B3 - Issues Relating To Tranmission Of Data Flashcards

1
Q

What are the 4 different types of data transmission protocols?

A

Email
VOIP
Web Pages
Secure Payment Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 Email protocols?

A

SMTP - Single Mail Transfer Protocol
POP3 - Post Office Protocol 3
IMAP - Internet Message Access protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 VOIP protocols

A

SIP - Session Initiation Protocol
RTP - Real-time Transport Protocol
RTCP - RTP control protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 3 types of web page protocols?

A

HTTP - HyperText Transfer Protocol
HTTPS -HypeText Transfer Protocol Secure
FTP - File transfer protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 2 types of secure payment system protocols?

A

SET - Secure Electronic Transaction
3D secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the job of SMTP? (Email)

A
  • To transmit data from your email client to outgoing mail server
  • to transmit data between two outgoing mail server to recipient mail servers and reestablishes connection with outgoing mail server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the job of POP 3? (EMAIL)

A
  • To download emails from your mail server to email client then removed from mail server to email client then removed from mail server
  • can’t access emails on multiple devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the job of IMAP? (EMAIL)

A
  • receiving emails from mail server. They are synced between the client and server
  • can access same emails and gets updates on multiple devices.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the job of SIP (VOIP)

A
  • connection between server and receiver and establish location (IP address) of people in the conversation and to agree on CODECs
  • SIP packet sent from person starting VOIP call to recipient so that when the data packet is received, the phone rings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the job of RTP? (VOIP)

A
  • works with SIP, to transmit data packets along the connection
  • takes no responsibility for receiving lost packets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the job of RCTP? (VOIP)

A
  • sends control packets that provide feedback on quality of data delivery
  • info (E.G: bytes sent, packet courts, round trip times ( may and CODEC to boost performance)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the job of HTTP? (WP)

A
  • connection between client and server then transfers web pages to client so they can be presented by browser.
  • when you type a URL into the browser, a HTTP message is created that requests for a file from the web server, the server sends HTTP response message containing the files requested.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the job of HTTPS (WP)

A
  • transmits data in encrypted format using TSL/USL
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the job of FTP? (WP)

A

For transferring files over the internet (E.G: uploading web pages to a web server so it can be accessed by users browsing the web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the job of SET? (SPS)

A
  • communication protocol when purchase process is started only purchase the order and it is sent to the website , card details go to merchant bank. Payment is authorized with purchasers bank. Authorization is retuned to the computer website
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the job of 3D Secure? (SPS)

A
  • XML protocol, uses SSL encryption to ensure data is secure
  • merchant website will check of card is on 3D secure. If so, the buyer will be directed to a 3D Secure page for their own bank to authenticate the buyer (natwest verification at the end of buying something)
17
Q

What are the two connections of web page protocols?

A
  1. Control connection = to administrate the connection and send commands
  2. Data connection = to transfer files between the client computer and the server
18
Q

What are the two security issues of data transmission?

A

Sniffing and spoofing

19
Q

What is sniffing?

A
  • to gain unauthorized access to data
  • packet sniffer : instructs your computer to inspect all data transmitted over a network (pw, credit card details)
  • Public Wifi and Bluetooth vulnerable (harder if it’s wired)
20
Q

What is spoofing?

A
  • when you get your computer to pretend to be another computer
  • using fake credentials and preventing them to the network to access to services meant for another device (confidential data)
  • spoofing to perform denial of service attack by spoofing IP address
21
Q

What are the two security prevention methods?

A

Firewalls and encryption

22
Q

What is a firewall?

A
  • hardware/software firewalls to monitor traffic and block anything that appears to be dangerous/fake
  • block access to certain websites, prevent certain data being sent out of business .
  • prevent external computer accessing internal computer, closing certain ports to prevent network traffic going through them (built into router - uses rules to filter traffic and prevent anything unwanted
  • hardware firewall can prevent a Denial Of Service attack
23
Q

What is Encryption?

A
  • Prevents unauthorized here from reading intercepted data
  • SSL- encrypts the data to secure it so it can’t be accessed by anyone without encryption key
  • it relies on SSL/ digital certificates to authenticate a user and allows them to use public key infrastructure
24
Q

What is bandwidth ,latency and ping?

A

Bandwidth - amount of data that can be transferred from one computer to another in a given time (bits per second) (the higher bandwidth the better)
Latency - time taken for a data packet to transfer over a network (Ms) (the lower latency the better)
ping - time taken for a data packet to travel over a network to destination and back to you

25
Q

What is compression and the two types of compression?

A

The downsizing of a file so less bandwidth is needed to share
Lossy and lossless

26
Q

What is lossy compression?

A

Permanently deletes certain bits of data and it can’t be decompressed

27
Q

What is lossless compression?

A

Uses algorithms to pack data into a smaller space

28
Q

Advantages of lossy compression?

A

Has a smaller file size than lossless so the upload and download times are quicker

29
Q

Disadvantages of lossy compression?

A
  • Worse quality and can’t be restored to original quality (printing/assessment - quality is important)
  • Video compression uses CODEC which person receiving may not have installed ( can’t watch it )
  • Sometimes files can’t be compressed further so compressing = larger file size
30
Q

Advantages of lossless compression

A

Can be decompressed to original (can share)

31
Q

Disadvantages of lossless compression?

A
  • Compressed files can be incorrectly identified as malware by antivirus software and block it
  • file archive compression formats only work with specific archive software (recipient software must be compatible)
  • decompressing = higher processing time
  • may increase file size if it can’t be compressed more.
32
Q

What is a feature of CODECs and the two types of CODECS?

A

Because there’s so many, you must have the same CODEC the data is coded with to decode it.
The two types are software and hardware CODECs

33
Q

What is the job of hardware CODECs?

A
  • to encode analogue data ( computer can’t store/ use ) into digital and vice versa.
    EG: microphone VOIP transmits voice so it can be heard on computer
34
Q

What is the job of software CODECs

A

For audio and video data to compress so it can be transmitted over network to send data quickly (VOIP for real time convo)
Lowers buffering