Section 5 - Networks and web technologies Flashcards

1
Q

What does URL stand for?

A

Uniform Resource Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the DHCP do?

A

It dynamically gives any connecting clients a private IP on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why does DHCP give dynamic IP addresses?

A

So that the IP you connect to constantly changes and so can’t be accessed through other methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is the first checked server in the DNS tree the local client?

A

The local client server has a catch memory of previously visited websites so can be accessed quickly without finding the address in the DNS servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between physical and logical topologies?

A

The physical topology is how the devices are physically connected (cables etc) and the logical topology is how the devices communicate on the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is circuit switching?

A

Creating a communication network between two endpoints for the duration of a phone call or file transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a transfer between two routers known as?

A

A hop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What data about a network does a router hold?

A

The available routes to the destination node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does a router do?

A

Look up the destination IP address in its routing table to find the best router to send a packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the difference between a router and a hub?

A

A hub doesn’t know where data needs to go or the fastest route to get there. The router knows both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between a switch and a router.

A

A switch knows the destination address but not how to get there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What data is in a packet?

A

The header, Payload and trailer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How big is a typical packet?

A

between 500 and 1500 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the header on a packet contain?

A

Senders IP
Recipients IP
Protocol
Packet number
Time to live (hop limit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is contained in the trailer of a packet?

A

Error checking components to maintain the payload integrity
Techniques to check the data by the receiving host (CRCs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When is the checksum calculated during file transfer?

A

When the packet reaches it’s destination

17
Q

What happens if the checksums after file transfer do not match?

A

The data is corrupted and rejected so new data is requested.

18
Q

Why does TCP and other protocols exist?

A

So data is handled the same way in every computer

19
Q

What is a gateway in a network?

A

A gateway is a physical appliance that removes the headers from packets and reapplies them with the correct format for that network.

20
Q

What are the 4 stages of the TCP/IP process?

A

Application
Transport
Internet
Link

21
Q

What happens at the application layer of TCP/IP?

A

The application layer provides the services for application that want to access the internet such as the protocol to be used

22
Q

What happens at the transport layer of TCP/IP?

A

Uses TCP to establish an end to end connection while it splits data into packets and numbers them. IT also adds a port number to be used based on HTTP protocol.

23
Q

What happens at the internet layer of the TCP/IP process?

A

Gives every packet a source and destination IP address

24
Q

What happens at the link layer of the TCP/IP process?

A

The link layer operates the physical connection between the computers and attaches the MAC address of the physical NIC that packets should be sent to

25
What does the Link layer do upon receiving data?
Removes the MAC addresses and gives the packets to the internet layer
26
What does the Internet layer do upon receiving data?
Removes the IP addresses from the packets and passes the data to the transport layer
27
What does the Transport layer do upon receiving data?
Removes the port number from all the packets and reassembles the packets into the correct order before passing to the application layer.
28
What does the Application layer do upon receiving data?
Takes the data and presents it in a browser.
29
What are port numbers?
Numbers that represent the protocols with which data is being transferred
30
What protocols does sending and receiving emails use?
SMTP (sending) POP3 (viewing and deleting after download) IMAP (viewing emails while saving a copy on the server)
31
What is a firewall?
Hardware or software that controls access to and from a network.
32
How does a firewall work?
It opens and closes ports within the firewall to only allow certain traffic through.
33
What is packet filtering?
When packets are inspected by the firewall to check which port they are trying to access
34
What is a proxy server?
A proxy is a server that you can connect to which hides your IP address by sending requests to the web server on your behalf.
35
What are the functions of a proxy server?
Enables mostly anonymous surfing Filters undesirable online content Logs user data and requests Provides a cache of previously visited sites.
36
What is a worm?
A malicious program that self-replicates without needing to be run
37
What is a trojan?
A malicious program that pretends to be something else
38
What is phishing?
When people attempt to manipulate a victim into visiting fake websites and giving away personal information.
39
What improvements could be made to code quality to aid against threats?
Guarding against buffer overflow attacks Guarding against SQL injections Use of strong passwords Two-factor authentication Use of access rights (permissions)