Y12 Networking Flashcards

(35 cards)

1
Q

router

A
  • forwards packets between networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

switch

A
  • connects devices within a lan
  • receives messages from devices and transmits it to other devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

patch panels

A
  • organises network cables
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

firewalls

what do they filter

key functions

A
  • controls incoming and outgoing network traffic by analysing data packets
  • hardware firewalls protects you from outside world
  • software firewalls protects a specific device from other internal systems

filter
- ports, packets, ip addresses, domain names, protocols, keywords

key functions
- packet filtering, access control, network traffic monitoring, protection against threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

modem

A
  • modulates analogue systems into digital signals and back
  • produces signals that can be transmitted easily and decoded easily
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

network interface card

A
  • connects a computer to the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

wireless access points

A
  • devices that allows wireless devices to connect to a wired network
  • usually connects to or is part of a router
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

bridge

A
  • repeaters that send data from one network to another
  • inspects incoming traffic and decides whether to forward or discard it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

802.11
characteristics
troubleshooting steps

A
  • wifi
  • characteristics
    1. uses radio frequencies
  • troubleshooting steps
    1. relocate WAP
    2. change wifi channel
    3. update firmware & network adapter drivers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

802.3
characteristics
troubleshooting steps

A
  • ethernet
  • transmits up to 10 Megabits per second

Characteristics
- wired connection, high reliability & speed

Trouble shooting steps
1. check physical connections
2. inspect cables
3. restart devices
4. check link lights
5. update drivers
6. test with different ports/device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

network protocols

A
  • set of rules followed by a network
  • define communications between two or more deivces
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TCP

A
  • transmission control protocol
  • provides reliable, ordered and error-checked delivery of data
  • uses ‘three way handshake’
    1. TCP assigns sequence number (SYN)
    2. server acknowledges SYN, called SYN-ACK
    3. client acknowledges SYN-ACK, called ACK
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IP

A
  • internet protocol
  • used to transmit data across a network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCP/IP

A
  • set of communication protocols on the internet to interconnect devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HTTPS

A
  • hypertext transfer protocol secure
  • combination of HTTP with SSL (secure socket layer)
  • means all communications between your browser and website are encrypted, through digital certificates and signatures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

public key

A
  • every one can access it, used to encrypt and decrypt messages
17
Q

private keys

A
  • only user can access it and encrypt/decrypt with it
18
Q

digital certificates

A
  • electronic files that authenticate the identity of websites, individuals, organisations or devices
  • uses a system of public and private keys to encrypt message, whilst owner keeps private key secret
  • certificate contains public key used to encrypt message, whilst owner keeps private key secret
  • issued by Certificate authorities (CA)
19
Q

digital signatures

A
  • when you sign a document digitally, your encrypting a hash value of the document with the private key, which creates a digital signature that can be verified using public key (stored in digital certificate)
20
Q

authentication factors

A
  • used to sign in to a network
    knowledge factor - something user knows
    possession factor - something user has
    inherence factor/biometric factor - something inherent in user’s physical self
    location factor - uses IP addresses or GPS data to prevent unauthorised access
21
Q

authentication: passwords

A
  • the more complex a password is, the harder it is to guess
  • create passwords that are long, contain upper and lowercase, numbers + special characters
22
Q

authentication: two-factor

A
  • requires users to provide two forms of authentication to get access to an account/system
23
Q

secure router settings

A
  • make complex router passwords, change router’s admin credentials, non-identifiable network name, hide SSID, keep router firmware up to date, use firewall etc
24
Q

setting access permissions

A
  • they determine who can access what data and resources on a network
    1. identify users and groups that need access to specific networks
    2. assign appropriate permissions
    3. use principles of least privilege
  • common access permissions include read, write, execute and full control
25
encryption
- protects private and personal data through unique codes that scramble data and make it unreadable to unauthorised users - three types include symmetric, asymmetric and hybrid encryption
26
logging
- network logs provide a record of user activity - allows network security professionals to monitor behaviour and identify any potential threats - types include system logs, firewall logs and application logs
27
backups
- copy of computer data taken and stored somewhere else so it can be used to restore original after data loss event
28
anti-virus software
- type of software designed to detect, prevent and remove malicious software from devices key functions include scanning, quarantine and removal, protection from threats
29
twisted pair cable
- ethernet cables - consist of insulated copper wires twisted together
30
coaxial cable
- central copper conductor surrounded by insulating layer - bulkier and more expensive than twisted pair
31
fibre optic cable
- transmits data using light signals through thin strans of glass - often higher bandwidth , longer transmission distances compared to copper
32
advantages of wired networks
- reliability, speed & bandwidth, security, lower latency
33
disadvantages of wired networks
- setup complexity & cost, lack of mobility, cable management
34
advantages of wireless networks
- convenience, mobility, productivity, expandability and easier deployment
35
disadvantages of wireless networks
- interference, speed, security concerns and range limitations