Communications and Networks Part 2 Flashcards

1
Q

A ________ is designed to protect a computer or network from intruders.

A

firewall

[Explanation]

A firewall can be hardware or software-based or a combination of the two.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A _____ is a program that reproduces itself, either by making copies of itself or by attaching to another program.

A

virus

[Explanation]

Many common viruses attach themselves to an existing executable program, and when that program is copied to and run on other computers, the virus infects those computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ____________ is a program that is disguised as an innocent program to gain control of your computer.

A

Trojan horse

[Explanation]

Trojan horses refer to programs that appear to serve a normal function–i.e. two common examples are games and screensavers–but have a hidden, malicious agenda. For example, a game or a screensaver that’s a Trojan horse will contain code designed to give a hacker access to your computer. Trojan horses can also carry viruses and destructive instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

__________ uses mathematical formulas to create coded messages.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To prevent unauthorized access to sensitive data, you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.

A

key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___________ cable transmits pulsating beams of light rather than electricity.

A

Fiber optic

[Explanation]

Fiber optic cable consists of dozens or hundreds of thin strands of glass or plastic; it is more secure and can carry much more data than normal copper telephone wire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Infrared transmission sends data via light waves at a frequency too ___ for human eyes to see.

A

low

[Explanation]

Infrared ports can be found on some notebook computers, PDAs, mice and printers. Transmission is limited to short range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A message that has not been ________ is called plaintext.

A

encrypted

[Explanation]

Plaintext is also called cleartext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A message which has been encrypted is called __________.

A

cyphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The process of converting cyphertext to plaintext is ________.

A

decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Messages are encrypted using a cryptographic ________ and a key.

A

algorithm

[Explanation]

A cryptographic key is a number, word, or phrase that must be used to decrypt a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An algorithm is a _______ or set of steps for solving a particular problem.

A

formula

[Explanation]

To be an algorithm, a set of rules must be unambiguous and have a clear stopping point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__________ encryption uses two keys.

A

Public key

[Explanation]

A public key is used to encrypt the message and a private key is used to decrypt it.

Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The public key encryption software used to encrypt documents such as email is called ___.

A

PGP

[Explanation]

PGP (Pretty Good Privacy) encryption software is available for free download on the web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does PGP stand for?

A

Pretty Good Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Passwords are often encrypted using a ____ function, which is a function that takes a string of characters of any length and converts it into a string of a specific length.

A

hash

[Explanation]

A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a hash). For instance, a common password hashing function will take any string, whether it be “b7b” or “sam@userexamplemail.com” and convert it into a 13 character string (for example, “e.lDRxlIpgM0G”).

17
Q

SSL and TLS are protocols used to _______ transmit credit card data over the Internet

A

securely

[Explanation]

SSL (Secure Socket Layer) and TLS are protocols used to create a secure connection between a computer and a website. Sensitive information such as credit card numbers is encrypted and therefore useless if intercepted.

18
Q

What does SSL stand for?

A

Secure Socket Layer

19
Q

__________ detection software is used by merchants for online transactions to detect and prevent fraud by establishing criteria each transaction must meet.

A

Rule-based

[Explanation]

Examples of rules this software would include are matching cardholder information such as billing and shipping address and checking the card number against a database of stolen credit card numbers.

20
Q

____ is the communications protocol used by your browser to connect with web servers and display web pages on your computer.

A

HTTP

[Explanation]

The web protocol HTTP (Hypertext Transfer Protocol) is a set of rules for exchanging information over the web.

21
Q

FTP is a protocol used to copy _____ from one computer to another over the Internet.

A

files

[Explanation]

FTP can be used on any TCP/IP network such as a LAN or the Internet and is compatible with any operating system.

22
Q

A ___ is a string of characters that points to a specific piece of information anywhere on the web.

A

URL

[Explanation]

Heres an example of a URL (Uniform Resource Locator):

http://www.degreeforum.net/general-education-testing-discussion/1-post-your-test-results.html.

23
Q

What does URL stand for?

A

Uniform Resource Locator

24
Q

What part of the URL http://instantcert.com/landing.html is the top level domain?

A

com

[Explanation]

Examples of common top level domains are com, edu, gov, info, mil, net, org, and biz. Notice that we are just talking about the top level domain. The domain name would be “instantcert.com”; the top level domain just refers to the part after the period.

25
Q

DHCP is a protocol designed to automatically __________ IP addresses.

A

distribute

26
Q

What does DHCP stand for?

A

Dynamic Host Configuration Protocol.

27
Q

An __________ is a series of numbers used to identify a network device.

A

IP address

[Explanation]

IP addresses are assigned to network devices, computers and peripherals. They can be changed by the network administrator.

28
Q

A MAC address is a series of numbers assigned by the manufacturer to a ___________ card at the factory.

A

network interface

[Explanation]

MAC addresses are used for network security and low level network functions. They are set from the factory and cannot be changed by the network admin.

29
Q

Packet switching technology divides a message into _______ that can be independently routed to their destination and then reassembled.

A

packets

[Explanation]

Messages are divided into equal size packets and shipped over the network on a first come first served basis.

30
Q

A ______ is a small unit of data transmitted over a network.

A

packet

[Explanation]

The TCP/IP protocol breaks data up into packets, which are fixed-length blocks of data, for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate routes and yet all end up in the same place to be reassembled in the correct order.

31
Q

CSMA/CD is the Ethernet protocol that handles __________.

A

collisions

[Explanation]

When two stations transmit at the same time on a network, collisions occur. CSMA/CD manages collisions on the network by deleting colliding signals and resetting the network.