90 DECK 1 - NINJA NOTES Flashcards

1
Q

Advantage of SaaS

A

Users do not have to worry about the underlying infrastructure or the software itself because all maintenance is taken care of by the service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Advantages of a Network Firewall

A

-easy to set up and configure
-inexpensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Advantages of Application Firewall

A

-provide more granular control of traffic; used to protect individual programs and data
-able to inspect contents of network traffic which allows them to detect and block attacks that network firewalls cannot
-provides additional user authentication procedures to protect the program and data making access more difficult for unauthorized users
-can be used to detect and block traffic that originates from within the network (helps to prevent insider threats)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An URL includes several parts. What are they?

A

protocol: HTTP or HTTPS
domain: www.ninjacpareview.com
path to the resource: /about or /image.jpg

Example: https://www.ninjacpareview.com/image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

antivirus software

A

designed to prevent, detect, and remove malware from a computer or mobile device.

-scans files and software on the device for known patterns of malware

-can monitor network traffic for suspicious activity

-software typically updates its malware definitions regulary in order to protect against new and emerging threats
-may have additional features such as firewall and antiphishing protection
-keep up to date and run regular scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Application Firewall

A

implements at the application level

-controls traffic that flows in and out of programs and applications

-provides additional layer of security
-allows for additional user authentication procedures to protect program and data
-makes it more difficult
-can block unauthorized traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Application Software

A

Performs special tasks such as word processing, spreadsheets, photos; productivity; graphics; multimedia; communication; games; heuristic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

bridge

A

a networking device that connects two separate LANs together, allowing them to communicate with each other as if they were a single network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bus topology

A

all devices are connected to a central cable called a bus.
-inefficient
-prone to failure if central cable is damaged

advantage: simple and easy to set up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

client

A

clients are individual computers or workstations that are used by users to access the resources provided by the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Client-server architecture

A

one server is responsible for providing specific service to other devices (the clients).

Commonly used for email, file sharing and web services.

It can be implemented on a LAN or over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Community Cloud

A

shared by a specific group of organizations managed by one or more of the organizations in the group or by a third-party.

-economies of scale

healthcare, financial services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Compilation

A

the process of converting the source code into machine code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Compiler

A

a type of software that converts source code written in a programming language into machine code that can be executed by a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CPU

A

Fetches instructions from memory and decodes them. It retrieves instructions and sends them to the arithmetic logic unit (ALU) for execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Customer Support and Service

A

Cloud service providers provide support and assistance: tech support, documentation, training, consulting services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Disadvantages of an Application Firewall

A

-expensive
-difficult to set up
-hard to configure
-need more maintenance
-need to be updated to support new apps and protocols
-may require additional hardware resources to run which increase cost of ownership
-may create a bottleneck in the network slowing down performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Disadvantages of Network Firewall

A

-do not provide protection against all types of attacks such as malware or phishing attacks
-does not protect against malicious traffic from within the network
-cannot inspect contents of encrypted traffic
-less sophisticated than application firewalls
- don’t provide the same level of protection against app-level threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

EDI, which stands for Electronic Data Interchange

A

a technology that allows the exchange of business documents and information in a standardized electronic format between organizations. It’s a key component in automated business processes, enabling faster, more efficient, and error-free transactions compared to traditional paper-based methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Examples of PaaS

A

Heroku, Salesforce App Cloud, Google App Engine, AWS Elastic Beanstalk, Azure App Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Examples of SaaS

A

Examples: Office 365, Salesforce, Zoom, G-Suite, Adobe Creative Cloud, Slack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Extranet

A

private network that shares part of an organization’s information or operations with suppliers, vendors, partners, customers, etc.

  • used for supply chain management, customer service, online collaboration

-protected by firewalls, virtual private networks (VPNs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Firewall

A

a security system used to control incoming and outgoing network traffic by analyzing data packets and determining whether they should be allowed through or not.

