TEST 1 Flashcards

1
Q

Define Cybersecurity

A

Cyber security is protecting the confidentiality, integrity and access of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the network requirements

A

Speed, distance, delay, reliability, and cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fragmentation

A

Break up the message into segments and each segment gets its own envelop(header, trailer), then those segments get routed through the network to the receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define what a host is

A

Any computer attached to a network, as that includes large servers, desktop PC’s, laptops, tablets, smartphones, etc..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is I.P. addressing?

A
  • logical reference to identifying the host
  • Dynamic - For people who are periodic users of the network
    - ex. Laptops are subscribed for a period of time
  • Static - Always there
    - network equipment, ex. Email
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the internet?

A

Collection of thousands of single networks and smaller internet’s as they all interconnect to form a single transmission system that in principle allows any internet host to reach any other host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internet exchange points

A

All networks to interconnect directly via the exchange

Verizon—> internet exchange point—> AT&T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define a Virtual Machine

A

Consists of many logical machines on one simple machine. Can be logically a windows server but shows a dozen others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain a domain name server

A
  • type : www. Ford.com
  • the internet can’t interpret that
  • the browser will contact a DNS server to get to map www. Ford.com to an I. P. Address in the form of xxx.xxx.xxx…etc
  • depending on where you’re coming from the address will be mapped to different servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Net Neutrality

A

Principle that ISPs should enable access to all content and applications regardless of the source, and without favoring or blocking particular products or websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the benefits and risks of using a cloud service provider?

A

Benefits

  • able to access data easier b/c of how big
  • ease of implementation
  • flexibility- system resources
  • capital expense

Risks

  • accessibility for attacks
  • out of your control
  • subject to cloud providers standards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multiplexing

A

Set of technique hat allows the simultaneous transmission of signals across a single data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does a router do?

A

Routes traffic between two or more networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does a switch do?

A

Routes traffic between a single network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does an access point do?

A
  • creates a wireless local area

- bridge between a wireless station and a wired LAD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the peering point?

A

Or internet exchange point is a data center that allows us to connect to individually owned and managed networks of different vendors

17
Q

What are the techniques to protect your device?

A

Firewalls- monitors and controls your network traffic
Scan for malware- software intended to damage or disable computers and computer systems
Security patches- update computer software to fix network vulnerabilities and other bugs

18
Q

Encapsulation

A

Adding a new envelope

19
Q

Name each of the five TCP/IP network layers and briefly describe their role/service in the network communication process

A

Email. Application- file transfer
TCP. Transport - error detection; host to host
IP. Internet - connects host to different networks
Data Links- sends segments to the same network
Wires. Physical- physically sends the signal

20
Q

Interoperability

A

Product or a system, whose interfaces are completely understood, to work with other products or systems

21
Q

Explain message ordering

A

“Three way handshake”

22
Q

Semantics

A

Meaning of a message
- most common HTTP request message is a GET message, which requests a file. There’s also POST request messages, which uploads files

23
Q

Syntax

A

How the message is organized

24
Q

Equifax hack

A
  • used “cross site scripting”
  • can be fixed with input validation
  • hacker inputs code to the website, the user inputs their user name and password and that information gets sent to the hacker