Test 1 Flashcards

1
Q

the amount of data that can be carried over a data network or connection in a fixed amount of time; higher=more data, expressed in bps

A

bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a network of zombie computers that can be remotely controlled by a hacker

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the act of using social media to create fake profiles, especially for the purpose of luring unsuspecting victims into online relationships

A

catfishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a protocol in which a _____ server assigns IP addresses to computers when they join a network. computer’s IP is not fixed, but can be different every time a computer joins the network

A

DHCP (dynamic host configuration protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a system for mapping human-friendly names to numeric IP addresses. DNS translates the name into the corresponding IP address. like directory assistance for the internet

A

DNS (domain name system)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an incident in which a user or organization is deprived of the services of a resource that they would normally expect to have. can target a person or company and are costly. can be politically motivated.

A

DoS (Denial of Service attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

computer becomes infected just by visiting a website which contains malicious code, vulnerable servers are searched for. cybercriminals inject their malicious code onto web pages. affects if you are unpatched

A

drive by download

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the number of legs (or hops) a particular packet takes as it moves from its source to its destination. aka number of routers a packet passes through on its journey

A

hop count

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

protocol for moving hypertext files and other info across the internet, requires browser on one end and web server on the other. uses tcp/ip services and is most important protocol for world wide web

A

http (hypertext transfer protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

standard internet protocol that routes data packets across multiple nodes and networks on a best effort basis and is unreliable

A

IP (internet protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

standard way of identifying a computer that is connected to the internet

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

hijacking and fraudulent use of another person’s personal information without that person’s knowledge

A

identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the amount of time it takes for a packet of data to get across a network from one point to another

A

network latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a unit of data sent across a network, contains destination address, sender’s address, error-control info, and data. layout determined by protocol

A

packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

use of counterfeit emals and fraudulent websites to fool recipients into disclosing personal financial data such as credit card numbers, usernames and passwords, and social security numbers

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

standard set of rules that govern how computers and electronics communicate with one another, define a messages format and how they are exchanged

A

protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

intermediate server that sits between clients and the servers those clients use. accepts requests from clients and transmits those requests to the server. prevents clients from accessing prohibited servers, etc.

A

proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

kind of extortion via software, in which a Trojan horse running on a computer will encrypt some files, only to be returned for money

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

software that hides the real screen of a computer to conceal the presence of other intrusive software. may hide some data so its not visible to the user

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

device that interconnects multiple computer networks, read the address info on data packets, which are then forwarded in the appropriate direction. assoc. with IP

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

malware that preys on naïve users, usually reports some nonexistent problem and convinces user to buy a software to “fix” it

A

scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

gaining access to systems or data by exploiting human psychology, rather than hacking

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

unsolicited junk messages, typically email, sent indiscriminately to many users at once

A

spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

a particular, designated victim or organization is targeted with an email customized for them, based on information the sender has gathered

A

spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

software that gathers information about a computer user and then transmits this info to an external entity without the knowledge or informed consent of the user

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

standard internet protocol that converts messages into streams of packets at the source, and reassembles streams of packets

A

TCP (transmission control protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

deceptive program that is presented as somewhat desirable, but is actually destructive with a malicious function

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

computer program that can reproduce by changing other programs to include a copy of itself. parasite program (needs another program to survive). requires a person/human contact to spread it

A

virus

29
Q

software program capable of reproducing itself and spreads automatically from one computer to the next over a network, generally taking advantage of security flaws. can spread once in a network without further human interaction

A

worm

30
Q

computer attached to the internet that has been comprised by a computer virus or Trojan horse so that it performs malicious tasks directed by the hacker. owners of these computers are often unaware it is even infected

A

zombie

31
Q

transforms infinites set of values to a finite set. sample analog input signals and convert to digital output signal. series of numbers representing the amplitude of the original signal as measured periodically (quantizing)

A

analog to digital converter

32
Q

world wide standard for the code numbers used by computers to represent all characters

A

ASCII (American standard code for information exchange)

33
Q

device or program that protects a network or individual computer from unauthorized external users. blocks certain types of traffic

A

firewall

34
Q

standard language for creating webpages

A

html

35
Q

company that sells access to the internet

A

ISP (internet service provider)

36
Q

connects computer in a relatively small area

A

LAN (local area network)

