Unit 12: Behind the Scenes: Networking and Security in the business world Flashcards

1
Q

4 benefits of business networks

A
  1. enables resource sharing
  2. facilitates knowledge sharing - data access to multiple people
  3. enables software sharing - deliver software form server to client
  4. enhances communication - connects employees
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

network administrators?

A

additional personnel that are required to maintain a business network due to its complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

client/server network/server-based network?

A

contains servers and client computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

sever?

A

a computer that stores and shares resources on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

client?

A

a computer that requests resources from the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

which one is centralized and which one is decentralized

a) client/server networks
b) P2P networks

A

a) centralized

b) decentralized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

when are P2P networks difficult to administer?

A

past 10 users therefore not used for business networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

scalability?

A

more users can be added easily without affecting the performance of the other network nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the 2 most common types of client/server networks?

A
  1. LAN - local area network

2. WAN - wide area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

types of client/server networks

A
  1. PAN - devices used by one person connect via wireless media
  2. LAN - network consisting of nodes covering a small geographical area
  3. HAN - small LAN installed in a home
  4. WAN - multiple LANs connected together over a long distance
  5. MAN - WANs constructed by municipalities to provide connectivity in a specific geopraphical area
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

intranet?

A

private network set up by a business that is used exclusively by a select group of employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

extranet?

A

an area of an intranet that only certain corporations/individuals can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EDI?

A

electronic data interchange - enabled by extranet they allow the exchange of large amounts of business data in a standardized electronic format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VPN?

A

virtual private network - uses public internet communications infrastructure to build a secure, private network among various locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

tunneling?

A

data packets are placed inside other data packets allowing VPN to be achieved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

6 key components fo a client/server network

A
  1. servers
  2. network topologies
  3. transmission media
  4. network adapters
  5. network navigation devices
  6. network OS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

network topology?

A

physical or logical arrangement of computers, transmission media, and other networks components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

NIC?

A

network interface card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

dedicated server?

A

a server used to fulfill the specific function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

8 categories of servers

A
  1. print servers
  2. app servers - a repository for app software
  3. database servers - access
  4. authentication server - keeps track of who logs in
  5. file server - storage and management
  6. email server - process and deliver
  7. communication server
  8. web/cloud server - host website to make available on the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

print queue/print spooler?

A

a software holding area for print jobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Apache HTTP server and Microsoft IIS are examples of?

A

special software run by a web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IIS?

A

internet information services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

virtualization?

