Comp Flashcards
What is WAP
Wireless access point allows wireless devices to connect to wired networks using wi-fi
What is a switch
A switch is used to connect all devices to a network and a switch will send a message to its intented location in a network
What is router
A router is a networking device that forwards data packets between computer networks.
What is a modem used for
A modem is used to modulate the electrical signal
What are some ways to reduce the chance of cyber attack succeeding
Audit trail
Use secure operating system
Provide effective network security
WHat is white box penetration testing
White box penetration testing approach, also known as an assumed breach, clear box, or transparent box testing, is where the penetration tester has full access and complete knowledge of the target that is being tested and its features.
What is black box penetration testing
In a black box penetration test, no information is provided to the tester at all.
What is ethical hacking
Ethical hacking is when a person hacks into a system but doesn’t cause any harm.
3 ways to identify vulnerabilities
penetration testing
Ethical hacking
commercial analysis tool
What is a eavesdropping attack
Eavesdropping attack is when someone intercepts data being sent from one computer to another computer. Eavesdropping is just reading the data but not copying it or stealing it.
What is a unpatched software
It is basically a sofware that is very vurnerable to malware attacks because the person who made it has to see the weaknesses of his software by putting it on the internet.
What is shoulder surfing
Shouldering involves a attacker watching victim over their shoulder while they provide personal infomation (For example passcode for phone).
What is pharming
The term pharming refers to a user being sent a fake website that the user believes is real and the users are tricked into entering their personal info.
What is phishing
Phishing is a attack in which a victim recieves a message disguised to look like it is from a reputable source (for example Bank). THe message will contain a link when clicked will trick victim into giving personal information or initiate the installation of a malware.
What are the 6 types of cyberattacks
Phising
Pharming
Shoulder surfing
Unpatched software
USB device
Eavesdropping
Disadvantage of cloud storage
You are relying on third party stroage provider if company shuts down data may be lost.
Internet is required to access data
security risk
Advantage of cloud
You can change to amount of storage you need at anytime
Stored data can be accessed from anywhere
Cloud storage can back up data hourly or daily so data can be restored if there is hardware failure.
What is a firewall
A firewall is something that sits inbetween a trusted network (e.g. Home network) and a un-trusted network (e.g. Internet) and the firewall will attempt to prevent malicious traffic entering the network.
What is a runtime error
A runtime error is when a program encounters issues with some operations during runtime.
What is a logic error
A logic error is when a program does not do what it was intended to do
What is a syntax error
A syntax error is where a program statement does not obey the grammatical rules of the programming language.
What is a compiler
Translates a high-level program to machine code.
If a program contains a syntax error, a comprehensive list of all syntax errors is produced.
What are the 2 types of low-level language
Assembly language and Machine code
Advantage and disadvantage of Mesh
Advantage: Multiple path between devices
Disadvantage: Expensive, complicated to install
Advantage and disadvantage of Star
Advantage: Reliable, no collision
Disadvantage:Expensive, central device fails = everything fails
Advantage and disadvantage of ring network
Advantage: Fast, no data collision(one direction flow)
Disadvantage: One fail = all fail
Advantage and disadvantage of bus
Advantage: cheap and easy
Disadvantage:
One point of failure
More devices –> slower
All devices can see the data(security risk)
Name the 4 network topologies
Bus
Ring
Star
Mesh
Name the 4 layers of TCP/IP model from top to bottom
Application
Transport
Internet
Link
What is IP
IP addresses are the identifier that allows information to be sent between devices on a network: they contain location information and make devices accessible for communication.
What is UDP
User Datagram Protocol. Data is split into packets (as with TCP). However, this is an unreliable transmission protocol. If any packets arrive out of sequence or are missing, they are ignored. UDP is suitable where data does not have to be 100% accurate but speed is important, e.g., with some video streaming services or VOIP.
What is TCP
Transmission Control Protocol (TCP) is a communications standard that enables application programs and computing devices to exchange messages over a network. It is designed to send packets across the internet and ensure the successful delivery of data and messages over networks.
What is DHCP
Dynamic Host Configuration Protocol. Used to assign IP addresses and other configuration options to devices in a network.
What is IMAP
Internet Message Access Protocol. Used to synchronise a client email account with an account on a mail server. The server returns new emails (if there are any) and deletes any emails that were deleted locally on the client application. This allows a user to use multiple devices to access their email account.
What is POP
Post Office Protocol. Used to request any new emails for a specific email account. The server returns the emails (if there are any).
What is SMTP
Simple Mail Transfer Protocol. Used to send an email to an email server. The server returns a code indicating whether or not the email could be delivered.
What is FTP
File Transfer Protocol. Used to upload or download a file. The server opens a data connection (over which the file will be transferred) or sends an error code if there was a problem with the request.
What is HTTPS
Hypertext Transfer Protocol Secure. Sends an encrypted request for a webpage. The server returns the encrypted page or an error code if there was a problem with the request.
What is HTTP
Hypertext Transfer Protocol. Used to make a request for a webpage. The server returns the page or an error code if there was a problem with the request.
Name the 3 types of networks and state some examples
PAN: Bluetooth
LAN: Office or school
WAN: Wide geographic areas