midterms Flashcards

1
Q

it is the transfer of information from one point to another.

A

data communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

this refers to information that is represented by a sequenceof zeros and ones; the same sort of data that is handled by computers.

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

data communication is much like a regular communication among people , which consists of the following parts;______,_______,_______,________.

A

message
sender
medium
receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

it is information that has been processed and organized, it can be alphabetical, numeric, or symbolic information, including binary-coded alphanumeric symbols, microprocessor op-codes, control codes, user addresses, program data, or database information.

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Telegraph was invented and ___________ developed Morse code in _________.

A

Samuel F.B. Morse, 1837

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______ invented a telegraph multiplexer, which allowed signals from up to six different telegraph equipments in 1874

A

Emile Baudot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Telephone was invented by Alexander Graham Bell in ________

A

1876

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • the international organization for standardization
  • creates the sets of rules and standards for graphics, document exchange, and related technologies
  • responsible for endorsing and coordinating the work of the other standards organizations
A

ISO (international standards organization)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • the standards organization for the United Nations and develops the recommended sets of rules and standards for telephone and telegraph communications
  • developed three sets of specifications: the V series for modem interfacing, the X series for data communications, and the I and Q series for Integrated Services Digital Network (ISDN)
A

ITU-T (CCITT) Consultative committee for international telephony and telegraphy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

*official standards agency for the United States
*US voting representative for ISO

A

ANSI (American national standards institute)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

US professional organization of electronics, computer, and communications engineers

A

IEEE (institute of electrical and electronics engineers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • Developed the RS (recommended Standard) series of standards for data and telecommunications
A

EIA (Electronics Industries association)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A general term that describes the interface equipment used at the stations to adapt the digital signals from the computers and terminals to a form more suitable for transmission

A

data terminal equipment (DTE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A general term that describes the equipment that converts digital signals to analog signals and interfaces the DTE to the analog transmission medium

A

data communications equipment (DCE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

two types of data transmission modes based on the number of bits

A

serial data transmission
parallel data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • There is a single transmission line used
  • Only one bit is transmitted at one time
  • It is often called serial-by-bit transmission
  • Used for long distance communications
A

serial data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To transfer data on a parallel link, a separate line is used as a clock signal. This serves to inform the receiver when data is available.

A

parallel data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

2 types of data communications circuit configuratiions

A

two point configuration
multipoint configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

it involves only
two locations or stations; e.g. the transfer of information between a mainframe computer and a remote
computer terminal, two mainframe computers, or two remote computer terminals

A

two-point configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

this involves three or more stations or terminals; e.g. the interconnection of a single mainframe computer to many remote computer terminals

A

multipoint configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

data transmission modes based on the direction of exchange of info

A

simplx
half-duplex
full duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

it is when signals travel
in one direction and one
direction only.

A

simplex (sx)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is when signals travel in both directions , but one at a time.

A

half-duplex (hdx)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

k bits is called

A

data words

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

r is called

A

redundant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

n = k+r, n is called ____

A

codewords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

it is is the number of differences between corresponding bits.

A

hamming distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

–the process of monitoring the received data and determining when a transmission error occurred
–its purpose is to prevent undetected errors from occurring

A

error detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

It is also known as parity check

A

VRC (vertical redundancy check)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

a block data bits is organized in rows and columns.
▪Also called as the Two Dimensional Parity
▪The parity bit is calculated for each column and sent along with the data
▪The block of parity acts as the redundant bits.

A

longitudinal redundancy check (LRC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Only intended receiver understands the message

A

secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Sender and receiver need to confirm each others identity

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Ensure that their communication has not been altered, either maliciously or by accident during transmission

A

message integrity

33
Q

it is is the science of secret, or hidden writing

A

cryptography

34
Q

it is Practice of hiding messages so that they can not be read by anyone other than the intended recipient

A

encryption

35
Q

this means Ensuring that users of data/resources are the persons they claim to be and that a message has not been surreptitiously altered

A

authentication & integrity

36
Q

it is the process of breaking an encryption code

A

cryptanalysis

37
Q

it is an asset which, like other important business assets, has value to an organization and consequently needs to be suitably protected‟

A

information

38
Q

it is The quality or state of being secure to be free from danger

A

information security

39
Q

Ensuring that information is accessible only to those authorized to have access

A

confidentiality

40
Q

Safeguarding the accuracy and completeness of information and processing methods

A

integrity

41
Q

Ensuring that authorized users have access to information and associated assets when required

A

availability

42
Q

A possibility that a threat exploits a vulnerability in an asset and causes damage or loss to the asset.