-acts as a barrier between a private internal network and the public internet

-protects computer and information from insiders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

gateway

A

a networking device that connects two different networks together allowing them to communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Hoax Virus

A

a message that is circulated through email or social media warning users of a virus that does not actually exist.

-scares users into taking action such as forwarding or deleting files

-causes unnecessary panic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How do VPNs work?

A

-creates a secure, encrypted tunnel between the user’s device and VPN seriver

-all data is encrypted and then the VPN server acts as a gateway to the internet routing the user’s internet traffic through the encrypted tunnel

-allows user to access the internet and internal network resources as if they were on the same physical network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

HTML

A

Hypertext Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Hyper-Text Transfer Protocol (HTTP)

A

a protocol for transferring data over the internet.

-the foundation for the World Wide Web

-used to transmit data between a server and a client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Hypertext Markup Language (HTML)

A

a markup language used to create the structure and layout of a webpage

-consists of series of elements each represented by a tag which describes the content and structure of the page

-it is the standard markup language for creating web pages that can be displayed in a web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Infrastructure as a Service (IaaS)

A

virtualized computing services such as servers, storage and networking over the internet.

  • users can provision and manage resources on demand and only pay for what they use

Scaling up or down for IT resources as needed

Examples are Amazon Web Services and Google Cloud Platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Infrastructure management

A

cloud service providers are responsible for setting up, maintaining, and managing the physical infrastructure required to deliver cloud services

-data centers, servers, storage devices, networking equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Innovation and Scalability

A

cloud service providers must continuously innovate and improve their services to stay competitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

internet

A

a network that connects millions of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Internet Service Provider (ISP)

A

a company that provides customers with access to the internet

-dial-up
-DSL (over phone lines with DSL technology)
-Cable
-Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Intranet

A

a private network used by an organization to share information and resources among its employees, members or departments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

IP

A

responsible for routing data packets to their destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

ISP

A

Internet Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Key features of EDI transactions include:

A

Standardization: EDI documents adhere to strict formats, ensuring compatibility and understandability across different systems and organizations. Common standards include ANSI X12 (widely used in North America) and EDIFACT (predominant in international trade).

Types of Documents: EDI can handle a variety of documents such as purchase orders, invoices, shipping notices, and payment documents.

Automation: EDI facilitates automated processing of business transactions, reducing the need for manual data entry and minimizing errors.

Efficiency and Speed: Transactions can be completed in minutes or seconds, rather than days, improving the speed of business cycles.

Security: EDI transmissions are often encrypted and follow security protocols, ensuring data integrity and confidentiality.

Integration: EDI systems are often integrated with internal enterprise resource planning (ERP) systems, streamlining internal and external business processes.

EDI is widely used in various industries such as retail, manufacturing, healthcare, and logistics, helping these sectors to improve the speed, accuracy, and efficiency of their business communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Killer Application (killer app)

A

a software program that is so useful and in-demand that it drives the sales of a particular hardware platform or operating system.

-software app is so compelling people buy new hardware or software just to use it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

LAN

A

Local Area Network: connects devices in a limited geographic area such as a home or school or office. LANS are used to share printers and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Billing and Cost Management

A

cloud service providers offer flexible, pay as you go pricing models which requires them to track and monitor cutomer’s resource usage correctly

-transparent billing
-detailed usage reports
-cost management tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Machine Language is also known as

A

machine code or assembly language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Mesh topology

A

each device is connected to every other device on the network

adv: it provides redundant connections so network is highly resilient.

adv: If one connection fails there are alternative paths for data to be transmitted.

disadv: It can be complex and costly because it requires a large number of connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Network

A

allows devices to connect and communicate with each other enabling the exchange of data and information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Network Firewall

A

implemented at the network level so it controls all traffic that flows in and out of the network

-uses security algorithms and router communications protocols to prevent outsiders from accessing the corporate database and email systems.

