midterms Flashcards

(81 cards)

1
Q

it is the transfer of information from one point to another.

A

data communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

this refers to information that is represented by a sequenceof zeros and ones; the same sort of data that is handled by computers.

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

data communication is much like a regular communication among people , which consists of the following parts;______,_______,_______,________.

A

message
sender
medium
receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

it is information that has been processed and organized, it can be alphabetical, numeric, or symbolic information, including binary-coded alphanumeric symbols, microprocessor op-codes, control codes, user addresses, program data, or database information.

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Telegraph was invented and ___________ developed Morse code in _________.

A

Samuel F.B. Morse, 1837

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______ invented a telegraph multiplexer, which allowed signals from up to six different telegraph equipments in 1874

A

Emile Baudot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Telephone was invented by Alexander Graham Bell in ________

A

1876

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • the international organization for standardization
  • creates the sets of rules and standards for graphics, document exchange, and related technologies
  • responsible for endorsing and coordinating the work of the other standards organizations
A

ISO (international standards organization)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • the standards organization for the United Nations and develops the recommended sets of rules and standards for telephone and telegraph communications
  • developed three sets of specifications: the V series for modem interfacing, the X series for data communications, and the I and Q series for Integrated Services Digital Network (ISDN)
A

ITU-T (CCITT) Consultative committee for international telephony and telegraphy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

*official standards agency for the United States
*US voting representative for ISO

A

ANSI (American national standards institute)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

US professional organization of electronics, computer, and communications engineers

A

IEEE (institute of electrical and electronics engineers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • Developed the RS (recommended Standard) series of standards for data and telecommunications
A

EIA (Electronics Industries association)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A general term that describes the interface equipment used at the stations to adapt the digital signals from the computers and terminals to a form more suitable for transmission

A

data terminal equipment (DTE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A general term that describes the equipment that converts digital signals to analog signals and interfaces the DTE to the analog transmission medium

A

data communications equipment (DCE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

two types of data transmission modes based on the number of bits

A

serial data transmission
parallel data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • There is a single transmission line used
  • Only one bit is transmitted at one time
  • It is often called serial-by-bit transmission
  • Used for long distance communications
A

serial data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To transfer data on a parallel link, a separate line is used as a clock signal. This serves to inform the receiver when data is available.

A

parallel data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

2 types of data communications circuit configuratiions

A

two point configuration
multipoint configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

it involves only
two locations or stations; e.g. the transfer of information between a mainframe computer and a remote
computer terminal, two mainframe computers, or two remote computer terminals

A

two-point configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

this involves three or more stations or terminals; e.g. the interconnection of a single mainframe computer to many remote computer terminals

A

multipoint configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

data transmission modes based on the direction of exchange of info

A

simplx
half-duplex
full duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

it is when signals travel
in one direction and one
direction only.

A

simplex (sx)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is when signals travel in both directions , but one at a time.

