Section 5 - Networks and web technologies Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What does URL stand for?

A

Uniform Resource Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the DHCP do?

A

It dynamically gives any connecting clients a private IP on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why does DHCP give dynamic IP addresses?

A

So that the IP you connect to constantly changes and so can’t be accessed through other methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is the first checked server in the DNS tree the local client?

A

The local client server has a catch memory of previously visited websites so can be accessed quickly without finding the address in the DNS servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between physical and logical topologies?

A

The physical topology is how the devices are physically connected (cables etc) and the logical topology is how the devices communicate on the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is circuit switching?

A

Creating a communication network between two endpoints for the duration of a phone call or file transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a transfer between two routers known as?

A

A hop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What data about a network does a router hold?

A

The available routes to the destination node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does a router do?

A

Look up the destination IP address in its routing table to find the best router to send a packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the difference between a router and a hub?

A

A hub doesn’t know where data needs to go or the fastest route to get there. The router knows both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between a switch and a router.

A

A switch knows the destination address but not how to get there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What data is in a packet?

A

The header, Payload and trailer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How big is a typical packet?

A

between 500 and 1500 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the header on a packet contain?

A

Senders IP
Recipients IP
Protocol
Packet number
Time to live (hop limit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is contained in the trailer of a packet?

A

Error checking components to maintain the payload integrity
Techniques to check the data by the receiving host (CRCs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When is the checksum calculated during file transfer?

A

When the packet reaches it’s destination

17
Q

What happens if the checksums after file transfer do not match?

A

The data is corrupted and rejected so new data is requested.

18
Q

Why does TCP and other protocols exist?

A

So data is handled the same way in every computer

19
Q

What is a gateway in a network?

A

A gateway is a physical appliance that removes the headers from packets and reapplies them with the correct format for that network.

20
Q

What are the 4 stages of the TCP/IP process?

A

Application
Transport
Internet
Link

21
Q

What happens at the application layer of TCP/IP?

A

The application layer provides the services for application that want to access the internet such as the protocol to be used

22
Q

What happens at the transport layer of TCP/IP?

A

Uses TCP to establish an end to end connection while it splits data into packets and numbers them. IT also adds a port number to be used based on HTTP protocol.

23
Q

What happens at the internet layer of the TCP/IP process?

A

Gives every packet a source and destination IP address

24
Q

What happens at the link layer of the TCP/IP process?

A

The link layer operates the physical connection between the computers and attaches the MAC address of the physical NIC that packets should be sent to

25
Q

What does the Link layer do upon receiving data?

A

Removes the MAC addresses and gives the packets to the internet layer

26
Q

What does the Internet layer do upon receiving data?

A

Removes the IP addresses from the packets and passes the data to the transport layer

27
Q

What does the Transport layer do upon receiving data?

A

Removes the port number from all the packets and reassembles the packets into the correct order before passing to the application layer.

28
Q

What does the Application layer do upon receiving data?

A

Takes the data and presents it in a browser.

29
Q

What are port numbers?

A

Numbers that represent the protocols with which data is being transferred

30
Q

What protocols does sending and receiving emails use?

A

SMTP (sending)
POP3 (viewing and deleting after download)
IMAP (viewing emails while saving a copy on the server)

31
Q

What is a firewall?

A

Hardware or software that controls access to and from a network.

32
Q

How does a firewall work?

A

It opens and closes ports within the firewall to only allow certain traffic through.

33
Q

What is packet filtering?

A

When packets are inspected by the firewall to check which port they are trying to access

34
Q

What is a proxy server?

A

A proxy is a server that you can connect to which hides your IP address by sending requests to the web server on your behalf.

35
Q

What are the functions of a proxy server?

A

Enables mostly anonymous surfing
Filters undesirable online content
Logs user data and requests
Provides a cache of previously visited sites.

36
Q

What is a worm?

A

A malicious program that self-replicates without needing to be run

37
Q

What is a trojan?

A

A malicious program that pretends to be something else

38
Q

What is phishing?

A

When people attempt to manipulate a victim into visiting fake websites and giving away personal information.

39
Q

What improvements could be made to code quality to aid against threats?

A

Guarding against buffer overflow attacks
Guarding against SQL injections
Use of strong passwords
Two-factor authentication
Use of access rights (permissions)