-blocks unauthorized traffic such as incoming traffic from known malicious IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

PAN

A

Personal Area Network: Use of bluetooth for smartphones, tablets, laptops in close range

47
Q

Phishing

A

a type of social engineering attack that is used to trick users into providing sensitive information such as passwords, credit card numbers, or personal details.

-carried out through email, text messages, phone calls

-appears to be from a reputable source such as a bank, gov’t agency or well-known company

  • message will ask recipient to click on a link or open an attachment which takes them to a fake website or login page that is designed to look legitimate

-user is prompted to enter personal information which is then collected by the attacker

48
Q

Platform and Software Management

A

cloud service providers manage the underlying platforms and software applications - maintaining, updating, patching software

49
Q

Platform as a Service (PaaS)

A

a type of cloud computing service model that provides a platform for developing, running and managing applications without the need for users to worry about the underlying structure.

  • offers a development environment for building, testing, and deploying applications
50
Q

Private Cloud

A

dedicated to a single organization managed by the organization or a third-party provider implemented on -premises, in a data center, or off-site

51
Q

Private networks can be either local area networks (LANs) or wide area networks (WANs). What about public networks?

A

They can be either LANS or WANS

52
Q

Programming Language

A

A set of instructions, rules and conventions used to create and execute software programs. There are many types based on use, level of abstraction, etc. Each has its own syntax, semantics and rules for constructing programs.

Programs are written in Source Language (High-Level Programming Languages or Fourth Generation Programming Languages (4GL) and then converted to Machine Language using a compiler.

53
Q

Proxy server

A

a server that acts as an intermediary between a client and a server in a network

-forwards requests from clients and returns responses back to clients

  • allows security, privacy, content filtering

-allows filtering of unwanted traffic, hide a client’s IP address, cache frequently requested content

54
Q

Public Cloud

A

resources such as servers, storage and applications are made available to the general public over the internet such as Amazon Web Services, Google Cloud Platform

They are pay as you go model.

55
Q

RAM

A

Stores data temporarily while a computer is running. It is used to store instructions and data the CPU needs to access quickly while running an application.

56
Q

Resource provisioning

A

cloud service provides on-demand computing resources such as processing power, memory, storage, and networking

57
Q

Ring topology

A

devices are connected in a circular configuration and data is transmitted in one direction around the ring.

adv: efficient because no central hub is needed.

disadv: if a device fails, all are affected

58
Q

ROM

A

Types of memory that are permanently or semi-permanently written with data and cannot be easily rewritten or modified by a computer’s user or CPU. It is used to store data that needs to be retained when the power is off. ROM stores instructions required to start a computer.

59
Q

Router

A

a connection point between a home or office network and the internet

60
Q

Secondary Storage

A

Hard drive, Solid State Drive, Optical Drive, USB Drive - all known as external memory.

61
Q

Security and compliance

A

cloud service providers implement security to protect data and apps through encryption, access controls, firewalls, intrusion detection, prevention systems

  • ensure compliance with GDPR, HIPAA and PCI-DSS
62
Q

server

A

high-capacity computer that contains software and hardware to provide a variety of services to clients.

filesharing
database management
access to printers and scanners

  • manages user authentication and authorization
  • manages and stores data

-processes requests from clients to add, edit, or delete data.

63
Q

Service reliability and availability

A

cloud service providers ensure their services are reliable and available to their customers

-implements redundancy, failover, and backup systems to minimize downtime and prevent data loss

64
Q

Service-Level Agreements (SLAs)

A

Cloud service providers establish SLA with their customers outlining the performance, availability, and support standards they commit to

-responsible for adhering to the SLA terms

-provide compensation or credits in case of failure to meet agreed-upon standards

65
Q

Software as a Service (SaaS)

A

a type of cloud computing service model that provides software applications over the internet and accessed on demand

  • a delivery model where software vendors host and maintain software apps and make them available to customers over the internet
66
Q

Source Program

A

a set of instructions written in a programming language that is compiled by a computer. It is written by a programmer to create a software program.

