TNE20003-Internet and Cybersecurity for Engineering Applications

0.0(0)
studied byStudied by 9 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/150

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

151 Terms

1
New cards

What are the 3 types of personal data?

Volunteered, observed and inferred.

2
New cards

What is volunteered data?

Data that is created and explicitly shared by individuals

3
New cards

What is observed data?

data that is captured by recording the actions of individuals

4
New cards

What is inferred data?

data that is based on analysis of volunteered or observed data.

5
New cards

What is a bit?

0 or 1

6
New cards

How many bits in a byte?

8

7
New cards

What are three common methods of signal transmission used in networks?

Electrical signals, optical signals, wireless signals

8
New cards

What are electrical signals?

Transmission achieved by representing data as electrical pulses on copper wire.

9
New cards

What are optical signals?

Transmission achieved by converting the electrical signals into light pulses.

10
New cards

What are wireless signals?

Transmission is achieved by using infrared, microwave, or radio waves through the air.

11
New cards

Bandwidth is ___________.

the capacity of a medium to carry data

12
New cards

Bandwidth is typically measured in __________.

The number of bits that (theoretically) can be sent across the media in a second.

13
New cards

throughput is the measure of the transfer of bits across the media over a given period of time. However, throughput ______ match the specified bandwidth. This is due to ______.

does not usually | the amount of data being sent and received over the connection, the types of data being transmitted, the latency created by the number of network devices encountered between source and destination.

14
New cards

What are clients?

Clients are computer hosts that can request and display information obtained from a server.

15
New cards

What is a server?

Servers are hosts that have software installed which enable them to provide information

16
New cards

In a peer-to-peer network __________.

Devices function as both client and server

17
New cards

What are the advantages of P2P?

Easy to set up

less complex

lower cost

18
New cards

What are the disadvantages of P2P?

No central administration

not as secure as other networks

not scalable

slower performance

19
New cards

What do end devices do?

allow users to interact with the network

20
New cards

What is a network?

A combination of various networking devices and infrastructure which allows remote communication

21
New cards

All communications are governed by ______.

protocols

22
New cards

A standard is a ____________.

set of rules that determines how something must be done.

23
New cards

What do standards allow in networking?

different types of devices to send information to each other

24
New cards

HTTP governs the way _______________.

A web server and a web client interact

25
New cards

TCP is responsible for guaranteeing ___________.

the reliable delivery of information

26
New cards

IP is used by ______ to _____________.

routers

forward messages across multiple networks

27
New cards

Ethernet is responsible for _____________.

The delivery of messages from one Network Interface Card (NIC) to another NIC on the same Ethernet local area network (LAN)

28
New cards

What are the TCP/IP Model layers?

Network access, internet, transport, application.

29
New cards

In the TCP/IP Model, the network access layer _____, the internet layer _____, the transport layer _____ and the application layer _____.

Controls the hardware devices and media that make up the network

Determines the best path through the network

Supports communication between various devices across diverse networks

Represents data to the user, plus encoding and dialogue control

30
New cards

What are the OSI Model layers?

Physical, data link, network, transport, session, presentation, application

31
New cards

In the OSI Model, the physical layer is _____, the data link layer _____, the network layer _____, the transport layer _____, the session layer _____, the presentation layer _____ and the application layer _____.

the things we can see and touch

MAC-address related info

IP-address related info

checks speed/accuracy of data transfer

provides services to presentation layer

ensures data is presentable

supports process-to-process communication

32
New cards

MAC address is used at layer _, IP address is used at layer _.

2,3

33
New cards

What is the first octet range for a class A address?

0 - 125

34
New cards

What is the first octet range for a class B address?

128 - 191

35
New cards

What is the first octet range for a class C address?

192 - 223

36
New cards

What is the first octet range for a class D address?

224 - 239

37
New cards

A class A address has __ network bits, B has __ and C has __.

1, 2, 3

38
New cards

What is another way to describe a frame?

a Layer 2 Protocol Data Unit

39
New cards

What does a frame include?

the source and destination address

40
New cards

What is needed for a device to communicate on in an ethernet network?

Both physical and logical addresses

41
New cards

A physical address (_____) _____ change, a logical address (_____) _____ change

mac address, doesn’t, IP address, can

42
New cards

What does hierarchical network design provide?

Increased efficiency

optimisation of function

increased speed

a way in which to scale the network without impacting performance

43
New cards

What are the 3 layers of hierarchical network design?

Access, Distribution, Core

44
New cards

What do Access layer devices in hierarchical network design do?

provide connections to hosts in a wired or wireless network.

45
New cards

What does the Distribution layer of hierarchical network design do?

interconnects the smaller local networks.

46
New cards

What does the Core layer of hierarchical network design do?

provides a high-speed connection between distribution layer devices.

47
New cards

Messages through an ethernet hub must be sent _____ at a time.

One

48
New cards

How do hubs send and receive signals?

They take signals from one port and send the message out all of the other ports.

49
New cards

What is the purpose of an ethernet switch?

to provide micro-segmentation of the collision domain.

50
New cards

What is a content addressable memory (CAM) table

A table of MAC addresses

51
New cards

How does a switch build a CAM table

by examining a frame as it comes into the switch.

52
New cards

What are the steps a switch takes to build a CAM table?

adding the source MAC address of the device connected to the port the frame came from.

- forwarding a frame out to a specific port when the destination MAC address is in the MAC address table.

- forwarding a frame out to all hosts (except the sending host) when the destination MAC address is not in the MAC address table.