A

half-duplex (hdx)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

k bits is called

A

data words

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
r is called
redundant
25
n = k+r, n is called ____
codewords
26
it is is the number of differences between corresponding bits.
hamming distance
27
–the process of monitoring the received data and determining when a transmission error occurred –its purpose is to prevent undetected errors from occurring
error detection
28
It is also known as parity check
VRC (vertical redundancy check)
29
a block data bits is organized in rows and columns. ▪Also called as the Two Dimensional Parity ▪The parity bit is calculated for each column and sent along with the data ▪The block of parity acts as the redundant bits.
longitudinal redundancy check (LRC)
30
Only intended receiver understands the message
secrecy
31
Sender and receiver need to confirm each others identity
authentication
32
Ensure that their communication has not been altered, either maliciously or by accident during transmission
message integrity
33
it is is the science of secret, or hidden writing
cryptography
34
it is Practice of hiding messages so that they can not be read by anyone other than the intended recipient
encryption
35
this means Ensuring that users of data/resources are the persons they claim to be and that a message has not been surreptitiously altered
authentication & integrity
36
it is the process of breaking an encryption code
cryptanalysis
37
it is an asset which, like other important business assets, has value to an organization and consequently needs to be suitably protected‟
information
38
it is The quality or state of being secure to be free from danger
information security
39
Ensuring that information is accessible only to those authorized to have access
confidentiality
40
Safeguarding the accuracy and completeness of information and processing methods
integrity
41
Ensuring that authorized users have access to information and associated assets when required
availability
42
A possibility that a threat exploits a vulnerability in an asset and causes damage or loss to the asset.
risk
43
Something that can potentially cause damage to the organisation, IT Systems or network.
threat
44
A weakness in the organization, IT Systems, or network that can be exploited by a threat.
vulnerability
45
The catalyst that performs the threat.
agent
46
Something that causes the agent to act.
motive
47
The outcome of the applied threat. The results normally lead to the loss of CIA
results
48
motivation Challenge Ego Game Playing threat System hacking Social engineering Dumpster diving
external hackers
49
motivation Deadline Financial problems Disenchantment threat Backdoors Fraud Poor documentation
internal hackers
50
motivation revenge political threat System attacks Social engineering Letter bombs Viruses Denial of service
terrorist
51
motivation Unintentional errors Programming errors Data threats Corruption of data Malicious code introduction System bugs
poorly trained
52
it is a technique designed to let one party prove the identity of another party.
entity authentication
53
an attempt by hackers to damage or destroy a computer network system
cyber attack
54
this attack compromises the initial handshake process makes the server unavailable for the actual traffic sends SYN packets repeatedly and eventually overwhelms the targeted server
syn flood attack
55
the attacker fills up the target machine with multiple connection requests makes target machine to timeout, awaiting for permission to connect from the server
TCP SYN flood attack
56
it is a DoS attack where fragmented packets are sent to a target machine this makes the victim's computer too crash overwhelming with packets
tear drop attack
57
is a DoS attack which involves IP spoofing a ping is issued to the entire IP broadcast addresses
smurf attack
58
it happens when the network packets are used to ping the target machine wth large packet size
ping of death attack
59
are millions of computers compromised with viruses by the hacker whos is under control of DDoS attacks
botnets
60
cookies
cross site scripting attack
61
this attack is most common in database-driven websites SQL query is executed to the data base as the input from the client and the server mostly works if a website uses dynamic SQL
SQL injection attack
62
this happens when a hacker hijacks the established connection between a client and server attacker changes the IP address for a trusted client
session hijacking
63
this happens when a hacker manipulates the traffic by being in between the client and server
man-in-the-middle attack
64
65
it is used to convince the victim that he or she is connected to a trusted and known entity
IP Spoofing attack
66
aka play back attack it happens when a data transmission is hacked and purposely delayed or repeated
replay attack
67
refers to the probability that two random message generates have the same message digest
birthday attack
68
happens by guessing passwords randomnly or in systematic manner
password attack
69
hacking of user confidential information sent over the network occurs through the interuption of network traffic
eavesdropping attack
70
sending an email in the name of trusted sources by an attacker is known as
pishing
71
when pishing attack is conducted on the targeted audience it is called
spear pishing
72
forces user to download malicious program on victim systems exposing personal data
spear pishing attack
73
it consist of a single cable called a backbone connecting all nodes on a network without intervening connectivity devices
bus topology
74
Each node is connected to the two nearest nodes so the entire network forms a circle
ring topology
75
One method for passing data on ring networks is _
token passing
76
Every node on the network is connected through a central device called hub or switch.
star topology
77
Each computer connects to every other.
mesh topology
78
is a combination of Bus and Star topology.
tree topology
79
A metallic circuit formed by two conductors insulated from each other; in contrast with a four-wire circuit, it uses only one line or channel for transmission of electric waves in both directions.
two-wire circuit
80
A two-way circuit using two paths so arranged that communication currents are transmitted in one direction only on one path, and in the opposite direction on the other path; the transmission path may or may not employ four wires.
four-wire circuit