67
Q

Star topology

A

all devices are connected to a central hub

adv: reliable because each device has its own dedicated connection to the hub

If the central hub fails, all connected devices are affected.

68
Q

switch

A

a networking device that connects multiple devices together on a computer network and forwards data packets between them.

-more advanced than bridges

-they create multiple LANs on a single physical interface

-also provide more security and traffic management capabilities

69
Q

System Software

A

Operating system: Microsoft Windows, MacOS, Linux.

Utility programs: antivirus, disk defragmenter, backup software, disk cleanup

70
Q

taxonomies (standardized set of tags) are used by what language?

A

XBRL allows companies to tag financial data in their reports using a standardized set of tags, called taxonomies

-allows financial software and other apps to automatically extract and analyze data

-reduces the need for manual data entry

-increases the accuracy of analysis

71
Q

TCP

A

responsible for ensuring that data is transmitted reliably and in correct order

72
Q

TCP/IP

A

Transmission Control Protocol/Internet Protocol

73
Q

the US SEC starting in 2009, mandated that all public companies file their financial statements with what type of language?

A

XBRL

goal: to make it easier for investors and analysts to access and analyze financial information allowing more informed investment decisions

74
Q

There are two types of networks based on ownership. What are they?

A

Private networks
Public networks

75
Q

tree topology

A

a central device called the root is connected to multiple devices which are connected to additional devices in a hierarchy.

Used for large networks (schools or businesses)

Devices on the same branch can connect to each other without going through the root.

76
Q

Trojan Horse

A

a type of malware that disguises itself as a legitimate program or file but once executed can cause damage and steal information

-does not replicate

-can give attackers remote access to the infected computer

-spread by email attachments, infected software and file downloads

77
Q

Uniform Resource Locator (URL)

A

a unique string of characters that identifies a specific webpage or resource on the internet

-often called a web address

-used to locate and retrieve a specific resource such as a webpage, image or video.

78
Q

URL

A

Uniform Resource Locator

79
Q

VAN

A

Value-added network - provides value-added services such as data storage and secure transmission to businesses and organizations to facilitate electronic data interchange (EDI) between trading partners.

80
Q

Virus

A

a type of malware (malicious software) that attaches itself to a legitimate program or file and is designed to replicate and spread itself to other computers

-slows down computers
-corrupts or deletes files
-steals personal information

81
Q

VPN

A

Virtual Private Network

82
Q

VPN

A

a technology that allows users to securely connect to a private network over the internet

-used to provide remote access to a company’s internal network
-can be used to provide a secure internet connection for individuals

83
Q

WAN

A

Wide Area Network - connects devices over a large geographic area such as a city or country. The internet is the largest WAN. They can be private or public and can use satellites, telephone lines and fiber optic cables.

84
Q

Web Browser

A

a software application that allows users to access and navigate the World Wide Web.

Examples: Google Chrome, Mozilla Firefox, Apple Safaria, Microsoft Edge, Opera

85
Q

Web Server

A

specialized computers that store and manage webpages, images, videos, other data on the internet

-connected to the internet

-handle requests from web browsers

86
Q

What are advantages of private networks?

A

increased security
flexibility
better performance

87
Q

What are disadvantages of private networks?

A

cost
limited access
limited scalability

88
Q

What are some examples of high-level programming languages?

A

C
C++
Java
Python
JavaScript

89
Q

What are the advantages of public networks?

A

lower cost
wider availability
scalability

90
Q

What are the disadvantages of public networks?

A

-lower security because they are accessible to the public
-lower performance (used by many which leads to congestion)
-limited control since they are owned by third-party companies

91
Q

What does machine language consist of?

A

a series of binary digits (ones and zeros) that represent instructions and data that the computer is to process.

92
Q

What is machine language?