37
Q

control information on a packet needed by the network to deliver the user data

A

packet header

38
Q

data transmission method in which data is transmitted in packets through a network to a remote location

A

packet switching

39
Q

a set of up to 256 colors used in an image

A

palette

40
Q

often referred to as a dot, “dots per inch” short for picture element. make up an image

A

pixel

41
Q

connection point or interface and an external device

A

port

42
Q

process of limiting a value to one of a fixed number of values

A

quantization

43
Q

field in a packet header for some protocols, identifying the data contained in the payload

A

sequence number

44
Q

universal character set or wide-body ASCII that can represent all the characters in the world’s written languages

A

unicode

45
Q

global address for documents and other resources on the world wide web. first part indicates what protocol to use, second part indicates the IP address or domain name

A

URL (uniform resource locator)

46
Q

a computer network covering a large geographical area usually interconnecting two or more LANs

A

WAN (wide area network)

47
Q

abbrev. dns

A

domain name system

48
Q

abbrev. http

A

hypertext transfer protocol

49
Q

abbrev. ip

A

internet protocol

50
Q

abbrev. isp

A

internet service protocol

51
Q

abbrev. LAN

A

local area network

52
Q

abbrev. RFC

A

request for comment

53
Q

abbrev. tcp

A

transmission control protocol

54
Q

abbrev. URL

A

uniform resource locator

55
Q

how many bits in a kilobyte

A

8x1024

56
Q

what is a socket

A

ip address+tcp port
computer to program
connection you use

57
Q

internet vs. world wide web?

A

the internet is a collection of connected networks that can communicate with each other using TCP/IP, while the world wide web is a global web of linked information in various formats. its built using services of the internet, but those services are also used for separate things (email, voiceover). primary protocol of the web is HTTP

58
Q

format of an IP address?

A

x.x.x.x where x is a number between 0 and 255

59
Q

what type of images should use jpeg?

A

photos, images with complex color schemes

60
Q

what type of images should use gif?

A

line art, images with large areas of single color

61
Q

cookies: what creates?
when created?
where saved?
when sent from browser to web server?

A

created by web server
created when you visit a webpage
saved in browser
sent from browser to web server when you visit the site again

62
Q

virus vs. worm

A

worms do not need anymore human interaction to spread once they have infected a network (it spreads automatically). viruses require people to spread them (not on purpose)

63
Q

zombie computer: what is it?
how does it get this way?
how is it controlled?
what can it be used for?

A

it is a computer that has been compromised by malware that performs various malicious tasks
it is infected by a virus or Trojan horse to get this way
it is controlled by the hacker
it can be used for dos attacks or sending a spam email

64
Q

3 components of the google search and explanation

A

the crawl: reads all the web pages it can find and follows links from those pages to find others
the index: builds a database of the contents of those pages
the query processor: when a user submits a request, it used the info in the index and a complex set of rules to construct the best response

65
Q

responsibilities of client vs. server

A

client: handle user interface, translates requests into protocol, send request to server, wait, translate response into readable results, present them
server: listen for client’s request, process it, return results back to the client, maintain secure and important information

66
Q

ip vs tcp vs http

A

ip: unreliable, sees that packets are routed across multiple nodes and networks
tcp: reliable, uses ip, converts messages into streams of packets at the source, then reassembles them into messages at the destination
http: uses tcp/ip to move hypertext files and other info across the internet.

67
Q

how is an image turned into a set of numbers
-how does # of pixels and colors used affect: A) # of bytes B) how closely the actual image is represented in the digital representation

A

the image is divided into pixels, which each get assigned a solid color which requires 3 bytes (each color has a number) or use a palette (256 colors in each, each pixel requires one byte).
A) more colors used means more bytes, 3 bytes per pixel, but if a palette of colors is used then only one byte is required for each pixel.
B) not enough colors in the palette-won’t match the original picture close enough, not enough pixels-will be able to see each individual pixel, the picture won’t be sharp enough

68
Q

how can tcp reliably deliver a message over an unreliable ip network

A

when the large message is broken up into packets, these packets are numbered and sent.
-received packets are acknowledged
-unacknowledged packets are resent
-duplicate packets are discarded
at the destination the packets are reassembled into the original message

69
Q

describe the Melissa virus: how did it work?
how was it spread?
what made it so effective?

A

the Melissa virus was sent via email