5 Flashcards

1
Q

Item of hardware

A

Network interface card (NIC)
- Inside each computer or device to connect (allow it to have access) it to the network

Router, which contains:
- Router
- Wireless access point
- Modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IP address

A

Unique address for each device used to route packets of data

  • Each address has a 32-bit number
  • It is usually written in denary with a dot separating each byte
  • The address allows data to be sent to the correct computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

router

A
  • The routing of packets, sends data to specific destination on a network
  • It assigns IP addresses if it contains a DHCP server;
  • It connects the private/local network to the Internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How are IP address assigned?

A
  • A DHCP server (Dynamic Host Configuration Protocol) is built to home routers
  • When a new device connects to the network it is assigned an IP address by the DHCP server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless access point

A

The wireless access point may be inbuilt to the router – it allows devices to connect wirelessly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Modem

A

A modem will be part of a home router – it converts data from digital to analogue (radio or optical)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the need for IP address assignment.

A

Each computer on the network needs a unique IP address
To join the network, each computer is assigned the IP address that they will use by the router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MAC addresses

A

Each network interface card needs its own Media Access Control Address (MAC address)
The MAC address is given to the NIC when it is manufactured
MAC addresses are used to send data between two terms of hardware on a
network – such as a computer and router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State two components to the MAC address

A

-manufacture code
-serial code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

first 3 bytes of MAC Address

A

manufacturer code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

last 3 bytes of MAC adress

A

serial code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MAC address

A

Unique identifier for each hardware device permanently put on the device by the manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IPv4 and IPv6

A

Standards for IP addresses,
- IPv4 uses 32-bit addresses
- IPv6 uses 128-bit addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dynamic and static IP addresses

A

IP addresses are allocated by the network/ISP and will be the same (static) each time the connection is made, or change (dynamic) each time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

State one issue with IPv4 that IPv6 fixes.

A
  • IPv4 has a limited set of IP addresses which are improved by IPv6 / far larger address
    range for IPv6
  • Improved security with IPv6
  • Autoconfiguration with IPv6 / no need for a DHCP server (1).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Brute-force attack

A

– obtaining data, without permission, passing through

17
Q

URL structure

A

URL- https://www.mywebsite.org/index.html
Protocol - https
Domain name- mywebsite.org
Web page or file- index.html

18
Q

HTTP and HTTPS

A

Hypertext Transfer Protocol (HTTP) is the protocol used to send webpages
- It is unencrypted so not safe for sending personal information
- HTTPS (Hypertext Transfer Protocol Secure) is used to send and receive web pages and form data in an encrypted format

19
Q

HTML

A

– Hypertext markup language – used to create
web pages

20
Q

Create a list of at least five browser features

A

Storing bookmarks and favourites; Recording user history
Allowing use of multiple tabs
Storing cookies
Providing navigation tools
Providing an address bar
Rendering (displaying) web pages

21
Q
A
22
Q

Explain the difference between session cookies and persistent cookies

A

Session cookies are deleted after the browser window closes
Persistent cookies remain on the computer until their
expiry date

23
Q

Harmful software includes:

A

Malware
(viruses, worms, Trojan horses, spyware, adware
and ransomware)

24
Q

Prevention methods include:

A

Anti-malware, anti-virus, encryption, acceptable use policies, backup and recovery procedures

25
Q

viruses

A

They replicate their code in other programs
They infect other computers
They harm the computer by deleting,
corrupting or modifying files

26
Q

worms

A

They might cause no damage to the attacked computers
They slow down networks
and computers
replicates itself to spread to other computers

27
Q

Trojan horse

A

They have a program, game or cracked file which is something the user wants
They have negative program code which causes damage, takes control, or provides access to the computer

28
Q

Ransomware

A

-First encrypts the hard drive of a computer
-The user is unable to read any files
on the computer or run any programs
-The user would need to pay ransom usually by a cryptocurrency such
as bitcoin
- If they pay the ransom, their files should be restored. Otherwise, all
files will be deleted
-The motivation for this attack
is to receive the ransom (money)

29
Q

Spyware

A

-Spyware is a type of malware
that finds information about
users, their computers or
company information
-The information is then sent to a hacker who is able to misuse it
-The spyware may be hidden inside an app, software, file attachment or malicious website

30
Q

Adware

A

-Adware is a type of malware that displays large numbers of adverts, often through multiple windows
-In the worst cases, new adverts appear faster than the user is able to close them
-The hacker aims to make money
from users clicking on the adverts

31
Q

Malware

A

– software that aims to harm computers and/or data

32
Q

Hacking

A

– Activities that misuse computer systems/networks

33
Q

Phishing

A
  • emails that pretend to be form legitimate companies but actually try to gain personal information
34
Q

Pharming

A

– Changing DNS records to point to the wrong IP address
- So when browser searches up the web page, it will go to the wrong IP address which is controlled by a hacker
- The hacker will have a web server that serves a fake web page, such as a form for a user to log in to a bank

35
Q

Distributed denial of service (DDoS) attack or DoS

A

– flooding a server or network with pointless requests to make it fail or slow down

36
Q

Man-in-the-middle attack
(MITM)

A
  • allows the attacker to intercept data communications between the user and server.
    -Meaning hacker can then
    eavesdrop to find passwords and personal information
37
Q

found

A

Criminals sometimes leave a USB stick containing malware in a public place such as a company car park
Someone may pick it up and insert it into their computers so malware can now install onto the computer so that and hacker can gain access to you files and information

38
Q

Brute-force attack

A

– trying all possible passwords until the correct one is found

39
Q

Reducing threats on mobile devices

A
  • Use the password feature and choose a strong password
  • Make sure the data is encrypted
  • Do not follow links in suspicious emails
  • Think carefully before posting your mobile phone number on public websites
  • Don’t install apps without researching them first –
    if they require unnecessary extra permissions, don’t install them
  • Delete all information stored on your mobile before discarding