Internet Basics Flashcards

1
Q

What preceeded the internet?

A

The internetworking protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an ISP?

A

An internet service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Most people do not appreciate that the internet is really ___

A

a design philosophy and an architecture expressed in a series of protocols.

-vint cerf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A protocol is a ____

A

well-known set of rules and standards used to communicate between machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How the internet actually works is less important than the fact that this design philosophy has allowed ____

A

the internet to grow to accept and absorb new communication technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

All a technology needs to do to adapt to the internet is to ____

A

know which protocols to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Do all the different devices on the internet have unique addresses?

A

Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does IP stand for?

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a computer’s address?

A

It’s IP Address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How many bits does IPv4 use for addresses?

A

32 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How many bits will the IPv6 use?

A

128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The first set of numbers in an IP address represent ____

A

the country or regional address of the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In what year was IPv4 designed?

A

1973

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is DNS?

A

Domain Name System

It associates names with IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DNS servers are connected in a ____

A

distributed hierarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Each packet of data sent through the internet is labeled with it’s ____

A

origin IP address and its destination IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Special servers called _______ act like traffic managers to keep packets moving smoothly.

A

routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The network is _______ which means it can continue to function even when bad things happen to parts of it, which allows the internet to stay reliable.

A

fault tolerant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TCP

A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is TCP

A

Transmission Control Protocol manages the sending and receiving of all your data as packets. Think of it like a guaranteed mail service. If all the packets arrive, TCP approves the deliver, if some are missing, TCP requests the missing ones to be resent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

TCP and router systems are _____, they can work with 8 packets or 8 billion packets.

A

scalable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The internet can scale without ____

A

interrupting service.

23
Q

URL

A

uniform resource locator, another word for web address

24
Q

When you hit enter after typing in an address, your computer talks to another computer called a ______

25
Usually the server you are communicating with is ______
thousands of miles away.
26
Browsers and servers communicate using ____
HTTP | Hypertext Transfer Protocol
27
HTTP is mainly made up of ___
get requests (Get document-name)
28
A get request tells the server you want all of the ______ that makes up that particular page.
html code
29
What is HyperText Markup Language?
HTML is the language you use to tell a web browser how to make a page look.
30
The text of a web page is included in the HTML, but other parts, like images and videos ____
are separate files with their own urls that need to be reqeusted. The browser sends a separate HTTP request for each of these and they are then displayed as they arrive.
31
A _____ is when you enter information into a browser and send it to the server.
Post Request
32
When the server responds to a post request, what does it send back along with the requested information?
A cookie to remember who the computer is
33
Your browser sends a cookie along with requests if it wants the server to
remember who you are.
34
SSL
secure sockets layer
35
TLS
transport Layer Security
36
When a website asks your browser to engage in a secure connection, it first provides a _____
digital certificate
37
HTTP and DNS manage the _______ of web files.
sending and receiving.
38
TCP/IP and router networks _____ along the 'cheapest routes.'
break down and transport the packets
39
Encryption is ____
the scrambling of a message to hide the original information.
40
What was Caeser's cypher?
One of the first methods of encryption, this cypher used an agreed upon key which showed how far away in the alphabet the actual letter intended was. So e with a key of 3 would be e-f-g-h, H.
41
How can you make Caeser's cypher more secure?
By using more than one digit in the key. So a 23 key would be like saying Hello is equal to H-i-j, J, E-F-G, G, L-M, M, L-m-n, N, o-p, P jgmnp = hello
42
Too hard to crack means that there are too many ____
possibilities to compute in a reasonable amount of time.
43
How long are the encryption keys we use now?
256 bits
44
Using longer encryption keys does not make securing much harder, ________.
but it does make cracking exponentially harder
45
When the same key is used to encrypt and decrypt a message, it's called _____
symmetric encryption
46
Computers use asymmetric encryption. This is comprised of a public and a private key. The message is encrypted with the public key,
and decrypted only by a computer that has access to the private key.
47
Public key cryptography is the foundation of all secure messaging on the open internet including the security protocols ____
SSL and TSL
48
Hackers exploit _____
unintentional decisions made by people using software.
49
A virus is a program that ____
gets installed unintentionally and causes harm and spreads itself to other computers.
50
A lot of viruses are disguised as ____
security updates
51
A digital army known as a _____ can take down websites using Distributed Denial of Service attacks (DDoS).
bot net
52
A ______ is a trustworthy email that collects sensitive information which hackers can then use.
phishing scam
53
90% of the time, a system is hacked because of ____, not because of a flaw in the system.
a human error
54
Who are two people who invented the internet?
Bob Kahn | Vint Cerf