A

a set of instructions that are written in a form that can be directly executed by a computer’s CPU. It is the lowest-level programming language and is specific to a type of computer.

93
Q

What is the only language a computer can understand and execute directly?

A

machine language

All other programming languages must be compiled or interpreted into machine language before they can be executed by a computer.

94
Q

What is used to create low-level software such as drivers and firmware?

A

machine language

95
Q

What is used to create the operating system of a computer?

A

machine language.

96
Q

What language are source programs written with

A

High-Level Programming Languages or Fourth Generation Programming Languages (4GL)

97
Q

What makes compilers so useful?

A

They allow programmers to write code in a high-level programming language that is easier to read and understand, and then compile it into a machine that can be executed by the computer.

98
Q

What type of high-level programming language is designed to be more user-friendly and easier to use than traditional programming languages?

A

4GLs - Fourth-generation programming languages.

99
Q

Which applications is XBRL used in?

A

financial reporting
business intelligence
regulatory compliance

100
Q

Which network allows users to bypass censorship and geo-restrictions?

A

VPNs

Users are able to access content that may be blocked in their location

101
Q

Which programming language uses English-like statements and commands.

A

4GL

102
Q

Which type of code can by directly executed by the computer’s CPU?

A

machine code

103
Q

Which type of language is more readable by humans?

A

High-level programming languages. They are closer to natural human language and are less detailed and less abstract than machine language.

104
Q

Which type of programming language is used for database management programs?

A

4GL

105
Q

Who often uses VPNs?

A

remote workers
businesses with multiple locations
individuals who want to protect their internet connection while using public Wi-Fi

106
Q

WLAN

A

Wireless Local Area Network - a type of LAN that uses wireless technology to connect devices.

107
Q

World Wide Web

A

a vast network of interconnected documents and other resources linked by hyperlinks and URLs. It is the primary platform for information-sharing on the internet and is used by billions of people every day to access information, communicate, and conduct business.

108
Q

Worm

A

a type of malware similar to a virus that replicates itself and can spread to other computers but does not attach itself to a legitimate program or file

-spreads by exploiting vulnerabilities in software or operating systems

-uses social engineering techniques to trick users into executing them

109
Q

XBRL

A

eXtensible Business Reporting Language

110
Q

XBRL (eXtensible Business Reporting Language)

A

a standard for electronic communication of business and financial data based on XML

-provides a common format for financial statements

-makes it easier for software programs to process and analyze data

111
Q

XML

A

eXtensible Markup Language

112
Q

XML (eXtensible Markup Language)

A

a markup language used to store and transport data

-designed to be platform-independent and self-describing, meaning that structure of the data is included in the document itself

-well suited for a wide range of applications such as data exchange between different systems, data storage, and data processing

113
Q

What is the difference between a gateway and a firewall?

A

To simplify the analogy, imagine a city:

Gateway: Like a bridge or tunnel connecting two cities, allowing people and goods to flow between them.
Firewall: Like the city walls and security checkpoints, controlling who and what enters and leaves the city.
Gateways enable communication and flow, while firewalls prioritize security and control. Both are essential for building a secure and efficient network infrastructure.

While both gateways and firewalls play crucial roles in network security and connectivity, they have distinct functions and purposes:

Gateway:

Focus: Connection and routing
Main Function: Acts as a bridge between two different networks, allowing devices to communicate across them.
Key Capabilities:
Routes data packets to their intended destination across different networks.
Translates data formats or protocols between networks.
Manages traffic flow between network segments.
Can offer a basic level of security by filtering malicious traffic.

Firewall:

Focus: Security and access control
Main Function: Acts as a shield, protecting a network from unauthorized access and malicious activity.
Key Capabilities:
Filters incoming and outgoing traffic based on predefined rules.
Blocks suspicious or unauthorized traffic attempts.
Monitors network activity for potential threats.
Can be implemented as hardware, software, or a combination of both.