

A

groups of the data packet sent together

73
Q

NOS?

A

network OS - provides protocols that control communication among devices on a network

74
Q

what does a switch do?

A

sends data on a specific route through a network based on the MAC address of the data

75
Q

bridge?

A

devices used to send data between different network collision domains

76
Q

collision domain?

A

a segment of a network

77
Q

router?

A

a device designed to send info between two networks

78
Q

do P2P networks require a special NOS?

A

no usually P2P devices already have it built in the system

79
Q

can a network use multiple NOSs? why?

A

yes, because each NOS provides different features

80
Q

the 3 types of threat that client/servers are vulnerable to

A
  1. human error
  2. malicious human activity
  3. natural events/disasters
81
Q

who offers more security?

a) P2P
b) client/servers

A

b)

82
Q

authentication?

A

process whereby users prove they have the authorization to use a computer network

83
Q

possessed object?

A

any object that users carry to identify themselves and that grants them access to a computer system/facility

84
Q

brute-force attack?

A

attempting to access an account by repeatedly trying different passwords

85
Q

OSI reference model?

A

open system interconnection reference model - a standard of communication that provides the protocol guideline for all modern networks

86
Q

7 layers of OSI model?

A
  1. application layer
  2. presentation layer
  3. session layer
  4. transport layer
  5. network layer
  6. data link layer
  7. physical layer
87
Q

OSI model application layer? (2)

A
  1. interfaces between app software and network

2. translates user info into language presentation layer can understand

88
Q

OSI model presentation layer? (2)

A
  1. reformats data so the session layer understands

2. compresses and encrypts data

89
Q

OSI model session layer? (2)

A
  1. sets up a virtual connection between sending and receiving deveis
  2. manages communication sessions
90
Q

OSI model transport layer?

A

creates and acknowledges data packets

91
Q

OSI model network layer?

A

determines where to sends data packets

92
Q

OSI model data link layer?

A

assembles data into frames, addresses them sends them to the physical layer

93
Q

OSI model physical layer?

A

transmits data to intended address using network

94
Q

why might portable storage devices endanger a network? what are they?

A

they can aid in theft of data or intellectual property - flash drives/USB devices

95
Q

2 physical devices used to control network access

A
  1. access card reader - cheap devices that read info from the magnetic stripe on the back of credit card
  2. biometric authentication device - uses a unique characteristic of human biology to identify authorized users
96
Q

3 of the best security methods for sensitive info

A
  1. knowledge - passcode
  2. possession - user ID
  3. inherence - retina scan/fingerprint
97
Q

multi-factor authentication?

A

when a system requires multiple factor demonstrations of authorization before access is granted

98
Q

packet screening?

A

having an external screening router examining incoming data packets to ensure that they originated from a valid user on the internal network

99
Q

bastion host?

A

a heavily secured server located on a special perimeter network between a company’s secure internal network and firewall - a type of honey pot

100
Q

honey pot?

A

a computer system designed to attract unauthorized users by appearing to be a key part of the network

101
Q

information assurance?

A

ensuring info system sare adequately secured against tampering

102
Q

5 key attributes to securing information systems

A
  1. availability - the extent a data processing system can receive and process data
  2. integrity - logical and accurate with protected data
  3. authentication - contains security measures restricting access
  4. confidentiality - the assurance that info is not disclosed t unauthorized personnel
  5. nonrepudiation - proof that a piece of data originated from a specific person
103
Q

proxy server?

A

a configuration of a bastion host that resides between internal and external networks in order to maintain adequate security - customs