🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

CH7_TYN Created September 10, 2024 1200 PM Class ICT1 Networks 1 How is a Local Area Network different from a Wide Area Network? Local Area Network (LAN) Covers a small geographic area such as a single building or campus. While Wide Area Ne...

CH7_TYN Created September 10, 2024 1200 PM Class ICT1 Networks 1 How is a Local Area Network different from a Wide Area Network? Local Area Network (LAN) Covers a small geographic area such as a single building or campus. While Wide Area Network (WAN) Spans a large geographic area, often connecting multiple LANs using internet connections. 2 What are one advantage and one disadvantage of a peer-to-peer network? One advantage of peer to peer connection is it’s private and quick Disadvantage: Multiple wire connections are needed and the accessibility is not user friendly plus cost might be higher. 3 Describe the role of a server on a network. A server is a device that is used to provide services to other devices connected to a network. A server on a network provides centralized resources and services, such as file storage, web hosting, and printer access, to other devices (clients), enabling efficient management and sharing of data across the network. 4 List three devices that may be found on a Wireless Personal Network. Switch Wireless-equipped laptops, phone Desktop computers with wireless connection Router @ CH7_TYN 1 Network hardware and software 5 Describe the role of a network interface card. Network interface card (NIC) is a hardware component that connects a computer or device to a network, enabling it to communicate with other devices. It slots into the motherboard and provides the necessary ports for either wired or wireless network connections. 6 Explain how a router differs from a switch. A router connects different networks, such as a LAN to the internet, directing data between networks using IP addresses. In contrast, a switch connects devices within a single network (LAN) and forwards data to the specific device using MAC addresses. 7 Outline the role of a modem on a network. A modem connects a local are network to the internet by converting digital signals into analog signals and vice versa, enabling data transmission over telephone lines or other communication methods. 8 State one function of a network operating system. One function of a network operating system (NOS) is to manage security by monitoring and controlling access to network resources, ensuring that only authorized users can access certain files or devices. Communication methods 9 Explain an advantage of unshielded twisted-pair cabling compared with fibre optic cabling. An advantage of unshielded twisted-pair (UTP) cabling compared to fiber optic cabling is that UTP is generally less expensive and easier to install. This makes it a more cost-effective solution for shorter-distance network setups. 10 Describe one advantage of wireless communication over wired communication. One tangible advantage of wireless communication over wired communication is it’s better to manage and the mobility of the devices are CH7_TYN 2 better. 11 Why many data transmission on a mobile network incur a cost? Data transmission on a mobile network incurs a cost because mobile networks are operated by telecommunications organizations that charge for the use of their infrastructure to send and receive data, images, voice, and text messages. Types of networks 12 Describe one similarity and one difference between an intranet and the internet. One similarity between an intranet and the internet is that both use web technologies like browsers and protocols to share information. A key difference is that an intranet is a private network accessible only to an organization’s members, while the internet is a public network open to anyone. 13. Three devices that may be found on the Internet of Things (IoT) include: Smart speakers (e.g., Amazon Echo) Wearable devices (e.g., Fitbit) Smart refrigerators 14. A user would require a virtual private network (VPN) when they need to securely access a private network over the internet, such as accessing an organization’s resources remotely or bypassing geo-restrictions on internet services. 15. A network diagram is used to visually represent a network's structure, showing the devices (nodes) and their connections. It helps in planning, maintaining, and troubleshooting a network Security threats 16. Three examples of malware are: CH7_TYN 3 Viruses: Malicious software that replicates and spreads across systems, often damaging files. Worms: Programs that self-replicate to overwhelm system resources. Spyware: Software that collects and sends data from a user’s device without their knowledge. 17. Give an example that illustrates why the credentials of users need to be managed. Managing user credentials is important because it prevents unauthorized access. For example, if an employee leaves a company, their access must be revoked to ensure they no longer have access to sensitive data. Security controls 18 How do access rights protect data and information within an organisation? Access rights protect data and information by ensuring only authorized users can view or modify certain resources within an organization, reducing the risk of data breaches 19 Write a sentence using the encryption method explained in Figure 7.29. Give it to someone else to decrypt using the same key. Using the encryption method shown in Figure 7.29: Encrypt the word "HELLO" using the key shown: Encrypted word: "URYYB" Authentication 20 Describe two different methods of authentication. Password-based authentication: A user enters a password to verify their identity. Biometric authentication: Uses a person’s unique biological traits, such as fingerprints or facial recognition. 21 Explain the purpose of a digital signature. A digital signature verifies the authenticity of a document or message, ensuring that it comes from the stated sender and hasn't been altered during transmission. CH7_TYN 4 Preventative measures 22 List the four sub-plans of a disaster recovery plan. Prevention plan Contingency plan Recovery plan Backup plan 23 What is a virus definition? How can it be used to detect viruses? A virus definition is a database of known virus signatures. It is used by antivirus software to detect and remove viruses from a system. Network intrusion 24 How does a host intrusion detection system (HIDS) differ from a network intrusion detection system (NIDS)? A host intrusion detection system (HIDS) monitors traffic and activities on a single device, while a network intrusion detection system (NIDS) monitors traffic across the entire network. 25 How does an intrusion prevention system block threats to data and information? An intrusion prevention system (IPS) blocks detected threats to data and information in real-time, preventing unauthorized access or damage without human intervention Ethical hacking 26 Outline the purpose of ethical hacking. The purpose of ethical hacking is to identify and address vulnerabilities in a system's security before malicious hackers can exploit them. Laws 27 Which law regulates the handling of personal data for all Australians? CH7_TYN 5 The law that regulates the handling of personal data for all Australians is the Privacy Act 1988. 28 Explain the Information Privacy Principles (IPPs) of use and disclosure. The Information Privacy Principles (IPPs) of use and disclosure restrict organizations to using or disclosing personal information only for the primary purpose it was collected, unless consent is obtained or it is required by law. Ethical issues 29 Describe one issue that may arise regarding the privacy of users of a network. One issue regarding the privacy of users on a network is the collection and use of their personal data without clear consent, leading to potential misuse or data breaches. 30 Explain an issue that may occur as a result of ethical hacking. An issue that may occur as a result of ethical hacking is the accidental exposure of sensitive information during testing, which could lead to privacy concern. CH7_TYN 6

Use Quizgecko on...
Browser
Browser