Internet Basics Flashcards

1
Q

What preceeded the internet?

A

The internetworking protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an ISP?

A

An internet service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Most people do not appreciate that the internet is really ___

A

a design philosophy and an architecture expressed in a series of protocols.

-vint cerf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A protocol is a ____

A

well-known set of rules and standards used to communicate between machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How the internet actually works is less important than the fact that this design philosophy has allowed ____

A

the internet to grow to accept and absorb new communication technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

All a technology needs to do to adapt to the internet is to ____

A

know which protocols to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Do all the different devices on the internet have unique addresses?

A

Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does IP stand for?

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a computer’s address?

A

It’s IP Address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How many bits does IPv4 use for addresses?

A

32 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How many bits will the IPv6 use?

A

128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The first set of numbers in an IP address represent ____

A

the country or regional address of the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In what year was IPv4 designed?

A

1973

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is DNS?

A

Domain Name System

It associates names with IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DNS servers are connected in a ____

A

distributed hierarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Each packet of data sent through the internet is labeled with it’s ____

A

origin IP address and its destination IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Special servers called _______ act like traffic managers to keep packets moving smoothly.

A

routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The network is _______ which means it can continue to function even when bad things happen to parts of it, which allows the internet to stay reliable.

A

fault tolerant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TCP

A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is TCP

A

Transmission Control Protocol manages the sending and receiving of all your data as packets. Think of it like a guaranteed mail service. If all the packets arrive, TCP approves the deliver, if some are missing, TCP requests the missing ones to be resent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

TCP and router systems are _____, they can work with 8 packets or 8 billion packets.

A

scalable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The internet can scale without ____

A

interrupting service.

23
Q

URL

A

uniform resource locator, another word for web address

24
Q

When you hit enter after typing in an address, your computer talks to another computer called a ______

A

server.

25
Q

Usually the server you are communicating with is ______

A

thousands of miles away.

26
Q

Browsers and servers communicate using ____

A

HTTP

Hypertext Transfer Protocol

27
Q

HTTP is mainly made up of ___

A

get requests (Get document-name)

28
Q

A get request tells the server you want all of the ______ that makes up that particular page.

A

html code

29
Q

What is HyperText Markup Language?

A

HTML is the language you use to tell a web browser how to make a page look.

30
Q

The text of a web page is included in the HTML, but other parts, like images and videos ____

A

are separate files with their own urls that need to be reqeusted. The browser sends a separate HTTP request for each of these and they are then displayed as they arrive.

31
Q

A _____ is when you enter information into a browser and send it to the server.

A

Post Request

32
Q

When the server responds to a post request, what does it send back along with the requested information?

A

A cookie to remember who the computer is

33
Q

Your browser sends a cookie along with requests if it wants the server to

A

remember who you are.

34
Q

SSL

A

secure sockets layer

35
Q

TLS

A

transport Layer Security

36
Q

When a website asks your browser to engage in a secure connection, it first provides a _____

A

digital certificate

37
Q

HTTP and DNS manage the _______ of web files.

A

sending and receiving.

38
Q

TCP/IP and router networks _____ along the ‘cheapest routes.’

A

break down and transport the packets

39
Q

Encryption is ____

A

the scrambling of a message to hide the original information.

40
Q

What was Caeser’s cypher?

A

One of the first methods of encryption, this cypher used an agreed upon key which showed how far away in the alphabet the actual letter intended was. So e with a key of 3 would be e-f-g-h, H.

41
Q

How can you make Caeser’s cypher more secure?

A

By using more than one digit in the key. So a 23 key would be like saying Hello is equal to H-i-j, J, E-F-G, G, L-M, M, L-m-n, N, o-p, P

jgmnp = hello

42
Q

Too hard to crack means that there are too many ____

A

possibilities to compute in a reasonable amount of time.

43
Q

How long are the encryption keys we use now?

A

256 bits

44
Q

Using longer encryption keys does not make securing much harder, ________.

A

but it does make cracking exponentially harder

45
Q

When the same key is used to encrypt and decrypt a message, it’s called _____

A

symmetric encryption

46
Q

Computers use asymmetric encryption. This is comprised of a public and a private key. The message is encrypted with the public key,

A

and decrypted only by a computer that has access to the private key.

47
Q

Public key cryptography is the foundation of all secure messaging on the open internet including the security protocols ____

A

SSL and TSL

48
Q

Hackers exploit _____

A

unintentional decisions made by people using software.

49
Q

A virus is a program that ____

A

gets installed unintentionally and causes harm and spreads itself to other computers.

50
Q

A lot of viruses are disguised as ____

A

security updates

51
Q

A digital army known as a _____ can take down websites using Distributed Denial of Service attacks (DDoS).

A

bot net

52
Q

A ______ is a trustworthy email that collects sensitive information which hackers can then use.

A

phishing scam

53
Q

90% of the time, a system is hacked because of ____, not because of a flaw in the system.

A

a human error

54
Q

Who are two people who invented the internet?

A

Bob Kahn

Vint Cerf