A

risk

43
Q

Something that can potentially cause damage to the organisation, IT Systems or network.

A

threat

44
Q

A weakness in the organization, IT Systems, or network that can be exploited by a threat.

A

vulnerability

45
Q

The catalyst that performs the threat.

A

agent

46
Q

Something that causes the agent to act.

A

motive

47
Q

The outcome of the applied threat. The results normally lead to the loss of CIA

A

results

48
Q

motivation
Challenge
Ego
Game Playing

threat
System hacking
Social engineering
Dumpster diving

A

external hackers

49
Q

motivation
Deadline
Financial problems
Disenchantment

threat
Backdoors
Fraud
Poor documentation

A

internal hackers

50
Q

motivation
revenge
political

threat
System attacks
Social engineering
Letter bombs Viruses
Denial of service

A

terrorist

51
Q

motivation
Unintentional errors
Programming errors Data

threats
Corruption of data
Malicious code
introduction System bugs

A

poorly trained

52
Q

it is a technique designed to let one party prove the identity of another party.

A

entity authentication

53
Q

an attempt by hackers to damage or destroy a computer network system

A

cyber attack

54
Q

this attack compromises the initial handshake process
makes the server unavailable for the actual traffic
sends SYN packets repeatedly and eventually overwhelms the targeted server

A

syn flood attack

55
Q

the attacker fills up the target machine with multiple connection requests
makes target machine to timeout, awaiting for permission to connect from the server

A

TCP SYN flood attack

56
Q

it is a DoS attack where fragmented packets are sent to a target machine
this makes the victim’s computer too crash overwhelming with packets

A

tear drop attack

57
Q

is a DoS attack which involves IP spoofing
a ping is issued to the entire IP broadcast addresses

A

smurf attack

58
Q

it happens when the network packets are used to ping the target machine wth large packet size

A

ping of death attack

59
Q

are millions of computers compromised with viruses by the hacker whos is under control of DDoS attacks

A

botnets

60
Q

cookies

A

cross site scripting attack

61
Q

this attack is most common in database-driven websites
SQL query is executed to the data base as the input from the client and the server
mostly works if a website uses dynamic SQL

A

SQL injection attack

62
Q

this happens when a hacker hijacks the established connection between a client and server
attacker changes the IP address for a trusted client

A

session hijacking

63
Q

this happens when a hacker manipulates the traffic by being in between the client and server

A

man-in-the-middle attack

64
Q
A
65
Q

it is used to convince the victim that he or she is connected to a trusted and known entity

A

IP Spoofing attack

66
Q

aka play back attack
it happens when a data transmission is hacked and purposely delayed or repeated

A

replay attack

67
Q

refers to the probability that two random message generates have the same message digest

A

birthday attack

68
Q

happens by guessing passwords randomnly or in systematic manner

A

password attack

69
Q

hacking of user confidential information sent over the network
occurs through the interuption of network traffic

A

eavesdropping attack

70
Q

sending an email in the name of trusted sources by an attacker is known as

A

pishing

71
Q

when pishing attack is conducted on the targeted audience it is called

A

spear pishing

72
Q

forces user to download malicious program on victim systems exposing personal data

A

spear pishing attack

73
Q

it consist of a single cable called a backbone connecting all nodes on a network without intervening connectivity devices

A

bus topology

74
Q

Each node is connected to the two nearest nodes so the entire network forms a circle

A

ring topology

75
Q

One method for passing data on ring networks is _

A

token passing

76
Q

Every node on the network is connected through a central device called hub or switch.

A

star topology

77
Q

Each computer connects to every other.

A

mesh topology

78
Q

is a combination of Bus and Star topology.

A

tree topology

79
Q

A metallic circuit formed by two conductors insulated from each other; in contrast with a four-wire circuit, it uses only one line or channel for transmission of electric waves in both directions.

A

two-wire circuit

80
Q

A two-way circuit using two paths so arranged that communication currents are transmitted in one direction only on one path, and in the opposite direction on the other path; the transmission path may or may not employ four wires.

A

four-wire circuit