network Flashcards

(38 cards)

1
Q

LAN

A

is a network that connects computers and devices in a limited geographical area such as homes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WLAN

A

is a LAN that uses no physical wires. A wireless LAN must have built-in wireless compatibility or the appropriate wireless network card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WAN

A

is a network that connects computers and devices from wide geographic areas (such as a city, country or the world) It can be one large network or consist of two or more LANs connected together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Client/server

A

On a Client/Server network, one or more computers act as a server (also known as a host computer). All the other computers (also known as clients) on the network request services from the server. The server controls access to the all the resources on the network, which include the hardware, software and central storage areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Peer to peer

A

Peer-to-peer is also known as P2P. It is an inexpensive network that often connects less than 10 computers so it is ideal for small business and home use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Star network

A

In this layout, all computers and devices (also known as nodes) link to a central device, which forms a star shape. easy to maintain and nodes can be added or removed with almost no disruption to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bus network

A

This network features a single cable (the bus), on which all devices on the network connect to. Bus networks are inexpensive and easy to install. An advantage of this type of network is that devices can be attached and detached at any point along the cable with no disruption. Also, if one device fails, it has no affect on the rest of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ring network

A

A Ring Network features a closed loop cable where all devices are arranged along the loop. Data moves in a one way direction traveling from device to device. The network can be disabled if one device along the loop fails. An advantage of a Ring Network is that it can be implemented for networks in large distances however it is more difficult to install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protocols

A

Protocols are the set of rules computers follow when communicating across a network. Without them, no information can be transmitted or interpreted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TCP/IP

A

TCP/IP is a network standard, that defines how data is routed/transmitted from one end of the network to the other end.

  • checking for and detection of errors,
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Characteristics of TPI/IP

A

Packet data transfer

Recovers data:

Flow control:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TCP/IP consists of

A
  • Transmission Control Protocol (TCP), which uses a set of rules to exchange messages with other Internet points at the information packet level.
  • Internet Protocol (IP), which uses a set of rules to send and receive messages at the Internet address level.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HTTP

A

defines how messages are formatted and transmitted on the World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HTTPS

A

A widely-used communications protocol for secure communication over a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

802.11x wireless

A

Used over a small geographical area – used on wireless lan technology
 Used by mobile devices on a network
 Range of frequency bands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.3 ethernet

A

 uses cables for faster more reliable connectivity
 enables efficient delivery of data.

17
Q

Advantages of ethernet

A
  • not expensive to implement
  • flexible cabling
18
Q

Disadvantages of ethernet

A
  • data packet collisions cause many resends
  • one fault and the whole system goes down
19
Q

Firewall

A

Prevents unauthorised or malicious data packets from reaching the network.

20
Q

Firewall protects u against

A
  • Hackers breaking into your computer.
  • Worms – types of viruses that spread from computer to computer over the internet.
21
Q

A firewall does not do

A

If you give permission for other computers to connect to yours.
If it is switched off, disabled or contains many exceptions or open ports.

22
Q

Personal firewall

A
  • Personal firewalls should be installed on each computer that is connected to the internet and monitors
23
Q

Hardware firewall

A
  • Medium-sized and large businesses may need a hardware firewall
24
Q

Network passwords

A

A network security key or password can help protect your wireless network from this type of unauthorized access.

25
Wifi protected access WPA WPA2
* WPA and WPA2 require users to provide a security key to connect.
26
WEP
WEP is an older network security method that's still available to support older devices, but it's no longer recommended. There are two kinds of WEP: * open system authentication, and * shared key authentication. Neither is very secure, but shared key authentication is the least secure of the two.
27
Two step authentication
Two-factor authentication adds an additional layer of security to the authentication process by making it harder for attackers to gain access to a person's devices or online accounts because, even if the victim's password is hacked, a password alone is not enough to pass the authentication check.
28
Physical security
Physical security is equally important as online security in protecting your computers, business and employees against crime. This page covers physically protecting your equipment and data not only from theft, but also from fire, flood and accidental damage.
29
risk of computer and data theft
If your computer equipment is not suitably protected, it is easy for criminals to either steal data or infect your computers and network without needing online access – or to steal or damage the equipment itself. In spite of the sophisticated online methods now used by criminals, it is still easier to access the computer by entering your premises.
30
Physical damage
Like everything else in a business, computer equipment is vulnerable to damage from fire, flood and accidental damage. However, the consequences can be devastating because of the data you have stored on it.
31
Keeping computer safe
* Keep doors and windows locked. * Keep sensitive hard copy records locked away if possible.
32
Visitors to your business
* Be vigilant about granting access to any visitors, and escort them where appropriate. * Vet contractors and support personnel.
33
Advise for laptop users
* Employees should keep laptops and other mobile devices with them whenever possible. When unattended – for example in a hotel room or meeting room – they should keep them hidden or physically locked up. Laptops and other mobile devices should be carried in hand baggage on an aircraft or coach.
34
Servers and IT infrastructure
* Keep servers and network equipment in a locked room and control access to it. * Server and networking racks and cabinets can also be protected by individual locks.
35
Hard copy records
* Use lockable filing cabinets. * Maintain a strict shredding policy.
36
Stolen or lost equipment
* If you learn that passwords have been stored in a document on a stolen or lost PC or laptop, or the ‘remember this password’ box has been ticked on a website, ensure any passwords are changed as soon as possible after the theft or loss. * Notify the Police and obtain a crime or loss reference number for tracking and insurance purposes.
37
Limit the impacts of a theft or loss
* Make a note of all IT equipment serial numbers to enable reporting if stolen. * Security mark computers and other high-value items. * Never store passwords on computers.
38
wireless structure
modem - internet - firewall - router - switch - wireless access point - export - device - standard wireless protocol