53
New cards

What happens if the destination MAC address is unknown?

the data needs to be broadcast.

54
New cards

What is a broadcast message used for?

to contact every other device on the local network.

55
New cards

An Ethernet broadcast is all _____ in the destination MAC address.

1s

56
New cards

What is a broadcast domain?

the area through which a broadcast message can travel.

57
New cards

What are routers used to do in broadcast domains?

to divide the network into multiple broadcast domains.

58
New cards

What must a device do to send information from a device that is on an Ethernet network

supply a source and destination MAC and IP address

59
New cards

What is used to discover the MAC address of a device on the same local network?

The address resolution protocol (ARP)

60
New cards

What are the three steps ARP uses?

The sending broadcasts a frame containing a message with the IPv4 address of the intended destination host.

Each host on the network receives the broadcast frame and compares the IPv4 address contained in the message with its own IPv4 address.

The host with the matching IPv4 address sends its own MAC address back to the original sending host.

The sending host receives the message and stores the MAC address and the IPv4 address in an ARP table.

61
New cards

What are the 4 main purposes of routers?

broadcast containment, security, interconnecting local networks, logically grouping users

62
New cards

What is the ARP process?

Mapping a known IP Address to an unknown MAC Address.

63
New cards

For Network transmission to function as efficiently as possible __________.

all data that moves through a network needs both MAC and IP Addresses.

64
New cards

What does a routing table contain?

network addresses and the best path to reach a network.

65
New cards

Routers _____ forward broadcast messages.

do not

66
New cards

What does a routing table do with the destination IP address?

It is compared with the networks in the routing table to determine the interface to forward the packet out of.

67
New cards

What does a routing table do with the destination MAC address?

It is used to forward the packet to either the router if the destination IP address is for a different network or a specific network device on the local network.

68
New cards

What are the 2 ways routes can be added to the routing table?

Dynamically learned from other routers

Manually entered by a network administrator

69
New cards

What is a default route?

The router interface used when forwarding packets to a destination that is not in the routing table.

70
New cards

If a packet is destined for a network that is not in the routing table and no default route exists _____.

the packet will be dropped

71
New cards

When a host sends a message to a device on the same network, __________.

it forwards the message directly and uses ARP to discover the MAC address.

72
New cards

When a host sends a message to a device on a remote network, __________.

the hosts uses the MAC address of the Router as the destination, but still has the IP address of the remote host as the Layer 3 destination.

73
New cards

What are the advantages of a single local segment?

Appropriate for simpler networks

less complexity and lower network cost

allows devices to be "seen" by other devices

faster data transfer - more direct communication

ease of device access

74
New cards

What are the disadvantages of a single local segment?

All hosts are in one broadcast domain which causes more traffic on the segment and may slow network performance

harder to implement QoS

harder to implement security

75
New cards

What are the advantages of having hosts on a remote segment?

More appropriate for larger, more complex networks

Splits up broadcast domains and decreases traffic

Can improve performance on each segment

Makes the machines invisible to those on other local network segments

Can provide increased security

Can improve network organization

76
New cards

What are the disadvantages of having hosts on a remote segment?

Requires the use of routing

Router can slow traffic between segments

More complexity and expense

77
New cards

What 2 protocols does TCP/IP use in the transport layer

Transmission Control Protocol and User Datagram Protocol

78
New cards

What are the responsibilities of transport layer protocols?

Tracking the individual communication between applications on the source and destination hosts

segmenting data for and reassembling segmented data at the destination

identifying the proper application for each communication stream

79
New cards

What are the responsibilities of the transport layer?

tracking individual conversations

segmenting and reassembling data

adding header information

identify, separate and manage multiple conversations

80
New cards

What does URL stand for and do?

Uniform Resource Locator

defines the network location of a specific resource on the network

81
New cards

What does URN stand for and do?

Uniform Resource Name

identifies the namespace of the resource without reference to the protocol

82
New cards

What are the properties of UDP?

Fast but prone to data loss

83
New cards

What are the properties of TCP?

slower, but prioritises reliability

acknowledges data

resends lost data

delivers data in order sent

84
New cards

What 4 protocols are necessary to deliver a webpage function at the internet, transport and application layers, respectively?

IP, TCP, HTTP

85
New cards

What do TCP and UDP use port numbers for?

to manage multiple, simultaneous conversations

86
New cards

what is source port number associated with?

the originating application on the local host

87
New cards

what is destination port number associated with?

the destination application on the remote host

88
New cards

What are sequence number used for?

To reassemble segments into their original order

89
New cards

What optional TCP procedure do host OS’ usually use during the three-way handshake?

selective acknowledgement (SACK)

90
New cards

What happens if 2 hosts use SACK?

the receiver can explicitly acknowledge which bytes were received during any discontinuous segments.

91
New cards

What is UDP used for?

applications that can tolerate a small loss of data but cannot tolerate delay

92
New cards

What are some examples of things UDP is used for?

video calls

livestreams

Online Games

93
New cards

In what 2 ways are IP addresses assigned?

statically or dynamically

94
New cards

How are static IP addresses configured?

Manually

95
New cards

What are static IPs used for?

devices that need a fixed IP

96
New cards

Why are static IPs prone to errors?

human error during configuration

97
New cards

How are dynamic IP addresses assigned?

automatically through DHCP

98
New cards

What does DHCP stand for?

Dynamic Host Configuration Protocol

99
New cards

What are the benefits of dynamic addressing?

reduced human error, IP addresses aren’t permanent

100
New cards

What happens when dynamic IPs aren’t being used?

they go back into the pool