Summary Questions, Chapters 40-42 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Firewall

A

Hardware or software protecting against unauthorised access to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two ways of creating a firewall?

A
  • packet filtering

* stateful inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is packet filtering?

A

A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is stateful inspection?

A

A technique for examining the contents of packets on a network and rejecting them if they do not form part of a recognised communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why does routing through a proxy server increase security?

A

There is no direct connection between the computer on the LAN and the internet, so all requests are passed through the proxy server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is symmetric encryption?

A

Where the sender and receiver both use the same key to encrypt and decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is key exchange?

A

When the sender sends the encryption key to the receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is asymmetric encryption?

A

When a public and private key are used to encrypt and decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a private key?

A

A code used to encrypt and decrypt data that is only known by one user, but is mathematically linked to a corresponding public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a public key?

A

A code used to encrypt and decrypt data that can be made public and is linked to a corresponding private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a digital certificate?

A

A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a Certification Authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Certification Authority?

A

A trusted organisation that provides digital certificates and signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a digital signature?

A

A method of ensuring that an encrypted message is from a trusted source as the have a unique, encrypted signature, verified by a Certification Authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Trojan?

A

Malware that is hidden within another file on your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a virus?

A

A generic term for malware where the program attaches itself to another file in order to infect a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a worm?

A

Malware or type of virus that replicates itself and spreads around a computer system, but does not need to be attached to a file in order to infect a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List ways of reducing the risk of a virus entering your network.

A
  • firewall
  • keep OS up to date
  • encrypt data files
  • ensure requests are coming from recognised sources
  • keep anti-virus software up to date
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which type of encryption is more secure?

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is TCP/IP?

A

A set of protocols for all TCP/IP network transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the four layers of TCP/IP?

A

Application, Transport, Internet, Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the purpose of the Application Layer?

A

Handles Domain Name System and some protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the purpose of the Transport Layer?

A

Ensures all packets have arrived and that there are no errors in them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the purpose of the Internet Layer?

A

Defines IP addresses of devices that send and receive data, creates and routes packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the purpose of the Link Layer?

A

Controls physical characteristics, provides synchronisation of devices, identifies network topology being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a port?

A

An addressable location on a network that links to a process or application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is HTTP?

A

A protocol for transmitting and displaying web pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the client-server model?

A

A way of implementing a connection between computers where one computer (client) makes use of the resources of another (server).

28
Q

Which protocols does HTTPS use?

A

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

29
Q

What is FTP?

A

A protocol for handling file uploads and downloads.

30
Q

What is SSH?

A

A protocol for remote access to computers.

31
Q

How does SSH improve connection security?

A

It creates a secure network of nodes.

32
Q

Why must you use specific command words when using SSH?

A

It uses a command line interface.

33
Q

What is SMTP protocol used for?

A

Sending emails

34
Q

What is POP3 protocol used for?

A

Receiving emails

35
Q

Which port does POP3 use?

A

Port 110

36
Q

What is a web server?

A

A dedicated computer on a network for handling web content.

37
Q

What is an email server?

A

A dedicated computer on a network for handling email.

38
Q

What is a web browser?

A

An application for viewing web pages.

39
Q

How does a web browser show a user web pages?

A
  1. Sends URL
  2. Translates URL to IP address
  3. Returns to browser
  4. Browser connects to web server using IP address
  5. Web server sends web pages to browser
40
Q

What does API stand for?

A

Application Program Interface

41
Q

What is an API?

A

A set of subroutines that enable one program to interface with another program.

42
Q

What is websocket protocol?

A

A set of rules that creates a persistent connection between two computers (client and server) on a network to enable real-time collaboration.

43
Q

What are messages?

A

Packets of data transmitted using websocket protocol.

44
Q

What is CRUD?

A

An acronym that explains the main functions of a database: Create, Read, Update, Delete

45
Q

What does CRUD refer to?

A

The way in which data is actually displayed.

46
Q

What does SQL stand for?

A

Standard Query Language

47
Q

What is SQL?

A

A programming language used to manage data within a relational database.

48
Q

What does REST stand for?

A

Representational State Transfer

49
Q

What is REST?

A

A methodology for implementing a networked database.

50
Q

What does HTTP stand for?

A

Hypertext Transfer Protocol

51
Q

What is HTTP?

A

Protocol to define identification, request and transfer of multimedia content over the Internet.

52
Q

What does JSON stand for?

A

JavaScript Object Notation

53
Q

What is JSON?

A

A standard format for transmitting data.

54
Q

What does XML stand for?

A

Extensible Markup Language

55
Q

What is XML?

A

A method of implementing a database where a database is put into a server and various users can access it from their workstations.

56
Q

What is a thin client?

A

A network where one computer contains most resources, processing power and storage capacity, which it distributes to other clients.

57
Q

What is a thick client?

A

A network where resources, processing power and storage capacity are distributed between the server and the client computers.

58
Q

What is a terminal?

A

A computer with little or no processing power or storage capacity, which is used as a client in a thin client network.

59
Q

What are the advantages of a thin client network?

A
  • Easy and cheap to set up new clients
  • Server can be configured to distribute all hardware and software resources needed
  • Hardware and software changes only need to be implemented on the server
  • Easier for network manager to control the clients
  • Greater security as clients have fewer access rights
60
Q

What are the disadvantages of a thin client network?

A
  • Clients are dependent on server, so if it goes down, all clients are affected
  • Can slow down with heavy use
  • May require greater bandwidth to cope with client request
  • High-specification servers are expensive
61
Q

What are the advantages of a thick client network?

A
  • Reduced pressure on the server leading to more uptime
  • Clients can store programs and data locally, giving them more control
  • Fewer servers and lower bandwidth can be used
  • Suitable for tablets and mobile phones that require more of the processing and storage to be done on the server side
62
Q

What are the disadvantages of a thick client network?

A
  • Reduced security if clients can download software or access the internet remotely
  • More difficult to manage and update
  • Data more likely to be lost or deleted on client side
  • Can be difficult to ensure data integrity
63
Q

How does JSON compare to XML in terms of human readability?

A

Very easy to read as it is based on defining objects and values

64
Q

How does JSON compare to XML in terms of how compact the code is?

A

Less code is created in JSON than XML.

65
Q

How does JSON compare to XML in terms of parsing speed?

A

Quicker than XML as data is clearly defined as object and value.

66
Q

How does JSON compare to XML in terms of ease of creation?

A

Easier to create as the syntax of the coding is easier.

67
Q

How does JSON compare to XML in terms of flexibility and extenibility?

A

Works with a limited range of data types, which may not be sufficient for all applications.