A

using specialized software to make individual physical servers behave as though they are more than one physical devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
protocol?
set of rules for exchanging communications
26
bus/linear bus topology?
where all computers are connected in a sequence on a single cable
27
data collision?
when 2 computers send data at the same time and the sets of data collide somewhere in the connection media
28
what networks don't have a data collision problem?
none
29
access method?
controls which computer can use the transmission media at a certain time in order to prevent data collision
30
passive topology?
when nodes do nothing to move data along with the network
31
terminator?
a device that absorbs a signal so that it's not reflected back onto parts of the network that has already received it
32
costs and benefits of a bus network
1. benefit - inexpensive | 2. cost - causes a break in the "cable" and limits performance/delays data transmission
33
ring/loop topology?
type of network topology where computer and peripherals are laid out in a circular configuration
34
token?
spacial data packet used in a ring topology
35
token method?
access method that ring networks use t avoid data collision
36
active topology?
nodes participate in moving data through a network
37
is a ring topology an active or passive topology?
active
38
is a bus topology an active or passive topology?
passive
39
star topology?
nodes connect to a switch
40
switch?
central communication device - receives node signal and retransmits it to another node that needs to receive the signal
41
which topology is most commonly used by client/server networks? why?
star topology - because its the most flexible for a low price - most efficient
42
CSMA/CD?
carrier sense multiple access with collision detection - where a node uses carrier sense to verify that no other nodes are currently transmitting data signals in order to check if it is safe to transmit data
43
carrier sense?
computers version of listening
44
jam signal?
a signal that alerts nodes that a collision has occurred
45
4 advantages of a star topology?
1. failure of one node doesn't affect network - other nodes 2. easy to add nodes 3. acceptable performance even with many nodes 4. switch makes repairs easier
46
2 advantages of bus topology?
1. min amount of cable | 2. easy, reliable, and inexpensive installation
47
2 advantages of ring topology?
1. fair network allocation | 2. acceptable performance even with many nodes
48
hybrid topology?
combining multiple topologies into one network
49
6 factors to consider when choosing a network cable
1. max run length - how long cable can run before data signal degrades 2. bandwidth - the amount of data transmission 3. flexibility - how much it can bend 4. cable cost 5. installation cost 6. interference
50
transmission media?
a physical system that data takes to flow between devices on the network
51
3 types of cables
1. twisted-pair 2. coaxial 3. fiber-optic
52
things that cause transmission media interference
1. EMI - when a cable is exposed to a strong electromagnetic field 2. RFI - when a cable is disrupted by a radio frequency
53
EMI?
electromagnetic field interference
54
RMI?
radio frequency interference
55
twisted-pair cable?
pairs of copper wires twisted around each other covered by a protective sheath
56
STP cable?
shielded twisted-pair - cable that contains a layer of foil shielding on a twisted-pair cable meant to reduce interference
57
UTP cable?
unshielded twisted-pair - twisted-pair cable that doesn't have a shielding
58
what is UTP cable used for and why?
business networks because it is cheaper
59
what are the 4 components of coaxial cable?
1. a core - used to transmit the signal 2. layer of nonconductive insulating material surrounding the core 3. layer of braided metal shielding covering installation to reduce interference 4. external layer of plastic - jacket
60
what are the 3 components of fiber-optic cable?
1. multiple glass/plastic fibre (core) - used to transmit data 2. protective layer of glass/plastic wrapped around the core 3. outer sheath made of Kevlar - bulletproof vest
61
network adapter?
devices that perform specific tasks to enable nodes to communicate on a network
62
NIC?
network interface card - network adapter installed inside a computer/peripheral
63
3 thing network adapters do
1. generate high-powered signals to enable network transmissions 2. responsible for breaking the data into packets and transmitting and receiving data 3. act as a gatekeeper for info flowing to and from the client computer
64
what is the standard communication protocol used on most client/server network?
ethernet network
65
wireless NIC?
wireless network interference card - special networking card that allows a computing device to connect to a network using a wireless media
66
WAP?
wireless access point - gives wireless devices a sending and receiving connection point to a network
67
device driver?
a special communication software that enables the network adapter to communicate with the server's and computing system's OS
68
MAC address?
media access control address - physical address/serial number
69
IEEE?
institute of electrical and electronics engineer - a committee responsible for allocating blocks of numbers to network adapter manufacturers - MAC's
70
IP?
internet protocol
71
what is the difference between a MAC address and an IP address?
MAC address - used to identify purposes internally on a network IP address - used to identify purposes externally on a network
72
frame?
groups of the data packet sent together
73
NOS?
network OS - provides protocols that control communication among devices on a network
74
what does a switch do?
sends data on a specific route through a network based on the MAC address of the data
75
bridge?
devices used to send data between different network collision domains
76
collision domain?
a segment of a network
77
router?
a device designed to send info between two networks
78
do P2P networks require a special NOS?
no usually P2P devices already have it built in the system
79
can a network use multiple NOSs? why?
yes, because each NOS provides different features
80
the 3 types of threat that client/servers are vulnerable to
1. human error 2. malicious human activity 3. natural events/disasters
81
who offers more security? a) P2P b) client/servers
b)
82
authentication?
process whereby users prove they have the authorization to use a computer network
83
possessed object?
any object that users carry to identify themselves and that grants them access to a computer system/facility
84
brute-force attack?
attempting to access an account by repeatedly trying different passwords
85
OSI reference model?
open system interconnection reference model - a standard of communication that provides the protocol guideline for all modern networks
86
7 layers of OSI model?
1. application layer 2. presentation layer 3. session layer 4. transport layer 5. network layer 6. data link layer 7. physical layer
87
OSI model application layer? (2)
1. interfaces between app software and network | 2. translates user info into language presentation layer can understand
88
OSI model presentation layer? (2)
1. reformats data so the session layer understands | 2. compresses and encrypts data
89
OSI model session layer? (2)
1. sets up a virtual connection between sending and receiving deveis 2. manages communication sessions
90
OSI model transport layer?
creates and acknowledges data packets
91
OSI model network layer?
determines where to sends data packets
92
OSI model data link layer?
assembles data into frames, addresses them sends them to the physical layer
93
OSI model physical layer?
transmits data to intended address using network
94
why might portable storage devices endanger a network? what are they?
they can aid in theft of data or intellectual property - flash drives/USB devices
95
2 physical devices used to control network access
1. access card reader - cheap devices that read info from the magnetic stripe on the back of credit card 2. biometric authentication device - uses a unique characteristic of human biology to identify authorized users
96
3 of the best security methods for sensitive info
1. knowledge - passcode 2. possession - user ID 3. inherence - retina scan/fingerprint
97
multi-factor authentication?
when a system requires multiple factor demonstrations of authorization before access is granted
98
packet screening?
having an external screening router examining incoming data packets to ensure that they originated from a valid user on the internal network
99
bastion host?
a heavily secured server located on a special perimeter network between a company's secure internal network and firewall - a type of honey pot
100
honey pot?
a computer system designed to attract unauthorized users by appearing to be a key part of the network
101
information assurance?
ensuring info system sare adequately secured against tampering
102
5 key attributes to securing information systems
1. availability - the extent a data processing system can receive and process data 2. integrity - logical and accurate with protected data 3. authentication - contains security measures restricting access 4. confidentiality - the assurance that info is not disclosed t unauthorized personnel 5. nonrepudiation - proof that a piece of data originated from a specific person
103
proxy server?
a configuration of a bastion host that resides between internal and external networks in order to maintain adequate security - customs