APPLIED NETWORKING Flashcards

1
Q

What is a MAC address

A

A MAC address is a
unique number that is
part of the NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What happens to the MAC and IP address when a PC is moved to a different network

A
When a laptop is
moved to a different
network, the MAC
address stays the
same, but the IPv4
and IPv6 addresses
change.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the IPv4 address format

A
• Two parts of an IP address:
– Network
– Host
• The subnet mask
determines which part of the address is
the network part.
*See phone for pic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is needed for static addressing

A

– IP address
– Subnet mask
– Default gateway (address of router so information can be sent to other networks)
– DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is DHCP

A

A Dynamic Host Configuration Protocol
(DHCP) server automatically
assigns IP addresses, which simplifies the addressing process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ICMP?

A
• Internet Control
Message Protocol (ICMP) is used to test
connectivity and send control and error messages.
• The ping command is
part of ICMP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the internet?

A

– A global system of interconnected computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is World Wide Web(www)

A

Designed to link and
access information of various kind, using
HTML(Hypertext Markup Language).
– It enables most users to access the vast resources of information that is available over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is URL

A

Uniform Resource Locator. The address of a web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the structure of a web address

A

• Web addresses are prefixed by:
– http:// (HyperText Transfer Protocol- set of rules governing
the format and transmission of data)-APPLICATION TRANSFER PROTOCOL
– www. (www)For example:http://www.google.com- HOST NAME

• Hosts and Domain Names: domain name as the name of the network you’re trying to connect to and think of the host as the computer you’re
looking for on that network.

• Path Name and File Name: the path maps to a
folder location where the file is stored on the server; the file is the name of the file you’re
looking for.

*See phone for pic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do the following mean?

.org, .com, .gov, net, .edu, .co.uk, .ac.uk

A

*see phone for pic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a web browser?

Examples?

A

• A web browser is a program that allows
you to read material that is published onto
the World Wide Web.
Firefox, Microsoft Edge, Explora, Chrome, Opera Mini, Safari

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are examples of ways to protect yourself online

A
  1. Purchase from reputable websites
  2. Avoid unnecessary disclosure of personal and financial information
  3. Log off from websites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is encryption?

A

Encryption is the method of encoding information, so that it unintelligible to any unauthorized person
who tries to read it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a digital ID?

A

Information is encrypted using a Digital ID. The digital ID will contain a private key which stays on your computer and encrypts information and a certificate containing a public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Digital Certificate

A

• A digital certificate is used in conjunction with encryption to enable safe transfer of sensitive information during online transactions.
• They are a digital form of identification.
• Issued by a third party known as Certificate Authority.
• Widely used when a web browser needs to
connect to a secure website, to carry out
online transactions.

17
Q

What are the types of SSL Certificates

A

– Standard SSL Certificates

– Extended Validation SSL certificate

18
Q

What is the procedure for connecting to a website secured with SSL

A
  • BROWSER ASKS THE WEB SERVER TO IDENTIFY ITSELF
  • WEB SERVER SENDS YOUR BROWSER A COPY OF ITS SSL CERTIFICATE
  • BROWSER CHECKS AND CONFIRMS THE CERTIFICATE WITH THE WEB SERVER
  • WEB SERVER SENDS A DIGITAL ACKNOWLEDGEMENT AND THE SSL ENCRYPTED SESSION BEGINS
  • ENCRYPTED DATA IS SECURELY SHARED BETWEEN YOUR BROWSER AND THE WEB SERVER
19
Q

What indicates the presence of an SSL certificate

A

– Standard HTTP is changed to HTTPS
– A padlock is displayed in the address bar, showing the connection is secure.
– Websites with extended validation SSL certificates, the
address bar will be displayed in green and the website owner’s legally incorporated company name is displayed alongside the URL.

20
Q

What are cookies

A

• Cookies are small files, containing
information about your visits to a website.
• They are stored on your computer, to
enable quick, customized future access to these websites.

21
Q

What are the factors determine the credibility of a website

A
  1. Author
  2. Reference
  3. Up to date content
  4. Copyright
22
Q

What is a copyright

A

The legal ownership of original material and
licenses, and copyright registration aims to
safeguard against software misuse.

23
Q

What is Intellectual property- IPR

A

Refers to creations of the mind. Can be ideas, inventions, literary and artistic works. They are
owned by their creator.

24
Q

What is the purpose for the data protection Act?

A

– To protect the rights of the data subject

– To set out the responsibilities of the data controller

25
Q

What are the requirements for the handling of personal data

A
. It must be:
• Fairly and lawfully processed
• Processed for limited purposes
• Adequate, relevant and not excessive
• Accurate
• Not kept longer than necessary
• Processed in accordance with the data subject’s rights
• Secure
• Not transferred to countries without adequate
data protection
26
Q

What are the Data Protection

responsibilities for a data controller

A

• A company collecting personal data from individuals should inform them of the purpose for which they intend to process the personal data.
• If a site makes use of cookies containing
personal information, this could also be
deemed as a method of collecting
personal data, and hence covered by
legislation